Search is not available for this dataset
filename
stringlengths 5
114
| module_name
stringlengths 8
67
| content
stringlengths 0
282M
|
---|---|---|
func_fs.ps1 | ADComputerRange-0.0.3 | # _________________________________________
# | | #
# | func_fs.ps1 | #
# |_________________________________________| #
# ====================== #
# PKGS #
#
# DESCRIPTION : filesystem interacting for all APPs.
# Test-Dir().
# DESCRIPTION : check directory.
# RETURN : bool.
function Test-Dir([Parameter(Mandatory=$true)][string]$PATH,[bool]$CREATE,[bool]$QUIET) {
If (Test-Path -Path "$PATH") {
[bool]$RESULT = $True;
} Else {
If ($CREATE -eq $True) { New-Item -ItemType "directory" -Path "$PATH" -Force | Out-Null; }
[bool]$RESULT = $False;
}
If ($QUIET -ne $True) { return $RESULT; }
}
# Test-File().
# DESCRIPTION : check file.
# RETURN : bool.
function Test-File([string]$PATH,[bool]$CREATE,[string]$CONTENT,[bool]$OVERWRITE,[bool]$QUIET) {
If (Test-Path -Path "$PATH") {
[bool]$RESULT = $True;
} Else {
If ($CREATE -eq $True) { New-Item -ItemType "file" -Path "$PATH" -Force | Out-Null; }
[bool]$RESULT = $False;
}
If ((-not([string]::IsNullOrWhiteSpace($CONTENT))) -And ($OVERWRITE -eq $True)) {
Set-Content -Path "$PATH" -Value "$CONTENT" | Out-Null;
}
If ($QUIET -ne $True) { return $RESULT; }
} |
ADComputerRange.psd1 | ADComputerRange-0.0.3 | #
# Module manifest for module 'ADComputerRange'
#
# Generated by: Frédéric Petit
#
# Generated on: 16/02/2024
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'ADComputerRange.psm1'
# Version number of this module.
ModuleVersion = '0.0.3'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = '4a7dda61-932b-498c-a0c6-6f9659f323a4'
# Author of this module
Author = 'Frédéric Petit'
# Company or vendor of this module
CompanyName = 'Frédéric Petit'
# Copyright statement for this module
Copyright = 'Copyright (c) 2024 ADComputerRange by Frédéric Petit'
# Description of the functionality provided by this module
Description = 'Show AD Computer state (name free, offline or online) by range and for those that are in use, displays the user logged in. Result exported to a CSV file.'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = 'Get-ADComputerRange'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'ActiveDirectory','Active','Directory','Range','Computer'
# A URL to the license for this module.
LicenseUri = 'https://gitlab.com/fredericpetit/get-ad-computer-range/-/raw/main/LICENSE'
# A URL to the main website for this project.
ProjectUri = 'https://gitlab.com/fredericpetit/ad-computer-range/'
# A URL to an icon representing this module.
IconUri = 'https://gitlab.com/uploads/-/system/project/avatar/54554295/find.png'
# ReleaseNotes of this module
# ReleaseNotes = ''
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
ADComputerRange.psm1 | ADComputerRange-0.0.3 | # __________________________________________________
# | | #
# | ADComputerRange.psm1 | #
# |__________________________________________________| #
# Paths.
$SEPARATOR = [System.IO.Path]::DirectorySeparatorChar;
$NAME = $PSScriptRoot.Split($SEPARATOR)[-1];
$MANIFEST = $PSScriptRoot + $SEPARATOR + $NAME + '.psd1';
$PATH_PUB = $PSScriptRoot + $SEPARATOR + 'src' + $SEPARATOR + 'windows' + $SEPARATOR + 'public';
$PATH_PRIV = $PSScriptRoot + $SEPARATOR + 'src' + $SEPARATOR + 'windows' + $SEPARATOR + 'private';
$PATH_CLASSES = $PSScriptRoot + $SEPARATOR + 'src' + $SEPARATOR + 'windows' + $SEPARATOR + 'classes';
# Sourcing.
$PUB = Get-ChildItem -Path $PATH_PUB | Where-Object { $_.Extension -eq '.ps1' };
$PUB | ForEach-Object { . $_.FullName };
$PRIV = Get-ChildItem -Path $PATH_PRIV | Where-Object { $_.Extension -eq '.ps1' };
$PRIV | ForEach-Object { . $_.FullName };
$CLASSES = Get-ChildItem -Path $PATH_CLASSES | Where-Object { $_.Extension -eq '.ps1' };
$CLASSES | ForEach-Object { . $_.FullName };
|
adconfiguration.psd1 | ADConfiguration-0.0.0.7 | #
# Module manifest for module 'adconfiguration'
#
# Generated by: David
#
# Generated on: 6/8/2016
#
@{
# Script module or binary module file associated with this manifest.
RootModule = '.\adconfiguration.psm1'
# Version number of this module.
ModuleVersion = '0.0.0.7'
# ID used to uniquely identify this module
GUID = '0900bd05-9444-4f3a-8607-fceb634c573a'
# Author of this module
Author = 'David'
# Company or vendor of this module
CompanyName = 'Unknown'
# Copyright statement for this module
Copyright = '(c) 2016 David. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Complements xActiveDirectory module with class based DSC resources to configure Active Directory even further.'
# Minimum version of the Windows PowerShell engine required by this module
# PowerShellVersion = ''
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module
FunctionsToExport = '*'
# Cmdlets to export from this module
CmdletsToExport = '*'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module
AliasesToExport = '*'
# DSC resources to export from this module
DscResourcesToExport = 'adsite', 'adsubnet', 'ADDCLocation'
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = @('DSC','ActiveDirectory','class','WMF5')
# The web address of this module's project or support homepage.
ProjectUri = 'https://github.com/davidobrien1985/adconfiguration'
# The web address of this module's license. Points to a page that's embeddable and linkable.
LicenseUri = 'https://www.apache.org/licenses/LICENSE-2.0.html'
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
adconfiguration.psm1 | ADConfiguration-0.0.0.7 | enum Ensure {
Absent
Present
}
[DscResource()]
class ADSite {
[DscProperty(Key)]
[string]$SiteName
[DscProperty()]
[string]$newSiteName
[DscProperty()]
[string]$siteDescription
[DscProperty(Mandatory)]
[string]$Ensure
[DscProperty(NotConfigurable)]
[string]$DistinguishedName
[ADSite]Get() {
$ADSite = [hashtable]::new()
$retADReplicationSite = $null
try {
$retADReplicationSite = Get-ADReplicationSite -Identity $this.SiteName -ErrorAction Ignore
}
catch {}
$ADSite.SiteName = $retADReplicationSite.Name
$ADSite.DistinguishedName = $retADReplicationSite.DistinguishedName
$ADSite.siteDescription = $retADReplicationSite.Description
return $ADSite
}
[void]Set() {
$adsite = $this.Get()
if ($this.Ensure -eq 'Absent') {
Write-Verbose -Message "Removing AD Site $($this.SiteName)."
Remove-ADReplicationSite -Identity $this.SiteName -Confirm:$false -Verbose
}
elseif ($this.Ensure -eq 'Present') {
if (($adsite.SiteName -eq $null) -or ($this.newSiteName -eq $null)) {
Write-Verbose -Message "Creating AD Site $($this.SiteName)."
New-ADReplicationSite -Name $this.SiteName -Description $this.siteDescription -Verbose
}
elseif ($adsite.SiteName -ne $this.newSiteName) {
Write-Verbose -Message "Renaming AD Site from $($this.SiteName) to $($this.newSiteName)."
Get-ADReplicationSite -Identity $this.SiteName | Set-ADObject -DisplayName $this.newSiteName
Get-ADReplicationSite -Identity $this.SiteName | Rename-ADObject -NewName $this.newSiteName
if ($adsite.Description -ne $this.siteDescription) {
Write-Verbose -Message 'Setting AD Site Description.'
Set-ADReplicationSite -Identity $this.newSiteName -Description $this.siteDescription
}
}
elseif ($adsite.Description -ne $this.siteDescription) {
Write-Verbose -Message "Setting AD Site $($this.SiteName)."
Set-ADReplicationSite -Identity $this.SiteName -Description $this.siteDescription -Verbose
}
}
}
[bool]Test() {
$ADSite = $null
try {
$ADSite = Get-ADReplicationSite -Identity $this.SiteName -ErrorAction Ignore
}
catch {}
if ($this.Ensure -eq 'Present') {
Write-Verbose -Message 'In Present if loop'
if ($this.newSiteName) {
Write-Verbose -Message 'new site name detected.'
try {
$ADSite = Get-ADReplicationSite -Identity $this.newSiteName -ErrorAction Ignore
}
catch {}
if ($ADSite.Name -ne $this.newSiteName) {
Write-Verbose -Message "$($ADSite.Name) is not in desired state."
return $false
}
else {
Write-Verbose -Message "$($ADSite.Name) is in desired state."
return $true
}
}
else {
if ($ADSite.Name -eq $this.SiteName) {
Write-Verbose -Message "$($ADSite.Name) is in desired state."
return $true
}
else {
Write-Verbose -Message "$($ADSite.Name) is not in desired state."
return $false
}
}
}
if ($this.Ensure -eq 'Absent') {
if ($ADSite.Name -eq $this.SiteName) {
Write-Verbose -Message "$($ADSite.Name) not in desired state."
return $false
}
else {
return $true
}
}
else {
Write-Verbose -Message "last else"
return $false
}
}
}
[DscResource()]
class ADSubnet {
[DscProperty(Key)]
[string]$subnetName
[DscProperty(Mandatory)]
[string]$Ensure
[ADSubnet] Get () {
$ADSubnet = [hashtable]::new()
$retADSubnet = $null
try {
$retADSubnet = Get-ADReplicationSubnet -Identity $this.subnetName -ErrorAction Ignore
}
catch {}
$ADSubnet.SubnetName = $retADSubnet.Name
$ADSubnet.DistinguishedName = $retADSubnet.DistinguishedName
return $ADSubnet
}
[void] Set () {
if ($this.Ensure -eq 'Present') {
New-ADReplicationSubnet -Name $this.subnetName -Confirm:$false -Verbose
Write-Verbose -Message "Created new subnet $($this.subnetName)."
}
else {
Remove-ADReplicationSubnet -Identity $this.subnetName -Confirm:$false -Verbose
Write-Verbose -Message "Removed new subnet $($this.subnetName)."
}
}
[bool] Test () {
$subnet = $null
try {
$subnet = Get-ADReplicationSubnet -Identity $this.subnetName -ErrorAction Ignore
}
catch {}
if ($this.Ensure -eq 'Present') {
if ($subnet.Name -eq $this.subnetName) {
return $true
}
else {
return $false
}
}
elseif ($this.Ensure -eq 'Absent') {
if ($subnet.Name -eq $this.subnetName) {
return $false
}
else {
return $true
}
}
else {
return $false
}
}
}
[DscResource()]
class ADDCLocation {
[DscProperty(Mandatory)]
[string]$DCLocation
[DscProperty(Key)]
[string]$DCName
[ADDCLocation] Get() {
$ADDCLocation = [hashtable]::new()
$dc = Get-ADDomainController -Identity $this.DCName
$ADDCLocation.DCLocation = $dc.Site
$ADDCLocation.DCName = $dc.Name
return $ADDCLocation
}
[void] Set() {
Write-Verbose -Message "Moving $($this.DCName) to site $($this.DCLocation)."
Move-ADDirectoryServer -Identity $this.DCName -Site $this.DCLocation -Verbose
}
[bool] Test() {
$dc = $this.Get()
if ($dc.DCLocation -eq $this.DCLocation) {
Write-Verbose -Message "$($this.DCName) is in desired state. AD Site is $($dc.DCLocation)."
return $true
}
else {
Write-Verbose -Message "$($this.DCName) is not in desired state. Current AD Site is $($dc.DCLocation)."
return $false
}
}
} |
ADDRS.psm1 | ADDRS-1.1.9 | <#
.SYNOPSIS
Automatically right sizes a given VM based on CPU, memory, performance rating and cost. Can run in many modes and is highly configurable (WhatIf, Force, etc)
Check Get-Help for the following functions to determine which one to use:
* set-vmRightSize
* set-rsgRightSize
.NOTES
filename: AADRS.psm1
author: Jos Lieben / [email protected]
copyright: https://www.lieben.nu/liebensraum/commercial-use/ (Commercial (re)use not allowed without prior written consent by the author, otherwise free to use/modify as long as header are kept intact)
site: https://www.lieben.nu/liebensraum/2022/05/automatic-modular-rightsizing-of-azure-vms-with-special-focus-on-azure-virtual-desktop/
Created: 16/05/2022
Updated: see Git: https://gitlab.com/Lieben/assortedFunctions/-/tree/master/ADDRS
#>
function set-vmToSize{
[cmdletbinding()]
Param(
[Parameter(Mandatory)][Object]$vm,
[Parameter(Mandatory)][String]$newSize,
[Switch]$Force,
[Switch]$Boot,
[Switch]$WhatIf
)
if($vm.HardwareProfile.VmSize -ne $newSize){
if($vm.PowerState -eq "VM running"){
if($Force){
Write-Verbose "Stopping $($vm.Name) as it is running and -Force was specified"
if(!$WhatIf){
$vm | Stop-AzVM -Confirm:$False -Force | Out-Null
}
Write-Verbose "Stopped $($vm.Name)"
}else{
Throw "$($vm.Name) still running, cannot resize a running VM. Use -Force if you wish to shut down $($vm.Name) automatically"
}
}else{
Write-Verbose "$($vm.Name) is already stopped or deallocated"
}
$vm.HardwareProfile.VmSize = $newSize
if(!$WhatIf){
Write-Verbose "Sending resize command"
$retVal = ($vm | Update-AzVM).StatusCode
Write-Host "VM resize result: $($retVal)"
}else{
Write-Host "Not sending resize command because running in -WhatIf"
$retVal = "OK"
}
if($Boot){
if(!$WhatIf){
Write-Verbose "Starting $($vm.Name) as -Boot was specified"
$vm | Start-AzVM -Confirm:$False -NoWait | Out-Null
}else{
Write-Verbose "-Boot specified, but not booting as -WhatIf was specified"
}
}
return $retVal
}else{
Throw "VM already at specified size"
}
}
function get-azureVMPricesAndPerformance{
[cmdletbinding()]
Param(
[String][Parameter(Mandatory)]$region
)
$vmPrices = @()
$vmPricingData = Invoke-RestMethod -Uri "https://prices.azure.com/api/retail/prices?meterRegion=primary&api-version=2021-10-01-preview¤cyCode='USD'&`$filter=serviceName eq 'Virtual Machines' and priceType eq 'Consumption' and armRegionName eq '$region'" -Usebasicparsing -Method GET -ContentType "application/json"
$vmPrices += $vmPricingData.Items
while($vmPricingData.NextPageLink){
$vmPricingData = Invoke-RestMethod -Uri $vmPricingData.NextPageLink -Usebasicparsing -Method GET -ContentType "application/json"
$vmPrices += $vmPricingData.Items
}
Write-Verbose "$($vmPrices.Count) prices retrieved, retrieving performance scores..."
$vmScoreRawData = (Invoke-RestMethod -Uri "https://raw.githubusercontent.com/MicrosoftDocs/azure-compute-docs/main/articles/virtual-machines/windows/compute-benchmark-scores.md" -Method GET -UseBasicParsing) -split "`n"
$vmScoreData = @()
$inTable = $False
for($l=0;$l -lt $vmScoreRawData.Count; $l++){
if($vmScoreRawData[$l].StartsWith("| VM Size |")){
#skip a line
$l++
$inTable = $True
continue
}
if($inTable){
if(!$vmScoreRawData[$l].StartsWith("| ")){
$inTable = $False
continue
}
$lineData = $vmScoreRawData[$l].Split("|")
$vmScoreData += [PSCustomObject]@{
"type" = $lineData[1].Trim()
"perf" = $lineData[6].Trim()
}
}
}
Write-Verbose "$($vmScoreData.Count) performance rows retrieved, merging data..."
$global:azureVMPrices = @()
$vmPrices = $vmPrices | where{-Not($_.skuName.EndsWith("Spot")) -and -Not($_.skuName.EndsWith("Low Priority"))}
foreach($sku in ($vmPrices.armSkuName | Select-Object -Unique)){
$vmPricing = $vmPrices | where{$_.armSkuName -eq $sku}
$obj = [PSCustomObject]@{
"Name" = $sku
"numberOfCores" = $($global:azureAvailableVMSizes | where{$_.Name -eq $sku}).NumberOfCores
"memoryInMB" = $($global:azureAvailableVMSizes | where{$_.Name -eq $sku}).MemoryInMB
"linuxPrice" = $($vmPricing | where{!$_.productName.EndsWith("Windows")}).retailPrice
"windowsPrice" = $($vmPricing | where{$_.productName.EndsWith("Windows")}).retailPrice
"perf" = $($vmScoreData | where{$_.type -eq $sku} | Sort-Object -Property perf | Select-Object -Last 1).perf
}
$global:azureVMPrices+= $obj
}
}
function get-vmRightSize{
[cmdletbinding()]
Param(
[Parameter(Mandatory)][String]$targetVMName,
[Parameter(Mandatory)][Guid]$workspaceId, #workspace GUID where perf data is stored (use Get-AzOperationalInsightsWorkspace to find this)
$domain, #if your machines are domain joined, enter the domain name here
[Int]$maintenanceWindowStartHour, #start hour of maintenancewindow in military time UTC (0-23)
[Int]$maintenanceWindowLengthInHours, #length of maintenance window in hours (round up if needed)
[ValidateSet(0,1,2,3,4,5,6)][Int]$maintenanceWindowDay, #day on which the maintenance window starts (UTC) where 0 = Sunday and 6 = Saturday
[String]$region = "westeurope", #you can find yours using Get-AzLocation | select Location
[Int]$measurePeriodHours = 152, #lookback period for a VM's performance while it was online, this is used to calculate the optimum. It is not recommended to size multiple times in this period!
[Array]$allowedVMTypes = @("Standard_D2ds_v4","Standard_D4ds_v4","Standard_D8ds_v4","Standard_D2ds_v5","Standard_D4ds_v5","Standard_D8ds_v5","Standard_E2ds_v4","Standard_E4ds_v4","Standard_E8ds_v4","Standard_E2ds_v5","Standard_E4ds_v5","Standard_E8ds_v5"),
[Int]$minMemoryGB = 2, #will never assign less than this (even if you've allowed VM's with more)
[Int]$maxMemoryGB = 512, #will never assign more than this (even if you've allowed VM's with more)
[Int]$minvCPUs = 1, #min 2 required for network acceleration!
[Int]$maxvCPUs = 64, #in no case will this function assign a vmtype with more vCPU's than this
[Switch]$doNotCheckForRecentResize #if this switch is used, the function will not check if the VM was resized within measurePeriodHours and if so will not resize it again
)
$script:reportRow = [PSCustomObject]@{
"vmName"=$targetVMName
"currentSize"=$Null
"targetSize"=$Null
"resized"=$False
"costImpactPercent"=$Null
"reason"=$Null
}
#####CONFIGURATION##########################
$vCPUTrigger = 0.75 #if a CPU is over 75% + the differerence percent on average, a vCPU should be added. If under 75% - the difference percent, the optimum amount should be calculated
$memoryTrigger = 0.75 #if this percentage of memory + the difference percent is in use on average, more should be added. If under this percentage - the difference percent, memory should be recalculated
$rightSizingMinimumDifferencePercent = 0.10 #minimum difference/buffer of 10% to avoid VM's getting resized back and forth every time you call this function
$defaultSize = "" #if specified, VM's that do not have performance data will be sized to this size as the fallback size. If you don't specify anything, they will remain at their current size untill performance data for right sizing is available
#####END OF OPTIONAL CONFIGURATION#########
$cul = $vCPUTrigger + $rightSizingMinimumDifferencePercent
$cll = $vCPUTrigger - $rightSizingMinimumDifferencePercent
$mul = $memoryTrigger + $rightSizingMinimumDifferencePercent
$mll = $memoryTrigger - $rightSizingMinimumDifferencePercent
#determine Azure Monitor query parameters in case a maintenance window was specified
if($domain){
$domain = ".$($domain)"
}
if($maintenanceWindowStartHour -and $maintenanceWindowDay -and $maintenanceWindowLengthInHours){
$start = ([datetime]"2022-02-01T$($maintenanceWindowStartHour):00:00")
$end = $start.AddHours($maintenanceWindowLengthInHours)
if($start.Day -eq $end.Day){
$queryAddition = " and ((dayofweek(TimeGenerated) == $($maintenanceWindowDay)d and (hourofday(TimeGenerated) < $maintenanceWindowStartHour or hourofday(TimeGenerated) > $($end.Hour))) or dayofweek(TimeGenerated) != $($maintenanceWindowDay)d)"
}else{
$queryAddition = " and ((dayofweek(TimeGenerated) == $($maintenanceWindowDay)d and (hourofday(TimeGenerated) < $maintenanceWindowStartHour)) or dayofweek(TimeGenerated) != $($maintenanceWindowDay)d) and ((dayofweek(TimeGenerated) == $($maintenanceWindowDay+1)d and (hourofday(TimeGenerated) > $($end.Hour))) or dayofweek(TimeGenerated) != $($maintenanceWindowDay+1)d)"
}
Write-Verbose "$targetVMName grabbing data to calculate optimal size excluding maintenance window on day $maintenanceWindowDay at $maintenanceWindowStartHour for $maintenanceWindowLengthInHours hours"
}else{
$queryAddition = $Null
Write-Verbose "$targetVMName grabbing data to calculate optimal size"
}
#use a global var to cache data between subsequent calls to list all available Azure VM sizes in the region
if(!$global:azureAvailableVMSizes){
$localCachePath = Join-Path $env:TEMP "azureAvailableVMSizes.json"
if((Test-Path $localCachePath)){
$global:azureAvailableVMSizes = Get-Content $localCachePath | ConvertFrom-Json
Write-Host "Loaded cached Azure VM sizes from $localCachePath"
}else{
try{
Write-Host "No VM size cache for $region yet, creating this first...."
$global:azureAvailableVMSizes = Get-AzVMSize -Location $region -ErrorAction Stop
Write-Host "VM Size cache created"
Write-Verbose "Cached the following available VM types in $region :"
Write-Verbose ($global:azureAvailableVMSizes.Name -Join ",")
$global:azureAvailableVMSizes | ConvertTo-Json -Depth 50 | Set-Content $localCachePath -Force -Confirm:$False
}catch{
Throw "$targetVMName failed to retrieve available Azure VM sizes in region $region because of $_"
}
}
}
#use a global var to cache data between subsequent calls to list cost and performance data in the selected region
if(!$global:azureVMPrices){
$localCachePath = Join-Path $env:TEMP "azureVMPrices.json"
if((Test-Path $localCachePath)){
$global:azureVMPrices = Get-Content $localCachePath | ConvertFrom-Json
Write-Host "Loaded cached Azure VM prices from $localCachePath"
}else{
try{
Write-Host "No cache of VM performance and pricing data yet, creating this first...."
get-azureVMPricesAndPerformance -region $region
$global:azureVMPrices | ConvertTo-Json -Depth 50 | Set-Content $localCachePath -Force -Confirm:$False
Write-Host "VM Performance and pricing data cached"
}catch{
Throw "$targetVMName failed to get pricing and performance data for Azure VM sizes because of $_"
}
}
}
#enrich all allowed VM's with pricing data and remove any that are not availabe in the selected region
$selectedVMTypes = @()
foreach($allowedVMType in $allowedVMTypes){
if($azureAvailableVMSizes.Name -contains $allowedVMType){
$vmPricingInfo = $Null
$vmPricingInfo = $azureVMPrices | where{$_.Name -eq $allowedVMType}
if($vmPricingInfo){
$selectedVMTypes += [PSCustomObject]@{
"Name" = $allowedVMType
"NumberOfCores" = $vmPricingInfo.numberOfCores
"MemoryInMB" = $vmPricingInfo.memoryInMB
"linuxPrice" = $vmPricingInfo.linuxPrice
"windowsPrice" = $vmPricingInfo.windowsPrice #https://docs.microsoft.com/en-us/rest/api/cost-management/retail-prices/azure-retail-prices
"perf" = $vmPricingInfo.perf #https://docs.microsoft.com/en-us/azure/virtual-machines/linux/compute-benchmark-scores#about-coremark
}
}
}
}
#sort the VM types we may use based on their price first, then performance rating
$selectedVMTypes = $selectedVMTypes | Sort-Object @{e={$_.windowsPrice};a=1},@{e={$_.perf}; a=0},@{e={$_.Name.Split("_")[-1]}; a=0}
Write-Verbose "Allowed VM types: $($selectedVMTypes.Name -Join ",")"
#error out if none match
if($selectedVMTypes.Count -le 0){
Throw "$targetVMName failed to determine optimal size because your `$allowedVMTypes list does not contain any VM's that are available in this subscription and region"
}
#get meta data of targeted VM
try{
$targetVM = Get-AzVM -Name $targetVMName -ErrorAction Stop
if(!$targetVM){
Throw "$targetVMName does not exist in this subscription or you do not have permissions to access it"
}
$script:reportRow.currentSize = $targetVM.HardwareProfile.VmSize
$targetVMPricing = $Null
$targetVMPricing = $azureVMPrices | where{$_.name -eq $targetVM.HardwareProfile.VmSize}
$targetVMCurrentHardware = $global:azureAvailableVMSizes | where{$_.Name -eq $targetVM.HardwareProfile.VmSize}
if(!$targetVMCurrentHardware){
Throw "Current VM type $($targetVM.HardwareProfile.VmSize) could not be found in Azure's Available VM list, please resize manually to a currently supported size before using this function or wait until it becomes available again (this is sometimes transitive while Msft scales to customer demand)"
}
Write-Verbose "$targetVMName currently runs on $($targetVMCurrentHardware.NumberOfCores) vCPU's and $($targetVMCurrentHardware.MemoryInMB)MB memory ($($targetVM.HardwareProfile.VmSize))"
}catch{
Throw "$targetVMName failed to get VM metadata from Azure because of $_"
}
#check for the LCRightSizeConfig tag
if($targetVM.Tags["LCRightSizeConfig"]){
Write-Verbose "$targetVMName has right sizing tag with value $($targetVM.Tags["LCRightSizeConfig"])"
if($targetVM.Tags["LCRightSizeConfig"] -eq "disabled"){
Throw "$targetVMName right sizing disabled through Azure Tag"
}else{
$script:reportRow.targetSize = $targetVM.Tags["LCRightSizeConfig"]
return $targetVM.Tags["LCRightSizeConfig"]
}
}
if(!$doNotCheckForRecentResize){
Write-Verbose "$targetVMName checking for recent resize in the past $($measurePeriodHours) hours..."
$VMAzLog = $Null;$VMAzLog = Get-AzLog -ResourceId $vm.Id -StartTime (Get-Date).AddHours($measurePeriodHours*-1) -WarningAction SilentlyContinue
$resized = $False
foreach($log in $VMAzLog){
if($log.properties.content.responseBody){
$json = $log.properties.content.responseBody | convertfrom-json
if($json.properties.hardwareProfile.vmSize){
$resized = $True
}
}
}
if($resized){
Write-Verbose "$targetVMName was resized in the past $($measurePeriodHours) hours, skipping resize. You can override this with -doNotCheckForRecentResize"
$script:reportRow.targetSize = $targetVM.HardwareProfile.VmSize
return $targetVM.HardwareProfile.VmSize
}
}
#get memory performance of targeted VM in configured period
try{
$query = "Perf | where TimeGenerated between (ago($($measurePeriodHours)h) .. ago(0h)) and CounterName =~ 'Available Mbytes' and Computer =~ '$($targetVMName)$($domain)'$queryAddition | project TimeGenerated, CounterValue | order by CounterValue"
Write-Verbose "$targetVMName querying log analytics workspace $workspaceId : $query"
$result = Invoke-AzOperationalInsightsQuery -WorkspaceId $workspaceId -Query $query -ErrorAction Stop
$resultsArray = [System.Linq.Enumerable]::ToArray($result.Results)
Write-Verbose "$targetVMName retrieved $($resultsArray.Count) MB (LA type counter) memory datapoints from Azure Monitor"
if($resultsArray.Count -le 0){
Write-Verbose "No data returned by Log Analytics for LA type counter, checking for AM type counter"
$query = "Perf | where TimeGenerated between (ago($($measurePeriodHours)h) .. ago(0h)) and CounterName =~ 'Available Bytes' and Computer =~ '$($targetVMName)$($domain)'$queryAddition | project TimeGenerated, CounterValue | order by CounterValue"
Write-Verbose "$targetVMName querying azure monitor workspace $workspaceId : $query"
$result = $Null; $result = Invoke-AzOperationalInsightsQuery -WorkspaceId $workspaceId -Query $query -ErrorAction Stop
$resultsArray = $Null; $resultsArray = [System.Linq.Enumerable]::ToArray($result.Results)
Write-Verbose "$targetVMName retrieved $($resultsArray.Count) MB (AM type counter) memory datapoints from Azure Monitor"
if($resultsArray.Count -le 0){
Write-Verbose "No data returned by Log Analytics for AM type counter"
Throw "no data returned by Log Analytics. Was the VM turned on the past hours, and has the 'Available Mbytes' or 'Available Bytes' counter been turned on, and do you have permissions to query Log Analytics?"
}else{
$resultsArray = $resultsArray | % {[PSCustomObject]@{"TimeGenerated" = $_.TimeGenerated;"CounterValue"=$_.CounterValue/1MB}}
}
}
#we need to ensure enough datapoints exist
if($resultsArray.Count -le $measurePeriodHours*4){
if($defaultSize){
Write-Verbose "Insufficient performance data to right size, default size specified at $defaultSize"
$script:reportRow.targetSize = $defaultSize
return $defaultSize
}
Throw "too few MEM perf data points to reliably calculate optimal VM size"
}
$memoryStats = get-vmCounterStats -Data $resultsArray.CounterValue
#memory is expressed in Free MB's, recalculate to used % so we can apply similar logic as with CPU's
$memUsedPct = (($targetVMCurrentHardware.MemoryInMB-$memoryStats.Percentile5)/$targetVMCurrentHardware.MemoryInMB)
if($memUsedPct -gt 100 -or $memUsedPct -lt 0 -or $memoryStats.Maximum -gt $targetVMCurrentHardware.MemoryInMB){
Throw "Unexpected (negative or too large) memory perf value detected, VM was probably already resized less than $measurePeriodHours hours ago"
}
}catch{
Throw "$targetVMName failed to get memory performance data from Azure Monitor because $_"
}
Write-Verbose "$targetVMName has $($targetVMCurrentHardware.MemoryInMB)MB and the 95th percentile is $($targetVMCurrentHardware.MemoryInMB - $memoryStats.Percentile5)MB ($([Math]::Round($memUsedPct*100,2))%) used"
#get cpu performance of targeted VM in configured period
try{
$query = "Perf | where TimeGenerated between (ago($($measurePeriodHours)h) .. ago(0h)) and CounterName =~ '% Processor Time' and Computer =~ '$($targetVMName)$($domain)'$queryAddition | project TimeGenerated, CounterValue | order by CounterValue"
$result = Invoke-AzOperationalInsightsQuery -WorkspaceId $workspaceId -Query $query -ErrorAction Stop
$resultsArray = [System.Linq.Enumerable]::ToArray($result.Results)
Write-Verbose "$targetVMName retrieved $($resultsArray.Count) cpu datapoints from Azure Monitor"
if($resultsArray.Count -le 0){
Write-Verbose "No data returned by Log Analytics"
Throw "no data returned by Log Analytics. Was the VM turned on the past hours, and has the '% Processor Time' counter been turned on, and do you have permissions to query Log Analytics?"
}
#we need to ensure enough datapoints exist
if($resultsArray.Count -le $measurePeriodHours*4){
if($defaultSize){
Write-Verbose "Insufficient performance data to right size, default size specified at $defaultSize"
$script:reportRow.targetSize = $defaultSize
return $defaultSize
}
Throw "too few CPU perf data points to reliably calculate optimal VM size"
}
$cpuStats = get-vmCounterStats -Data $resultsArray.CounterValue
$cpuUsedPct = $cpuStats.Percentile95/100
if($cpuUsedPct -lt 0){
Throw "Negative value detected, VM was probably already resized less than $measurePeriodHours hours ago"
}
}catch{
Throw "$targetVMName failed to get CPU performnace data from Azure Monitor because $_"
}
Write-Verbose "$targetVMName has $($targetVMCurrentHardware.NumberOfCores) cpu cores and the 95th percentile is $([Math]::Round($cpuStats.Percentile95,2))% max of the cores"
$targetMinimumCPUCount=$targetVMCurrentHardware.NumberOfCores
$targetMinimumMemoryInMB=$targetVMCurrentHardware.MemoryInMB
#determine if CPU needs to be increased
if($cpuUsedPct -gt $cul){
$targetMinimumCPUCount = [Math]::Min($maxvCPUs,[Math]::Max($minvCPUs,[Math]::Ceiling($targetVMCurrentHardware.NumberOfCores*($cpuUsedPct/$cll))))
}
#determine if CPU needs to be decreased
if($cpuUsedPct -lt $cll){
$targetMinimumCPUCount = [Math]::Max($minvCPUs,[Math]::Min($maxvCPUs,[Math]::Ceiling($targetVMCurrentHardware.NumberOfCores*($cpuUsedPct/$cul))))
}
#determine if Memory needs to be increased
if($memUsedPct -gt $mul){
$targetMinimumMemoryInMB = [Math]::Min($maxMemoryGB*1024,[Math]::Max($minMemoryGB*1024,[Math]::Ceiling($targetVMCurrentHardware.MemoryInMB*($memUsedPct/$mll))))
}
#determine if memory needs to be decreased
if($memUsedPct -lt $mll){
$targetMinimumMemoryInMB = [Math]::Max($minMemoryGB*1024,[Math]::Min($maxMemoryGB*1024,[Math]::Ceiling($targetVMCurrentHardware.MemoryInMB*($memUsedPct/$mul))))
}
Write-Verbose "$targetVMName should have at least $targetMinimumCPUCount vCPU's and $targetMinimumMemoryInMB MB memory"
$desiredVMType = $Null
for($i=0;$i -lt $selectedVMTypes.Count;$i++){
if($selectedVMTypes[$i].NumberOfCores -ge $targetMinimumCPUCount -and $selectedVMTypes[$i].NumberOfCores -le $maxvCPUs -and $selectedVMTypes[$i].MemoryInMB -le $maxMemoryGB*1024 -and $selectedVMTypes[$i].MemoryInMB -ge $targetMinimumMemoryInMB){
$desiredVMType = $selectedVMTypes[$i]
$script:reportRow.targetSize = $desiredVMType.Name
break
}else{
Write-Verbose "Skipping $($selectedVMTypes[$i].Name) because it does not meet the requirements of $targetMinimumCPUCount vCPU's ($($selectedVMTypes[$i].NumberOfCores)) and $targetMinimumMemoryInMB MB ($($selectedVMTypes[$i].MemoryInMB)) Memory"
}
}
if($targetVMPricing -and $desiredVMType){
$costFactor = ($targetVMPricing.windowsPrice-$desiredVMType.windowsPrice)/$targetVMPricing.windowsPrice
}
if($desiredVMType){
if($desiredVMType.Name -eq $targetVM.HardwareProfile.VmSize){
Write-Verbose "$targetVMName is already sized correctly at $($targetVM.HardwareProfile.VmSize)"
return $targetVM.HardwareProfile.VmSize
}else{
if($costFactor){
if($costFactor -gt 0){
Write-Verbose "$targetVMName financial impact: $([Math]::Round($costFactor*100,2))% cost reduction"
}else{
Write-Verbose "$targetVMName financial impact: $([Math]::Round($costFactor*100*-1,2))% cost increase"
}
$script:reportRow.costImpactPercent = $costFactor*-100
}
Write-Verbose "$targetVMName should be resized from $($targetVM.HardwareProfile.VmSize) to $($desiredVMType.Name)"
Write-Verbose "$targetVMName $($desiredVMType.Name) has $($desiredVMType.NumberOfCores) vCPU's and $($desiredVMType.MemoryInMB)MB Memory"
return $desiredVMType.Name
}
}else{
Throw "$targetVMName failed to find a VM with at least $targetMinimumCPUCount vCPU's and $targetMinimumMemoryInMB MB Memory in your `$allowedVMTypes list"
}
}
function get-vmCounterStats{
[cmdletbinding()]
Param(
[Parameter(Mandatory)]$Data
)
$Data = [System.Collections.ArrayList][Double[]]$resultsArray.CounterValue | Sort-Object
$Stats = $Data | Microsoft.PowerShell.Utility\Measure-Object -Minimum -Maximum -Sum -Average
if ($Data.Count % 2 -eq 0) {
$MedianIndex = ($Data.Count / 2) - 1
$LowerMedian = $Data[$MedianIndex]
$UpperMedian = $Data[$MedianIndex - 1]
$Median = ($LowerMedian + $UpperMedian) / 2
} else {
$MedianIndex = [math]::Ceiling(($Data.Count - 1) / 2)
$Median = $Data[$MedianIndex]
}
Add-Member -InputObject $Stats -MemberType NoteProperty -Name 'Median' -Value $Median -Force
$Variance = 0
foreach ($_ in $Data) {
$Variance += [math]::Pow($_ - $Stats.Average, 2) / $Stats.Count
}
$Variance /= $Stats.Count
Add-Member -InputObject $Stats -MemberType NoteProperty -Name 'Variance' -Value $Variance -Force
$StandardDeviation = [math]::Sqrt($Stats.Variance)
Add-Member -InputObject $Stats -MemberType NoteProperty -Name 'StandardDeviation' -Value $StandardDeviation -Force
$Percentile1Index = [math]::Ceiling(1 / 100 * $Data.Count)
$Percentile5Index = [math]::Ceiling(5 / 100 * $Data.Count)
$Percentile10Index = [math]::Ceiling(10 / 100 * $Data.Count)
$Percentile25Index = [math]::Ceiling(25 / 100 * $Data.Count)
$Percentile75Index = [math]::Ceiling(75 / 100 * $Data.Count)
$Percentile90Index = [math]::Ceiling(90 / 100 * $Data.Count)
$Percentile95Index = [math]::Ceiling(95 / 100 * $Data.Count)
$Percentile99Index = [math]::Ceiling(99 / 100 * $Data.Count)
Add-Member -InputObject $Stats -MemberType NoteProperty -Name 'Percentile1' -Value $Data[$Percentile1Index] -Force
Add-Member -InputObject $Stats -MemberType NoteProperty -Name 'Percentile5' -Value $Data[$Percentile5Index] -Force
Add-Member -InputObject $Stats -MemberType NoteProperty -Name 'Percentile10' -Value $Data[$Percentile10Index] -Force
Add-Member -InputObject $Stats -MemberType NoteProperty -Name 'Percentile25' -Value $Data[$Percentile25Index] -Force
Add-Member -InputObject $Stats -MemberType NoteProperty -Name 'Percentile75' -Value $Data[$Percentile75Index] -Force
Add-Member -InputObject $Stats -MemberType NoteProperty -Name 'Percentile90' -Value $Data[$Percentile90Index] -Force
Add-Member -InputObject $Stats -MemberType NoteProperty -Name 'Percentile95' -Value $Data[$Percentile95Index] -Force
Add-Member -InputObject $Stats -MemberType NoteProperty -Name 'Percentile99' -Value $Data[$Percentile99Index] -Force
Return $Stats
}
function set-rsgRightSize{
<#
.SYNOPSIS
Targets all VM's in a given resource group for right sizing.
Use -Force to also resize VM's that are running, and -WhatIf with -Verbose to see what would happen without actually resizing
Use -Report to output a full report in csv format
.EXAMPLE
set-rsgRightSize -targetRSG rg-avd-we-01 -domain company.local -workspaceId e32b3dbe-2850-4f88-9acb-2b919cce4126 -Force
set-rsgRightSize -targetRSG rg-avd-we-01 -workspaceId e32b3dbe-2850-4f88-9acb-2b919cce4126 -WhatIf
set-rsgRightSize -targetRSG rg-avd-we-01 -workspaceId e32b3dbe-2850-4f88-9acb-2b919cce4126 -allowedVMTypes @("Standard_D2ds_v4","Standard_D4ds_v4","Standard_D8ds_v4")
#>
[cmdletbinding()]
Param(
[Parameter(Mandatory)][String]$targetRSG,
[Parameter(Mandatory)][Guid]$workspaceId, #workspace GUID where perf data is stored (use Get-AzOperationalInsightsWorkspace to find this)
$domain, #if your machines are domain joined, enter the domain name here
[Int]$maintenanceWindowStartHour, #start hour of maintenancewindow in military time UTC (0-23)
[Int]$maintenanceWindowLengthInHours, #length of maintenance window in hours (round up if needed)
[ValidateSet(0,1,2,3,4,5,6)][Int]$maintenanceWindowDay, #day on which the maintenance window starts (UTC) where 0 = Sunday and 6 = Saturday
[String]$region = "westeurope", #you can find yours using Get-AzLocation | select Location
[Int]$measurePeriodHours = 152, #lookback period for a VM's performance while it was online, this is used to calculate the optimum. It is not recommended to size multiple times in this period!
[Switch]$Force, #shuts a VM down to resize it if it detects the VM is still running when you run this command
[Switch]$Boot, #after resizing, by default a VM stays offline. Use -Boot to automatically start if after resizing
[Switch]$WhatIf, #best used together with -Verbose. Causes the script not to modify anything, just to log what it would do
[Switch]$Report,
[Array]$allowedVMTypes = @("Standard_D2ds_v4","Standard_D4ds_v4","Standard_D8ds_v4","Standard_D2ds_v5","Standard_D4ds_v5","Standard_D8ds_v5","Standard_E2ds_v4","Standard_E4ds_v4","Standard_E8ds_v4","Standard_E2ds_v5","Standard_E4ds_v5","Standard_E8ds_v5"),
[Int]$minMemoryGB = 2, #will never assign less than this (even if you've allowed VM's with more)
[Int]$maxMemoryGB = 512, #will never assign more than this (even if you've allowed VM's with more)
[Int]$minvCPUs = 1, #min 2 required for network acceleration!
[Int]$maxvCPUs = 64, #in no case will this function assign a vmtype with more vCPU's than this
[Switch]$doNotCheckForRecentResize #if this switch is used, the function will not check if the VM was resized within measurePeriodHours and if so will not resize it again
)
Write-Verbose "Getting VM's for RSG $targetRSG"
$targetVMs = Get-AzVM -ResourceGroupName $targetRSG -ErrorAction Stop
$reportRows = @()
foreach($vm in $targetVMs){
Write-Verbose "calling set-vmRightSize for $($vm.Name)"
$retVal = set-vmRightSize -doNotCheckForRecentResize:$doNotCheckForRecentResize.IsPresent -allowedVMTypes $allowedVMTypes -targetVMName $vm.Name -domain $domain -workspaceId $workspaceId -maintenanceWindowStartHour $maintenanceWindowStartHour -maintenanceWindowLengthInHours $maintenanceWindowLengthInHours -maintenanceWindowDay $maintenanceWindowDay -region $region -measurePeriodHours $measurePeriodHours -Report:$Report.IsPresent -Force:$Force.IsPresent -Boot:$Boot.IsPresent -WhatIf:$WhatIf.IsPresent -minMemoryGB $minMemoryGB -maxMemoryGB $maxMemoryGB -minvCPUs $minvCPUs -maxvCPUs $maxvCPUs
if($Report){
$reportRows += $retVal
}else{
$retVal
}
}
if($Report){
$reportPath = Join-Path $Env:TEMP -ChildPath "addrs-report.csv"
Write-Output "Writing report with $($reportRows.Count) lines to $reportPath"
$reportRows | Export-CSV -Path $reportPath -Force -Encoding UTF8 -NoTypeInformation -Confirm:$False -Append
Start-Process $reportPath
Write-Output "Report written and launched, script has completed"
}
}
function set-vmRightSize{
<#
.SYNOPSIS
Targets a single VM for right sizing. Use set-rsgRightSize if you wish to resize all VM's in a resource group
Use -Force to also resize VM's that are running, and -WhatIf with -Verbose to see what would happen without actually resizing
Use -Report to output a report object
.EXAMPLE
set-vmRightSize -targetVMName azvm01 -domain company.local -workspaceId e32b3dbe-2850-4f88-9acb-2b919cce4126 -Force
set-vmRightSize -targetVMName azvm01 -workspaceId e32b3dbe-2850-4f88-9acb-2b919cce4126 -WhatIf
set-vmRightSize -targetVMName azvm01 -workspaceId e32b3dbe-2850-4f88-9acb-2b919cce4126 -allowedVMTypes @("Standard_D2ds_v4","Standard_D4ds_v4","Standard_D8ds_v4")
#>
[cmdletbinding()]
Param(
[Parameter(Mandatory)][String]$targetVMName,
[Parameter(Mandatory)][Guid]$workspaceId, #workspace GUID where perf data is stored (use Get-AzOperationalInsightsWorkspace to find this)
$domain, #if your machines are domain joined, enter the domain name here
[Int]$maintenanceWindowStartHour, #start hour of maintenancewindow in military time UTC (0-23)
[Int]$maintenanceWindowLengthInHours, #length of maintenance window in hours (round up if needed)
[ValidateSet(0,1,2,3,4,5,6)][Int]$maintenanceWindowDay, #day on which the maintenance window starts (UTC) where 0 = Sunday and 6 = Saturday
[String]$region = "westeurope", #you can find yours using Get-AzLocation | select Location
[Int]$measurePeriodHours = 152, #lookback period for a VM's performance while it was online, this is used to calculate the optimum. It is not recommended to size multiple times in this period!
[Switch]$Force, #shuts a VM down to resize it if it detects the VM is still running when you run this command
[Switch]$Boot, #after resizing, by default a VM stays offline. Use -Boot to automatically start if after resizing
[Switch]$WhatIf, #best used together with -Verbose. Causes the script not to modify anything, just to log what it would do
[Switch]$Report,
[Array]$allowedVMTypes = @("Standard_D2ds_v4","Standard_D4ds_v4","Standard_D8ds_v4","Standard_D2ds_v5","Standard_D4ds_v5","Standard_D8ds_v5","Standard_E2ds_v4","Standard_E4ds_v4","Standard_E8ds_v4","Standard_E2ds_v5","Standard_E4ds_v5","Standard_E8ds_v5"),
[Int]$minMemoryGB = 2, #will never assign less than this (even if you've allowed VM's with more)
[Int]$maxMemoryGB = 512, #will never assign more than this (even if you've allowed VM's with more)
[Int]$minvCPUs = 1, #min 2 required for network acceleration!
[Int]$maxvCPUs = 64, #in no case will this function assign a vmtype with more vCPU's than this
[Switch]$doNotCheckForRecentResize #if this switch is used, the function will not check if the VM was resized within measurePeriodHours and if so will not resize it again
)
try{
Write-Verbose "$targetVMName getting metadata"
$vm = Get-AzVM -Name $targetVMName -Status
Write-Verbose "$targetVMName calculating optimal size"
$optimalSize = get-vmRightSize -doNotCheckForRecentResize:$doNotCheckForRecentResize.IsPresent -allowedVMTypes $allowedVMTypes -targetVMName $targetVMName -workspaceId $workspaceId -maintenanceWindowStartHour $maintenanceWindowStartHour -maintenanceWindowLengthInHours $maintenanceWindowLengthInHours -maintenanceWindowDay $maintenanceWindowDay -region $region -measurePeriodHours $measurePeriodHours -domain $domain -minMemoryGB $minMemoryGB -maxMemoryGB $maxMemoryGB -minvCPUs $minvCPUs -maxvCPUs $maxvCPUs
if($optimalSize -eq $vm.HardwareProfile.VmSize){
Write-Host "$targetVMName already at optimal size"
if($Report){
return $script:reportRow
}else{
return $False
}
}else{
Write-Host "$targetVMName resizing from $($vm.HardwareProfile.VmSize) to $optimalSize ..."
$retVal = set-vmToSize -vm $vm -newSize $optimalSize -Force:$Force.IsPresent -Boot:$Boot.IsPresent -WhatIf:$WhatIf.IsPresent
if($retVal -eq "OK"){
$script:reportRow.resized = $True
}
if($Report){
return $script:reportRow
}else{
return $retVal
}
}
}catch{
Write-Error $_
if($Report){
$script:reportRow.reason = $_
return $script:reportRow
}else{
return $False
}
}
} |
ADDRS.psd1 | ADDRS-1.1.9 | #
# Module manifest for module 'ADDRS'
#
# Generated by: Jos Lieben
#
# Generated on: 5/16/2022
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'ADDRS.psm1'
# Version number of this module.
ModuleVersion = '1.1.9'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = 'bbd6707a-392d-4db8-97c3-2634f029e2f0'
# Author of this module
Author = 'Jos Lieben'
# Company or vendor of this module
CompanyName = 'Lieben Consultancy'
# Copyright statement for this module
Copyright = 'Check https://www.lieben.nu/liebensraum/commercial-use/ (tl;dr; free to use as long as you do not make money out of it)'
# Description of the functionality provided by this module
Description = 'Automatically right sizes any Azure Windows VM based on configurable telemetry data to the optimal size based on cpu/mem, performance rating and cost. Use Get-Help set-vmRightSize or Get-Help set-rsgRightSize for more information on specific commands or check my blog.'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.0'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(
@{
ModuleName = 'Az.Compute'
ModuleVersion = '5.5.0'
},
@{
ModuleName = 'Az.OperationalInsights'
ModuleVersion = '3.2.0'
},
@{
ModuleName = 'Az.Resources'
ModuleVersion = '6.5.0'
},
@{
ModuleName = 'Az.Accounts'
ModuleVersion = '2.13.0'
}
)
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = 'get-vmRightSize','set-rsgRightSize','set-vmRightSize'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = '*'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = @("Azure","Rightsizing","VirtualMachines","Costoptimization","Performancemonitoring")
# A URL to the license for this module.
LicenseUri = 'https://www.lieben.nu/liebensraum/commercial-use'
# A URL to the main website for this project.
ProjectUri = 'https://www.lieben.nu/liebensraum/2022/05/automatic-modular-rightsizing-of-azure-vms-with-special-focus-on-azure-virtual-desktop/'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
HelpInfoURI = 'https://www.lieben.nu/liebensraum/2022/05/automatic-modular-rightsizing-of-azure-vms-with-special-focus-on-azure-virtual-desktop/'
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
ADDSActiveAccountAudit.psd1 | ADDSActiveAccountAudit-1.2.0 | #
# Module manifest for module 'ADDSActiveAccountAudit'
#
# Generated by: DrIOSX
#
# Generated on: 5/4/2022
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'ADDSActiveAccountAudit.psm1'
# Version number of this module.
ModuleVersion = '1.2.0'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = '4e252a77-9c2f-474d-b171-c5be9a066767'
# Author of this module
Author = 'DrIOSX'
# Company or vendor of this module
CompanyName = 'CriticalSolutions.net'
# Copyright statement for this module
Copyright = '(c) 2022 CriticalSolutions.net LLC All rights reserved.'
# Description of the functionality provided by this module
Description = 'Active Directory Domain Services Active User Audit'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.0'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = 'Get-ADDSActiveAccountAudit'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
# VariablesToExport = @()
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
# Tags = @()
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
ProjectUri = 'https://github.com/CriticalSolutionsNetwork/ADDSActiveAccountAudit'
# A URL to an icon representing this module.
IconUri = 'https://csit.s3.amazonaws.com/PICS/square_ICON_critical+solutions.png'
# ReleaseNotes of this module
ReleaseNotes = '### Added Release Notes'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
ADDSActiveAccountAudit.psm1 | ADDSActiveAccountAudit-1.2.0 | #Region '.\Private\Get-TimeStamp.ps1' 0
function Get-TimeStamp{
return "[{0:yyyy/MM/dd} {0:HH:mm:ss}]" -f (Get-Date)
}
#EndRegion '.\Private\Get-TimeStamp.ps1' 4
#Region '.\Private\Send-AuditEmail.ps1' 0
function Send-AuditEmail {
<#
.SYNOPSIS
This is a sample Private function only visible within the module. It uses Send-MailkitMessage
To send email messages.
.DESCRIPTION
This sample function is not exported to the module and only return the data passed as parameter.
.EXAMPLE
Send-AuditEmail -smtpServer $SMTPServer -port $Port -username $Username -Function $Function -FunctionApp $FunctionApp -token $ApiToken -from $from -to $to -attachmentfilePath "$FilePath" -ssl
.PARAMETER PrivateData
The PrivateData parameter is what will be returned without transformation.
#>
param (
[string]$smtpServer,
[int]$port,
[string]$username,
[switch]$ssl,
[string]$from,
[string]$to,
[string]$subject = "ADDSActiveAccountAudit for $($env:USERDNSDOMAIN).",
[string]$attachmentfilePath,
[string]$body,
[securestring]$pass,
[string]$Function,
[string]$FunctionApp,
[string]$token
)
Import-Module Send-MailKitMessage
# Recipient
$RecipientList = [MimeKit.InternetAddressList]::new()
$RecipientList.Add([MimeKit.InternetAddress]$to)
# Attachment
$AttachmentList = [System.Collections.Generic.List[string]]::new()
$AttachmentList.Add("$attachmentfilePath")
# From
$from = [MimeKit.MailboxAddress]$from
# Mail Account variable
$User = $username
if ($pass) {
# Set Credential to $Password parameter input.
$Credential = `
[System.Management.Automation.PSCredential]::new($User, $pass)
}
elseif ($FunctionApp) {
$url = "https://$($FunctionApp).azurewebsites.net/api/$($Function)"
# Retrieve credentials from function app url into a SecureString.
$a, $b = (Invoke-RestMethod $url -Headers @{ 'x-functions-key' = "$token" }).split(',')
$Credential = `
[System.Management.Automation.PSCredential]::new($User, (ConvertTo-SecureString -String $a -Key $b.split('')) )
}
# Create Parameter hashtable
$Parameters = @{
"UseSecureConnectionIfAvailable" = $ssl
"Credential" = $Credential
"SMTPServer" = $SMTPServer
"Port" = $Port
"From" = $From
"RecipientList" = $RecipientList
"Subject" = $subject
"TextBody" = $body
"AttachmentList" = $AttachmentList
}
Send-MailKitMessage @Parameters
Clear-Variable -Name "a", "b", "Credential", "token" -Scope Local -ErrorAction SilentlyContinue
}
#EndRegion '.\Private\Send-AuditEmail.ps1' 71
#Region '.\Private\Write-TSLog.ps1' 0
function Write-TSLog {
<#
.SYNOPSIS
This is a sample Private function only visible within the module.
.DESCRIPTION
This sample function is not exported to the module and only return the data passed as parameter.
.EXAMPLE
$null = Write-Logs -PrivateData 'NOTHING TO SEE HERE'
.PARAMETER PrivateData
The PrivateData parameter is what will be returned without transformation.
#>
[CmdletBinding(DefaultParameterSetName = 'Default')]
[OutputType([string])]
param(
[Parameter(
ValueFromPipeline = $true,
Mandatory = $true,
ParameterSetName = 'Default',
Position = 0
)]
[String]$LogString,
[Parameter(
ValueFromPipelineByPropertyName = $true,
Mandatory = $true,
ParameterSetName = 'Begin',
Position = 0
)]
[switch]$Begin,
[Parameter(
ValueFromPipelineByPropertyName = $true,
Mandatory = $true,
ParameterSetName = 'End',
Position = 0
)]
[switch]$End,
[Parameter(
ValueFromPipelineByPropertyName = $true,
ParameterSetName = 'LogToFile',
Position = 0
)]
[string]$LogOutputPath
)
process {
if ($Begin) {
$script:Logs = ""
$TSLogString = "$(Get-TimeStamp) Begin Log for Script: $($script:MyInvocation.MyCommand.Name -replace '\..*') `n"
return $script:Logs += $TSLogString
}
elseif ($End) {
$TSLogString = "$(Get-TimeStamp) End Log for Script: $($script:MyInvocation.MyCommand.Name -replace '\..*') `n"
return $script:Logs += $TSLogString
}
elseif ($LogOutputPath) {
Add-Content "$($LogOutputPath)" -Value $script:Logs
}
else {
$TSLogString = "$(Get-TimeStamp) $logstring `n"
return $script:Logs += $TSLogString
}
}
}
#EndRegion '.\Private\Write-TSLog.ps1' 64
#Region '.\Public\Get-ADDSActiveAccountAudit.ps1' 0
function Get-ADDSActiveAccountAudit {
<#
.SYNOPSIS
Active Directory Audit with Keyvault retrieval option.
.DESCRIPTION
Audit's Active Directory taking "days" as the input for how far back to check for a last sign in.
.EXAMPLE
PS C:\> Get-ADDSActiveAccountAudit -LocalDisk -Verbose
.EXAMPLE
PS C:\> Get-ADDSActiveAccountAudit -SendMailMessage -SMTPServer $SMTPServer -UserName "[email protected]" -Password (Read-Host -AsSecureString) -To "[email protected]" -Verbose
.EXAMPLE
PS C:\> Get-ADDSActiveAccountAudit -FunctionApp $FunctionApp -Function $Function -SMTPServer $SMTPServer -UserName "[email protected]" -To "[email protected]" -Verbose
.PARAMETER LocalDisk
Only output data to local disk.
.PARAMETER AttachementFolderPath
Default path is C:\temp\ADDSActiveAccountAuditLogs.
This is the folder where attachments are going to be saved.
.PARAMETER DaysInactive
Defaults to 90 days in the past.
Specifies how far back to look for accounts last logon.
If logon is within 90 days, it won't be included.
.PARAMETER ADDSAccountIsNotEnabled
Defaults to not being set.
Choose to search for disabled Active Directory Users.
.PARAMETER SendMailMessage
Adds parameters for sending Audit Report as an Email.
.PARAMETER FunctionApp
Azure Function App Name.
.PARAMETER Function
Azure Function App's Function Name. Ex. "HttpTrigger1"
.PARAMETER ApiToken
Private Function Key.
.PARAMETER SMTPServer
Defaults to Office 365 SMTP relay. Enter optional relay here.
.PARAMETER Port
SMTP Port to Relay. Ports can be: "993", "995", "587", or "25"
.PARAMETER UserName
Specify the account with an active mailbox and MFA disabled.
Ensure the account has delegated access for Send On Behalf for any
UPN set in the "$From" Parameter
.PARAMETER Password
Use: (Read-Host -AsSecureString) as in Examples.
May be omitted.
.PARAMETER To
Recipient of the attachment outputs.
.PARAMETER From
Defaults to the same account as $UserName unless the parameter is set.
Ensure the Account has delegated access to send on behalf for the $From account.
.PARAMETER Clean
Remove installed modules during run. Remove local files if not a LocalDisk run.
.NOTES
Can take password as input into secure string using (Read-Host -AsSecureString).
#>
[CmdletBinding(DefaultParameterSetName = 'LocalDisk', HelpURI = "https://criticalsolutionsnetwork.github.io/ADDSActiveAccountAudit/#Get-ADDSActiveAccountAudit")]
param (
[Parameter(
Mandatory = $true,
ParameterSetName = 'LocalDisk',
HelpMessage = 'Output to disk only',
Position = 0
)]
[switch]$LocalDisk,
[Parameter(
Mandatory = $true,
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Send Mail to a relay',
Position = 0
)]
[switch]$SendMailMessage,
[Parameter(
Mandatory = $true,
ParameterSetName = 'FunctionApp',
HelpMessage = 'Enter the FunctionApp name',
Position = 0
)]
[string]$FunctionApp,
[Parameter(
Mandatory = $true,
ParameterSetName = 'FunctionApp',
HelpMessage = 'Enter the FunctionApp Function name',
ValueFromPipelineByPropertyName = $true,
Position = 1
)]
[string]$Function,
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Enter the SMTP hostname' ,
ValueFromPipelineByPropertyName = $true
)]
[string]$SMTPServer = "smtp.office365.com",
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(ParameterSetName = 'SendMailMessage')]
[Parameter(
ParameterSetName = 'LocalDisk',
HelpMessage = 'Enter output folder path',
ValueFromPipeline = $true
)]
[string]$AttachementFolderPath = "C:\temp\ADDSActiveAccountAuditLogs",
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(ParameterSetName = 'SendMailMessage')]
[Parameter(
ParameterSetName = 'LocalDisk',
HelpMessage = 'Active Directory User Enabled or not',
ValueFromPipelineByPropertyName = $true
)]
[switch]$ADDSAccountIsNotEnabled,
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(ParameterSetName = 'SendMailMessage')]
[Parameter(
ParameterSetName = 'LocalDisk',
HelpMessage = 'Days back to check for recent sign in',
ValueFromPipelineByPropertyName = $true
)]
[int]$DaysInactive = '90',
[Parameter(Mandatory = $true, ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
Mandatory = $true,
HelpMessage = 'Enter the Sending Account UPN Ex:"[email protected]"',
ValueFromPipelineByPropertyName = $true
)]
[ValidatePattern("[a-z0-9!#\$%&'*+/=?^_`{|}~-]+(?:\.[a-z0-9!#\$%&'*+/=?^_`{|}~-]+)*@(?:[a-z0-9](?:[a-z0-9-]*[a-z0-9])?\.)+[a-z0-9](?:[a-z0-9-]*[a-z0-9])?")]
[string]$UserName,
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Copy Paste the following: $Password = (Read-Host -AsSecureString)',
ValueFromPipelineByPropertyName = $true
)]
[securestring]$Password,
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Enter the port n
umber for the mail relay',
ValueFromPipelineByPropertyName = $true
)]
[ValidateSet("993", "995", "587", "25")]
[int]$Port = 587,
[Parameter(Mandatory = $true, ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
Mandatory = $true,
HelpMessage = 'Enter the recipient email address',
ValueFromPipelineByPropertyName = $true
)]
[ValidatePattern("[a-z0-9!#\$%&'*+/=?^_`{|}~-]+(?:\.[a-z0-9!#\$%&'*+/=?^_`{|}~-]+)*@(?:[a-z0-9](?:[a-z0-9-]*[a-z0-9])?\.)+[a-z0-9](?:[a-z0-9-]*[a-z0-9])?")]
[string]$To,
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Enter the name of the sender',
ValueFromPipelineByPropertyName = $true
)]
[ValidatePattern("[a-z0-9!#\$%&'*+/=?^_`{|}~-]+(?:\.[a-z0-9!#\$%&'*+/=?^_`{|}~-]+)*@(?:[a-z0-9](?:[a-z0-9-]*[a-z0-9])?\.)+[a-z0-9](?:[a-z0-9-]*[a-z0-9])?")]
[string]$From = $UserName,
[Parameter(
Mandatory = $true,
ParameterSetName = 'FunctionApp',
HelpMessage = 'Enter output folder path',
ValueFromPipelineByPropertyName = $true
)]
[string]$ApiToken,
[Parameter(
Mandatory = $true,
ParameterSetName = 'Clean',
HelpMessage = 'Clean Modules and output path',
Position = 0
)]
[switch]$Clean
)
Begin {
# Create Directory Path
$DirPath = $AttachementFolderPath
$DirPathCheck = Test-Path -Path $DirPath
If (!($DirPathCheck)) {
Try {
# If not present then create the dir
New-Item -ItemType Directory $DirPath -Force
}
Catch {
Write-TSLog -Begin
Write-TSLog "Directory: $DirPath was not created."
Write-TSLog $(($Error[0].Exception).ToString())
Write-TSLog -End
throw $(($Error[0].Exception).ToString())
}
}
# Begin Logging to $script:Logs
Write-TSLog -Begin
$LogOutputPath = "$AttachementFolderPath\$((Get-Date).ToString("yyyy-MM-dd-hh.mm.ss"))_ADDSAuditlog.log"
Write-TSLog "Log output path: $LogOutputPath"
if (!($Clean)) {
# Import Active Directory Module
$module = Get-Module -Name ActiveDirectory -ListAvailable
if (-not $module) {
Add-WindowsFeature RSAT-AD-PowerShell -IncludeAllSubFeature -Verbose -ErrorAction Stop
}
try {
Import-Module "activedirectory" -Global
}
catch {
Write-TSLog "The Module Was not installed. Use `"Add-WindowsFeature RSAT-AD-PowerShell`" or install using server manager under `"Role Administration Tools>AD DS and AD LDS Tools>Active Directory module for Windows Powershell`"."
Write-TSLog -End
Write-TSLog $(($Error[0].Exception).ToString())
Write-TSLog -LogtoFile
throw $(($Error[0].Exception).ToString())
}
# If SendMailMessage Begin
if ($SendMailMessage) {
# Install / Import required modules.
$module = Get-Module -Name Send-MailKitMessage -ListAvailable
if (-not $module) {
Install-Module -Name Send-MailKitMessage -AllowPrerelease -Scope AllUsers -Force
}
try {
Import-Module "Send-MailKitMessage" -Global
}
catch {
Write-TSLog "The Module Was not installed. Use `"Save-Module -Name Send-MailKitMessage -AllowPrerelease -Path C:\temp`" on another Windows Machine."
Write-TSLog $(($Error[0].Exception).ToString())
Write-TSLog -End
Write-TSLog -LogOutputPath $LogOutputPath
throw $(($Error[0].Exception).ToString())
}
}
if ($ADDSAccountIsNotEnabled) {
$Enabled = $false
}
else {
$Enabled = $true
}
}
}
Process {
if (!($Clean)) {
# Establish timeframe to review.
$time = (Get-Date).Adddays( - ($DaysInactive))
# Add Datetime to filename
$csvFileName = "$attachementfolderpath\AD_Export_$($env:USERDNSDOMAIN).$((Get-Date).ToString('yyyy-MM-dd.hh.mm.ss'))"
# Create FileNames
$csv = "$csvFileName.csv"
$zip = "$csvFileName.zip"
Write-TSLog "Searching for users who have signed in within the last $DaysInactive days, where parameter Enabled = $Enabled"
# Audit Script with export to csv and zip. Paramters for Manager, lastLogonTimestamp and DistinguishedName normalized.
try {
# Add extra parameters for > 30, > 60 and > 90 days "-gt"
Get-aduser -Filter { LastLogonTimeStamp -lt $time -and Enabled -eq $Enabled } -Properties `
GivenName, Surname, Mail, UserPrincipalName, Title, Description, Manager, lastlogontimestamp, samaccountname, DistinguishedName `
| Select-Object `
@{N = 'FirstName'; E = { $_.GivenName } }, `
@{N = 'LastName'; E = { $_.Surname } }, `
@{N = 'UserName'; E = { $_.samaccountname } }, `
@{N = "Last Sign-in"; E = { [DateTime]::FromFileTime($_.lastLogonTimestamp).ToString('yyyy-MM-dd.hh.mm') } }, `
@{N = 'UPN'; E = { $_.UserPrincipalName } }, `
@{N = 'OrgUnit'; E = { $_.DistinguishedName -replace '^.*?,(?=[A-Z]{2}=)' } }, `
@{N = 'Job Title'; E = { $_.Title } }, `
Description, `
@{N = 'Manager'; E = { (Get-ADUser ($_.Manager)).name } } -Verbose -OutVariable Export
}
catch {
Write-TSLog $(($Error[0].Exception).ToString())
Write-TSLog -End
Write-TSLog -LogOutputPath $LogOutputPath
throw $(($Error[0].Exception).ToString())
}
Write-TSLog "The AD User Export was successful. There are $($Export.Count) accounts listed."
try {
$Export | Export-CSV -Path "$csv" -NoTypeInformation
}
catch {
Write-TSLog $(($Error[0].Exception).ToString())
Write-TSLog -End
Write-TSLog -LogOutputPath $LogOutputPath
throw $(($Error[0].Exception).ToString())
}
try {
Compress-Archive -Path "$csv" -DestinationPath "$zip" -Verbose
}
catch {
Write-TSLog $(($Error[0].Exception).ToString())
Write-TSLog -End
Write-TSLog -LogOutputPath $LogOutputPath
throw $(($Error[0].Exception).ToString())
}
try {
Remove-Item $csv -Force
}
catch {
Write-TSLog $(($Error[0].Exception).ToString())
}
}
}
End {
if (!($Clean)) {
if ($SendMailMessage) {
if ($Password) {
<#
Send Attachement using O365 email account and password.
Must exclude from conditional access legacy authentication policies.
#>
Send-AuditEmail -smtpServer $SMTPServer -port $Port -username $Username `
-body $script:Logs -pass $Password -from $From -to $to -attachmentfilePath "$zip" -ssl
$Password.Dispose()
} # End if
else {
Send-AuditEmail -smtpServer $SMTPServer -port $Port -username $Username `
-body $script:Logs -from $From -to $to -attachmentfilePath "$zip" -ssl
}
}
elseif ($FunctionApp) {
<#
Send Attachement using O365 email account and Keyvault retrived password.
Must exclude email account from conditional access legacy authentication policies.
#>
Write-TSLog "Email Generated @ $(Get-Date)"
Write-TSLog -End
Send-AuditEmail -smtpServer $SMTPServer -port $Port -username $Username `
-body $Script:Logs -Function $Function -FunctionApp $FunctionApp -token $ApiToken -from $from -to $to -attachmentfilePath "$zip" -ssl
}
elseif($LocalDisk){
#Confirm output path to console.
Write-TSLog "The archive have been saved to: "
Write-TSLog "$zip"
}
}
if ($Clean) {
Write-TSLog "Removing Send-MailKitMessage Module"
try {
# Remove Modules
Remove-Module -Name "Send-MailKitMessage" -Force -Confirm:$false
}
catch {
Write-TSLog "Error removing Send-MailKitMessage Module"
Write-TSLog $(($Error[0].Exception).ToString())
}
Write-TSLog "Uninstalling Send-MailKitMessage Module"
try {
# Uninstall Modules
Uninstall-Module -Name "Send-MailKitMessage" -AllowPrerelease -Force -Confirm:$false
}
catch {
Write-TSLog $(($Error[0].Exception).ToString())
if (Get-Module -Name Send-MailKitMessage -ListAvailable) {
Write-TSLog "Error uninstalling Send-MailKitMessage Module"
}
}
try {
Write-TSLog "Removing directories and files in: "
Write-TSLog "$DirPath"
Remove-Item -Path $DirPath -Recurse -Force
}
catch {
Write-TSLog "Directory Cleanup error!"
Write-TSLog $(($Error[0].Exception).ToString())
throw $(($Error[0].Exception).ToString())
}
Write-TSLog -End
Write-TSLog -LogOutputPath C:\temp\ADDSCleanupLogs.log
}
else {
Write-TSLog -End
Write-TSLog -LogOutputPath $LogOutputPath
}
Clear-Variable -Name "Function", "FunctionApp", "ApiToken" -Scope Local
# End Logging
}
}
#EndRegion '.\Public\Get-ADDSActiveAccountAudit.ps1' 369
|
ADDSAuditTasks.psm1 | ADDSAuditTasks-1.9.12 | #Region '.\Classes\1.class1.ps1' 0
class ADAuditAccount {
[string]$UserName
[string]$FirstName
[string]$LastName
[string]$Name
[string]$UPN
[string]$LastSignIn
[string]$Enabled
[string]$LastSeen
[string]$OrgUnit
[string]$Title
[string]$Manager
[string]$Department
[bool]$AccessRequired
[bool]$NeedMailbox
# Constructor 1
ADAuditAccount([string]$UserName) {
$this.UserName = $UserName
$this.AccessRequired = $false
$this.NeedMailBox = $false
}
ADAuditAccount(
[string]$UserName,
[string]$FirstName,
[string]$LastName,
[string]$Name,
[string]$UPN,
[string]$LastSignIn,
[string]$Enabled,
[string]$LastSeen,
[string]$OrgUnit,
[string]$Title,
[string]$Manager,
[string]$Department,
[bool]$AccessRequired,
[bool]$NeedMailbox
) {
$this.UserName = $UserName
$this.FirstName = $FirstName
$this.LastName = $LastName
$this.Name = $Name
$this.UPN = $UPN
$this.LastSignIn = ([DateTime]::FromFileTime($LastSignIn))
$this.Enabled = $Enabled
$this.LastSeen = $(
switch (([DateTime]::FromFileTime($LastSeen))) {
# Over 90 Days
{ ($_ -lt (Get-Date).Adddays( - (90))) } { '3+ months'; break }
# Over 60 Days
{ ($_ -lt (Get-Date).Adddays( - (60))) } { '2+ months'; break }
# Over 90 Days
{ ($_ -lt (Get-Date).Adddays( - (30))) } { '1+ month'; break }
default { 'Recently' }
} # End Switch
) # End LastSeen
$this.OrgUnit = $OrgUnit -replace '^.*?,(?=[A-Z]{2}=)'
$this.Title = $Title
$this.Manager = $(
switch ($Manager) {
# Over 90 Days
{ if ($_) { return $true } } { "$((Get-ADUser -Identity $Manager).Name)"; break }
# Over 60 Days
default { 'NotFound' }
}
) # End Manager
$this.AccessRequired = $AccessRequired
$this.NeedMailbox = $NeedMailbox
$this.Department = $Department
}
}
#EndRegion '.\Classes\1.class1.ps1' 71
#Region '.\Classes\2.class2.ps1' 0
class ADComputerAccount {
[string]$ComputerName
[string]$DNSHostName
[bool]$Enabled
[string]$IPv4Address
[string]$IPv6Address
[string]$OperatingSystem
[string]$LastLogon
[string]$Created
[string]$Modified
[string]$Description
[string]$OrgUnit
[string]$KerberosEncryptionType
[string]$SPNs
[string]$GroupMemberships #Computername for Group Membership Search
[string]$LastSeen
# Constructor 1
ADComputerAccount(
[string]$ComputerName,
[string]$DNSHostName,
[bool]$Enabled,
[string]$IPv4Address,
[string]$IPv6Address,
[string]$OperatingSystem,
[long]$LastLogon,
[datetime]$Created,
[string]$Modified,
[string]$Description,
[string]$OrgUnit,
[string]$KerberosEncryptionType,
[string]$SPNs,
[string]$GroupMemberships,
[long]$LastSeen
) {
#Begin Contructor 1
$this.ComputerName = $ComputerName
$this.DNSHostName = $DNSHostName
$this.Enabled = $Enabled
$this.IPv4Address = $IPv4Address
$this.IPv6Address = $IPv6Address
$this.OperatingSystem = $OperatingSystem
$this.LastLogon = ([DateTime]::FromFileTime($LastLogon))
$this.Created = $Created
$this.Modified = $Modified
$this.Description = $Description
$this.OrgUnit = $(($OrgUnit -replace '^.*?,(?=[A-Z]{2}=)') -replace ",", ">")
$this.KerberosEncryptionType = $(($KerberosEncryptionType | Select-Object -ExpandProperty $_) -replace ", ", " | ")
$this.SPNs = $SPNs
$this.GroupMemberships = $(Get-ADComputerGroupMemberof -SamAccountName $GroupMemberships)
$this.LastSeen = $(
switch (([DateTime]::FromFileTime($LastSeen))) {
# Over 90 Days
{ ($_ -lt (Get-Date).Adddays( - (90))) } { '3+ months'; break }
# Over 60 Days
{ ($_ -lt (Get-Date).Adddays( - (60))) } { '2+ months'; break }
# Over 90 Days
{ ($_ -lt (Get-Date).Adddays( - (30))) } { '1+ month'; break }
default { 'Recently' }
} # End Switch
) # End LastSeen
}# End Constuctor 1
}
# $($SPNs -join " | " )
#
#
#EndRegion '.\Classes\2.class2.ps1' 66
#Region '.\Private\Export-AuditCSVtoZip.ps1' 0
function Export-AuditCSVtoZip {
[CmdletBinding()]
param (
[PSCustomObject[]]$Exported,
[ADAuditAccount[]]$ExportObject,
[string]$CSVName,
[string]$ZipName
)
process {
if ($Exported) {
[PSCustomObject[]]$ExportObject = $Exported
$membertype = "NoteProperty"
}
else {
$membertype = "Property"
}
Write-TSLog "The $($script:MyInvocation.MyCommand.Name -replace '\..*') Export was successful. There are $($ExportObject.Count) objects listed with the following properties: "
($ExportObject | Get-Member -MemberType $membertype ).Name | Write-TSLog
Write-TSLog "Exporting CSV to path: $CSVName"
try {
$ExportObject | Export-Csv -Path $CSVName -NoTypeInformation -ErrorVariable ExportErr -ErrorAction Stop
}
catch {
Write-TSLog "The CSV export failed with error: "
write-tslog "Error" + $ExportErr.Exception.ErrorRecord
}
Write-TSLog "Compressing file: $CSVName"
Write-TSLog "to destination zip file: $ZipName"
try {
Compress-Archive -Path $CSVName -DestinationPath $ZipName -ErrorVariable ZipErr -ErrorAction Stop
}
catch {
Write-TSLog "Failed compressing file: "
Write-TSLog $CSVName
Write-TSLog "to destination zip file: "
Write-TSLog $ZipName
Write-TSLog "with error: "
Write-TSLog -End
write-tslog $ZipErr.Exception.ErrorRecord
}
Write-TSLog "Removing CSV file: "
Write-TSLog $CSVName
Write-TSLog "from the file system."
try {
Remove-Item $CSVName -Force -ErrorVariable CSVDeleteErr -ErrorAction Stop
}
catch {
Write-TSLog "Failed to remove CSV file: $CSVName"
Write-TSLog -LogError -LogErrorVar $CSVDeleteErr.Exception.ErrorRecord
}
Write-TSLog "Removed CSV file: "
Write-TSLog $CSVName
Write-TSLog "from the file system."
}
}
#EndRegion '.\Private\Export-AuditCSVtoZip.ps1' 57
#Region '.\Private\Get-ADComputerGroupMemberof.ps1' 0
function Get-ADComputerGroupMemberof {
[CmdletBinding()]
param (
[string]$SamAccountName
)
process {
$GroupStringArray = ((Get-ADComputer -Identity $SamAccountName -Properties memberof).memberof | Get-ADGroup | Select-Object name | Sort-Object name).name
$GroupString = $GroupStringArray -join " | "
return $GroupString
}
}
#EndRegion '.\Private\Get-ADComputerGroupMemberof.ps1' 12
#Region '.\Private\Get-ADExtendedRight.ps1' 0
Function Get-AdExtendedRight([Microsoft.ActiveDirectory.Management.ADObject] $ADObject) {
$ExportER = @()
Foreach ($Access in $ADObject.ntsecurityDescriptor.Access) {
# Ignore well known and normal permissions
if ($Access.AccessControlType -eq [System.Security.AccessControl.AccessControlType]::Deny) { continue }
if ($Access.IdentityReference -eq "NT AUTHORITY\SYSTEM") { continue }
if ($Access.IdentityReference -eq "NT AUTHORITY\SELF") { continue }
if ($Access.IsInherited) { continue }
# Check extended right
if ($Access.ActiveDirectoryRights -band [System.DirectoryServices.ActiveDirectoryRights]::ExtendedRight) {
$Right = "";
# This is the list of dangerous extended attributs
# see : https://technet.microsoft.com/en-us/library/ff405676.aspx
switch ($Access.ObjectType) {
"00299570-246d-11d0-a768-00aa006e0529" { $Right = "User-Force-Change-Password" }
"45ec5156-db7e-47bb-b53f-dbeb2d03c40" { $Right = "Reanimate-Tombstones" }
"bf9679c0-0de6-11d0-a285-00aa003049e2" { $Right = "Self-Membership" }
"ba33815a-4f93-4c76-87f3-57574bff8109" { $Right = "Manage-SID-History" }
"1131f6ad-9c07-11d1-f79f-00c04fc2dcd2" { $Right = "DS-Replication-Get-Changes-All" }
} # End switch
if ($Right -ne "") {
$Rights = [ordered]@{
Actor = $($Access.IdentityReference)
CanActOnThePermissionof = "$($ADObject.name)" + " " + "($($ADObject.DistinguishedName))"
WithExtendedRight = $Right
}
$ExportER += New-Object -TypeName PSObject -Property $Rights
#"$($Access.IdentityReference) can act on the permission of $($ADObject.name) ($($ADObject.DistinguishedName)) with extended right: $Right"
} # Endif
} # Endif
} # End Foreach
return $ExportER
} # End Function
#EndRegion '.\Private\Get-ADExtendedRight.ps1' 34
#Region '.\Private\Get-ADGroupMemberof.ps1' 0
function Get-ADGroupMemberof {
[CmdletBinding()]
param (
[string]$SamAccountName
)
process {
$GroupStringArray = ((Get-ADUser -Identity $SamAccountName -Properties memberof).memberof | Get-ADGroup | Select-Object name | Sort-Object name).name
$GroupString = $GroupStringArray -join " | "
return $GroupString
}
}
#EndRegion '.\Private\Get-ADGroupMemberof.ps1' 12
#Region '.\Private\Get-TimeStamp.ps1' 0
function Get-TimeStamp {
$Stamp = "[{0:yyyy/MM/dd} {0:HH:mm:ss}]" -f (Get-Date)
return $Stamp
}
#EndRegion '.\Private\Get-TimeStamp.ps1' 5
#Region '.\Private\Initialize-AuditBeginBlock.ps1' 0
function Initialize-AuditBeginBlock {
<#
.SYNOPSIS
This is a sample Private function only visible within the module.
.DESCRIPTION
This sample function is not exported to the module and only return the data passed as parameter.
.EXAMPLE
$null = Initialize-AuditBeginBlock -PrivateData 'NOTHING TO SEE HERE'
.PARAMETER PrivateData
The PrivateData parameter is what will be returned without transformation.
#>
[cmdletBinding()]
[OutputType([string])]
param(
[Parameter(ValueFromPipeline = $true)]
[string]$AttachmentFolderPathBegin = "C:\temp\ADDSAuditTasks",
[Parameter(ValueFromPipelineByPropertyName = $true)]
[string]$ScriptFunctionName,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[bool]$SendEmailMessageBegin,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[bool]$CleanBegin,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[bool]$WinSCPBegin
)
process {
# Create Directory Path
$AttachmentFolderPathCheck = Test-Path -Path $AttachmentFolderPathBegin
If (!($AttachmentFolderPathCheck)) {
Try {
# If not present then create the dir
New-Item -ItemType Directory $AttachmentFolderPathBegin -Force -ErrorAction Stop
}
Catch {
Write-TSLog -Begin
Write-TSLog "Directory: $AttachmentFolderPathBegin was not created."
Write-TSLog -LogErrorEnd
throw
}
}
# Begin Logging to $script:Logs
Write-TSLog -Begin
$script:LogOutputPath = "$AttachmentFolderPathBegin\$((Get-Date).ToString('yyyy-MM-dd_hh.mm.ss'))_$($ScriptFunctionName)_$($env:USERDNSDOMAIN)_ADDSAuditlog.log"
Write-TSLog "Log output path: $LogOutputPath"
# If not Clean
if (!($CleanBegin)) {
# Import Active Directory Module
$module = Get-Module -Name ActiveDirectory -ListAvailable
if (-not $module) {
Add-WindowsFeature RSAT-AD-PowerShell -IncludeAllSubFeature -Verbose -ErrorAction Stop
}
try {
Import-Module "activedirectory" -Global -ErrorAction Stop
}
catch {
Write-TSLog "The Module Was not installed. Use `"Add-WindowsFeature RSAT-AD-PowerShell`" or install using server manager under `"Role Administration Tools>AD DS and AD LDS Tools>Active Directory module for Windows Powershell`"."
Write-TSLog -LogErrorEnd
throw
}
if ($SendEmailMessageBegin) {
# Install / Import required modules.
$module = Get-Module -Name Send-MailKitMessage -ListAvailable
if (-not $module) {
Install-Module -Name Send-MailKitMessage -AllowPrerelease -Scope AllUsers -Force
}
try {
Import-Module "Send-MailKitMessage" -Global -ErrorAction Stop
}
catch {
# End run and log to file.
Write-TSLog "The Module Was not installed. Use `"Save-Module -Name Send-MailKitMessage -AllowPrerelease -Path C:\temp`" on another Windows Machine."
Write-TSLog -End
throw
}
}
elseif ($WinSCPBegin) {
$module = Get-Module -Name WinSCP -ListAvailable
if (-not $module) {
Install-Module WinSCP -Scope CurrentUser
}
try {
Import-Module WinSCP -Global -ErrorAction Stop
}
catch {
Write-TSLog "The Module Was not installed. Export WinSCP using: `"Save-Module WinSCP -Path <Path>`" and import to this machine."
Write-TSLog -LogErrorEnd
throw
}
}
}
# If SendMailMessage
return $LogOutputPath
}
}
#EndRegion '.\Private\Initialize-AuditBeginBlock.ps1' 100
#Region '.\Private\Initialize-AuditEndBlock.ps1' 0
function Initialize-AuditEndBlock {
<#
.SYNOPSIS
This is a sample Private function only visible within the module.
.DESCRIPTION
This sample function is not exported to the module and only return the data passed as parameter.
.EXAMPLE
$null = Initialize-AuditEndBlock -PrivateData 'NOTHING TO SEE HERE'
.PARAMETER PrivateData
The PrivateData parameter is what will be returned without transformation.
#>
[cmdletBinding()]
param
(
[string]$SmtpServerEnd,
[int]$PortEnd,
[string]$UserNameEnd,
#[switch]$ssl,
[string]$FromEnd,
[string]$ToEnd,
#[string]$subject = "$($script:MyInvocation.MyCommand.Name -replace '\..*') report ran for $($env:USERDNSDOMAIN).",
[string]$AttachmentFolderPathEnd,
#[string]$body,
[securestring]$Password,
[string]$FunctionEnd,
[string]$FunctionAppEnd,
[string]$ApiTokenEnd,
[string[]]$ZipEnd,
[bool]$CleanEnd,
[bool]$LocalDiskEnd,
[bool]$SendEmailMessageEnd,
[bool]$WinSCPEnd,
[string]$FTPHostEnd,
[string]$SshHostKeyFingerprintEnd,
[string]$RemotePathEnd
)
process {
Write-TSLog "The Value of Clean is $CleanEnd."
if ($CleanEnd) {
Write-TSLog "Removing Send-MailKitMessage Module"
try {
# Remove Modules
Remove-Module -Name "Send-MailKitMessage" -Force -Confirm:$false -ErrorAction Stop
}
catch {
Write-TSLog "Error removing Send-MailKitMessage Module"
Write-TSLog -LogError
}
Write-TSLog "Uninstalling Send-MailKitMessage Module"
try {
# Uninstall Modules
Uninstall-Module -Name "Send-MailKitMessage" -AllowPrerelease -Force -Confirm:$false
}
catch {
Write-TSLog -LogError
if (Get-Module -Name Send-MailKitMessage -ListAvailable) {
Write-TSLog "Error uninstalling Send-MailKitMessage Module"
}
}
Write-TSLog "Removing directories and files in: "
Write-TSLog "$AttachmentFolderPathEnd"
try {
Remove-Item -Path $AttachmentFolderPathEnd -Recurse -Force -ErrorAction Stop
}
catch {
Write-TSLog "Directory Cleanup error!"
Write-TSLog -LogError
throw
}
Write-TSLog -End
Write-TSLog -LogOutputPath C:\temp\ADDSAuditTaskCleanupLogs.log
}
else {
if ($SendEmailMessageEnd) {
if ($Password) {
<#
Send Attachment using O365 email account and password.
Must exclude from conditional access legacy authentication policies.
#>
Write-TSLog "Account: $UserNameEnd,"
Write-TSLog "SENDING email to: $ToEnd,"
Write-TSLog "From USER: $FromEnd,"
Write-TSLog "Using PORT: $PortEnd,"
Write-TSLog "Using RELAY $SMTPServerEnd, with SSL"
Write-TSLog "With: PASSWORD"
Write-TSLog "Logs included in body"
Write-TSLog -End
Send-AuditEmail -smtpServer $SMTPServerEnd -port $PortEnd -username $UserNameEnd `
-body $script:Logs -pass $Password -from $FromEnd -to $ToEnd -attachmentfiles ($ZipEnd).Split(" ") -ssl
$Password.Dispose()
Remove-Item -Path $AttachmentFolderPath -Recurse -Force -ErrorAction Stop
} # End if
else {
Write-TSLog "Account: $UserNameEnd,"
Write-TSLog "SENDING email to: $ToEnd,"
Write-TSLog "From USER: $FromEnd,"
Write-TSLog "Using PORT: $PortEnd,"
Write-TSLog "Using RELAY: $SMTPServerEnd, with SSL"
Write-TSLog "Without: PASSWORD"
Write-TSLog "Logs included in body"
Write-TSLog -End
Send-AuditEmail -smtpServer $SMTPServerEnd -port $PortEnd -username $UsernameEnd `
-body $script:Logs -from $FromEnd -to $ToEnd -attachmentfiles ($ZipEnd).Split(" ") -ssl
Remove-Item -Path $AttachmentFolderPathEnd -Recurse -Force -ErrorAction Stop
}
}
elseif ($FunctionAppEnd) {
<#
Send Attachment using O365 email account and Keyvault retrived password.
Must exclude email account from conditional access legacy authentication policies.
#>
Write-TSLog "Account: $UserNameEnd,"
Write-TSLog "SENDING email to: $ToEnd,"
Write-TSLog "From USER: $FromEnd,"
Write-TSLog "Using PORT: $PortEnd,"
Write-TSLog "Using RELAY: $SMTPServerEnd, with SSL"
Write-TSLog "Using FUNCTION APP: $FunctionAppEnd,"
Write-TSLog "With FUNCTION: $FunctionEnd"
Write-TSLog "Logs included in body"
Write-TSLog -End
Send-AuditEmail -smtpServer $SMTPServerEnd -port $PortEnd -username $UserNameEnd `
-body $script:Logs -Function $FunctionEnd -FunctionApp $FunctionAppEnd -token $ApiTokenEnd -from $FromEnd -to $ToEnd -attachmentfiles ($ZipEnd).Split(" ") -ssl
Remove-Item -Path $AttachmentFolderPathEnd -Recurse -Force -ErrorAction Stop
}
elseif ($WinSCPEnd) {
Write-TSLog "Account: $UserNameEnd,"
Write-TSLog "SENDING SFTP to: $FTPHostEnd,"
Write-TSLog "For SshHostKeyFingerprint: "
Write-TSLog "Files: $ZipEnd"
Write-TSLog $SshHostKeyFingerprintEnd
Submit-FTPUpload -FTPUserName $UserNameEnd -Password $Password `
-FTPHostName $FTPHostEnd -LocalFilePath ($ZipEnd).Split(" ") -SshHostKeyFingerprint $SshHostKeyFingerprintEnd -RemoteFTPPath $RemotePathEnd -ErrorVariable SubmitFTPErr
if ($?) {
Write-TSLog "The ADDSAuditTask archive has been uploaded to ftp."
Write-TSLog -End
Write-TSLog -LogOutputPath $LogOutputPath
}
else {
Write-TSLog -LogError $SubmitFTPErr
}
}
elseif ($LocalDiskEnd) {
#Confirm output path to console.
Write-TSLog "The ADDSAuditTask archive has been saved to: "
Write-TSLog "$ZipEnd"
Write-TSLog -End
Write-TSLog -LogOutputPath $LogOutputPath
}
}
}
}
#EndRegion '.\Private\Initialize-AuditEndBlock.ps1' 153
#Region '.\Private\Send-AuditEmail.ps1' 0
function Send-AuditEmail {
<#
.SYNOPSIS
This is a sample Private function only visible within the module. It uses Send-MailkitMessage
To send email messages.
.DESCRIPTION
This sample function is not exported to the module and only return the data passed as parameter.
.EXAMPLE
Send-AuditEmail -smtpServer $SMTPServer -port $Port -username $Username -Function $Function -FunctionApp $FunctionApp -token $ApiToken -from $from -to $to -attachmentfilePath "$FilePath" -ssl
.PARAMETER PrivateData
The PrivateData parameter is what will be returned without transformation.
#>
param (
[string]$smtpServer,
[int]$port,
[string]$username,
[switch]$ssl,
[string]$from,
[string]$to,
[string]$subject = "$($script:MyInvocation.MyCommand.Name -replace '\..*') report ran for $($env:USERDNSDOMAIN).",
[string[]]$attachmentfiles,
[string]$body,
[securestring]$pass,
[string]$Function,
[string]$FunctionApp,
[string]$token
)
Import-Module Send-MailKitMessage
# Recipient
$RecipientList = [MimeKit.InternetAddressList]::new()
$RecipientList.Add([MimeKit.InternetAddress]$to)
# Attachment
$AttachmentList = [System.Collections.Generic.List[string]]::new()
foreach ($currentItem in $attachmentfiles) {
$AttachmentList.Add("$currentItem")
}
# From
$from = [MimeKit.MailboxAddress]$from
# Mail Account variable
$User = $username
if ($pass) {
# Set Credential to $Password parameter input.
$Credential = `
[System.Management.Automation.PSCredential]::new($User, $pass)
}
elseif ($FunctionApp) {
$url = "https://$($FunctionApp).azurewebsites.net/api/$($Function)"
# Retrieve credentials from function app url into a SecureString.
$a, $b = (Invoke-RestMethod $url -Headers @{ 'x-functions-key' = "$token" }).split(',')
$Credential = `
[System.Management.Automation.PSCredential]::new($User, (ConvertTo-SecureString -String $a -Key $b.split(' ')) )
}
# Create Parameter hashtable
$Parameters = @{
"UseSecureConnectionIfAvailable" = $ssl
"Credential" = $Credential
"SMTPServer" = $SMTPServer
"Port" = $Port
"From" = $From
"RecipientList" = $RecipientList
"Subject" = $subject
"TextBody" = $body
"AttachmentList" = $AttachmentList
}
Send-MailKitMessage @Parameters
Clear-Variable -Name "a", "b", "Credential", "token" -Scope Local -ErrorAction SilentlyContinue
}
#EndRegion '.\Private\Send-AuditEmail.ps1' 68
#Region '.\Private\Submit-FTPUpload.ps1' 0
function Submit-FTPUpload {
[CmdletBinding()]
param (
[string]$FTPUserName,
[securestring]$Password,
[string]$FTPHostName,
[ValidateSet("Sftp", "SCP", "FTP", "Webdav", "s3")]
[string]$Protocol = "Sftp",
[ValidateSet("None", "Implicit ", "Explicit")]
[string]$FTPSecure = "None",
#[int]$FTPPort = 0,
# Mandatory with SFTP/SCP
[string[]]$SshHostKeyFingerprint,
#[string]$SshPrivateKeyPath,
[string[]]$LocalFilePath,
# Send-WinSCPItem
# './remoteDirectory'
[string]$RemoteFTPPath
)
process {
# This script will run in the context of the user. Please be sure it's a local admin with cached credentials.
# Required Modules
Import-Module WinSCP
# Capture credentials.
$Credential = [System.Management.Automation.PSCredential]::new($FTPUserName, $Password)
# Open the session using the SessionOptions object.
$sessionOption = New-WinSCPSessionOption -Credential $Credential -HostName $FTPHostName -SshHostKeyFingerprint $SshHostKeyFingerprint -Protocol $Protocol -FtpSecure $FTPSecure
# New-WinSCPSession sets the PSDefaultParameterValue of the WinSCPSession parameter for all other cmdlets to this WinSCP.Session object.
# You can set it to a variable if you would like, but it is only necessary if you will have more then one session open at a time.
$WinSCPSession = New-WinSCPSession -SessionOption $sessionOption
if (!(Test-WinSCPPath -Path $RemoteFTPPath -WinSCPSession $WinSCPSession)) {
New-WinSCPItem -Path $RemoteFTPPath -ItemType Directory -WinSCPSession $WinSCPSession
}
# Upload a file to the directory.
$errorindex = 0
foreach ($File in $LocalFilePath) {
$sendvar = Send-WinSCPItem -Path $File -Destination $RemoteFTPPath -WinSCPSession $WinSCPSession -ErrorAction Stop -ErrorVariable SendWinSCPErr
if ($sendvar.IsSuccess -eq $false) {
write-tslog -LogErrorEnd -LogErrorVar $SendWinSCPErr
$errorindex += 1
}
}
if ($ErrorIndex -ne 0) {
Write-Output "Error"
throw 1
}
# Close and remove the session object.
Remove-WinSCPSession -WinSCPSession $WinSCPSession
}
}
#EndRegion '.\Private\Submit-FTPUpload.ps1' 51
#Region '.\Private\Write-TSLog.ps1' 0
function Write-TSLog {
<#
.SYNOPSIS
This is a sample Private function only visible within the module.
.DESCRIPTION
This sample function is not exported to the module and only return the data passed as parameter.
.EXAMPLE
$null = Write-Logs -PrivateData 'NOTHING TO SEE HERE'
.PARAMETER PrivateData
The PrivateData parameter is what will be returned without transformation.
#>
[CmdletBinding(DefaultParameterSetName = 'Default')]
[OutputType([string])]
param(
[Parameter(
ValueFromPipeline = $true,
ValueFromPipelineByPropertyName = $true,
Mandatory = $true,
ParameterSetName = 'Default',
Position = 0
)]
[String[]]$LogString,
[Parameter(
ValueFromPipelineByPropertyName = $true,
Mandatory = $true,
ParameterSetName = 'Begin',
Position = 0
)]
[switch]$Begin,
[Parameter(
ValueFromPipelineByPropertyName = $true,
Mandatory = $true,
ParameterSetName = 'End',
Position = 0
)]
[switch]$End,
[Parameter(
ValueFromPipelineByPropertyName = $true,
Mandatory = $true,
ParameterSetName = 'LogError',
Position = 0
)]
[switch]$LogError,
[Parameter(
ValueFromPipelineByPropertyName = $true,
Mandatory = $true,
ParameterSetName = 'LogErrorEnd',
Position = 0
)]
[switch]$LogErrorEnd,
[Parameter(ParameterSetName = 'LogError', Position = 1)]
[Parameter(
ValueFromPipelineByPropertyName = $true,
ParameterSetName = 'LogErrorEnd',
Position = 1
)]
[System.Management.Automation.ErrorRecord[]]$LogErrorVar,
[Parameter(
ValueFromPipelineByPropertyName = $true,
Mandatory = $true,
ParameterSetName = 'LogToFile',
Position = 0
)]
[string]$LogOutputPath
)
process {
# Change the ErrorActionPreference to 'Stop'
$ErrorActionPreference = "SilentlyContinue"
$ModuleName = $script:MyInvocation.MyCommand.Name.ToString() -replace '\..*'
$ModuleVer = $MyInvocation.MyCommand.Version.ToString()
$ErrorActionPreference = "Continue"
if ($Begin) {
Clear-Variable Logs -Scope Script -ErrorAction SilentlyContinue
$TSLogString = "$(Get-TimeStamp) Begin Log for Module version $ModuleVer of Module: $ModuleName `n"
$script:Logs += $TSLogString
}
elseif ($End) {
$TSLogString = "$(Get-TimeStamp) End Log for Module version $ModuleVer of Module: $ModuleName `n"
$script:Logs += $TSLogString
Write-Output $script:Logs
}
elseif ($LogError) {
if ($LogErrorVar) {
#$TSLogString += "$(($LogErrorVar.Exception).ToString()) `n"
$TSLogString += "$($global:Error[0].Exception.ErrorRecord) `n"
}
else {
$TSLogString = "$($global:Error[0].Exception.ErrorRecord) `n"
}
$script:Logs += $TSLogString
}
elseif ($LogErrorEnd) {
if ($LogErrorVar) {
$TSLogString = "$(Get-TimeStamp) An Error Occured. The Error Variable was: `n"
$script:Logs += $TSLogString
$TSLogString += "$($LogErrorVar.Exception.ErrorRecord)" + "Error`n"
$script:Logs += $TSLogString
$TSLogString = "$(Get-TimeStamp) End Log for Module version $ModuleVer of Module: $ModuleName `n"
$script:Logs += $TSLogString
$TSLogString = "$(Get-TimeStamp) ErrorLog output to 'C:\temp\ADDSAuditTasksErrors.log' `n"
$script:Logs += $TSLogString
}
else {
$TSLogString = "$(Get-TimeStamp) An Error Occured. The exception was: `n"
$script:Logs += $TSLogString
$TSLogString = "$($global:Error[0].Exception.ErrorRecord) `n"
$script:Logs += $TSLogString
$TSLogString = "$(Get-TimeStamp) ErrorLog output to 'C:\temp\ADDSAuditTasksErrors.log' `n"
$script:Logs += $TSLogString
}
Write-Output $script:Logs
$script:Logs | Out-File "C:\temp\ADDSAuditTasksErrors.log" -Encoding utf8 -Append -Force
}
elseif ($LogOutputPath) {
$script:Logs | Out-File $LogOutputPath -Encoding utf8 -Append -Force
Write-Output "Logs saved to $LogOutputPath"
}
else {
$TSLogString = "$(Get-TimeStamp) $logstring `n"
$script:Logs += $TSLogString
}
}
}
#EndRegion '.\Private\Write-TSLog.ps1' 124
#Region '.\Public\Get-ADDSActiveAccountAudit.ps1' 0
function Get-ADDSActiveAccountAudit {
<#
.SYNOPSIS
Active Directory Audit with Keyvault retrieval option.
.DESCRIPTION
Audit's Active Directory taking "days" as the input for how far back to check for a last sign in.
Output can be kept locally, or sent remotely via email or sftp.
Function App is the same as SendEmail except that it uses a password retrieved using the related Function App.
The related function app would need to be created.
Expects SecureString and Key as inputs to function app parameter set.
.EXAMPLE
PS C:\> Get-ADDSActiveAccountAudit -LocalDisk -Verbose
.EXAMPLE
PS C:\> Get-ADDSActiveAccountAudit -SendMailMessage -SMTPServer $SMTPServer -UserName "[email protected]" -Password (Read-Host -AsSecureString) -To "[email protected]" -Verbose
.EXAMPLE
PS C:\> Get-ADDSActiveAccountAudit -FunctionApp $FunctionApp -Function $Function -SMTPServer $SMTPServer -UserName "[email protected]" -To "[email protected]" -Verbose
.EXAMPLE
PS C:\> Get-ADDSActiveAccountAudit -WinSCP -UserName "ftphostname.UserName" -Password (Read-Host -AsSecureString) -FTPHost "ftphost.domain.com" -SshHostKeyFingerprint "<SShHostKeyFingerprint>" -Verbose
.EXAMPLE
PS C:\> Get-ADDSActiveAccountAudit -Clean -Verbose
.PARAMETER LocalDisk
Only output data to local disk.
.PARAMETER SendMailMessage
Adds parameters for sending Audit Report as an Email.
.PARAMETER WinSCP
Adds parameters for sending Audit Report via SFTP.
.PARAMETER AttachmentFolderPath
Default path is C:\temp\ADDSActiveAccountAuditLogs.
This is the folder where attachments are going to be saved.
.PARAMETER FunctionApp
Azure Function App Name.
.PARAMETER Function
Azure Function App's Function Name. Ex. "HttpTrigger1"
.PARAMETER ApiToken
Private Function Key.
.PARAMETER SMTPServer
Defaults to Office 365 SMTP relay. Enter optional relay here.
.PARAMETER Port
SMTP Port to Relay. Ports can be: "993", "995", "587", or "25"
.PARAMETER UserName
Specify the account with an active mailbox and MFA disabled.
Ensure the account has delegated access for Send On Behalf for any
UPN set in the "$From" Parameter
.PARAMETER Password
Use: (Read-Host -AsSecureString) as in Examples.
May be omitted.
.PARAMETER To
Recipient of the attachment outputs.
.PARAMETER From
Defaults to the same account as $UserName unless the parameter is set.
Ensure the Account has delegated access to send on behalf for the $From account.
.PARAMETER FTPHost
SFTP Hostname.
.PARAMETER RemotePath
Remove FTP path. Will be created in the user path under functionname folder if not specified.
.PARAMETER SshHostKeyFingerprint
Adds parameters for sending Audit Report via SFTP.
.PARAMETER DaysInactive
Defaults to 90 days in the past.
Specifies how far back to look for accounts last logon.
If logon is within 90 days, it won't be included.
.PARAMETER ADDSAccountIsNotEnabled
Defaults to not being set.
Choose to search for disabled Active Directory Users.
.PARAMETER Clean
Remove installed modules during run. Remove local files if not a LocalDisk run.
.NOTES
Can take password as input into secure string using (Read-Host -AsSecureString).
#>
[CmdletBinding(DefaultParameterSetName = 'LocalDisk', HelpURI = "https://criticalsolutionsnetwork.github.io/ADDSAuditTasks/#Get-ADDSActiveAccountAudit")]
param (
[Parameter(
Mandatory = $true,
ParameterSetName = 'LocalDisk',
HelpMessage = 'Output to disk only',
Position = 0
)]
[switch]$LocalDisk,
[Parameter(
Mandatory = $true,
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Send Mail to a relay',
Position = 0
)]
[switch]$SendMailMessage,
[Parameter(
Mandatory = $true,
ParameterSetName = 'WinSCP',
HelpMessage = 'Send using SFTP via WinSCP Module',
Position = 0,
ValueFromPipelineByPropertyName = $true
)]
[switch]$WinSCP,
[Parameter(
Mandatory = $true,
ParameterSetName = 'FunctionApp',
HelpMessage = 'Enter the FunctionApp name',
Position = 0
)]
[string]$FunctionApp,
[Parameter(
Mandatory = $true,
ParameterSetName = 'FunctionApp',
HelpMessage = 'Enter the FunctionApp Function name',
ValueFromPipelineByPropertyName = $true,
Position = 1
)]
[string]$Function,
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Enter the SMTP hostname' ,
ValueFromPipelineByPropertyName = $true
)]
[string]$SMTPServer = "smtp.office365.com",
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(ParameterSetName = 'SendMailMessage')]
[Parameter(ParameterSetName = 'WinSCP')]
[Parameter(
ParameterSetName = 'LocalDisk',
HelpMessage = 'Enter output folder path',
ValueFromPipeline = $true
)]
[string]$AttachmentFolderPath = "C:\temp\ADDSActiveAccountAuditLogs",
[Parameter(ParameterSetName = 'WinSCP')]
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(ParameterSetName = 'SendMailMessage')]
[Parameter(
ParameterSetName = 'LocalDisk',
HelpMessage = 'Active Directory User Enabled or not',
ValueFromPipelineByPropertyName = $true
)]
[switch]$ADDSAccountIsNotEnabled,
[Parameter(ParameterSetName = 'WinSCP')]
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(ParameterSetName = 'SendMailMessage')]
[Parameter(
ParameterSetName = 'LocalDisk',
HelpMessage = 'Days back to check for recent sign in',
ValueFromPipelineByPropertyName = $true
)]
[int]$DaysInactive = '90',
[Parameter(Mandatory = $true, ParameterSetName = 'WinSCP')]
[Parameter(Mandatory = $true, ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
Mandatory = $true,
HelpMessage = 'Enter the Sending Account UPN Ex:"[email protected]"',
ValueFromPipelineByPropertyName = $true
)]
[string]$UserName,
[Parameter(ParameterSetName = 'WinSCP', Mandatory = $true)]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Copy Paste the following: $Password = (Read-Host -AsSecureString)',
ValueFromPipelineByPropertyName = $true
)]
[securestring]$Password,
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Enter the port n
umber for the mail relay',
ValueFromPipelineByPropertyName = $true
)]
[ValidateSet("993", "995", "587", "25")]
[int]$Port = 587,
[Parameter(Mandatory = $true, ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
Mandatory = $true,
HelpMessage = 'Enter the recipient email address',
ValueFromPipelineByPropertyName = $true
)]
[ValidatePattern("[a-z0-9!#\$%&'*+/=?^_`{|}~-]+(?:\.[a-z0-9!#\$%&'*+/=?^_`{|}~-]+)*@(?:[a-z0-9](?:[a-z0-9-]*[a-z0-9])?\.)+[a-z0-9](?:[a-z0-9-]*[a-z0-9])?")]
[string]$To,
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Enter the name of the sender',
ValueFromPipelineByPropertyName = $true
)]
[ValidatePattern("[a-z0-9!#\$%&'*+/=?^_`{|}~-]+(?:\.[a-z0-9!#\$%&'*+/=?^_`{|}~-]+)*@(?:[a-z0-9](?:[a-z0-9-]*[a-z0-9])?\.)+[a-z0-9](?:[a-z0-9-]*[a-z0-9])?")]
[string]$From = $UserName,
[Parameter(
Mandatory = $true,
ParameterSetName = 'FunctionApp',
HelpMessage = 'Enter output folder path',
ValueFromPipelineByPropertyName = $true
)]
[string]$ApiToken,
[Parameter(
Mandatory = $true,
ParameterSetName = 'WinSCP',
HelpMessage = 'Enter FTP HostName',
ValueFromPipelineByPropertyName = $true
)]
[string]$FTPHost,
[Parameter(
Mandatory = $true,
ParameterSetName = 'WinSCP',
HelpMessage = 'Enter SshHostKeyFingerprint like: "ecdsa-sha2-nistp256 256 <Key>" ',
ValueFromPipelineByPropertyName = $true
)]
[string]$SshHostKeyFingerprint,
[Parameter(
ParameterSetName = 'WinSCP',
HelpMessage = 'Enter ftp remote path "/path/" ',
ValueFromPipelineByPropertyName = $true
)]
[string]$RemotePath = ("./" + $($MyInvocation.MyCommand.Name -replace '\..*')) ,
[Parameter(
Mandatory = $true,
ParameterSetName = 'Clean',
HelpMessage = 'Clean Modules and output path',
Position = 0
)]
[switch]$Clean
)
Begin {
$ScriptFunctionName = $MyInvocation.MyCommand.Name -replace '\..*'
try {
Initialize-AuditBeginBlock -AttachmentFolderPathBegin $AttachmentFolderPath -ScriptFunctionName $ScriptFunctionName -SendEmailMessageBegin $SendMailMessage -WinSCPBegin $WinSCP -CleanBegin $Clean -ErrorVariable InitBeginErr -ErrorAction Stop
}
catch {
Write-TSLog "End Block last error for log: "
Write-TSLog -LogError -LogErrorVar InitBeginErr
}
if ($ADDSAccountIsNotEnabled) {
$Enabled = $false
}
else {
$Enabled = $true
}
}
Process {
if (!($Clean)) {
# Establish timeframe to review.
$time = (Get-Date).Adddays( - ($DaysInactive))
# Add Datetime to filename
$csvFileName = "$AttachmentFolderPath\$((Get-Date).ToString('yyyy-MM-dd_hh.mm.ss'))_$($ScriptFunctionName)_$($env:USERDNSDOMAIN)"
# Create FileNames
$csv = "$csvFileName.csv"
$zip = "$csvFileName.zip"
Write-TSLog "Searching for users who have not signed in within the last $DaysInactive days, where parameter Enabled = $Enabled"
# Audit Script with export to csv and zip. Paramters for Manager, lastLogonTimestamp and DistinguishedName normalized.
# GetActiveUsers
Get-ADUser -Filter { LastLogonTimeStamp -lt $time -and Enabled -eq $Enabled } -Properties `
samaccountname, GivenName, Surname, Name, UserPrincipalName, lastlogontimestamp, DistinguishedName, `
Title, Enabled, Description, Manager, Department -OutVariable ADExport | Out-Null
$Export = @()
foreach ($item in $ADExport) {
$Export += [ADAuditAccount]::new(
$($item.SamAccountName),
$($item.GivenName),
$($item.Surname),
$($item.Name),
$($item.UserPrincipalName),
$($item.LastLogonTimeStamp),
$($item.Enabled),
$($item.LastLogonTimeStamp),
$($item.DistinguishedName),
$($item.Title),
$($item.Manager),
$($item.Department),
$false,
$false
)
}
try {
Export-AuditCSVtoZip -Exportobject $Export -csv $csv -zip $zip -ErrorAction Stop -ErrorVariable ExportAuditCSVZipErr
}
catch {
Write-TSLog -LogErrorEnd -LogErrorVar $ExportAuditCSVZipErr.Exception.ErrorRecord
}
} # End If Clean Region
} ## End Process Region
End {
try {
Initialize-AuditEndBlock -SendEmailMessageEnd $SendMailMessage -WinSCPEnd $WinSCP -FTPHostend $FTPHost -SshHostKeyFingerprintEnd $SshHostKeyFingerprint -SmtpServerEnd $SMTPServer -PortEnd $Port -UserNameEnd $UserName -FromEnd $From -ToEnd $To `
-AttachmentFolderPathEnd $AttachmentFolderPath -Password $Password -FunctionEnd $function -FunctionAppEnd $FunctionApp `
-ApiTokenEnd $ApiToken -ZipEnd $zip -RemotePathEnd $RemotePath -LocalDiskEnd $LocalDisk -CleanEnd $Clean -ErrorVariable InitEndErr
}
catch {
Write-TSLog "End Block last error for log: "
Write-TSLog -LogError
}
# Clear Variables
Clear-Variable -Name "Function", "FunctionApp", "ApiToken"
}
}
#EndRegion '.\Public\Get-ADDSActiveAccountAudit.ps1' 292
#Region '.\Public\Get-ADDSAssetInventoryAudit.ps1' 0
function Get-ADDSAssetInventoryAudit {
<#
.SYNOPSIS
Active Directory Server and Workstation Audit with Report export option (Can also be piped to CSV if Report isn't specified).
.DESCRIPTION
Audit's Active Directory taking "days" as the input for how far back to check for a device's last sign in.
Output can be piped to a csv manually, or automatically to C:\temp or a specified path in "DirPath" using
the -Report Switch.
Use the Tab key for the -HostType Parameter.
.EXAMPLE
PS C:\> Get-ADDSInventoryAudit -HostType WindowsServers
.EXAMPLE
PS C:\> Get-ADDSInventoryAudit -HostType WindowsWorkstations -DirPath "C:\Temp\" -Report
.EXAMPLE
PS C:\> Get-ADDSInventoryAudit -HostType WindowsServers -DirPath "C:\Temp\" -Report
.EXAMPLE
PS C:\> Get-ADDSInventoryAudit -OSType "2008" -DirPath "C:\Temp\" -Report
.PARAMETER HostType
Select from Windows Server or Windows 10 plus.
.PARAMETER OSType
Search an OS String. Wildcards can be omitted as the function will automatically add the
wildcard characters before searching.
.PARAMETER DirPath
The path to the -Report output directory.
.PARAMETER Report
Add report output as csv to DirPath directory.
.PARAMETER AttachmentFolderPath
Default path is C:\temp\ADDSDepartedUsersAuditLogs.
This is the folder where attachments are going to be saved.
.NOTES
Outputs to C:\temp by default. For help type: help Get-ADDSAssetInventoryAudit -ShowWindow
#>
[CmdletBinding(DefaultParameterSetName = 'HostType' , HelpURI = "https://criticalsolutionsnetwork.github.io/ADDSAuditTasks/#Get-ADDSInventoryAudit")]
param (
[ValidateSet("WindowsServers","WindowsWorkstations","Non-Windows")]
[Parameter(
ParameterSetName = 'HostType',
Mandatory = $true,
Position = 0,
HelpMessage = 'Name filter attached to users.',
ValueFromPipeline = $true
)]
[string]$HostType,
[Parameter(
Mandatory = $true,
ParameterSetName = 'OSType',
Position = 0,
HelpMessage = 'Enter a Specific OS Name or first few letters of the OS to Search for in ActiveDirectory',
ValueFromPipeline = $true
)]
[string]$OSType,
[Parameter(
Position = 1,
HelpMessage = 'How many days back to consider an AD Computer last sign in as active',
ValueFromPipelineByPropertyName = $true
)]
[int]$DaystoConsiderAHostInactive = 90,
[Parameter(
Position = 2,
HelpMessage = 'Switch to output to directory specified in DirPath parameter',
ValueFromPipelineByPropertyName = $true
)]
[switch]$Report,
[Parameter(
Position = 3,
HelpMessage = 'Enter the working directory you wish the report to save to. Default creates C:\temp'
)]
[string]$DirPath = 'C:\temp\ADDSAssetInventoryAudit',
[Parameter(
HelpMessage = 'Search for Enabled or Disabled hosts',
ValueFromPipelineByPropertyName = $true
)]
[bool]$Enabled = $true
)
begin {
$ScriptFunctionName = $MyInvocation.MyCommand.Name -replace '\..*'
$time = (Get-Date).Adddays( - ($DaystoConsiderAHostInactive))
$module = Get-Module -Name ActiveDirectory -ListAvailable
if (-not $module) {
[ValidateSet("Y", "N")]$choice = Read-Host "Install Active Directory Module? Y or N ?"
if (($Choice -eq "Y")) {
Add-WindowsFeature RSAT-AD-PowerShell -IncludeAllSubFeature -Verbose -ErrorAction Stop
}
else {
throw "You must install the Active Directory module to continue"
}
}
try {
Import-Module "activedirectory" -Global -ErrorAction Stop | Out-Null
}
catch {
throw $Error[0].Error.Exception
}
$AttachmentFolderPathCheck = Test-Path -Path $DirPath
If (!($AttachmentFolderPathCheck)) {
Try {
# If not present then create the dir
New-Item -ItemType Directory $DirPath -Force -ErrorAction Stop | Out-Null
}
Catch {
throw "Unable to create output directory $($DirPath)"
}
}
switch ($PsCmdlet.ParameterSetName) {
'HostType' {
if ($HostType -eq "WindowsWorkstations") {
$FileSuffix = "Workstations"
Write-Verbose "###############################################"
Write-Verbose "Searching Windows Workstations......"
Start-Sleep 2
}
elseif ($HostType -eq "Non-Windows") {
$POSIX = $true
$FileSuffix = "Non-Windows"
Write-Verbose "###############################################"
Write-Verbose "Searching Non-Windows Computer Objects......"
Start-Sleep 2
}
elseif ($HostType -eq "WindowsServers") {
$OSPicked = "*Server*"
$FileSuffix = "Servers"
Write-Verbose "###############################################"
Write-Verbose "Searching Windows Servers......"
Start-Sleep 2
}
}
'OSType' {
$OSPicked = '*' + $OSType + '*'
$FileSuffix = $OSType
Write-Verbose "###############################################"
Write-Verbose "Searching OSType $OsType......"
Start-Sleep 2
}
}
$propsArray = `
"Created", `
"Description", `
"DNSHostName", `
"Enabled", `
"IPv4Address", `
"IPv6Address", `
"KerberosEncryptionType", `
"lastLogonTimestamp", `
"Name", `
"OperatingSystem", `
"DistinguishedName", `
"servicePrincipalName", `
"whenChanged"
} # End Begin
process {
Write-Verbose "Searching computers that have logged in within the last $DaystoConsiderAHostInactive days."
Write-Verbose "Where property Enabled = $Enabled"
Start-Sleep 2
if ($OSPicked) {
Write-Verbose "And Operating System is like: $OSPicked."
$ActiveComputers = (Get-ADComputer -Filter { (LastLogonTimeStamp -gt $time) -and (Enabled -eq $Enabled) -and (OperatingSystem -like $OSPicked) }).Name
}
elseif ($POSIX) {
Write-Verbose "And Operating System is: Non-Windows(POSIX)."
$ActiveComputers = (Get-ADComputer -Filter {OperatingSystem -notlike "*windows*" -and OperatingSystem -notlike "*server*" -and Enabled -eq $Enabled -and lastlogontimestamp -gt $time} ).Name
}
else{
Write-Verbose "And Operating System is -like `"*windows*`" -and Operating System -notlike `"*server*`" (Workstations)."
$ActiveComputers = (Get-ADComputer -Filter {OperatingSystem -like "*windows*" -and OperatingSystem -notlike "*server*" -and Enabled -eq $Enabled -and lastlogontimestamp -gt $time} ).Name
}
$ADComps = @()
foreach ($comp in $ActiveComputers) {
Get-ADComputer -Identity $comp -Properties $propsArray | Select-Object $propsArray -OutVariable ADComp | Out-Null
$ADComps += $ADComp
} # End Foreach
$ADCompExport = @()
foreach ($item in $ADComps) {
$ADCompExport += [ADComputerAccount]::new(
$item.Name,
$item.DNSHostName,
$item.Enabled,
$item.IPv4Address,
$item.IPv6Address,
$item.OperatingSystem,
$item.lastLogonTimestamp,
$item.Created,
$item.whenChanged,
$item.Description,
$item.DistinguishedName,
$(($item.KerberosEncryptionType).Value.tostring()),
($item.servicePrincipalName -join " | "),
$item.Name,
$item.lastLogonTimestamp
) # End New [ADComputerAccount] object
}# End foreach Item in ADComps
$Export = @()
foreach ($Comp in $ADCompExport) {
$hash = [ordered]@{
DNSHostName = $Comp.DNSHostName
ComputerName = $Comp.ComputerName
Enabled = $Comp.Enabled
IPv4Address = $Comp.IPv4Address
IPv6Address = $Comp.IPv6Address
OperatingSystem = $Comp.OperatingSystem
LastLogon = $Comp.LastLogon
LastSeen = $Comp.LastSeen
Created = $Comp.Created
Modified = $Comp.Modified
Description = $Comp.Description
GroupMemberships = $Comp.GroupMemberships
OrgUnit = $Comp.OrgUnit
KerberosEncryptionType = $Comp.KerberosEncryptionType
SPNs = $Comp.SPNs
}
New-Object -TypeName PSCustomObject -Property $hash -OutVariable PSObject | Out-Null
$Export += $PSObject
} # End foreach Comp in ADCompExport
} # End Process
end {
if ($Report) {
# Add Datetime to filename
$csvFileName = "$DirPath\$((Get-Date).ToString('yyyy-MM-dd_hh.mm.ss'))_$($env:USERDNSDOMAIN)_$($ScriptFunctionName)_$($FileSuffix)"
# Create FileNames
$csv = "$csvFileName.csv"
$zip = "$csvFileName.zip"
$Export | Export-Csv $csv -NoTypeInformation
Compress-Archive -Path $csv -DestinationPath $zip
Remove-Item $csv -Force
Write-Verbose "Archive saved to: "
Write-Verbose "Directory: $DirPath"
Write-Verbose "FilePath: $zip"
}
else {
Write-Verbose "Returning output object."
Start-Sleep 2
return $Export
}
} # End End
}
#EndRegion '.\Public\Get-ADDSAssetInventoryAudit.ps1' 237
#Region '.\Public\Get-ADDSDepartedUsersAccountAudit.ps1' 0
function Get-ADDSDepartedUsersAccountAudit {
<#
.SYNOPSIS
Active Directory Audit with Keyvault retrieval option.
.DESCRIPTION
Audit's Active Directory taking a Prefix used as a Wildcard as input for checking user accounts.
Output can be kept locally, or sent remotely via email or sftp.
Function App is the same as SendEmail except that it uses a password retrieved using the related Function App.
The related function app would need to be created.
Expects SecureString and Key as inputs to function app parameter set.
.EXAMPLE
PS C:\> Get-ADDSDepartedUsersAccountAudit -LocalDisk -WildCardIdentifier "<StringToSearchFor>" -Verbose
.EXAMPLE
PS C:\> Get-ADDSDepartedUsersAccountAudit -SendMailMessage -SMTPServer $SMTPServer -UserName "[email protected]" -Password (Read-Host -AsSecureString) -To "[email protected]" -WildCardIdentifier "<StringToSearchFor>" -Verbose
.EXAMPLE
PS C:\> Get-ADDSDepartedUsersAccountAudit -FunctionApp $FunctionApp -Function $Function -SMTPServer $SMTPServer -UserName "[email protected]" -To "[email protected]" -WildCardIdentifier "<StringToSearchFor>" -Verbose
.EXAMPLE
PS C:\> Get-ADDSDepartedUsersAccountAudit -WinSCP -UserName "ftphostname.UserName" -Password (Read-Host -AsSecureString) -FTPHost "ftphost.domain.com" -SshHostKeyFingerprint "<SShHostKeyFingerprint>" -WildCardIdentifier "<StringToSearchFor>" -Verbose
.EXAMPLE
PS C:\> Get-ADDSDepartedUsersAccountAudit -Clean -Verbose
.PARAMETER LocalDisk
Only output data to local disk.
.PARAMETER SendMailMessage
Adds parameters for sending Audit Report as an Email.
.PARAMETER WinSCP
Adds parameters for sending Audit Report via SFTP.
.PARAMETER AttachmentFolderPath
Default path is C:\temp\ADDSDepartedUsersAuditLogs.
This is the folder where attachments are going to be saved.
.PARAMETER FunctionApp
Azure Function App Name.
.PARAMETER Function
Azure Function App's Function Name. Ex. "HttpTrigger1"
.PARAMETER ApiToken
Private Function Key.
.PARAMETER SMTPServer
Defaults to Office 365 SMTP relay. Enter optional relay here.
.PARAMETER Port
SMTP Port to Relay. Ports can be: "993", "995", "587", or "25"
.PARAMETER UserName
Specify the account with an active mailbox and MFA disabled.
Ensure the account has delegated access for Send On Behalf for any
UPN set in the "$From" Parameter
.PARAMETER Password
Use: (Read-Host -AsSecureString) as in Examples.
May be omitted.
.PARAMETER To
Recipient of the attachment outputs.
.PARAMETER From
Defaults to the same account as $UserName unless the parameter is set.
Ensure the Account has delegated access to send on behalf for the $From account.
.PARAMETER WildCardIdentifier
Name wildcard appended to user account.
.PARAMETER Clean
Remove installed modules during run. Remove local files if not a LocalDisk run.
.NOTES
Can take password as input into secure string using (Read-Host -AsSecureString).
#>
[CmdletBinding(DefaultParameterSetName = 'LocalDisk' , HelpURI = "https://criticalsolutionsnetwork.github.io/ADDSAuditTasks/#Get-ADDSDepartedUsersAccountAudit")]
param (
[Parameter(
Mandatory = $true,
ParameterSetName = 'LocalDisk',
HelpMessage = 'Output to disk only',
Position = 0
)]
[switch]$LocalDisk,
[Parameter(
Mandatory = $true,
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Send Mail to a relay',
Position = 0
)]
[switch]$SendMailMessage,
[Parameter(
Mandatory = $true,
ParameterSetName = 'WinSCP',
HelpMessage = 'Send using SFTP via WinSCP Module',
Position = 0,
ValueFromPipelineByPropertyName = $true
)]
[switch]$WinSCP,
[Parameter(
Mandatory = $true,
ParameterSetName = 'FunctionApp',
HelpMessage = 'Enter the FunctionApp name',
Position = 0
)]
[string]$FunctionApp,
[Parameter(
Mandatory = $true,
ParameterSetName = 'FunctionApp',
HelpMessage = 'Enter the FunctionApp Function name',
ValueFromPipelineByPropertyName = $true,
Position = 1
)]
[string]$Function,
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Enter the SMTP hostname' ,
ValueFromPipelineByPropertyName = $true
)]
[string]$SMTPServer = "smtp.office365.com",
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(ParameterSetName = 'SendMailMessage')]
[Parameter(ParameterSetName = 'WinSCP')]
[Parameter(
ParameterSetName = 'LocalDisk',
HelpMessage = 'Enter output folder path',
ValueFromPipeline = $true
)]
[string]$AttachmentFolderPath = "C:\temp\ADDSDepartedUsersAuditLogs",
[Parameter(Mandatory = $true, ParameterSetName = 'WinSCP')]
[Parameter(Mandatory = $true, ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
Mandatory = $true,
HelpMessage = 'Enter the Sending Account UPN Ex:"[email protected]"',
ValueFromPipelineByPropertyName = $true
)]
[string]$UserName,
[Parameter(ParameterSetName = 'WinSCP', Mandatory = $true)]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Copy Paste the following: $Password = (Read-Host -AsSecureString)',
ValueFromPipelineByPropertyName = $true
)]
[securestring]$Password,
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Enter the port n
umber for the mail relay',
ValueFromPipelineByPropertyName = $true
)]
[ValidateSet("993", "995", "587", "25")]
[int]$Port = 587,
[Parameter(Mandatory = $true, ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
Mandatory = $true,
HelpMessage = 'Enter the recipient email address',
ValueFromPipelineByPropertyName = $true
)]
[ValidatePattern("[a-z0-9!#\$%&'*+/=?^_`{|}~-]+(?:\.[a-z0-9!#\$%&'*+/=?^_`{|}~-]+)*@(?:[a-z0-9](?:[a-z0-9-]*[a-z0-9])?\.)+[a-z0-9](?:[a-z0-9-]*[a-z0-9])?")]
[string]$To,
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Enter the name of the sender',
ValueFromPipelineByPropertyName = $true
)]
[ValidatePattern("[a-z0-9!#\$%&'*+/=?^_`{|}~-]+(?:\.[a-z0-9!#\$%&'*+/=?^_`{|}~-]+)*@(?:[a-z0-9](?:[a-z0-9-]*[a-z0-9])?\.)+[a-z0-9](?:[a-z0-9-]*[a-z0-9])?")]
[string]$From = $UserName,
[Parameter(
Mandatory = $true,
ParameterSetName = 'FunctionApp',
HelpMessage = 'Enter output folder path',
ValueFromPipelineByPropertyName = $true
)]
[string]$ApiToken,
[Parameter(
Mandatory = $true,
ParameterSetName = 'WinSCP',
HelpMessage = 'Enter FTP HostName',
ValueFromPipelineByPropertyName = $true
)]
[string]$FTPHost,
[Parameter(
Mandatory = $true,
ParameterSetName = 'WinSCP',
HelpMessage = 'Enter SshHostKeyFingerprint like: "ecdsa-sha2-nistp256 256 <Key>" ',
ValueFromPipelineByPropertyName = $true
)]
[string]$SshHostKeyFingerprint,
[Parameter(
ParameterSetName = 'WinSCP',
HelpMessage = 'Enter ftp remote path "/path/" ',
ValueFromPipelineByPropertyName = $true
)]
[string]$RemotePath = ("./" + $($MyInvocation.MyCommand.Name -replace '\..*')) ,
[Parameter(
Mandatory = $true,
ParameterSetName = 'Clean',
HelpMessage = 'Clean Modules and output path',
Position = 0
)]
[switch]$Clean,
[Parameter(ParameterSetName = 'WinSCP', Mandatory = $true)]
[Parameter(ParameterSetName = 'FunctionApp', Mandatory = $true)]
[Parameter(ParameterSetName = 'SendMailMessage', Mandatory = $true)]
[Parameter(
Mandatory = $true,
ParameterSetName = 'LocalDisk',
HelpMessage = 'Name filter attached to users.',
ValueFromPipelineByPropertyName = $true
)]
[string]$WildCardIdentifier
)
begin {
$ScriptFunctionName = $MyInvocation.MyCommand.Name -replace '\..*'
try {
Initialize-AuditBeginBlock -AttachmentFolderPathBegin $AttachmentFolderPath -ScriptFunctionName $ScriptFunctionName -SendEmailMessageBegin $SendMailMessage -CleanBegin $Clean -ErrorVariable InitBeginErr -ErrorAction Stop
}
catch {
Write-TSLog "End Block last error for log: "
Write-TSLog -LogError -LogErrorVar InitBeginErr
}
}
process {
if (!($Clean)) {
# Add Datetime to filename
$csvFileName = "$AttachmentFolderPath\$((Get-Date).ToString('yyyy-MM-dd_hh.mm.ss'))_$($ScriptFunctionName)_$($env:USERDNSDOMAIN)"
# Create FileNames
$csv = "$csvFileName.csv"
$zip = "$csvFileName.zip"
Write-TSLog "Searching for users appended with:`"$WildCardIdentifier`" in Active Directory."
# Audit Script with export to csv and zip.
# Get ad user with Name String Filter
$WildCardIdentifierstring = '*' + $WildCardIdentifier + '*'
Get-ADUser -Filter { Name -like $WildCardIdentifierstring } -Properties `
samaccountname, GivenName, Surname, Name, UserPrincipalName, lastlogontimestamp, DistinguishedName, `
Title, Enabled, Description, Manager, Department `
-OutVariable ADExport | Out-Null
$Export = @()
foreach ($item in $ADExport) {
$Export += [ADAuditAccount]::new(
$($item.SamAccountName),
$($item.GivenName),
$($item.Surname),
$($item.Name),
$($item.UserPrincipalName),
$($item.LastLogonTimeStamp),
$($item.Enabled),
$($item.LastLogonTimeStamp),
$($item.DistinguishedName),
$($item.Title),
$($item.Manager),
$($item.Department),
$false,
$false
)
}
try {
Export-AuditCSVtoZip -Exportobject $Export -csv $csv -zip $zip -ErrorAction Stop -ErrorVariable ExportAuditCSVZipErr
}
catch {
Write-TSLog -LogErrorEnd -LogErrorVar $ExportAuditCSVZipErr
throw $ExportAuditCSVZipErr
}
} # End if (!($Clean)) {...}
} # End process region
End {
try {
Initialize-AuditEndBlock -SendEmailMessageEnd $SendMailMessage -WinSCPEnd $WinSCP -FTPHostend $FTPHost -SshHostKeyFingerprintEnd $SshHostKeyFingerprint -SmtpServerEnd $SMTPServer -PortEnd $Port -UserNameEnd $UserName -FromEnd $From -ToEnd $To `
-AttachmentFolderPathEnd $AttachmentFolderPath -Password $Password -FunctionEnd $function -FunctionAppEnd $FunctionApp `
-ApiTokenEnd $ApiToken -ZipEnd $zip -RemotePathEnd $RemotePath -LocalDiskEnd $LocalDisk -CleanEnd $Clean -ErrorVariable InitEndErr
}
catch {
Write-TSLog "End Block last error for log: "
Write-TSLog -LogError
}
# Clear Variables
Clear-Variable -Name "Function", "FunctionApp", "ApiToken"
}
}
#EndRegion '.\Public\Get-ADDSDepartedUsersAccountAudit.ps1' 268
#Region '.\Public\Get-ADDSPrivilegedAccountAudit.ps1' 0
function Get-ADDSPrivilegedAccountAudit {
<#
.SYNOPSIS
Active Directory Audit with Keyvault retrieval option.
.DESCRIPTION
Audit's Active Directory for priviledged users and groups, and extended rights.
Output can be kept locally, or sent remotely via email or sftp.
Function App is the same as SendEmail except that it uses a password retrieved using the related Function App.
The related function app would need to be created.
Expects SecureString and Key as inputs to function app parameter set.
.EXAMPLE
PS C:\> Get-ADDSPrivilegedAccountAudit -LocalDisk -Verbose
.EXAMPLE
PS C:\> Get-ADDSPrivilegedAccountAudit -SendMailMessage -SMTPServer $SMTPServer -UserName "[email protected]" -Password (Read-Host -AsSecureString) -To "[email protected]" -Verbose
.EXAMPLE
PS C:\> Get-ADDSPrivilegedAccountAudit -FunctionApp $FunctionApp -Function $Function -SMTPServer $SMTPServer -UserName "[email protected]" -To "[email protected]" -Verbose
.EXAMPLE
PS C:\> Get-ADDSPrivilegedAccountAudit -WinSCP -UserName "ftphostname.UserName" -Password (Read-Host -AsSecureString) -FTPHost "ftphost.domain.com" -SshHostKeyFingerprint "<SShHostKeyFingerprint>" -Verbose
.EXAMPLE
PS C:\> Get-ADDSPrivilegedAccountAudit -Clean -Verbose
.PARAMETER LocalDisk
Only output data to local disk.
.PARAMETER SendMailMessage
Adds parameters for sending Audit Report as an Email.
.PARAMETER WinSCP
Adds parameters for sending Audit Report via SFTP.
.PARAMETER AttachmentFolderPath
Default path is C:\temp\ADDSPrivilegedAccountAuditLogs.
This is the folder where attachments are going to be saved.
.PARAMETER FunctionApp
Azure Function App Name.
.PARAMETER Function
Azure Function App's Function Name. Ex. "HttpTrigger1"
.PARAMETER ApiToken
Private Function Key.
.PARAMETER SMTPServer
Defaults to Office 365 SMTP relay. Enter optional relay here.
.PARAMETER Port
SMTP Port to Relay. Ports can be: "993", "995", "587", or "25"
.PARAMETER UserName
Specify the account with an active mailbox and MFA disabled.
Ensure the account has delegated access for Send On Behalf for any
UPN set in the "$From" Parameter
.PARAMETER Password
Use: (Read-Host -AsSecureString) as in Examples.
May be omitted.
.PARAMETER To
Recipient of the attachment outputs.
.PARAMETER From
Defaults to the same account as $UserName unless the parameter is set.
Ensure the Account has delegated access to send on behalf for the $From account.
.PARAMETER FTPHost
SFTP Hostname.
.PARAMETER RemotePath
Remove FTP path. Will be created in the user path under functionname folder if not specified.
.PARAMETER SshHostKeyFingerprint
Adds parameters for sending Audit Report via SFTP.
.PARAMETER Clean
Remove installed modules during run. Remove local files if not a LocalDisk run.
.NOTES
Can take password as input into secure string using (Read-Host -AsSecureString).
#>
[CmdletBinding(DefaultParameterSetName = 'LocalDisk' , HelpURI = "https://criticalsolutionsnetwork.github.io/ADDSAuditTasks/#Get-ADDSPrivilegedAccountAudit")]
param (
[Parameter(
Mandatory = $true,
ParameterSetName = 'LocalDisk',
HelpMessage = 'Output to disk only',
Position = 0
)]
[switch]$LocalDisk,
[Parameter(
Mandatory = $true,
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Send Mail to a relay',
Position = 0
)]
[switch]$SendMailMessage,
[Parameter(
Mandatory = $true,
ParameterSetName = 'WinSCP',
HelpMessage = 'Send using SFTP via WinSCP Module',
Position = 0,
ValueFromPipelineByPropertyName = $true
)]
[switch]$WinSCP,
[Parameter(
Mandatory = $true,
ParameterSetName = 'FunctionApp',
HelpMessage = 'Enter the FunctionApp name',
Position = 0
)]
[string]$FunctionApp,
[Parameter(
Mandatory = $true,
ParameterSetName = 'FunctionApp',
HelpMessage = 'Enter the FunctionApp Function name',
ValueFromPipelineByPropertyName = $true,
Position = 1
)]
[string]$Function,
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Enter the SMTP hostname' ,
ValueFromPipelineByPropertyName = $true
)]
[string]$SMTPServer = "smtp.office365.com",
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(ParameterSetName = 'SendMailMessage')]
[Parameter(ParameterSetName = 'WinSCP')]
[Parameter(
ParameterSetName = 'LocalDisk',
HelpMessage = 'Enter output folder path',
ValueFromPipeline = $true
)]
[string]$AttachmentFolderPath = "C:\temp\ADDSPrivilegedAccountAuditLogs",
[Parameter(Mandatory = $true, ParameterSetName = 'WinSCP')]
[Parameter(Mandatory = $true, ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
Mandatory = $true,
HelpMessage = 'Enter the Sending Account UPN or FTP Username if using WinSCP. Ex:"[email protected]" or "ftphost.helpdesk"',
ValueFromPipelineByPropertyName = $true
)]
[string]$UserName,
[Parameter(ParameterSetName = 'WinSCP', Mandatory = $true)]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Copy Paste the following: $Password = (Read-Host -AsSecureString)',
ValueFromPipelineByPropertyName = $true
)]
[securestring]$Password,
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Enter the port number for the mail relay',
ValueFromPipelineByPropertyName = $true
)]
[ValidateSet("993", "995", "587", "25")]
[int]$Port = 587,
[Parameter(Mandatory = $true, ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
Mandatory = $true,
HelpMessage = 'Enter the recipient email address',
ValueFromPipelineByPropertyName = $true
)]
[ValidatePattern("[a-z0-9!#\$%&'*+/=?^_`{|}~-]+(?:\.[a-z0-9!#\$%&'*+/=?^_`{|}~-]+)*@(?:[a-z0-9](?:[a-z0-9-]*[a-z0-9])?\.)+[a-z0-9](?:[a-z0-9-]*[a-z0-9])?")]
[string]$To,
[Parameter(ParameterSetName = 'FunctionApp')]
[Parameter(
ParameterSetName = 'SendMailMessage',
HelpMessage = 'Enter the name of the sender',
ValueFromPipelineByPropertyName = $true
)]
[ValidatePattern("[a-z0-9!#\$%&'*+/=?^_`{|}~-]+(?:\.[a-z0-9!#\$%&'*+/=?^_`{|}~-]+)*@(?:[a-z0-9](?:[a-z0-9-]*[a-z0-9])?\.)+[a-z0-9](?:[a-z0-9-]*[a-z0-9])?")]
[string]$From = $UserName,
[Parameter(
Mandatory = $true,
ParameterSetName = 'FunctionApp',
HelpMessage = 'Enter output folder path',
ValueFromPipelineByPropertyName = $true
)]
[string]$ApiToken,
[Parameter(
Mandatory = $true,
ParameterSetName = 'WinSCP',
HelpMessage = 'Enter FTP HostName',
ValueFromPipelineByPropertyName = $true
)]
[string]$FTPHost,
[Parameter(
Mandatory = $true,
ParameterSetName = 'WinSCP',
HelpMessage = 'Enter SshHostKeyFingerprint like: "ecdsa-sha2-nistp256 256 <Key>" ',
ValueFromPipelineByPropertyName = $true
)]
[string]$SshHostKeyFingerprint,
[Parameter(
ParameterSetName = 'WinSCP',
HelpMessage = 'Enter ftp remote path "/path/" ',
ValueFromPipelineByPropertyName = $true
)]
[string]$RemotePath = ("./" + $($MyInvocation.MyCommand.Name -replace '\..*')) ,
[Parameter(
Mandatory = $true,
ParameterSetName = 'Clean',
HelpMessage = 'Clean Modules and output path',
Position = 0
)]
[switch]$Clean
)
begin {
$ScriptFunctionName = $MyInvocation.MyCommand.Name -replace '\..*'
try {
Initialize-AuditBeginBlock -AttachmentFolderPathBegin $AttachmentFolderPath -ScriptFunctionName $ScriptFunctionName -SendEmailMessageBegin $SendMailMessage -CleanBegin $Clean -ErrorVariable InitBeginErr -ErrorAction Stop
}
catch {
Write-TSLog "End Block last error for log: "
Write-TSLog -LogError -LogErrorVar InitBeginErr
}
} # End begin
process {
if (!($Clean)) {
$csvFileName = "$AttachmentFolderPath\$((Get-Date).ToString('yyyy-MM-dd_hh.mm.ss'))_$($ScriptFunctionName)_$($env:USERDNSDOMAIN)"
# Create FileNames
$csv = "$csvFileName.csv"
$zip = "$csvFileName.zip"
# AD Privileged Groups Array
$AD_PrivilegedGroups = @(
'Enterprise Admins',
'Schema Admins',
'Domain Admins',
'Administrators',
'Cert Publishers',
'Account Operators',
'Server Operators',
'Backup Operators',
'Print Operators',
'DnsAdmins',
'DnsUpdateProxy',
'DHCP Administrators'
)
# Time Variables
$time90 = (Get-Date).Adddays( - (90))
$time60 = (Get-Date).Adddays( - (60))
$time30 = (Get-Date).Adddays( - (30))
# Create Arrays
$members = @()
$ADUsers = @()
foreach ($group in $AD_PrivilegedGroups) {
Clear-Variable GroupMember -ErrorAction SilentlyContinue
Get-ADGroupMember -Identity $group -Recursive -OutVariable GroupMember | Out-Null
$GroupMember | Select-Object SamAccountName, Name, ObjectClass, `
@{N = 'PriviledgedGroup'; E = { $group } }, `
@{N = 'Enabled'; E = { (Get-ADUser -Identity $_.samaccountname).Enabled } }, `
@{N = 'PasswordNeverExpires'; E = { (Get-ADUser -Identity $_.samaccountname -Properties PasswordNeverExpires).PasswordNeverExpires } }, `
@{N = 'LastLogin'; E = { [DateTime]::FromFileTime((Get-ADUser -Identity $_.samaccountname -Properties lastLogonTimestamp).lastLogonTimestamp) } }, `
@{N = 'LastSeen'; E = {
switch ([DateTime]::FromFileTime((Get-ADUser -Identity $_.samaccountname -Properties lastLogonTimestamp).lastLogonTimestamp)) {
# Over 90 Days
{ ($_ -lt $time90) } { '3+ months'; break }
# Over 60 Days
{ ($_ -lt $time60) } { '2+ months'; break }
# Over 90 Days
{ ($_ -lt $time30) } { '1+ month'; break }
default { 'Recently' }
}
}
}, `
@{N = 'OrgUnit'; E = { $_.DistinguishedName -replace '^.*?,(?=[A-Z]{2}=)' } }, `
@{N = 'GroupMemberships'; E = { Get-ADGroupMemberof -SamAccountName $_.samaccountname } }, `
Title, `
@{N = 'Manager'; E = { (Get-ADUser -Identity $_.manager).Name } }, `
@{N = 'SuspectedSvcAccount'; E = {
# Null gave unexpected behavior on the left side. Works on the right side.
if (((Get-ADUser -Identity $_.samaccountname -Properties PasswordNeverExpires).PasswordNeverExpires) -or (((Get-ADUser -Identity $_.samaccountname -Properties servicePrincipalName).servicePrincipalName) -ne $null) ) {
return $true
} # end if
else {
return $false
} # end else
} # End Expression
}, # End Named Expression SuspectedSvcAccount
Department, AccessRequired, NeedMailbox -OutVariable members | Out-Null
$ADUsers += $members
}
$Export = @()
# Create $Export Object
foreach ($User in $ADUsers) {
$hash = [ordered]@{
PriviledgedGroup = $User.PriviledgedGroup
SamAccountName = $User.SamAccountName
Name = $User.Name
ObjectClass = $User.ObjectClass
LastLogin = $User.LastLogin
LastSeen = $User.LastSeen
GroupMemberships = $User.GroupMemberships
Title = $User.Title
Manager = $User.Manager
Department = $User.Department
OrgUnit = $User.OrgUnit
Enabled = $User.Enabled
PasswordNeverExpires = $User.PasswordNeverExpires
SuspectedSvcAccount = $User.SuspectedSvcAccount
AccessRequired = $false
NeedMailbox = $true
}
New-Object -TypeName PSCustomObject -Property $hash -OutVariable PSObject | Out-Null
$Export += $PSObject
}
# Create filenames
$csv2 = $csv -replace ".csv", ".ExtendedPermissions.csv"
$zip2 = $zip -replace ".zip", ".ExtendedPermissions.zip"
$csv3 = $csv -replace ".csv", ".PossibleServiceAccounts.csv"
$zip3 = $zip -replace ".zip", ".PossibleServiceAccounts.zip"
# Get PDC
$dc = (Get-ADDomainController -Discover -DomainName $env:USERDNSDOMAIN -Service PrimaryDC).Name
# Get DN of AD Root.
$rootou = (Get-ADRootDSE).defaultNamingContext
# Get ad objects from the PDC for the root ou. #TODO Check
$Allobjects = Get-ADObject -Server $dc -SearchBase $rootou -SearchScope subtree -LDAPFilter `
"(&(objectclass=user)(objectcategory=person))" -Properties ntSecurityDescriptor -ResultSetSize $null
# "(|(objectClass=domain)(objectClass=organizationalUnit)(objectClass=group)(sAMAccountType=805306368)(objectCategory=Computer)(&(objectclass=user)(objectcategory=person)))"
# Create $Export2 Object
$Export2 = Foreach ($ADObject in $Allobjects) {
Get-AdExtendedRight $ADObject
}
# Export Delegated access, allowed protocols and Destination Serivces.
$Export3 = Get-ADObject -Filter { (msDS-AllowedToDelegateTo -like '*') -or (UserAccountControl -band 0x0080000) -or (UserAccountControl -band 0x1000000) } `
-prop samAccountName, msDS-AllowedToDelegateTo, servicePrincipalName, userAccountControl | `
Select-Object DistinguishedName, ObjectClass, samAccountName, `
@{N = 'servicePrincipalName'; E = { $_.servicePrincipalName -join " | " } }, `
@{N = 'DelegationStatus'; E = { if ($_.UserAccountControl -band 0x80000) { 'AllServices' }else { 'SpecificServices' } } }, `
@{N = 'AllowedProtocols'; E = { if ($_.UserAccountControl -band 0x1000000) { 'Any' }else { 'Kerberos' } } }, `
@{N = 'DestinationServices'; E = { $_.'msDS-AllowedToDelegateTo' } }
# Try first export.
Export-AuditCSVtoZip -Exported $Export -CSVName $csv -ZipName $zip -ErrorVariable ExportAuditCSVZipErr
# Try second export.
Export-AuditCSVtoZip -Exported $Export2 -CSVName $csv2 -ZipName $zip2 -ErrorVariable ExportAuditCSVZipErr2
# try third export
Export-AuditCSVtoZip -Exported $Export3 -CSVName $csv3 -ZipName $zip3 -ErrorVariable ExportAuditCSVZipErr3
} # End If Not Clean
} # End process
End {
try {
Initialize-AuditEndBlock -SendEmailMessageEnd $SendMailMessage -WinSCPEnd $WinSCP -FTPHostend $FTPHost -SshHostKeyFingerprintEnd $SshHostKeyFingerprint -SmtpServerEnd $SMTPServer -PortEnd $Port -UserNameEnd $UserName -FromEnd $From -ToEnd $To `
-AttachmentFolderPathEnd $AttachmentFolderPath -Password $Password -FunctionEnd $function -FunctionAppEnd $FunctionApp `
-ApiTokenEnd $ApiToken -ZipEnd $zip, $zip2, $zip3 -RemotePathEnd $RemotePath -LocalDiskEnd $LocalDisk -CleanEnd $Clean -ErrorVariable InitEndErr
}
catch {
Write-TSLog "End Block last error for log: "
Write-TSLog -LogError
}
# Clear Variables
Clear-Variable -Name "Function", "FunctionApp", "ApiToken"
} # End end
}
#EndRegion '.\Public\Get-ADDSPrivilegedAccountAudit.ps1' 340
#Region '.\Public\Get-ADUsersLastLogon.ps1' 0
function Get-ADUsersLastLogon {
<#
.SYNOPSIS
Takes SamAccountName as input to retrieve most recent LastLogon from all DC's.
.DESCRIPTION
Takes SamAccountName as input to retrieve most recent LastLogon from all DC's and output as DateTime.
.EXAMPLE
Get-ADUsersLastLogon -SamAccountName "UserName"
.PARAMETER SamAccountName
The SamAccountName of the user being checked for LastLogon.
#>
[CmdletBinding(HelpURI = "https://criticalsolutionsnetwork.github.io/ADDSAuditTasks/#Get-ADUsersLastLogon")]
[OutputType([datetime])]
param (
[Alias("Identity", "UserName", "Account")]
[Parameter(
Mandatory = $true,
HelpMessage = 'Enter the SamAccountName',
ValueFromPipeline = $true
)]
$SamAccountName
)
process {
$dcs = Get-ADDomainController -Filter { Name -like "*" }
$user = Get-ADUser -Identity $SamAccountName
$time = 0
$dt = @()
foreach ($dc in $dcs) {
$hostname = $dc.HostName
$usertime = $user | Get-ADObject -Server $hostname -Properties lastLogon
if ($usertime.LastLogon -gt $time) {
$time = $usertime.LastLogon
}
$dt += [DateTime]::FromFileTime($time)
}
return ($dt | Sort-Object -Descending)[0]
}
}
#EndRegion '.\Public\Get-ADUsersLastLogon.ps1' 39
#Region '.\Public\Get-NetworkScan.ps1' 0
function Get-NetworkScan {
<#
.SYNOPSIS
Discovers local network and runs port scans on all hosts found for specific or default sets of ports.
.DESCRIPTION
Scans the network for open ports specified by the user or default ports if no ports are specified.
Creates reports if report switch is active.
.NOTES
Installs PSnmap if not found and can output a report, or just the results.
.LINK
Specify a URI to a help page, this will show when Get-Help -Online is used.
.EXAMPLE
Get-NetworkScan -report
.PARAMETER Ports
Default ports are:
"21", "22", "23", "25", "53", "67", "68", "80", "443", `
"88", "464", "123", "135", "137", "138", "139", `
"445", "389", "636", "514", "587", "1701", `
"3268", "3269", "3389", "5985", "5986"
If you want to supply a port, do so as an integer or an array of integers.
"22","80","443", etc.
.PARAMETER Report
Specify this switch if you would like a report generated in C:\temp.
#>
[CmdletBinding(DefaultParameterSetName = 'Default' , HelpURI = "https://criticalsolutionsnetwork.github.io/ADDSAuditTasks/#Get-NetworkScan")]
param (
[Parameter(
ValueFromPipelineByPropertyName = $true,
Position = 0
)]
[ValidateRange(1, 65535)]
[int[]]$Ports,
[Parameter(
Mandatory = $true,
ParameterSetName = 'Default',
HelpMessage = 'Automatically find and scan local attached subnets',
ValueFromPipelineByPropertyName = $true,
Position = 1
)]
[switch]$LocalSubnets,
[Parameter(
Mandatory = $true,
ParameterSetName = 'Computers',
HelpMessage = 'Scan host or array of hosts using Subet ID in CIDR Notation, IP, NETBIOS, or FQDN in "quotes"',
ValueFromPipelineByPropertyName = $true,
Position = 1
)]
[string[]]$Computers,
[switch]$Report
)
begin {
If (Get-Module -ListAvailable -Name "PSnmap") { Import-Module "PSnmap" } Else { Install-Module "PSnmap" -Force; Import-Module "PSnmap" }
if (!($ports)) {
[int[]]$ports = "21", "22", "23", "25", "53", "67", "68", "80", "443", `
"88", "464", "123", "135", "137", "138", "139", `
"445", "389", "636", "514", "587", "1701", `
"3268", "3269", "3389", "5985", "5986"
}
$ouiobject = Invoke-RestMethod https://standards-oui.ieee.org/oui/oui.csv | ConvertFrom-Csv
} # Begin Close
process {
if ($LocalSubnets) {
$ConnectedNetworks = Get-NetIPConfiguration -Detailed | Where-Object { $_.Netadapter.status -eq "up" }
$results = @()
foreach ($network in $ConnectedNetworks) {
# Get Network DHCP Server
$DHCPServer = (Get-CimInstance -ClassName Win32_NetworkAdapterConfiguration | Where-Object { $_.IPAddress -eq $network.IPv4Address }).DHCPServer
# Get Subnet as CIDR
$Subnet = "$($network.IPv4DefaultGateway.nexthop)/$($network.IPv4Address.PrefixLength)"
# Regex for IPV4 and IPV6 validation
if (($subnet -match '^([0-9]{1,3}\.){3}[0-9]{1,3}(\/([0-9]|[1-2][0-9]|3[0-2]))?$') -or ($subnet -match '^s*((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})?:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4]d|1dd|[1-9]?d)(.(25[0-5]|2[0-4]d|1dd|[1-9]?d)){3}))|:)))(%.+)?s*(\/([0-9]|[1-9][0-9]|1[0-1][0-9]|12[0-8]))?$')) {
# Create Network Scan Object
$NetWorkScan = Invoke-PSnmap -ComputerName $subnet -Port $ports -Dns -NoSummary -AddService
# Filter devices that don't ping as no results will be found.
$scan = $NetworkScan | Where-Object { $_.Ping -eq $true }
Write-Verbose "##########################################"
Write-Verbose "Network scan for Subnet $Subnet completed."
Write-Verbose "DHCP Server: $($DHCPServer)"
Write-Verbose "Gateway: $($network.IPv4DefaultGateway.nexthop)"
Write-Verbose "##########################################"
$scan | ForEach-Object {
$org = ""
$macid = ((arp -a $_.ComputerName | Select-String '([0-9a-f]{2}-){5}[0-9a-f]{2}').Matches.Value).Replace("-", ":")
$macpop = $macid.replace(":", "")
$macsubstr = $macpop.Substring(0, 6)
$org = ($ouiobject | Where-Object { $_.assignment -eq $macsubstr })."Organization Name"
Add-Member -InputObject $_ -MemberType NoteProperty -Name MacID -Value $macid
if ($org) {
Add-Member -InputObject $_ -MemberType NoteProperty -Name ManufacturerName -Value $org
}
else {
Add-Member -InputObject $_ -MemberType NoteProperty -Name ManufacturerName -Value "Not Found"
}
}
# Normalize Subnet text for filename.
$subnetText = $(($subnet.Replace("/", ".CIDR.")))
# If report switch is true.
if ($report) {
$scan | Export-Csv "C:\temp\$((Get-Date).ToString('yyyy-MM-dd_hh.mm.ss')).$($env:USERDNSDOMAIN)_Subnet.$($subnetText)_DHCP.$($DHCPServer)_Gateway.$($network.IPv4DefaultGateway.nexthop).NetScan.csv" -NoTypeInformation
}
# Add scan to function output.
$results += $scan
} # IF Subnet Match End
} # End Foreach
} # End If $LocalSubnets
elseif ($Computers) {
$Subnet = $Computers
$results = Invoke-PSnmap -ComputerName $subnet -Port $ports -Dns -NoSummary -AddService | Where-Object { $_.Ping -eq $true }
if ($Report) {
$results | Export-Csv "C:\temp\$((Get-Date).ToString('yyyy-MM-dd_hh.mm.ss')).$($env:USERDNSDOMAIN)_HostScan.csv" -NoTypeInformation
}
}
} # Process Close
end {
return $results
}# End Close
}
#EndRegion '.\Public\Get-NetworkScan.ps1' 119
#Region '.\Public\Switch-SurnameWithGivenName.ps1' 0
function Switch-SurnameWithGivenName {
<#
.SYNOPSIS
Takes CSV input as "LastName<space>FirstName" and flips it to "Firstname<space>Lastname"
.DESCRIPTION
Takes a CSV that was formatted as 'LastName, FirstName' with the comma and space removed, to 'FirstName Lastname'.
.NOTES
This function depends on the name column in the employee roster name column, to have been formatted in excel using a find and replace to replace ", " with " ".
In other words: The file needs to have "comma space" replaces with "space" in the name column to be easily compared to ADUser output.
.LINK
Specify a URI to a help page, this will show when Get-Help -Online is used.
.EXAMPLE
Switch-SurnameWithGivenName -RosterCSV "C:\temp\RosterNameColumnFormattedLastNameSpaceFirstname.csv" -Verbose
#>
[CmdletBinding()]
param (
[Parameter(
HelpMessage = 'Enter the full path to the csv file',
ValueFromPipeline = $true,
ValueFromPipelineByPropertyName = $true,
Position = 0
)]
[string]$RosterCSV,
[Parameter(
HelpMessage = 'Enter the folder path to the new csv file',
ValueFromPipelineByPropertyName = $true,
Position = 1
)][string]$AttachmentFolder = "C:\temp\Switch-SurnameWithGivenName"
)
begin {
$AttachmentFolderPathCheck = Test-Path -Path $AttachmentFolder
If (!($AttachmentFolderPathCheck)) {
# If not present then create the dir
New-Item -ItemType Directory $AttachmentFolder -Force -ErrorAction Stop
}
$HRCSV = Import-Csv $RosterCSV
}
Process {
$Export = @()
foreach ($user in $HRCSV) {
$a, $b = ($user.Name).split(' ')
New-Object -TypeName PSCustomObject -Property @{
NewName = "$b $a"
} -OutVariable PSObject | Out-Null
$Export += $PSObject
}
}
end {
$Export | Export-Csv "$($home)\Documents\$((Get-Date).ToString("yyyy.MM.dd hh.mm tt")).Switch-SurnameWithGivenName.csv" -NoTypeInformation
}
}
#EndRegion '.\Public\Switch-SurnameWithGivenName.ps1' 52
|
ADDSAuditTasks.psd1 | ADDSAuditTasks-1.9.12 | #
# Module manifest for module 'ADDSAuditTasks'
#
# Generated by: DrIOSX
#
# Generated on: 5/5/2022
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'ADDSAuditTasks.psm1'
# Version number of this module.
ModuleVersion = '1.9.12'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = 'a5bcdb3b-68b2-4b47-b50e-669b786c5187'
# Author of this module
Author = 'DrIOSX'
# Company or vendor of this module
CompanyName = 'CriticalSolutions.net LLC'
# Copyright statement for this module
Copyright = '(c) 2022 DrIOSX via CriticalSolutions.net LLC. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Tasks for auditing Active Directory'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.0'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @("ActiveDirectory")
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @('Get-ADDSActiveAccountAudit','Get-ADDSAssetInventoryAudit','Get-ADDSDepartedUsersAccountAudit','Get-ADDSPrivilegedAccountAudit','Get-ADUsersLastLogon','Get-NetworkScan','Switch-SurnameWithGivenName')
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = @()
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
Prerelease = ''
# Tags applied to this module. These help with module discovery in online galleries.
Tags = @('ActiveDirectory','Audit','Security')
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
ProjectUri = 'https://github.com/CriticalSolutionsNetwork/ADDSAuditTasks'
# A URL to an icon representing this module.
IconUri = 'https://csn-source.s3.us-east-2.amazonaws.com/CSN-Icon.png'
# External dependent modules of this module
# ExternalModuleDependencies = @('ActiveDirectory')
# ReleaseNotes of this module
ReleaseNotes = '## [1.9.12] - 2022-12-19
### Fixed
- Asset Inventory Ouput showing SPNs.
'
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
HelpInfoURI = 'https://criticalsolutionsnetwork.github.io/ADDSAuditTasks/'
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
ADDSConfigurations.psd1 | ADDSConfigurations-1.0.2 | #
# Module manifest for module 'ADDSConfigurations'
#
# Generated by: Olamide Olaleye
#
# Generated on: 22/04/2024
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'ADDSConfigurations.psm1'
# Version number of this module.
ModuleVersion = '1.0.2'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = '45927117-2a2f-4ab3-a478-78adc040a3ac'
# Author of this module
Author = 'Olamide Olaleye'
# Company or vendor of this module
CompanyName = 'Fountview Technology Solutions'
# Copyright statement for this module
Copyright = '(c) Fountview Technology Solutions. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This module will install a new AD forest and domain controller. It will securely pull down organization secrets from Azure and use them to configure the domain controller.It also remove the secrets from the local machine after the domain controller opoeration has been completed.'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '7.2'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = 'New-ADForest', 'New-ADDSDomainController'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'New-ADForest', 'New-ADDSDomainController'
# Variables to export from this module
VariablesToExport = 'New-ADForest', 'New-ADDSDomainController'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = 'New-ADForest', 'New-ADDSDomainController'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'ActiveDirectory', 'DomainController', 'Forest', 'Domain', 'ADDS',
'Configurations'
# A URL to the license for this module.
LicenseUri = 'https://raw.githubusercontent.com/Princetimber/Project/main/LICENSE'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/Princetimber/Project/tree/main/DomainController/ADDSConfigurations'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
ReleaseNotes = 'Removed enforced architecture for the module manifest. Updated the module version to 1.0.2'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
HelpInfoURI = 'https://raw.githubusercontent.com/Princetimber/Project/main/DomainController/ADDSConfigurations/help.md'
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
ADDSConfigurations.psm1 | ADDSConfigurations-1.0.2 | $ErrorActionPreference = "Stop"
$PSDefaultParameterValues = @{
'New-ADDSForest:DomainMode' = 'WinThreshold'
'New-ADDSForest:ForestMode' = 'WinThreshold'
'New-ADDSForest:DatabasePath' = "$env:SystemDrive\Windows\"
'New-ADDSForest:LogPath' = "$env:SystemDrive\Windows\NTDS\"
'New-ADDSForest:SysvolPath' = "$env:SystemDrive\Windows\"
'New-ADDSForest:Force' = $true
}
$RegisteredSecretVault = $null
$AzureConnection = $null
# Import the required modules
function Install-RequiredModule {
param(
[string[]]$Name = @( 'Microsoft.PowerShell.SecretManagement', 'az.keyvault')
)
$Name | ForEach-Object {
if(-not (Get-Module -Name $_ -ListAvailable)){
try {
Set-PSResourceRepository -Name PSGallery -Trusted
Install-PSResource -Name $_ -Repository PSGallery -Scope AllUsers -Confirm:$false
Write-Output "Module $_ installed successfully"
}
catch {
Write-Error -Message "Failed to install module $_. Please see the error message below.:$_"
}
}
else {
Write-Output "Module $_ is already installed"
}
}
}
function Install-RequiredADModule {
[string]$Name = 'AD-Domain-Services'
if (-not (Get-WindowsFeature -Name $Name | Where-Object { $_.Installed -eq $true })) {
try {
install-WindowsFeature -Name $Name -IncludeManagementTools
}
catch {
throw "Failed to install the required module $ModuleName. Please see the error message below.:$_"
}
}
else {
Write-Output "Module $ModuleName is already installed"
}
}
# Add keys to a hashtable
function Add-keys{
param($hash, $keys)
$keys.GetEnumerator() | ForEach-Object {
$hash.Add($_.Key, $_.Value)
}
}
# Create a new environment path
function New-EnvPath {
param(
[string]$Path,
[string]$ChildPath
)
return Join-Path @PSBoundParameters
}
function Test-Paths {
param(
[string[]]$Paths
)
$paths | ForEach-Object {
if (-not (Test-Path -Path $_)) {
throw "Path $_ does not exist"
}
}
}
# function to connect to Azure
function Connect-ToAzure {
if($null -eq $AzureConnection){
try {
# Check if there is an existing connection
$existingConnection = Get-AzContext -ErrorAction SilentlyContinue
if($existingConnection){
Write-Output "Already connected to Azure"
return
}
# Connect to Azure
if($null -eq $AzureConnection){
Connect-AzAccount -UseDeviceAuthentication
$timeout = New-TimeSpan -Minutes 90
$stopwatch = [System.Diagnostics.Stopwatch]::StartNew()
while ($stopwatch.Elapsed -lt $timeout){
$Context = (Get-AzContext -ErrorAction SilentlyContinue).Account
$AzureConnection = $Context
if($AzureConnection){
write-output "Connected to Azure"
return
}
}
}
}
catch {
Write-Error "Failed to connect to Azure. Please see the error message below.:$_"
}
}
}
# function to get the vault in Azure
function Get-Vault {
param(
[string]$keyVaultName,
[string]$ResourceGroupName
)
Get-AzKeyVault @PSBoundParameters
}
# function to add the registered secret vault using SecretManagement module
function Add-RegisteredSecretVault {
param(
[string]$Name = (Get-Vault).VaultName,
[string]$ModuleName = "az.keyvault",
[hashtable]$VaultParameters = @{
AZKVaultName = $Name
SubscriptionId = (Get-AzContext).Subscription.Id
}
)
# Check if the vault is already registered
$existingVault = Get-SecretVault -Name $Name -ErrorAction SilentlyContinue
if($existingVault){
Write-Output "Secret vault $Name is already registered"
return
}
if($null -eq $RegisteredSecretVault){
try {
Register-SecretVault -Name $Name -ModuleName $ModuleName -VaultParameters $VaultParameters -Confirm:$false
$Context = (Get-SecretVault -Name $Name).Name
$RegisteredSecretVault = $Context
if($RegisteredSecretVault){
write-output "Secret vault $Name registered successfully"
return
}
}
catch {
Write-Error "Failed to register the secret vault. Please see the error message below.:$_"
}
}
}
# function to remove the registered secret vault
function Remove-RegisteredSecretVault {
param(
[string]$Name = (Get-Vault).VaultName
)
if(!$RegisteredSecretVault){
try {
Unregister-SecretVault -Name $Name -Confirm:$false
write-output "Secret vault $Name unregistered successfully"
}
catch {
Write-Error "Failed to unregister the secret vault. Please see the error message below.:$_"
}
}
}
# function to disconnect from Azure
function Disconnect-FromAzure {
try {
if(!$AzureConnection){
Disconnect-AzAccount -Confirm:$false
$AzureConnection = $null
write-output "Disconnected from Azure"
}
}
catch {
Write-Error "Failed to disconnect from Azure. Please see the error message below.:$_"
}
}
# function to create a new AD Forest
function New-ADDSForest {
param(
[string]$DomainName,
[string]$DomainNetBiosName,
[string]$DomainMode = 'WinThreshold',
[string]$ForestMode = 'WinThreshold',
[string]$DatabasePath = "$env:SystemDrive\Windows\",
[string]$LogPath = "$env:SystemDrive\Windows\NTDS\",
[string]$SysvolPath = "$env:SystemDrive\Windows\",
[string]$KeyVaultName,
[string]$ResourceGroupName,
[string]$secretName
)
# set the paths
$LOG_PATH = New-EnvPath -Path $LogPath -ChildPath 'logs'
$DATABASE_PATH = New-EnvPath -Path $DatabasePath -ChildPath 'ntds'
$SYSVOL_PATH = New-EnvPath -Path $SysvolPath -ChildPath 'SYSVOL'
# install required modules
Install-RequiredModule
Install-RequiredADModule
# connect to Azure
Connect-ToAzure
# get the vault
Get-Vault
Add-RegisteredSecretVault
# define common parameters
$commonParams = @{
InstallDNS = $true
DomainName = $DomainName
DomainNetBiosName = $DomainNetBiosName
DomainMode = $DomainMode
ForestMode = $ForestMode
DatabasePath = $DATABASE_PATH
LogPath = $LOG_PATH
SysvolPath = $SYSVOL_PATH
Force = $true
}
# retrieve the safe mode administrator password
$vaultName = (Get-Vault).VaultName
[securestring]$safeModeAdministratorPassword = Get-Secret -Name $secretName -Vault $vaultName
$param = $commonParams.Clone()
$keys = @{
SafeModeAdministratorPassword = $safeModeAdministratorPassword
}
Add-keys -hash $param -keys $keys
# create the new AD Forest
Install-ADDSForest @param
# remove the registered secret vault
Remove-RegisteredSecretVault
# disconnect from Azure
Disconnect-FromAzure
}
# nested function to wrap the New-ADDSForest function
function New-ADForest {
<#
.SYNOPSIS
This function is used to create a new Active Directory Forest in on-premises or Azure.
.DESCRIPTION
This module is used to create a new Active Directory Forest in on-premises or Azure.
It installs the required modules, connects to Azure, gets the vault, adds the registered secret vault, defines common parameters, retrieves the safe mode administrator password, creates the new AD Forest, removes the registered secret vault, and disconnects from Azure after the operation.
.PARAMETER DomainName
The fully qualified domain name of the new AD Forest.
.PARAMETER DomainNetBiosName
The NetBIOS name of the new AD Forest.
.PARAMETER DomainMode
The domain functional level of the new AD Forest. This is set to 'WinThreshold' by default.
.PARAMETER ForestMode
The forest functional level of the new AD Forest. This is set to 'WinThreshold' by default.
.PARAMETER DatabasePath
The path to the database folder of the new AD Forest. This is set to the default path of the system drive by default. But you can specify a different path (recommended).
.PARAMETER LogPath
The path to the log folder of the new AD Forest. This is set to the default path of the system drive by default. But you can specify a different path (recommended).
.PARAMETER SysvolPath
The path to the sysvol folder of the new AD Forest. This is set to the default path of the system drive by default. But you can specify a different path (recommended).
.PARAMETER KeyVaultName
The name of the key vault in Azure.
.PARAMETER ResourceGroupName
The name of the resource group in Azure where the key vault is located.
.PARAMETER secretName
The name of the secret in the key vault that contains the safe mode administrator password.
.PARAMETER Force
This is a switch parameter that forces the operation to continue without prompting for confirmation.
.NOTES
File Name : New-ADForest
Author : Olamide Olaleye
Prerequisite : PowerShell 7.2 and above.
.LINK
Specify a URI to a help page, this will show when Get-Help -Online is used.
.EXAMPLE
New-ADForest -DomainName "contoso.com" -DomainNetBiosName "CONTOSO" -KeyVaultName "mykeyvault" -ResourceGroupName "myresourcegroup" -secretName "safemodeadminpassword"
This example creates a new Active Directory Forest with the specified parameters.
The function assumes default values for the DomainMode, ForestMode, DatabasePath, LogPath, and SysvolPath parameters.
.EXAMPLE
New-ADForest -DomainName "contoso.com" -DomainNetBiosName "CONTOSO" -DatabasePath "D:\" -LogPath "e:\" -SysvolPath "F:\" -KeyVaultName "mykeyvault" -ResourceGroupName "myresourcegroup" -secretName "safemodeadminpassword" -Force
This example creates a new Active Directory Forest with the specified parameters.
The function specifies the DatabasePath, LogPath, and SysvolPath parameters.
There is no requirement to specify the database, log and sysvol directory folders as the default values are used.
.INPUTS
System.String
.OUTPUTS
System.String
#>
[CmdletBinding(SupportsShouldProcess = $true)]
param(
[Parameter(Mandatory = $true)]
[string]$DomainName,
[Parameter(Mandatory = $true)]
[string]$DomainNetBiosName,
[Parameter(Mandatory = $false)]
[string]$DomainMode = 'WinThreshold',
[Parameter(Mandatory = $false)]
[string]$ForestMode = 'WinThreshold',
[Parameter(Mandatory = $false)]
[string]$DatabasePath = "$env:SystemDrive\Windows\",
[Parameter(Mandatory = $false)]
[string]$LogPath = "$env:SystemDrive\Windows\NTDS\",
[Parameter(Mandatory = $false)]
[string]$SysvolPath = "$env:SystemDrive\Windows\",
[Parameter(Mandatory = $true)]
[string]$KeyVaultName,
[Parameter(Mandatory = $true)]
[string]$ResourceGroupName,
[Parameter(Mandatory = $true)]
[string]$secretName,
[Parameter(Mandatory = $false)]
[switch]$Force
)
try {
if($PSCmdlet.ShouldProcess($DomainName,"Create a new Active Directory Forest") -or $PSCmdlet.ShouldContinue("Do you want to continue?")) {
New-ADDSForest @PSBoundParameters
}
else{
Write-Output "Operation cancelled"
}
}
catch {
throw "Failed to create the new AD Forest. Please see the error message below.:$_"
}
}
# End of the functions to install and configure new AD Forest.
# New funtions to Add additonal Domain Controller
function Add-ADDomainController {
param(
[string]$DomainName,
[string]$SiteName = 'Default-First-Site-Name',
[string]$DatabasePath = "$env:SystemDrive\Windows\",
[string]$LogPath = "$env:SystemDrive\Windows\NTDS\",
[string]$SysvolPath = "$env:SystemDrive\Windows\",
[string]$KeyVaultName,
[string]$ResourceGroupName,
[string]$SafeModeAdminSecretName,
[string]$DomainAdminSecretName,
[string]$DomainAdminUser
)
# set paths
$DatabasePath = New-EnvPath -Path $DatabasePath -ChildPath 'ntds'
$LogPath = New-EnvPath -Path $LogPath -ChildPath 'ntds'
$SysvolPath = New-EnvPath -Path $SysvolPath -ChildPath 'sysvol'
# install required modules
Install-RequiredModule
Install-RequiredADModule
# connect to azure
Connect-ToAzure
# get the vault
Get-Vault
Add-RegisteredSecretVault
# define common parameters
$commonParams = @{
DomainName = $DomainName
SiteName = $SiteName
DatabasePath = $DatabasePath
LogPath = $LogPath
SysvolPath = $SysvolPath
Force = $true
}
# retrieve the safe mode admin password
$vaultName = (Get-Vault).VaultName
$credential = New-Object System.Management.Automation.PSCredential ($DomainAdminUser, (Get-Secret -Name $DomainAdminSecretName -Vault $vaultName))
[securestring]$safeModeAdministratorPassword = Get-Secret -Name $SafeModeAdminSecretName -Vault $vaultName
$param = $commonParams.Clone()
$keys = @{
SafeModeAdministratorPassword = $safeModeAdministratorPassword
Credential = $credential
}
Add-keys -hash $param -keys $keys
try {
# add the domain controller6-**
Install-ADDSDomainController @param
}
catch {
Write-Error "Failed to add the domain controller. Please see the error message below.:$_"
}
finally {
# remove the registered secret vault
Remove-RegisteredSecretVault
# disconnect from azure
Disconnect-FromAzure
}
}
function New-ADDSDomainController{
<#
.SYNOPSIS
This function is used to add an additional domain controller to an existing forest/domain.
.DESCRIPTION
This module is used to add an additional domain controller to an existing forest/domain.
It installs the required modules, connects to Azure, gets the vault, adds the registered secret vault, defines common parameters, retrieves the safe mode administrator password, creates a secure credential object, retrieves the domain admin password, adds the domain controller, removes the registered secret vault, and disconnects from Azure after the operation.
.PARAMETER DomainName
The fully qualified domain name of the existing forest/domain.
.PARAMETER SiteName
The name of the site where the new domain controller will be located. This is set to 'Default-First-Site-Name' by default.
.PARAMETER DatabasePath
The path to the database folder of the new domain controller. This is set to the default path of the system drive by default. But you can specify a different path (recommended).
.PARAMETER LogPath
The path to the log folder of the new domain controller. This is set to the default path of the system drive by default. But you can specify a different path (recommended).
.PARAMETER SysvolPath
The path to the sysvol folder of the new domain controller. This is set to the default path of the system drive by default. But you can specify a different path (recommended).
.PARAMETER KeyVaultName
The name of the key vault in Azure.
.PARAMETER ResourceGroupName
The name of the resource group in Azure where the key vault is located.
.PARAMETER SafeModeAdminSecretName
The name of the secret in the key vault that contains the safe mode administrator password.
.PARAMETER DomainAdminSecretName
The name of the secret in the key vault that contains the domain administrator password.
.PARAMETER DomainAdminUser
The username of the domain administrator.
.PARAMETER Force
This is a switch parameter that forces the operation to continue without prompting for confirmation.
.NOTES
File Name : Add-ADDomainController
Author : Olamide Olaleye
Prerequisite : PowerShell 7.2 and above.
.LINK
Specify a URI to a help page, this will show when Get-Help -Online is used.
.EXAMPLE
New-ADDSDomainController -DomainName "contoso.com" -KeyVaultName "mykeyvault" -ResourceGroupName "myresourcegroup" -SafeModeAdminSecretName "safemodeadminpassword" -DomainAdminSecretName "domainadminpassword" -DomainAdminUser "domainadmin"
This example adds an additional domain controller to an existing forest/domain with the specified parameters.
The function assumes default values for the SiteName, DatabasePath, LogPath, and SysvolPath parameters.
.EXAMPLE
New-ADDSDomainController -DomainName "contoso.com" -SiteName "NewSite" -DatabasePath "D:\" -LogPath "e:\" -SysvolPath "F:\" -KeyVaultName "mykeyvault" -ResourceGroupName "myresourcegroup" -SafeModeAdminSecretName "safemodeadminpassword" -DomainAdminSecretName "domainadminpassword" -DomainAdminUser "domainadmin" -Force
This example adds an additional domain controller to an existing forest/domain with the specified parameters.
The function specifies the SiteName, DatabasePath, LogPath, and SysvolPath parameters.
There is no requirement to specify the database, log and sysvol directory folders as the default values are used.
.INPUTS
System.String
.OUTPUTS
System.String
#>
[CmdletBinding(SupportsShouldProcess = $true)]
param(
[Parameter (Mandatory = $true)][string]$DomainName,
[Parameter (Mandatory = $false)][string]$SiteName = 'Default-First-Site-Name',
[Parameter (Mandatory = $false)][string]$DatabasePath = "$env:SystemDrive\Windows\",
[Parameter (Mandatory = $false)][string]$LogPath = "$env:SystemDrive\Windows\NTDS\",
[Parameter (Mandatory = $false)][string]$SysvolPath = "$env:SystemDrive\Windows\",
[Parameter (Mandatory = $true)][string]$KeyVaultName,
[Parameter (Mandatory = $true)][string]$ResourceGroupName,
[Parameter (Mandatory = $true)][string]$SafeModeAdminSecretName,
[Parameter (Mandatory = $true)][string]$DomainAdminSecretName,
[Parameter (Mandatory = $true)][string]$DomainAdminUser,
[Parameter (Mandatory = $false)][switch]$Force
)
try {
if($PSCmdlet.ShouldProcess($DomainName,"Add a new domain controller") -or $PSCmdlet.ShouldContinue("Do you want to continue?")){
Add-ADDomainController @PSBoundParameters
}
else{
Write-Output "Operation cancelled"
}
}
catch {
Write-Error "Failed to add the domain controller. Please see the error message below.:$_"
}
}
# Export the functions in the module.
Export-ModuleMember -Function New-ADForest -Cmdlet New-ADForest
Export-ModuleMember -Function New-ADDSDomainController -Cmdlet Add-ADDomainController |
ADDefaultUserLocation.psm1 | ADDefaultLocationDsc-1.0.0 | [DscResource()]
class ADDefaultUserLocation {
[DscProperty(Key)]
[ValidateSet("Yes")]
[string] $IsSingleInstance
[DscProperty(Mandatory)]
[string] $TargetDN
[ADDefaultUserLocation] Get() {
$this.TargetDN = (Get-ADDomain).UsersContainer
return $this
}
[void] Set() {
if([ADSI]::Exists("LDAP://$($this.TargetDN)")) {
redirusr $this.TargetDN
}
}
[bool] Test() {
if((Get-ADDomain).UsersContainer -eq $this.TargetDN) {
return $true
}
else {
return $false
}
}
}
|
ADDefaultUserLocation.psd1 | ADDefaultLocationDsc-1.0.0 | @{
# Script module or binary module file associated with this manifest.
RootModule = 'ADDefaultUserLocation.psm1'
# Version number of this module.
moduleVersion = '1.0.0'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = 'f8fbaff1-bb54-4b4c-862d-eb9516a538c6'
# Author of this module
Author = 'Daniel Snelling'
# Company or vendor of this module
CompanyName = 'Citadel Group'
# Copyright statement for this module
Copyright = '(c) 2019 Citadel Group. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This resource provides the functionality needed to manipulate the default AD locations for storing AD User objects.'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.1'
# DSC resources to export from this module
DscResourcesToExport = @('ADDefaultUserLocation')
}
|
ADDefaultComputerLocation.psm1 | ADDefaultLocationDsc-1.0.0 | [DscResource()]
class ADDefaultComputerLocation {
[DscProperty(Key)]
[ValidateSet("Yes")]
[string] $IsSingleInstance
[DscProperty(Mandatory)]
[string] $TargetDN
[ADDefaultComputerLocation] Get() {
$this.TargetDN = (Get-ADDomain).ComputersContainer
return $this
}
[void] Set() {
if([ADSI]::Exists("LDAP://$($this.TargetDN)")) {
redircmp $this.TargetDN
}
}
[bool] Test() {
if((Get-ADDomain).ComputersContainer -eq $this.TargetDN) {
return $true
}
else {
return $false
}
}
}
|
ADDefaultLocationDsc.psd1 | ADDefaultLocationDsc-1.0.0 | @{
# Version number of this module.
moduleVersion = '1.0.0'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = '31f45d9b-61dc-495c-a9dd-8d9785adb091'
# Author of this module
Author = 'Daniel Snelling'
# Company or vendor of this module
CompanyName = 'Citadel Group'
# Copyright statement for this module
Copyright = '(c) 2019 Citadel Group. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This module provides the functionality needed to manipulate the default AD locations for storing User and Computer objects.'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
#RequiredModules = @(@{ModuleName='PSDscResources';RequiredVersion='2.9.0.0'})
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @('DSCClassResources\ADDefaultComputerLocation\ADDefaultComputerLocation.psd1',
'DSCClassResources\ADDefaultUserLocation\ADDefaultUserLocation.psd1')
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @()
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
DscResourcesToExport = @('ADDefaultComputerLocation','ADDefaultUserLocation')
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'DesiredStateConfiguration', 'DSC', 'DSCResourceKit', 'DSCResource', 'ActiveDirectory', 'AD', 'User', 'Computer'
# A URL to the license for this module.
LicenseUri = 'https://github.com/citadelgroup/ADDefaultLocationDsc/blob/master/LICENSE'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/citadelgroup/ADDefaultLocationDsc'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
ReleaseNotes = 'V1 Release'
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
ADDefaultComputerLocation.psd1 | ADDefaultLocationDsc-1.0.0 | @{
# Script module or binary module file associated with this manifest.
RootModule = 'ADDefaultComputerLocation.psm1'
# Version number of this module.
moduleVersion = '1.0.0'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = '7539e501-06b7-466a-a11d-bdc34882b5a1'
# Author of this module
Author = 'Daniel Snelling'
# Company or vendor of this module
CompanyName = 'Citadel Group'
# Copyright statement for this module
Copyright = '(c) 2019 Citadel Group. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This resource provides the functionality needed to manipulate the default AD locations for storing AD Computer objects.'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.1'
# DSC resources to export from this module
DscResourcesToExport = @('ADDefaultComputerLocation')
}
|
Sample_ADDefaultUserLocation.ps1 | ADDefaultLocationDsc-1.0.0 | <#
.SYNOPSIS
Set the default location for User objects to the "mydomain.com/Employees" OU.
#>
Configuration Sample_ADDefaultUserLocation {
Import-DscResource -ModuleName 'ADDefaultLocationDsc'
Node localhost {
ADDefaultUserLocation ADDefaultUserLocationConfig {
IsSingleInstance = "Yes"
TargetDN = "OU=Employees,DC=mydomain,DC=com"
}
}
}
|
Sample_ADDefaultComputerLocation.ps1 | ADDefaultLocationDsc-1.0.0 | <#
.SYNOPSIS
Set the default location for Computer objects to the "mydomain.com/Servers" OU.
#>
Configuration Sample_ADDefaultComputerLocation {
Import-DscResource -ModuleName 'ADDefaultLocationDsc'
Node localhost {
ADDefaultComputerLocation ADDefaultComputerLocationConfig {
IsSingleInstance = "Yes"
TargetDN = "OU=Servers,DC=mydomain,DC=com"
}
}
}
|
ADEssentials.psm1 | ADEssentials-0.0.226 | function Convert-ADSchemaToGuid {
<#
.SYNOPSIS
Converts name of schema properties to guids
.DESCRIPTION
Converts name of schema properties to guids
.PARAMETER SchemaName
Schema Name to convert to guid
.PARAMETER All
Get hashtable of all schema properties and their guids
.PARAMETER Domain
Domain to query. By default the current domain is used
.PARAMETER RootDSE
RootDSE to query. By default RootDSE is queried from the domain
.PARAMETER AsString
Return the guid as a string
.EXAMPLE
Convert-ADSchemaToGuid -SchemaName 'ms-Exch-MSO-Forward-Sync-Cookie'
.EXAMPLE
Convert-ADSchemaToGuid -SchemaName 'ms-Exch-MSO-Forward-Sync-Cookie' -AsString
.NOTES
General notes
#>
[CmdletBinding()]
param(
[string] $SchemaName,
[string] $Domain,
[Microsoft.ActiveDirectory.Management.ADEntity] $RootDSE,
[switch] $AsString
)
if (-not $Script:ADGuidMap -or -not $Script:ADGuidMapString) {
if ($RootDSE) {
$Script:RootDSE = $RootDSE
} elseif (-not $Script:RootDSE) {
if ($Domain) {
$Script:RootDSE = Get-ADRootDSE -Server $Domain
} else {
$Script:RootDSE = Get-ADRootDSE
}
}
$DomainCN = ConvertFrom-DistinguishedName -DistinguishedName $Script:RootDSE.defaultNamingContext -ToDomainCN
$QueryServer = (Get-ADDomainController -DomainName $DomainCN -Discover -ErrorAction Stop).Hostname[0]
$Script:ADGuidMap = [ordered] @{
'All' = [System.GUID]'00000000-0000-0000-0000-000000000000'
}
$Script:ADGuidMapString = [ordered] @{
'All' = '00000000-0000-0000-0000-000000000000'
}
Write-Verbose "Convert-ADSchemaToGuid - Querying Schema from $QueryServer"
$Time = [System.Diagnostics.Stopwatch]::StartNew()
if (-not $Script:StandardRights) {
$Script:StandardRights = Get-ADObject -SearchBase $Script:RootDSE.schemaNamingContext -LDAPFilter "(schemaidguid=*)" -Properties name, lDAPDisplayName, schemaIDGUID -Server $QueryServer -ErrorAction Stop | Select-Object name, lDAPDisplayName, schemaIDGUID
}
foreach ($Guid in $Script:StandardRights) {
$Script:ADGuidMapString[$Guid.lDAPDisplayName] = ([System.GUID]$Guid.schemaIDGUID).Guid
$Script:ADGuidMapString[$Guid.Name] = ([System.GUID]$Guid.schemaIDGUID).Guid
$Script:ADGuidMap[$Guid.lDAPDisplayName] = ([System.GUID]$Guid.schemaIDGUID)
$Script:ADGuidMap[$Guid.Name] = ([System.GUID]$Guid.schemaIDGUID)
}
$Time.Stop()
$TimeToExecute = "$($Time.Elapsed.Days) days, $($Time.Elapsed.Hours) hours, $($Time.Elapsed.Minutes) minutes, $($Time.Elapsed.Seconds) seconds, $($Time.Elapsed.Milliseconds) milliseconds"
Write-Verbose "Convert-ADSchemaToGuid - Querying Schema from $QueryServer took $TimeToExecute"
Write-Verbose "Convert-ADSchemaToGuid - Querying Extended Rights from $QueryServer"
$Time = [System.Diagnostics.Stopwatch]::StartNew()
if (-not $Script:ExtendedRightsGuids) {
$Script:ExtendedRightsGuids = Get-ADObject -SearchBase $Script:RootDSE.ConfigurationNamingContext -LDAPFilter "(&(objectclass=controlAccessRight)(rightsguid=*))" -Properties name, displayName, lDAPDisplayName, rightsGuid -Server $QueryServer -ErrorAction Stop | Select-Object name, displayName, lDAPDisplayName, rightsGuid
}
foreach ($Guid in $Script:ExtendedRightsGuids) {
$Script:ADGuidMapString[$Guid.Name] = ([System.GUID]$Guid.RightsGuid).Guid
$Script:ADGuidMapString[$Guid.DisplayName] = ([System.GUID]$Guid.RightsGuid).Guid
$Script:ADGuidMap[$Guid.Name] = ([System.GUID]$Guid.RightsGuid)
$Script:ADGuidMap[$Guid.DisplayName] = ([System.GUID]$Guid.RightsGuid)
}
$Time.Stop()
$TimeToExecute = "$($Time.Elapsed.Days) days, $($Time.Elapsed.Hours) hours, $($Time.Elapsed.Minutes) minutes, $($Time.Elapsed.Seconds) seconds, $($Time.Elapsed.Milliseconds) milliseconds"
Write-Verbose "Convert-ADSchemaToGuid - Querying Extended Rights from $QueryServer took $TimeToExecute"
}
if ($SchemaName) {
if ($AsString) {
return $Script:ADGuidMapString[$SchemaName]
} else {
return $Script:ADGuidMap[$SchemaName]
}
} else {
if ($AsString) {
$Script:ADGuidMapString
} else {
$Script:ADGuidMap
}
}
}
function Convert-CountryCodeToCountry {
<#
.SYNOPSIS
Converts a country code to a country name, or when used with a switch to full culture information
.DESCRIPTION
Converts a country code to a country name, or when used with a switch to full culture information
.PARAMETER CountryCode
Country code
.PARAMETER All
Provide full culture information rather than just the country name
.EXAMPLE
Convert-CountryCodeToCountry -CountryCode 'PL'
.EXAMPLE
Convert-CountryCodeToCountry -CountryCode 'PL' -All
.EXAMPLE
$Test = Convert-CountryCodeToCountry
$Test['PL']['Culture'] | fl
$Test['PL']['RegionInformation']
.EXAMPLE
Convert-CountryCodeToCountry -CountryCode 'PL'
Convert-CountryCodeToCountry -CountryCode 'POL'
.NOTES
General notes
#>
[cmdletBinding()]
param(
[string] $CountryCode,
[switch] $All
)
if ($Script:QuickSearch) {
if ($PSBoundParameters.ContainsKey('CountryCode')) {
if ($All) {
$Script:QuickSearch[$CountryCode]
} else {
$Script:QuickSearch[$CountryCode].RegionInformation.EnglishName
}
} else {
$Script:QuickSearch
}
} else {
$Script:QuickSearch = [ordered] @{}
$AllCultures = [cultureinfo]::GetCultures([System.Globalization.CultureTypes]::SpecificCultures)
foreach ($Culture in $AllCultures) {
$RegionInformation = [System.Globalization.RegionInfo]::new($Culture)
$Script:QuickSearch[$RegionInformation.TwoLetterISORegionName] = @{
'Culture' = $Culture
'RegionInformation' = $RegionInformation
}
$Script:QuickSearch[$RegionInformation.ThreeLetterISORegionName] = @{
'Culture' = $Culture
'RegionInformation' = $RegionInformation
}
}
if ($PSBoundParameters.ContainsKey('CountryCode')) {
if ($All) {
$Script:QuickSearch[$CountryCode]
} else {
$Script:QuickSearch[$CountryCode].RegionInformation.EnglishName
}
} else {
$Script:QuickSearch
}
}
}
function Convert-DomainFqdnToNetBIOS {
<#
.SYNOPSIS
Converts FQDN to NetBIOS name for Active Directory Domain
.DESCRIPTION
Converts FQDN to NetBIOS name for Active Directory Domain
.PARAMETER DomainName
DomainName for current forest or trusted forest
.EXAMPLE
Convert-DomainFqdnToNetBIOS -Domain 'ad.evotec.xyz'
.EXAMPLE
Convert-DomainFqdnToNetBIOS -Domain 'ad.evotec.pl'
.NOTES
General notes
#>
[cmdletBinding()]
param (
[string] $DomainName
)
if (-not $Script:CacheFQDN) {
$Script:CacheFQDN = @{}
}
if ($Script:CacheFQDN[$DomainName]) {
$Script:CacheFQDN[$DomainName]
} else {
$objRootDSE = [System.DirectoryServices.DirectoryEntry] "LDAP://$DomainName/RootDSE"
$ConfigurationNC = $objRootDSE.configurationNamingContext
$Searcher = [System.DirectoryServices.DirectorySearcher] @{
SearchScope = "subtree"
SearchRoot = "LDAP://cn=Partitions,$ConfigurationNC"
Filter = "(&(objectcategory=Crossref)(dnsRoot=$DomainName)(netbiosname=*))"
}
$null = $Searcher.PropertiesToLoad.Add("netbiosname")
$Script:CacheFQDN[$DomainName] = ($Searcher.FindOne()).Properties.Item("netbiosname")
$Script:CacheFQDN[$DomainName]
}
}
function Convert-ExchangeEmail {
<#
.SYNOPSIS
Converts a list of Exchange email addresses into a readable and exportable format.
.DESCRIPTION
This function takes a list of Exchange email addresses and processes them to make them more readable and suitable for export.
.PARAMETER Emails
List of email addresses in Exchange or Exchange Online format, also known as proxy addresses.
.PARAMETER Separator
The separator to use between each processed email address. Default is ', '.
.PARAMETER RemoveDuplicates
Switch to remove duplicate email addresses from the list.
.PARAMETER RemovePrefix
Switch to remove any prefixes like 'SMTP:', 'SIP:', 'spo:', etc. from the email addresses.
.PARAMETER AddSeparator
Switch to join the processed email addresses using the specified separator.
.EXAMPLE
$Emails = @()
$Emails += 'SIP:[email protected]'
$Emails += 'SMTP:[email protected]'
$Emails += 'sip:[email protected]'
$Emails += 'Spo:[email protected]'
$Emails += 'SPO:[email protected]'
Convert-ExchangeEmail -Emails $Emails -RemovePrefix -RemoveDuplicates -AddSeparator
#>
#>
[CmdletBinding()]
param(
[string[]] $Emails,
[string] $Separator = ', ',
[switch] $RemoveDuplicates,
[switch] $RemovePrefix,
[switch] $AddSeparator
)
if ($RemovePrefix) {
$Emails = $Emails -replace 'smtp:', '' -replace 'sip:', '' -replace 'spo:', ''
}
if ($RemoveDuplicates) {
$Emails = $Emails | Sort-Object -Unique
}
if ($AddSeparator) {
$Emails = $Emails -join $Separator
}
return $Emails
}
function Convert-ExchangeRecipient {
<#
.SYNOPSIS
Convert msExchRemoteRecipientType, msExchRecipientDisplayType, msExchRecipientTypeDetails to their respective name
.DESCRIPTION
Convert msExchRemoteRecipientType, msExchRecipientDisplayType, msExchRecipientTypeDetails to their respective name
.PARAMETER RecipientTypeDetails
RecipientTypeDetails to convert
.PARAMETER RecipientType
RecipientType to convert
.PARAMETER RemoteRecipientType
Parameter description
.EXAMPLE
$Users = Get-ADUser -Filter * -Properties Mail, ProxyAddresses, msExchRemoteRecipientType, msExchRecipientDisplayType, msExchRecipientTypeDetails, MailNickName
$UsersModified = foreach ($User in $Users) {
[PSCUstomObject] @{
Name = $User.Name
Mail = $User.Mail
MailNickName = $User.MailNickName
msExchRemoteRecipientType = Convert-ExchangeRecipient -msExchRemoteRecipientType $User.msExchRemoteRecipientType
msExchRecipientDisplayType = Convert-ExchangeRecipient -msExchRecipientDisplayType $User.msExchRecipientDisplayType
msExchRecipientTypeDetails = Convert-ExchangeRecipient -msExchRecipientTypeDetails $User.msExchRecipientTypeDetails
ProxyAddresses = Convert-ExchangeEmail -AddSeparator -RemovePrefix -RemoveDuplicates -Separator ',' -Emails $User.ProxyAddresses
}
}
$UsersModified | Out-HtmlView -Filtering -ScrollX
.EXAMPLE
Convert-ExchangeRecipient -msExchRemoteRecipientType 17
Convert-ExchangeRecipient -msExchRecipientDisplayType 17
Convert-ExchangeRecipient -msExchRecipientTypeDetails 17
.NOTES
Based on:
- https://granikos.eu/exchange-recipient-type-values/
- https://answers.microsoft.com/en-us/msoffice/forum/all/recipient-type-values/7c2620e5-9870-48ba-b5c2-7772c739c651
- https://www.undocumented-features.com/2020/05/06/every-last-msexchrecipientdisplaytype-and-msexchrecipienttypedetails-value/
#>
[alias('Convert-ExchangeRecipientDetails')]
[cmdletbinding(DefaultParameterSetName = 'msExchRecipientTypeDetails')]
param(
[parameter(ParameterSetName = 'msExchRecipientTypeDetails')][alias('RecipientTypeDetails')][string] $msExchRecipientTypeDetails,
[parameter(ParameterSetName = 'msExchRecipientDisplayType')][alias('RecipientType')][string] $msExchRecipientDisplayType,
[parameter(ParameterSetName = 'msExchRemoteRecipientType')][alias('RemoteRecipientType')][string] $msExchRemoteRecipientType,
[parameter(ParameterSetName = 'msExchRecipientTypeDetails')]
[parameter(ParameterSetName = 'msExchRecipientDisplayType')]
[parameter(ParameterSetName = 'msExchRemoteRecipientType')]
[switch] $All
)
if ($PSBoundParameters.ContainsKey('msExchRecipientTypeDetails')) {
$ListMsExchRecipientTypeDetails = [ordered] @{
'0' = 'None'
'1' = 'UserMailbox'
'2' = 'LinkedMailbox'
'4' = 'SharedMailbox'
'8' = 'LegacyMailbox'
'16' = 'RoomMailbox'
'32' = 'EquipmentMailbox'
'64' = 'MailContact'
'128' = 'MailUser'
'256' = 'MailUniversalDistributionGroup'
'512' = 'MailNonUniversalGroup'
'1024' = 'MailUniversalSecurityGroup'
'2048' = 'DynamicDistributionGroup'
'4096' = 'PublicFolder'
'8192' = 'SystemAttendantMailbox'
'16384' = 'SystemMailbox'
'32768' = 'MailForestContact'
'65536' = 'User'
'131072' = 'Contact'
'262144' = 'UniversalDistributionGroup'
'524288' = 'UniversalSecurityGroup'
'1048576' = 'NonUniversalGroup'
'2097152' = 'Disable User'
'4194304' = 'MicrosoftExchange'
'8388608' = 'ArbitrationMailbox'
'16777216' = 'MailboxPlan'
'33554432' = 'LinkedUser'
'268435456' = 'RoomList'
'536870912' = 'DiscoveryMailbox'
'1073741824' = 'RoleGroup'
'2147483648' = 'RemoteUserMailbox'
'4294967296' = 'Computer'
'8589934592' = 'RemoteRoomMailbox'
'17179869184' = 'RemoteEquipmentMailbox'
'34359738368' = 'RemoteSharedMailbox'
'68719476736' = 'PublicFolderMailbox'
'137438953472' = 'Team Mailbox'
'274877906944' = 'RemoteTeamMailbox'
'549755813888' = 'MonitoringMailbox'
'1099511627776' = 'GroupMailbox'
'2199023255552' = 'LinkedRoomMailbox'
'4398046511104' = 'AuditLogMailbox'
'8796093022208' = 'RemoteGroupMailbox'
'17592186044416' = 'SchedulingMailbox'
'35184372088832' = 'GuestMailUser'
'70368744177664' = 'AuxAuditLogMailbox'
'140737488355328' = 'SupervisoryReviewPolicyMailbox'
}
if ($All) {
$ListMsExchRecipientTypeDetails
} else {
if ($null -ne $ListMsExchRecipientTypeDetails[$msExchRecipientTypeDetails]) {
$ListMsExchRecipientTypeDetails[$msExchRecipientTypeDetails]
} else {
$msExchRecipientTypeDetails
}
}
} elseif ($PSBoundParameters.ContainsKey('msExchRecipientDisplayType')) {
$ListMsExchRecipientDisplayType = [ordered] @{
'0' = 'MailboxUser'
'1' = 'DistributionGroup'
'2' = 'PublicFolder'
'3' = 'DynamicDistributionGroup'
'4' = 'Organization'
'5' = 'PrivateDistributionList'
'6' = 'RemoteMailUser'
'7' = 'ConferenceRoomMailbox'
'8' = 'EquipmentMailbox'
'10' = 'ArbitrationMailbox'
'11' = 'MailboxPlan'
'12' = 'LinkedUser'
'15' = 'RoomList'
'17' = 'Microsoft365Group'
'-2147483642' = 'SyncedMailboxUser'
'-2147483391' = 'SyncedUDGasUDG'
'-2147483386' = 'SyncedUDGasContact'
'-2147483130' = 'SyncedPublicFolder'
'-2147482874' = 'SyncedDynamicDistributionGroup'
'-2147482106' = 'SyncedRemoteMailUser'
'-2147481850' = 'SyncedConferenceRoomMailbox'
'-2147481594' = 'SyncedEquipmentMailbox'
'-2147481343' = 'SyncedUSGasUDG'
'-2147481338' = 'SyncedUSGasContact'
'-1073741818' = 'ACLableSyncedMailboxUser'
'-1073740282' = 'ACLableSyncedRemoteMailUser'
'-1073739514' = 'ACLableSyncedUSGasContact'
'-1073739511' = 'SyncedUSGasUSG'
'1043741833' = 'SecurityDistributionGroup'
'1073739511' = 'SyncedUSGasUSG'
'1073739514' = 'ACLableSyncedUSGasContact'
'1073741824' = 'ACLableMailboxUser'
'1073741830' = 'ACLableRemoteMailUser'
}
if ($All) {
$ListMsExchRecipientDisplayType
} else {
if ($null -ne $ListMsExchRecipientDisplayType[$msExchRecipientDisplayType]) {
$ListMsExchRecipientDisplayType[$msExchRecipientDisplayType]
} else {
$msExchRecipientDisplayType
}
}
} elseif ($PSBoundParameters.ContainsKey('msExchRemoteRecipientType')) {
$ListMsExchRemoteRecipientType = [ordered] @{
'1' = 'ProvisionMailbox'
'2' = 'ProvisionArchive (On-Prem Mailbox)'
'3' = 'ProvisionMailbox, ProvisionArchive'
'4' = 'Migrated (UserMailbox)'
'6' = 'ProvisionArchive, Migrated'
'8' = 'DeprovisionMailbox'
'10' = 'ProvisionArchive, DeprovisionMailbox'
'16' = 'DeprovisionArchive (On-Prem Mailbox)'
'17' = 'ProvisionMailbox, DeprovisionArchive'
'20' = 'Migrated, DeprovisionArchive'
'24' = 'DeprovisionMailbox, DeprovisionArchive'
'33' = 'ProvisionMailbox, RoomMailbox'
'35' = 'ProvisionMailbox, ProvisionArchive, RoomMailbox'
'36' = 'Migrated, RoomMailbox'
'38' = 'ProvisionArchive, Migrated, RoomMailbox'
'49' = 'ProvisionMailbox, DeprovisionArchive, RoomMailbox'
'52' = 'Migrated, DeprovisionArchive, RoomMailbox'
'65' = 'ProvisionMailbox, EquipmentMailbox'
'67' = 'ProvisionMailbox, ProvisionArchive, EquipmentMailbox'
'68' = 'Migrated, EquipmentMailbox'
'70' = 'ProvisionArchive, Migrated, EquipmentMailbox'
'81' = 'ProvisionMailbox, DeprovisionArchive, EquipmentMailbox'
'84' = 'Migrated, DeprovisionArchive, EquipmentMailbox'
'100' = 'Migrated, SharedMailbox'
'102' = 'ProvisionArchive, Migrated, SharedMailbox'
'116' = 'Migrated, DeprovisionArchive, SharedMailbox'
}
if ($All) {
$ListMsExchRemoteRecipientType
} else {
if ($null -ne $ListMsExchRemoteRecipientType[$msExchRemoteRecipientType]) {
$ListMsExchRemoteRecipientType[$msExchRemoteRecipientType]
} else {
$msExchRemoteRecipientType
}
}
}
}
function ConvertFrom-DistinguishedName {
<#
.SYNOPSIS
Converts a Distinguished Name to CN, OU, Multiple OUs or DC
.DESCRIPTION
Converts a Distinguished Name to CN, OU, Multiple OUs or DC
.PARAMETER DistinguishedName
Distinguished Name to convert
.PARAMETER ToOrganizationalUnit
Converts DistinguishedName to Organizational Unit
.PARAMETER ToDC
Converts DistinguishedName to DC
.PARAMETER ToDomainCN
Converts DistinguishedName to Domain Canonical Name (CN)
.PARAMETER ToCanonicalName
Converts DistinguishedName to Canonical Name
.EXAMPLE
$DistinguishedName = 'CN=Przemyslaw Klys,OU=Users,OU=Production,DC=ad,DC=evotec,DC=xyz'
ConvertFrom-DistinguishedName -DistinguishedName $DistinguishedName -ToOrganizationalUnit
Output:
OU=Users,OU=Production,DC=ad,DC=evotec,DC=xyz
.EXAMPLE
$DistinguishedName = 'CN=Przemyslaw Klys,OU=Users,OU=Production,DC=ad,DC=evotec,DC=xyz'
ConvertFrom-DistinguishedName -DistinguishedName $DistinguishedName
Output:
Przemyslaw Klys
.EXAMPLE
ConvertFrom-DistinguishedName -DistinguishedName 'OU=Users,OU=Production,DC=ad,DC=evotec,DC=xyz' -ToMultipleOrganizationalUnit -IncludeParent
Output:
OU=Users,OU=Production,DC=ad,DC=evotec,DC=xyz
OU=Production,DC=ad,DC=evotec,DC=xyz
.EXAMPLE
ConvertFrom-DistinguishedName -DistinguishedName 'OU=Users,OU=Production,DC=ad,DC=evotec,DC=xyz' -ToMultipleOrganizationalUnit
Output:
OU=Production,DC=ad,DC=evotec,DC=xyz
.EXAMPLE
$Con = @(
'CN=Windows Authorization Access Group,CN=Builtin,DC=ad,DC=evotec,DC=xyz'
'CN=Mmm,DC=elo,CN=nee,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=ad,DC=evotec,DC=xyz'
'CN=e6d5fd00-385d-4e65-b02d-9da3493ed850,CN=Operations,CN=DomainUpdates,CN=System,DC=ad,DC=evotec,DC=xyz'
'OU=Domain Controllers,DC=ad,DC=evotec,DC=pl'
'OU=Microsoft Exchange Security Groups,DC=ad,DC=evotec,DC=xyz'
)
ConvertFrom-DistinguishedName -DistinguishedName $Con -ToLastName
Output:
Windows Authorization Access Group
Mmm
e6d5fd00-385d-4e65-b02d-9da3493ed850
Domain Controllers
Microsoft Exchange Security Groups
.EXAMPLEE
ConvertFrom-DistinguishedName -DistinguishedName 'DC=ad,DC=evotec,DC=xyz' -ToCanonicalName
ConvertFrom-DistinguishedName -DistinguishedName 'OU=Users,OU=Production,DC=ad,DC=evotec,DC=xyz' -ToCanonicalName
ConvertFrom-DistinguishedName -DistinguishedName 'CN=test,OU=Users,OU=Production,DC=ad,DC=evotec,DC=xyz' -ToCanonicalName
Output:
ad.evotec.xyz
ad.evotec.xyz\Production\Users
ad.evotec.xyz\Production\Users\test
.NOTES
General notes
#>
[CmdletBinding(DefaultParameterSetName = 'Default')]
param(
[Parameter(ParameterSetName = 'ToOrganizationalUnit')]
[Parameter(ParameterSetName = 'ToMultipleOrganizationalUnit')]
[Parameter(ParameterSetName = 'ToDC')]
[Parameter(ParameterSetName = 'ToDomainCN')]
[Parameter(ParameterSetName = 'Default')]
[Parameter(ParameterSetName = 'ToLastName')]
[Parameter(ParameterSetName = 'ToCanonicalName')]
[alias('Identity', 'DN')][Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName, Position = 0)][string[]] $DistinguishedName,
[Parameter(ParameterSetName = 'ToOrganizationalUnit')][switch] $ToOrganizationalUnit,
[Parameter(ParameterSetName = 'ToMultipleOrganizationalUnit')][alias('ToMultipleOU')][switch] $ToMultipleOrganizationalUnit,
[Parameter(ParameterSetName = 'ToMultipleOrganizationalUnit')][switch] $IncludeParent,
[Parameter(ParameterSetName = 'ToDC')][switch] $ToDC,
[Parameter(ParameterSetName = 'ToDomainCN')][switch] $ToDomainCN,
[Parameter(ParameterSetName = 'ToLastName')][switch] $ToLastName,
[Parameter(ParameterSetName = 'ToCanonicalName')][switch] $ToCanonicalName
)
Process {
foreach ($Distinguished in $DistinguishedName) {
if ($ToDomainCN) {
$DN = $Distinguished -replace '.*?((DC=[^=]+,)+DC=[^=]+)$', '$1'
$CN = $DN -replace ',DC=', '.' -replace "DC="
if ($CN) {
$CN
}
} elseif ($ToOrganizationalUnit) {
if ($Distinguished -match '^CN=[^,\\]+(?:\\,[^,\\]+)*,(.+)$') {
$matches[1]
} elseif ($Distinguished -match '^(OU=|CN=)') {
$Distinguished
}
} elseif ($ToMultipleOrganizationalUnit) {
$Parts = $Distinguished -split '(?<!\\),'
$Results = [System.Collections.ArrayList]::new()
if ($IncludeParent) {
$null = $Results.Add($Distinguished)
}
for ($i = 1; $i -lt $Parts.Count; $i++) {
$CurrentPath = $Parts[$i..($Parts.Count - 1)] -join ','
if ($CurrentPath -match '^(OU=|CN=)' -and $CurrentPath -notmatch '^DC=') {
$null = $Results.Add($CurrentPath)
}
}
foreach ($R in $Results) {
if ($R -match '^(OU=|CN=)') {
$R
}
}
} elseif ($ToDC) {
$Value = $Distinguished -replace '.*?((DC=[^=]+,)+DC=[^=]+)$', '$1'
if ($Value) {
$Value
}
} elseif ($ToLastName) {
$NewDN = $Distinguished -split ",DC="
if ($NewDN[0].Contains(",OU=")) {
[Array] $ChangedDN = $NewDN[0] -split ",OU="
} elseif ($NewDN[0].Contains(",CN=")) {
[Array] $ChangedDN = $NewDN[0] -split ",CN="
} else {
[Array] $ChangedDN = $NewDN[0]
}
if ($ChangedDN[0].StartsWith('CN=')) {
$ChangedDN[0] -replace 'CN=', ''
} else {
$ChangedDN[0] -replace 'OU=', ''
}
} elseif ($ToCanonicalName) {
$Domain = $null
$Rest = $null
foreach ($O in $Distinguished -split '(?<!\\),') {
if ($O -match '^DC=') {
$Domain += $O.Substring(3) + '.'
} else {
$Rest = $O.Substring(3) + '\' + $Rest
}
}
if ($Domain -and $Rest) {
$Domain.Trim('.') + '\' + ($Rest.TrimEnd('\') -replace '\\,', ',')
} elseif ($Domain) {
$Domain.Trim('.')
} elseif ($Rest) {
$Rest.TrimEnd('\') -replace '\\,', ','
}
} else {
$Regex = '^CN=(?<cn>.+?)(?<!\\),(?<ou>(?:(?:OU|CN).+?(?<!\\),)+(?<dc>DC.+?))$'
$Found = $Distinguished -match $Regex
if ($Found) {
$Matches.cn
}
}
}
}
}
function ConvertFrom-NetbiosName {
<#
.SYNOPSIS
Converts a NetBIOS name to its corresponding domain name and object name.
.DESCRIPTION
This function takes a NetBIOS name in the format 'Domain\Object' and converts it to the corresponding domain name and object name.
.PARAMETER Identity
Specifies the NetBIOS name(s) to convert.
.EXAMPLE
'TEST\Domain Admins', 'EVOTEC\Domain Admins', 'EVOTECPL\Domain Admins' | ConvertFrom-NetbiosName
Converts the NetBIOS names 'TEST\Domain Admins', 'EVOTEC\Domain Admins', and 'EVOTECPL\Domain Admins' to their corresponding domain names and object names.
.EXAMPLE
ConvertFrom-NetbiosName -Identity 'TEST\Domain Admins', 'EVOTEC\Domain Admins', 'EVOTECPL\Domain Admins'
Converts the NetBIOS names 'TEST\Domain Admins', 'EVOTEC\Domain Admins', and 'EVOTECPL\Domain Admins' to their corresponding domain names and object names.
#>
[cmdletBinding()]
param(
[Parameter(Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName, Position = 0)]
[string[]] $Identity
)
process {
foreach ($Ident in $Identity) {
if ($Ident -like '*\*') {
$NetbiosWithObject = $Ident -split "\\"
if ($NetbiosWithObject.Count -eq 2) {
$LDAPQuery = ([ADSI]"LDAP://$($NetbiosWithObject[0])")
$DomainName = ConvertFrom-DistinguishedName -DistinguishedName $LDAPQuery.distinguishedName -ToDomainCN
[PSCustomObject] @{
DomainName = $DomainName
Name = $NetbiosWithObject[1]
}
} else {
[PSCustomObject] @{
DomainName = ''
Name = $Ident
}
}
} else {
[PSCustomObject] @{
DomainName = ''
Name = $Ident
}
}
}
}
}
function ConvertFrom-SID {
<#
.SYNOPSIS
Small command that can resolve SID values
.DESCRIPTION
Small command that can resolve SID values
.PARAMETER SID
Value to resolve
.PARAMETER OnlyWellKnown
Only resolve SID when it's well know SID. Otherwise return $null
.PARAMETER OnlyWellKnownAdministrative
Only resolve SID when it's administrative well know SID. Otherwise return $null
.PARAMETER DoNotResolve
Uses only dicrionary values without querying AD
.EXAMPLE
ConvertFrom-SID -SID 'S-1-5-8', 'S-1-5-9', 'S-1-5-11', 'S-1-5-18', 'S-1-1-0' -DoNotResolve
.NOTES
General notes
#>
[cmdletbinding(DefaultParameterSetName = 'Standard')]
param(
[Parameter(ParameterSetName = 'Standard')]
[Parameter(ParameterSetName = 'OnlyWellKnown')]
[Parameter(ParameterSetName = 'OnlyWellKnownAdministrative')]
[string[]] $SID,
[Parameter(ParameterSetName = 'OnlyWellKnown')][switch] $OnlyWellKnown,
[Parameter(ParameterSetName = 'OnlyWellKnownAdministrative')][switch] $OnlyWellKnownAdministrative,
[Parameter(ParameterSetName = 'Standard')][switch] $DoNotResolve
)
$WellKnownAdministrative = @{
'S-1-5-18' = [PSCustomObject] @{
Name = 'NT AUTHORITY\SYSTEM'
SID = 'S-1-5-18'
DomainName = ''
Type = 'WellKnownAdministrative'
Error = ''
}
'S-1-5-32-544' = [PSCustomObject] @{
Name = 'BUILTIN\Administrators'
SID = 'S-1-5-32-544'
DomainName = ''
Type = 'WellKnownAdministrative'
Error = ''
}
}
$wellKnownSIDs = @{
'S-1-0' = [PSCustomObject] @{
Name = 'Null AUTHORITY'
SID = 'S-1-0'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-0-0' = [PSCustomObject] @{
Name = 'NULL SID'
SID = 'S-1-0-0'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-1' = [PSCustomObject] @{
Name = 'WORLD AUTHORITY'
SID = 'S-1-1'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-1-0' = [PSCustomObject] @{
Name = 'Everyone'
SID = 'S-1-1-0'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-2' = [PSCustomObject] @{
Name = 'LOCAL AUTHORITY'
SID = 'S-1-2'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-2-0' = [PSCustomObject] @{
Name = 'LOCAL'
SID = 'S-1-2-0'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-2-1' = [PSCustomObject] @{
Name = 'CONSOLE LOGON'
SID = 'S-1-2-1'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-3' = [PSCustomObject] @{
Name = 'CREATOR AUTHORITY'
SID = 'S-1-3'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-3-0' = [PSCustomObject] @{
Name = 'CREATOR OWNER'
SID = 'S-1-3-0'
DomainName = ''
Type = 'WellKnownAdministrative'
Error = ''
}
'S-1-3-1' = [PSCustomObject] @{
Name = 'CREATOR GROUP'
SID = 'S-1-3-1'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-3-2' = [PSCustomObject] @{
Name = 'CREATOR OWNER SERVER'
SID = 'S-1-3-2'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-3-3' = [PSCustomObject] @{
Name = 'CREATOR GROUP SERVER'
SID = 'S-1-3-3'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-3-4' = [PSCustomObject] @{
Name = 'OWNER RIGHTS'
SID = 'S-1-3-4'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-80-0' = [PSCustomObject] @{
Name = 'NT SERVICE\ALL SERVICES'
SID = 'S-1-5-80-0'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-4' = [PSCustomObject] @{
Name = 'Non-unique Authority'
SID = 'S-1-4'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5' = [PSCustomObject] @{
Name = 'NT AUTHORITY'
SID = 'S-1-5'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-1' = [PSCustomObject] @{
Name = 'NT AUTHORITY\DIALUP'
SID = 'S-1-5-1'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-2' = [PSCustomObject] @{
Name = 'NT AUTHORITY\NETWORK'
SID = 'S-1-5-2'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-3' = [PSCustomObject] @{
Name = 'NT AUTHORITY\BATCH'
SID = 'S-1-5-3'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-4' = [PSCustomObject] @{
Name = 'NT AUTHORITY\INTERACTIVE'
SID = 'S-1-5-4'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-6' = [PSCustomObject] @{
Name = 'NT AUTHORITY\SERVICE'
SID = 'S-1-5-6'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-7' = [PSCustomObject] @{
Name = 'NT AUTHORITY\ANONYMOUS LOGON'
SID = 'S-1-5-7'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-8' = [PSCustomObject] @{
Name = 'NT AUTHORITY\PROXY'
SID = 'S-1-5-8'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-9' = [PSCustomObject] @{
Name = 'NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS'
SID = 'S-1-5-9'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-10' = [PSCustomObject] @{
Name = 'NT AUTHORITY\SELF'
SID = 'S-1-5-10'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-11' = [PSCustomObject] @{
Name = 'NT AUTHORITY\Authenticated Users'
SID = 'S-1-5-11'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-12' = [PSCustomObject] @{
Name = 'NT AUTHORITY\RESTRICTED'
SID = 'S-1-5-12'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-13' = [PSCustomObject] @{
Name = 'NT AUTHORITY\TERMINAL SERVER USER'
SID = 'S-1-5-13'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-14' = [PSCustomObject] @{
Name = 'NT AUTHORITY\REMOTE INTERACTIVE LOGON'
SID = 'S-1-5-14'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-15' = [PSCustomObject] @{
Name = 'NT AUTHORITY\This Organization'
SID = 'S-1-5-15'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-17' = [PSCustomObject] @{
Name = 'NT AUTHORITY\IUSR'
SID = 'S-1-5-17'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-18' = [PSCustomObject] @{
Name = 'NT AUTHORITY\SYSTEM'
SID = 'S-1-5-18'
DomainName = ''
Type = 'WellKnownAdministrative'
Error = ''
}
'S-1-5-19' = [PSCustomObject] @{
Name = 'NT AUTHORITY\LOCAL SERVICE'
SID = 'S-1-5-19'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-20' = [PSCustomObject] @{
Name = 'NT AUTHORITY\NETWORK SERVICE'
SID = 'S-1-5-20'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-544' = [PSCustomObject] @{
Name = 'BUILTIN\Administrators'
SID = 'S-1-5-32-544'
DomainName = ''
Type = 'WellKnownAdministrative'
Error = ''
}
'S-1-5-32-545' = [PSCustomObject] @{
Name = 'BUILTIN\Users'
SID = 'S-1-5-32-545'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-546' = [PSCustomObject] @{
Name = 'BUILTIN\Guests'
SID = 'S-1-5-32-546'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-547' = [PSCustomObject] @{
Name = 'BUILTIN\Power Users'
SID = 'S-1-5-32-547'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-548' = [PSCustomObject] @{
Name = 'BUILTIN\Account Operators'
SID = 'S-1-5-32-548'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-549' = [PSCustomObject] @{
Name = 'BUILTIN\Server Operators'
SID = 'S-1-5-32-549'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-550' = [PSCustomObject] @{
Name = 'BUILTIN\Print Operators'
SID = 'S-1-5-32-550'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-551' = [PSCustomObject] @{
Name = 'BUILTIN\Backup Operators'
SID = 'S-1-5-32-551'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-552' = [PSCustomObject] @{
Name = 'BUILTIN\Replicators'
SID = 'S-1-5-32-552'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-64-10' = [PSCustomObject] @{
Name = 'NT AUTHORITY\NTLM Authentication'
SID = 'S-1-5-64-10'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-64-14' = [PSCustomObject] @{
Name = 'NT AUTHORITY\SChannel Authentication'
SID = 'S-1-5-64-14'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-64-21' = [PSCustomObject] @{
Name = 'NT AUTHORITY\Digest Authentication'
SID = 'S-1-5-64-21'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-80' = [PSCustomObject] @{
Name = 'NT SERVICE'
SID = 'S-1-5-80'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-83-0' = [PSCustomObject] @{
Name = 'NT VIRTUAL MACHINE\Virtual Machines'
SID = 'S-1-5-83-0'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-16-0' = [PSCustomObject] @{
Name = 'Untrusted Mandatory Level'
SID = 'S-1-16-0'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-16-4096' = [PSCustomObject] @{
Name = 'Low Mandatory Level'
SID = 'S-1-16-4096'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-16-8192' = [PSCustomObject] @{
Name = 'Medium Mandatory Level'
SID = 'S-1-16-8192'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-16-8448' = [PSCustomObject] @{
Name = 'Medium Plus Mandatory Level'
SID = 'S-1-16-8448'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-16-12288' = [PSCustomObject] @{
Name = 'High Mandatory Level'
SID = 'S-1-16-12288'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-16-16384' = [PSCustomObject] @{
Name = 'System Mandatory Level'
SID = 'S-1-16-16384'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-16-20480' = [PSCustomObject] @{
Name = 'Protected Process Mandatory Level'
SID = 'S-1-16-20480'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-16-28672' = [PSCustomObject] @{
Name = 'Secure Process Mandatory Level'
SID = 'S-1-16-28672'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-554' = [PSCustomObject] @{
Name = 'BUILTIN\Pre-Windows 2000 Compatible Access'
SID = 'S-1-5-32-554'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-555' = [PSCustomObject] @{
Name = 'BUILTIN\Remote Desktop Users'
SID = 'S-1-5-32-555'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-556' = [PSCustomObject] @{
Name = 'BUILTIN\Network Configuration Operators'
SID = 'S-1-5-32-556'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-557' = [PSCustomObject] @{
Name = 'BUILTIN\Incoming Forest Trust Builders'
SID = 'S-1-5-32-557'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-558' = [PSCustomObject] @{
Name = 'BUILTIN\Performance Monitor Users'
SID = 'S-1-5-32-558'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-559' = [PSCustomObject] @{
Name = 'BUILTIN\Performance Log Users'
SID = 'S-1-5-32-559'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-560' = [PSCustomObject] @{
Name = 'BUILTIN\Windows Authorization Access Group'
SID = 'S-1-5-32-560'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-561' = [PSCustomObject] @{
Name = 'BUILTIN\Terminal Server License Servers'
SID = 'S-1-5-32-561'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-562' = [PSCustomObject] @{
Name = 'BUILTIN\Distributed COM Users'
SID = 'S-1-5-32-562'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-568' = [PSCustomObject] @{
Name = 'BUILTIN\IIS_IUSRS'
SID = 'S-1-5-32-568'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-569' = [PSCustomObject] @{
Name = 'BUILTIN\Cryptographic Operators'
SID = 'S-1-5-32-569'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-573' = [PSCustomObject] @{
Name = 'BUILTIN\Event Log Readers'
SID = 'S-1-5-32-573'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-574' = [PSCustomObject] @{
Name = 'BUILTIN\Certificate Service DCOM Access'
SID = 'S-1-5-32-574'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-575' = [PSCustomObject] @{
Name = 'BUILTIN\RDS Remote Access Servers'
SID = 'S-1-5-32-575'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-576' = [PSCustomObject] @{
Name = 'BUILTIN\RDS Endpoint Servers'
SID = 'S-1-5-32-576'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-577' = [PSCustomObject] @{
Name = 'BUILTIN\RDS Management Servers'
SID = 'S-1-5-32-577'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-578' = [PSCustomObject] @{
Name = 'BUILTIN\Hyper-V Administrators'
SID = 'S-1-5-32-578'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-579' = [PSCustomObject] @{
Name = 'BUILTIN\Access Control Assistance Operators'
SID = 'S-1-5-32-579'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-32-580' = [PSCustomObject] @{
Name = 'BUILTIN\Remote Management Users'
SID = 'S-1-5-32-580'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-90-0' = [PSCustomObject] @{
Name = 'Window Manager\Window Manager Group'
SID = 'S-1-5-90-0'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-80-3139157870-2983391045-3678747466-658725712-1809340420' = [PSCustomObject] @{
Name = 'NT SERVICE\WdiServiceHost'
SID = 'S-1-5-80-3139157870-2983391045-3678747466-658725712-1809340420'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-80-3880718306-3832830129-1677859214-2598158968-1052248003' = [PSCustomObject] @{
Name = 'NT SERVICE\MSSQLSERVER'
SID = 'S-1-5-80-3139157870-2983391045-3678747466-658725712-1809340420'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-80-344959196-2060754871-2302487193-2804545603-1466107430' = [PSCustomObject] @{
Name = 'NT SERVICE\SQLSERVERAGENT'
SID = 'S-1-5-80-344959196-2060754871-2302487193-2804545603-1466107430'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-80-2652535364-2169709536-2857650723-2622804123-1107741775' = [PSCustomObject] @{
Name = 'NT SERVICE\SQLTELEMETRY'
SID = 'S-1-5-80-2652535364-2169709536-2857650723-2622804123-1107741775'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-80-3245704983-3664226991-764670653-2504430226-901976451' = [PSCustomObject] @{
Name = 'NT SERVICE\ADSync'
SID = 'S-1-5-80-3245704983-3664226991-764670653-2504430226-901976451'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'S-1-5-80-4215458991-2034252225-2287069555-1155419622-2701885083' = [PSCustomObject] @{
Name = 'NT Service\himds'
SID = 'S-1-5-80-4215458991-2034252225-2287069555-1155419622-2701885083'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
}
foreach ($S in $SID) {
if ($OnlyWellKnownAdministrative) {
if ($WellKnownAdministrative[$S]) {
$WellKnownAdministrative[$S]
}
} elseif ($OnlyWellKnown) {
if ($wellKnownSIDs[$S]) {
$wellKnownSIDs[$S]
}
} else {
if ($wellKnownSIDs[$S]) {
$wellKnownSIDs[$S]
} else {
if ($DoNotResolve) {
if ($S -like "S-1-5-21-*-519" -or $S -like "S-1-5-21-*-512" -or $S -like "S-1-5-21-*-518") {
[PSCustomObject] @{
Name = $S
SID = $S
DomainName = ''
Type = 'Administrative'
Error = ''
}
} else {
[PSCustomObject] @{
Name = $S
SID = $S
DomainName = ''
Error = ''
Type = 'NotAdministrative'
}
}
} else {
if (-not $Script:LocalComputerSID) {
$Script:LocalComputerSID = Get-LocalComputerSid
}
try {
if ($S.Length -le 18) {
$Type = 'NotAdministrative'
$Name = (([System.Security.Principal.SecurityIdentifier]::new($S)).Translate([System.Security.Principal.NTAccount])).Value
[PSCustomObject] @{
Name = $Name
SID = $S
DomainName = ''
Type = $Type
Error = ''
}
} else {
if ($S -like "S-1-5-21-*-519" -or $S -like "S-1-5-21-*-512" -or $S -like "S-1-5-21-*-518") {
$Type = 'Administrative'
} else {
$Type = 'NotAdministrative'
}
$Name = (([System.Security.Principal.SecurityIdentifier]::new($S)).Translate([System.Security.Principal.NTAccount])).Value
[PSCustomObject] @{
Name = $Name
SID = $S
DomainName = if ($S -like "$Script:LocalComputerSID*") {
''
} else {
(ConvertFrom-NetbiosName -Identity $Name).DomainName
}
Type = $Type
Error = ''
}
}
} catch {
[PSCustomObject] @{
Name = $S
SID = $S
DomainName = ''
Error = $_.Exception.Message -replace [environment]::NewLine, ' '
Type = 'Unknown'
}
}
}
}
}
}
}
function Convert-Identity {
<#
.SYNOPSIS
Small command that tries to resolve any given object
.DESCRIPTION
Small command that tries to resolve any given object - be it SID, DN, FSP or Netbiosname
.PARAMETER Identity
Type to resolve in form of Identity, DN, SID
.PARAMETER SID
Allows to pass SID directly, rather then going thru verification process
.PARAMETER Name
Allows to pass Name directly, rather then going thru verification process
.PARAMETER Force
Allows to clear cache, useful when you want to force refresh
.EXAMPLE
$Identity = @(
'S-1-5-4'
'S-1-5-4'
'S-1-5-11'
'S-1-5-32-549'
'S-1-5-32-550'
'S-1-5-32-548'
'S-1-5-64-10'
'S-1-5-64-14'
'S-1-5-64-21'
'S-1-5-18'
'S-1-5-19'
'S-1-5-32-544'
'S-1-5-20-20-10-51' # Wrong SID
'S-1-5-21-853615985-2870445339-3163598659-512'
'S-1-5-21-3661168273-3802070955-2987026695-512'
'S-1-5-21-1928204107-2710010574-1926425344-512'
'CN=Test Test 2,OU=Users,OU=Production,DC=ad,DC=evotec,DC=pl'
'Test Local Group'
'[email protected]'
'test2'
'NT AUTHORITY\NETWORK'
'NT AUTHORITY\SYSTEM'
'S-1-5-21-853615985-2870445339-3163598659-519'
'TEST\some'
'EVOTECPL\Domain Admins'
'NT AUTHORITY\INTERACTIVE'
'INTERACTIVE'
'EVOTEC\Domain Admins'
'EVOTECPL\Domain Admins'
'Test\Domain Admins'
'CN=S-1-5-21-1928204107-2710010574-1926425344-512,CN=ForeignSecurityPrincipals,DC=ad,DC=evotec,DC=xyz' # Valid
'CN=S-1-5-21-1928204107-2710010574-512,CN=ForeignSecurityPrincipals,DC=ad,DC=evotec,DC=xyz' # not valid
'CN=S-1-5-21-1928204107-2710010574-1926425344-512,CN=ForeignSecurityPrincipals,DC=ad,DC=evotec,DC=xyz' # cached
)
$TestOutput = Convert-Identity -Identity $Identity -Verbose
Output:
Name SID DomainName Type Error
---- --- ---------- ---- -----
NT AUTHORITY\INTERACTIVE S-1-5-4 WellKnownGroup
NT AUTHORITY\INTERACTIVE S-1-5-4 WellKnownGroup
NT AUTHORITY\Authenticated Users S-1-5-11 WellKnownGroup
BUILTIN\Server Operators S-1-5-32-549 WellKnownGroup
BUILTIN\Print Operators S-1-5-32-550 WellKnownGroup
BUILTIN\Account Operators S-1-5-32-548 WellKnownGroup
NT AUTHORITY\NTLM Authentication S-1-5-64-10 WellKnownGroup
NT AUTHORITY\SChannel Authentication S-1-5-64-14 WellKnownGroup
NT AUTHORITY\Digest Authentication S-1-5-64-21 WellKnownGroup
NT AUTHORITY\SYSTEM S-1-5-18 WellKnownAdministrative
NT AUTHORITY\NETWORK SERVICE S-1-5-19 WellKnownGroup
BUILTIN\Administrators S-1-5-32-544 WellKnownAdministrative
S-1-5-20-20-10-51 S-1-5-20-20-10-51 Unknown Exception calling "Translate" with "1" argument(s): "Some or all identity references could not be translated."
EVOTEC\Domain Admins S-1-5-21-853615985-2870445339-3163598659-512 ad.evotec.xyz Administrative
EVOTECPL\Domain Admins S-1-5-21-3661168273-3802070955-2987026695-512 ad.evotec.pl Administrative
TEST\Domain Admins S-1-5-21-1928204107-2710010574-1926425344-512 test.evotec.pl Administrative
EVOTECPL\TestingAD S-1-5-21-3661168273-3802070955-2987026695-1111 ad.evotec.pl NotAdministrative
EVOTEC\Test Local Group S-1-5-21-853615985-2870445339-3163598659-3610 ad.evotec.xyz NotAdministrative
EVOTEC\przemyslaw.klys S-1-5-21-853615985-2870445339-3163598659-1105 ad.evotec.xyz NotAdministrative
test2 Unknown Exception calling "Translate" with "1" argument(s): "Some or all identity references could not be translated."
NT AUTHORITY\NETWORK S-1-5-2 WellKnownGroup
NT AUTHORITY\SYSTEM S-1-5-18 WellKnownAdministrative
EVOTEC\Enterprise Admins S-1-5-21-853615985-2870445339-3163598659-519 ad.evotec.xyz Administrative
TEST\some S-1-5-21-1928204107-2710010574-1926425344-1106 test.evotec.pl NotAdministrative
EVOTECPL\Domain Admins S-1-5-21-3661168273-3802070955-2987026695-512 ad.evotec.pl Administrative
NT AUTHORITY\INTERACTIVE S-1-5-4 WellKnownGroup
NT AUTHORITY\INTERACTIVE S-1-5-4 WellKnownGroup
EVOTEC\Domain Admins S-1-5-21-853615985-2870445339-3163598659-512 ad.evotec.xyz Administrative
EVOTECPL\Domain Admins S-1-5-21-3661168273-3802070955-2987026695-512 ad.evotec.pl Administrative
TEST\Domain Admins S-1-5-21-1928204107-2710010574-1926425344-512 test.evotec.pl Administrative
TEST\Domain Admins S-1-5-21-1928204107-2710010574-1926425344-512 test.evotec.pl Administrative
S-1-5-21-1928204107-2710010574-512 S-1-5-21-1928204107-2710010574-512 Unknown Exception calling "Translate" with "1" argument(s): "Some or all identity references could not be translated."
TEST\Domain Admins S-1-5-21-1928204107-2710010574-1926425344-512 test.evotec.pl Administrative
.NOTES
General notes
#>
[cmdletBinding(DefaultParameterSetName = 'Identity')]
param(
[parameter(ParameterSetName = 'Identity', Position = 0, ValueFromPipeline, ValueFromPipelineByPropertyName)][string[]] $Identity,
[parameter(ParameterSetName = 'SID', Mandatory)][System.Security.Principal.SecurityIdentifier[]] $SID,
[parameter(ParameterSetName = 'Name', Mandatory)][string[]] $Name,
[switch] $Force
)
Begin {
if (-not $Script:GlobalCacheSidConvert -or $Force) {
$Script:GlobalCacheSidConvert = @{
'NT AUTHORITY\SYSTEM' = [PSCustomObject] @{
Name = 'BUILTIN\Administrators'
SID = 'S-1-5-18'
DomainName = ''
Type = 'WellKnownAdministrative'
Error = ''
}
'BUILTIN\Administrators' = [PSCustomObject] @{
Name = 'BUILTIN\Administrators'
SID = 'S-1-5-32-544'
DomainName = ''
Type = 'WellKnownAdministrative'
Error = ''
}
'BUILTIN\Users' = [PSCustomObject] @{
Name = 'BUILTIN\Users'
SID = 'S-1-5-32-545'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Guests' = [PSCustomObject] @{
Name = 'BUILTIN\Guests'
SID = 'S-1-5-32-546'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Power Users' = [PSCustomObject] @{
Name = 'BUILTIN\Power Users'
SID = 'S-1-5-32-547'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Account Operators' = [PSCustomObject] @{
Name = 'BUILTIN\Account Operators'
SID = 'S-1-5-32-548'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Server Operators' = [PSCustomObject] @{
Name = 'BUILTIN\Server Operators'
SID = 'S-1-5-32-549'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Print Operators' = [PSCustomObject] @{
Name = 'BUILTIN\Print Operators'
SID = 'S-1-5-32-550'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Backup Operators' = [PSCustomObject] @{
Name = 'BUILTIN\Backup Operators'
SID = 'S-1-5-32-551'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Replicator' = [PSCustomObject] @{
Name = 'BUILTIN\Replicators'
SID = 'S-1-5-32-552'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Pre-Windows 2000 Compatible Access' = [PSCustomObject] @{
Name = 'BUILTIN\Pre-Windows 2000 Compatible Access'
SID = 'S-1-5-32-554'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Remote Desktop Users' = [PSCustomObject] @{
Name = 'BUILTIN\Remote Desktop Users'
SID = 'S-1-5-32-555'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Network Configuration Operators' = [PSCustomObject] @{
Name = 'BUILTIN\Network Configuration Operators'
SID = 'S-1-5-32-556'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Incoming Forest Trust Builders' = [PSCustomObject] @{
Name = 'BUILTIN\Incoming Forest Trust Builders'
SID = 'S-1-5-32-557'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Performance Monitor Users' = [PSCustomObject] @{
Name = 'BUILTIN\Performance Monitor Users'
SID = 'S-1-5-32-558'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Performance Log Users' = [PSCustomObject] @{
Name = 'BUILTIN\Performance Log Users'
SID = 'S-1-5-32-559'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Windows Authorization Access Group' = [PSCustomObject] @{
Name = 'BUILTIN\Windows Authorization Access Group'
SID = 'S-1-5-32-560'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Terminal Server License Servers' = [PSCustomObject] @{
Name = 'BUILTIN\Terminal Server License Servers'
SID = 'S-1-5-32-561'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Distributed COM Users' = [PSCustomObject] @{
Name = 'BUILTIN\Distributed COM Users'
SID = 'S-1-5-32-562'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\IIS_IUSRS' = [PSCustomObject] @{
Name = 'BUILTIN\IIS_IUSRS'
SID = 'S-1-5-32-568'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Cryptographic Operators' = [PSCustomObject] @{
Name = 'BUILTIN\Cryptographic Operators'
SID = 'S-1-5-32-569'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Event Log Readers' = [PSCustomObject] @{
Name = 'BUILTIN\Event Log Readers'
SID = 'S-1-5-32-573'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Certificate Service DCOM Access' = [PSCustomObject] @{
Name = 'BUILTIN\Certificate Service DCOM Access'
SID = 'S-1-5-32-574'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\RDS Remote Access Servers' = [PSCustomObject] @{
Name = 'BUILTIN\RDS Remote Access Servers'
SID = 'S-1-5-32-575'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\RDS Endpoint Servers' = [PSCustomObject] @{
Name = 'BUILTIN\RDS Endpoint Servers'
SID = 'S-1-5-32-576'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\RDS Management Servers' = [PSCustomObject] @{
Name = 'BUILTIN\RDS Management Servers'
SID = 'S-1-5-32-577'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Hyper-V Administrators' = [PSCustomObject] @{
Name = 'BUILTIN\Hyper-V Administrators'
SID = 'S-1-5-32-578'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Access Control Assistance Operators' = [PSCustomObject] @{
Name = 'BUILTIN\Access Control Assistance Operators'
SID = 'S-1-5-32-579'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'BUILTIN\Remote Management Users' = [PSCustomObject] @{
Name = 'BUILTIN\Remote Management Users'
SID = 'S-1-5-32-580'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'Window Manager\Window Manager Group' = [PSCustomObject] @{
Name = 'Window Manager\Window Manager Group'
SID = 'S-1-5-90-0'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'NT SERVICE\WdiServiceHost' = [PSCustomObject] @{
Name = 'NT SERVICE\WdiServiceHost'
SID = 'S-1-5-80-3139157870-2983391045-3678747466-658725712-1809340420'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'NT SERVICE\MSSQLSERVER' = [PSCustomObject] @{
Name = 'NT SERVICE\MSSQLSERVER'
SID = 'S-1-5-80-3880718306-3832830129-1677859214-2598158968-1052248003'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'NT SERVICE\SQLSERVERAGENT' = [PSCustomObject] @{
Name = 'NT SERVICE\SQLSERVERAGENT'
SID = 'S-1-5-80-344959196-2060754871-2302487193-2804545603-1466107430'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'NT SERVICE\SQLTELEMETRY' = [PSCustomObject] @{
Name = 'NT SERVICE\SQLTELEMETRY'
SID = 'S-1-5-80-2652535364-2169709536-2857650723-2622804123-1107741775'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'NT SERVICE\ADSync' = [PSCustomObject] @{
Name = 'NT SERVICE\ADSync'
SID = 'S-1-5-80-3245704983-3664226991-764670653-2504430226-901976451'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
'NT Service\himds' = [PSCustomObject] @{
Name = 'NT Service\himds'
SID = 'S-1-5-80-4215458991-2034252225-2287069555-1155419622-2701885083'
DomainName = ''
Type = 'WellKnownGroup'
Error = ''
}
}
}
}
Process {
if ($Identity) {
foreach ($Ident in $Identity) {
$MatchRegex = [Regex]::Matches($Ident, "S-\d-\d+-(\d+-|){1,14}\d+")
if ($Script:GlobalCacheSidConvert[$Ident]) {
Write-Verbose "Convert-Identity - Processing $Ident (Cache)"
$Script:GlobalCacheSidConvert[$Ident]
} elseif ($MatchRegex.Success) {
Write-Verbose "Convert-Identity - Processing $Ident (SID)"
if ($MatchRegex.Value -ne $Ident) {
$Script:GlobalCacheSidConvert[$Ident] = ConvertFrom-SID -SID $MatchRegex.Value
} else {
$Script:GlobalCacheSidConvert[$Ident] = ConvertFrom-SID -SID $Ident
}
$Script:GlobalCacheSidConvert[$Ident]
} elseif ($Ident -like '*DC=*') {
Write-Verbose "Convert-Identity - Processing $Ident (DistinguishedName)"
try {
$Object = [adsi]"LDAP://$($Ident)"
$SIDValue = [System.Security.Principal.SecurityIdentifier]::new($Object.objectSid.Value, 0).Value
$Script:GlobalCacheSidConvert[$Ident] = ConvertFrom-SID -SID $SIDValue
} catch {
$Script:GlobalCacheSidConvert[$Ident] = [PSCustomObject] @{
Name = $Ident
SID = $null
DomainName = ''
Type = 'Unknown'
Error = $_.Exception.Message -replace [environment]::NewLine, ' '
}
}
$Script:GlobalCacheSidConvert[$Ident]
} else {
Write-Verbose "Convert-Identity - Processing $Ident (Other)"
try {
$SIDValue = ([System.Security.Principal.NTAccount] $Ident).Translate([System.Security.Principal.SecurityIdentifier]).Value
$Script:GlobalCacheSidConvert[$Ident] = ConvertFrom-SID -SID $SIDValue
} catch {
$Script:GlobalCacheSidConvert[$Ident] = [PSCustomObject] @{
Name = $Ident
SID = $null
DomainName = ''
Type = 'Unknown'
Error = $_.Exception.Message -replace [environment]::NewLine, ' '
}
}
$Script:GlobalCacheSidConvert[$Ident]
}
}
} else {
if ($SID) {
foreach ($S in $SID) {
if ($Script:GlobalCacheSidConvert[$S]) {
$Script:GlobalCacheSidConvert[$S]
} else {
$Script:GlobalCacheSidConvert[$S] = ConvertFrom-SID -SID $S
$Script:GlobalCacheSidConvert[$S]
}
}
} else {
foreach ($Ident in $Name) {
if ($Script:GlobalCacheSidConvert[$Ident]) {
$Script:GlobalCacheSidConvert[$Ident]
} else {
$Script:GlobalCacheSidConvert[$Ident] = ([System.Security.Principal.NTAccount] $Ident).Translate([System.Security.Principal.SecurityIdentifier]).Value
$Script:GlobalCacheSidConvert[$Ident]
}
}
}
}
}
End {
}
}
function Convert-TimeToDays {
<#
.SYNOPSIS
Converts the time span between two dates into the number of days.
.DESCRIPTION
This function calculates the number of days between two given dates. It allows for flexibility in handling different date formats and provides an option to ignore specific dates.
.PARAMETER StartTime
Specifies the start date and time of the time span.
.PARAMETER EndTime
Specifies the end date and time of the time span.
.PARAMETER Ignore
Specifies a pattern to ignore specific dates. Default is '*1601*'.
.EXAMPLE
Convert-TimeToDays -StartTime (Get-Date).AddDays(-5) -EndTime (Get-Date)
# Calculates the number of days between 5 days ago and today.
.EXAMPLE
Convert-TimeToDays -StartTime '2022-01-01' -EndTime '2022-01-10' -Ignore '*2022*'
# Calculates the number of days between January 1, 2022, and January 10, 2022, ignoring any dates containing '2022'.
#>
[CmdletBinding()]
param (
$StartTime,
$EndTime,
#[nullable[DateTime]] $StartTime, # can't use this just yet, some old code uses strings in StartTime/EndTime.
#[nullable[DateTime]] $EndTime, # After that's fixed will change this.
[string] $Ignore = '*1601*'
)
if ($null -ne $StartTime -and $null -ne $EndTime) {
try {
if ($StartTime -notlike $Ignore -and $EndTime -notlike $Ignore) {
$Days = (New-TimeSpan -Start $StartTime -End $EndTime).Days
}
} catch {
}
} elseif ($null -ne $EndTime) {
if ($StartTime -notlike $Ignore -and $EndTime -notlike $Ignore) {
$Days = (New-TimeSpan -Start (Get-Date) -End ($EndTime)).Days
}
} elseif ($null -ne $StartTime) {
if ($StartTime -notlike $Ignore -and $EndTime -notlike $Ignore) {
$Days = (New-TimeSpan -Start $StartTime -End (Get-Date)).Days
}
}
return $Days
}
function Convert-ToDateTime {
<#
.SYNOPSIS
Converts a file time string to a DateTime object.
.DESCRIPTION
This function converts a file time string to a DateTime object. It handles the conversion and provides flexibility to ignore specific file time strings.
.PARAMETER Timestring
Specifies the file time string to convert to a DateTime object.
.PARAMETER Ignore
Specifies a pattern to ignore specific file time strings. Default is '*1601*'.
.EXAMPLE
Convert-ToDateTime -Timestring '132479040000000000'
# Converts the file time string '132479040000000000' to a DateTime object.
.EXAMPLE
Convert-ToDateTime -Timestring '132479040000000000' -Ignore '*1601*'
# Converts the file time string '132479040000000000' to a DateTime object, ignoring any file time strings containing '1601'.
#>
[CmdletBinding()]
param (
[string] $Timestring,
[string] $Ignore = '*1601*'
)
Try {
$DateTime = ([datetime]::FromFileTime($Timestring))
} catch {
$DateTime = $null
}
if ($null -eq $DateTime -or $Timestring -like $Ignore) {
return $null
} else {
return $DateTime
}
}
function ConvertTo-DistinguishedName {
<#
.SYNOPSIS
Converts CanonicalName to DistinguishedName
.DESCRIPTION
Converts CanonicalName to DistinguishedName for 3 different options
.PARAMETER CanonicalName
One or multiple canonical names
.PARAMETER ToOU
Converts CanonicalName to OrganizationalUnit DistinguishedName
.PARAMETER ToObject
Converts CanonicalName to Full Object DistinguishedName
.PARAMETER ToDomain
Converts CanonicalName to Domain DistinguishedName
.EXAMPLE
$CanonicalObjects = @(
'ad.evotec.xyz/Production/Groups/Security/ITR03_AD Admins'
'ad.evotec.xyz/Production/Accounts/Special/SADM Testing 2'
)
$CanonicalOU = @(
'ad.evotec.xyz/Production/Groups/Security/NetworkAdministration'
'ad.evotec.xyz/Production'
)
$CanonicalDomain = @(
'ad.evotec.xyz/Production/Groups/Security/ITR03_AD Admins'
'ad.evotec.pl'
'ad.evotec.xyz'
'test.evotec.pl'
'ad.evotec.xyz/Production'
)
$CanonicalObjects | ConvertTo-DistinguishedName -ToObject
$CanonicalOU | ConvertTo-DistinguishedName -ToOU
$CanonicalDomain | ConvertTo-DistinguishedName -ToDomain
Output:
CN=ITR03_AD Admins,OU=Security,OU=Groups,OU=Production,DC=ad,DC=evotec,DC=xyz
CN=SADM Testing 2,OU=Special,OU=Accounts,OU=Production,DC=ad,DC=evotec,DC=xyz
Output2:
OU=NetworkAdministration,OU=Security,OU=Groups,OU=Production,DC=ad,DC=evotec,DC=xyz
OU=Production,DC=ad,DC=evotec,DC=xyz
Output3:
DC=ad,DC=evotec,DC=xyz
DC=ad,DC=evotec,DC=pl
DC=ad,DC=evotec,DC=xyz
DC=test,DC=evotec,DC=pl
DC=ad,DC=evotec,DC=xyz
.NOTES
General notes
#>
[cmdletBinding(DefaultParameterSetName = 'ToDomain')]
param(
[Parameter(ParameterSetName = 'ToOU')]
[Parameter(ParameterSetName = 'ToObject')]
[Parameter(ParameterSetName = 'ToDomain')]
[alias('Identity', 'CN')][Parameter(ValueFromPipeline, Mandatory, ValueFromPipelineByPropertyName, Position = 0)][string[]] $CanonicalName,
[Parameter(ParameterSetName = 'ToOU')][switch] $ToOU,
[Parameter(ParameterSetName = 'ToObject')][switch] $ToObject,
[Parameter(ParameterSetName = 'ToDomain')][switch] $ToDomain
)
Process {
foreach ($CN in $CanonicalName) {
if ($ToObject) {
$ADObject = $CN.Replace(',', '\,').Split('/')
[string]$DN = "CN=" + $ADObject[$ADObject.count - 1]
for ($i = $ADObject.count - 2; $i -ge 1; $i--) {
$DN += ",OU=" + $ADObject[$i]
}
$ADObject[0].split(".") | ForEach-Object {
$DN += ",DC=" + $_
}
} elseif ($ToOU) {
$ADObject = $CN.Replace(',', '\,').Split('/')
[string]$DN = "OU=" + $ADObject[$ADObject.count - 1]
for ($i = $ADObject.count - 2; $i -ge 1; $i--) {
$DN += ",OU=" + $ADObject[$i]
}
$ADObject[0].split(".") | ForEach-Object {
$DN += ",DC=" + $_
}
} else {
$ADObject = $CN.Replace(',', '\,').Split('/')
$DN = 'DC=' + $ADObject[0].Replace('.', ',DC=')
}
$DN
}
}
}
function ConvertTo-OperatingSystem {
<#
.SYNOPSIS
Allows easy conversion of OperatingSystem, Operating System Version to proper Windows 10 naming based on WMI or AD
.DESCRIPTION
Allows easy conversion of OperatingSystem, Operating System Version to proper Windows 10 naming based on WMI or AD
.PARAMETER OperatingSystem
Operating System as returned by Active Directory
.PARAMETER OperatingSystemVersion
Operating System Version as returned by Active Directory
.EXAMPLE
$Computers = Get-ADComputer -Filter * -Properties OperatingSystem, OperatingSystemVersion | ForEach-Object {
$OPS = ConvertTo-OperatingSystem -OperatingSystem $_.OperatingSystem -OperatingSystemVersion $_.OperatingSystemVersion
Add-Member -MemberType NoteProperty -Name 'OperatingSystemTranslated' -Value $OPS -InputObject $_ -Force
$_
}
$Computers | Select-Object DNS*, Name, SamAccountName, Enabled, OperatingSystem*, DistinguishedName | Format-Table
.EXAMPLE
$Registry = Get-PSRegistry -ComputerName 'AD1' -RegistryPath 'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion'
ConvertTo-OperatingSystem -OperatingSystem $Registry.ProductName -OperatingSystemVersion $Registry.CurrentBuildNumber
.NOTES
General notes
#>
[CmdletBinding()]
param(
[string] $OperatingSystem,
[string] $OperatingSystemVersion
)
if ($OperatingSystem -like 'Windows 10*' -or $OperatingSystem -like 'Windows 11*') {
$Systems = @{
'10.0 (22621)' = 'Windows 11 22H2'
'10.0 (22000)' = 'Windows 11 21H2'
'10.0 (19045)' = 'Windows 10 22H2'
'10.0 (19044)' = 'Windows 10 21H2'
'10.0 (19043)' = 'Windows 10 21H1'
'10.0 (19042)' = 'Windows 10 20H2'
'10.0 (19041)' = 'Windows 10 2004'
'10.0 (18898)' = 'Windows 10 Insider Preview'
'10.0 (18363)' = "Windows 10 1909"
'10.0 (18362)' = "Windows 10 1903"
'10.0 (17763)' = "Windows 10 1809"
'10.0 (17134)' = "Windows 10 1803"
'10.0 (16299)' = "Windows 10 1709"
'10.0 (15063)' = "Windows 10 1703"
'10.0 (14393)' = "Windows 10 1607"
'10.0 (10586)' = "Windows 10 1511"
'10.0 (10240)' = "Windows 10 1507"
'10.0.22621' = 'Windows 11 22H2'
'10.0.22000' = 'Windows 11 21H2'
'10.0.19045' = 'Windows 10 22H2'
'10.0.19044' = 'Windows 10 21H2'
'10.0.19043' = 'Windows 10 21H1'
'10.0.19042' = 'Windows 10 20H2'
'10.0.19041' = 'Windows 10 2004'
'10.0.18898' = 'Windows 10 Insider Preview'
'10.0.18363' = "Windows 10 1909"
'10.0.18362' = "Windows 10 1903"
'10.0.17763' = "Windows 10 1809"
'10.0.17134' = "Windows 10 1803"
'10.0.16299' = "Windows 10 1709"
'10.0.15063' = "Windows 10 1703"
'10.0.14393' = "Windows 10 1607"
'10.0.10586' = "Windows 10 1511"
'10.0.10240' = "Windows 10 1507"
'22621' = 'Windows 11 22H2'
'22000' = 'Windows 11 21H2'
'19045' = 'Windows 10 22H2'
'19044' = 'Windows 10 21H2'
'19043' = 'Windows 10 21H1'
'19042' = 'Windows 10 20H2'
'19041' = 'Windows 10 2004'
'18898' = 'Windows 10 Insider Preview'
'18363' = "Windows 10 1909"
'18362' = "Windows 10 1903"
'17763' = "Windows 10 1809"
'17134' = "Windows 10 1803"
'16299' = "Windows 10 1709"
'15063' = "Windows 10 1703"
'14393' = "Windows 10 1607"
'10586' = "Windows 10 1511"
'10240' = "Windows 10 1507"
}
$System = $Systems[$OperatingSystemVersion]
if (-not $System) {
$System = $OperatingSystemVersion
}
} elseif ($OperatingSystem -like 'Windows Server*') {
$Systems = @{
'10.0 (20348)' = 'Windows Server 2022'
'10.0 (19042)' = 'Windows Server 2019 20H2'
'10.0 (19041)' = 'Windows Server 2019 2004'
'10.0 (18363)' = 'Windows Server 2019 1909'
'10.0 (18362)' = "Windows Server 2019 1903"
'10.0 (17763)' = "Windows Server 2019 1809"
'10.0 (17134)' = "Windows Server 2016 1803"
'10.0 (14393)' = "Windows Server 2016 1607"
'6.3 (9600)' = 'Windows Server 2012 R2'
'6.1 (7601)' = 'Windows Server 2008 R2'
'5.2 (3790)' = 'Windows Server 2003'
'10.0.20348' = 'Windows Server 2022'
'10.0.19042' = 'Windows Server 2019 20H2'
'10.0.19041' = 'Windows Server 2019 2004'
'10.0.18363' = 'Windows Server 2019 1909'
'10.0.18362' = "Windows Server 2019 1903"
'10.0.17763' = "Windows Server 2019 1809"
'10.0.17134' = "Windows Server 2016 1803"
'10.0.14393' = "Windows Server 2016 1607"
'6.3.9600' = 'Windows Server 2012 R2'
'6.1.7601' = 'Windows Server 2008 R2'
'5.2.3790' = 'Windows Server 2003'
'20348' = 'Windows Server 2022'
'19042' = 'Windows Server 2019 20H2'
'19041' = 'Windows Server 2019 2004'
'18363' = 'Windows Server 2019 1909'
'18362' = "Windows Server 2019 1903"
'17763' = "Windows Server 2019 1809"
'17134' = "Windows Server 2016 1803"
'14393' = "Windows Server 2016 1607"
'9600' = 'Windows Server 2012 R2'
'7601' = 'Windows Server 2008 R2'
'3790' = 'Windows Server 2003'
}
$System = $Systems[$OperatingSystemVersion]
if (-not $System) {
$System = $OperatingSystemVersion
}
} else {
$System = $OperatingSystem
}
if ($System) {
$System
} else {
'Unknown'
}
}
function Convert-UserAccountControl {
<#
.SYNOPSIS
Converts the UserAccountControl flags to their corresponding names.
.DESCRIPTION
This function takes a UserAccountControl value and converts it into a human-readable format by matching the flags to their corresponding names.
.PARAMETER UserAccountControl
Specifies the UserAccountControl value to be converted.
.PARAMETER Separator
Specifies the separator to use when joining the converted flags. If not provided, the flags will be returned as a list.
.EXAMPLE
Convert-UserAccountControl -UserAccountControl 66048
Outputs: "DONT_EXPIRE_PASSWORD, PASSWORD_EXPIRED"
.EXAMPLE
Convert-UserAccountControl -UserAccountControl 512 -Separator ', '
Outputs: "NORMAL_ACCOUNT"
#>
[cmdletBinding()]
param(
[alias('UAC')][int] $UserAccountControl,
[string] $Separator
)
$UserAccount = [ordered] @{
"SCRIPT" = 1
"ACCOUNTDISABLE" = 2
"HOMEDIR_REQUIRED" = 8
"LOCKOUT" = 16
"PASSWD_NOTREQD" = 32
"ENCRYPTED_TEXT_PWD_ALLOWED" = 128
"TEMP_DUPLICATE_ACCOUNT" = 256
"NORMAL_ACCOUNT" = 512
"INTERDOMAIN_TRUST_ACCOUNT" = 2048
"WORKSTATION_TRUST_ACCOUNT" = 4096
"SERVER_TRUST_ACCOUNT" = 8192
"DONT_EXPIRE_PASSWORD" = 65536
"MNS_LOGON_ACCOUNT" = 131072
"SMARTCARD_REQUIRED" = 262144
"TRUSTED_FOR_DELEGATION" = 524288
"NOT_DELEGATED" = 1048576
"USE_DES_KEY_ONLY" = 2097152
"DONT_REQ_PREAUTH" = 4194304
"PASSWORD_EXPIRED" = 8388608
"TRUSTED_TO_AUTH_FOR_DELEGATION" = 16777216
"PARTIAL_SECRETS_ACCOUNT" = 67108864
}
$Output = foreach ($_ in $UserAccount.Keys) {
$binaryAnd = $UserAccount[$_] -band $UserAccountControl
if ($binaryAnd -ne "0") {
$_
}
}
if ($Separator) {
$Output -join $Separator
} else {
$Output
}
}
function Copy-Dictionary {
<#
.SYNOPSIS
Copies dictionary/hashtable
.DESCRIPTION
Copies dictionary uusing PS Serializer. Replaces usage of BinnaryFormatter due to no support in PS 7.4
.PARAMETER Dictionary
Dictionary to copy
.EXAMPLE
$Test = [ordered] @{
Test = 'Test'
Test1 = @{
Test2 = 'Test2'
Test3 = @{
Test4 = 'Test4'
}
}
Test2 = @(
"1", "2", "3"
)
Test3 = [PSCustomObject] @{
Test4 = 'Test4'
Test5 = 'Test5'
}
}
$New1 = Copy-Dictionary -Dictionary $Test
$New1
.NOTES
#>
[alias('Copy-Hashtable', 'Copy-OrderedHashtable')]
[cmdletbinding()]
param(
[System.Collections.IDictionary] $Dictionary
)
$clone = [System.Management.Automation.PSSerializer]::Serialize($Dictionary, [int32]::MaxValue)
return [System.Management.Automation.PSSerializer]::Deserialize($clone)
}
function Get-ADADministrativeGroups {
<#
.SYNOPSIS
Retrieves administrative groups information from Active Directory.
.DESCRIPTION
This function retrieves information about administrative groups in Active Directory based on the specified parameters.
.PARAMETER Type
Specifies the type of administrative groups to retrieve. Valid values are 'DomainAdmins' and 'EnterpriseAdmins'.
.PARAMETER Forest
Specifies the name of the forest to query for administrative groups.
.PARAMETER ExcludeDomains
Specifies an array of domains to exclude from the query.
.PARAMETER IncludeDomains
Specifies an array of domains to include in the query.
.PARAMETER ExtendedForestInformation
Specifies additional information about the forest to include in the query.
.EXAMPLE
Get-ADADministrativeGroups -Type DomainAdmins, EnterpriseAdmins
Output (Where VALUE is Get-ADGroup output):
Name Value
---- -----
ByNetBIOS {EVOTEC\Domain Admins, EVOTEC\Enterprise Admins, EVOTECPL\Domain Admins}
ad.evotec.xyz {DomainAdmins, EnterpriseAdmins}
ad.evotec.pl {DomainAdmins}
.NOTES
This function requires Active Directory module to be installed on the system.
#>
[cmdletBinding()]
param(
[parameter(Mandatory)][validateSet('DomainAdmins', 'EnterpriseAdmins')][string[]] $Type,
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ADDictionary = [ordered] @{ }
$ADDictionary['ByNetBIOS'] = [ordered] @{ }
$ADDictionary['BySID'] = [ordered] @{ }
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
foreach ($Domain in $ForestInformation.Domains) {
$ADDictionary[$Domain] = [ordered] @{ }
$QueryServer = $ForestInformation['QueryServers'][$Domain]['HostName'][0]
$DomainInformation = Get-ADDomain -Server $QueryServer
if ($Type -contains 'DomainAdmins') {
Get-ADGroup -Filter "SID -eq '$($DomainInformation.DomainSID)-512'" -Server $QueryServer -ErrorAction SilentlyContinue | ForEach-Object {
$ADDictionary['ByNetBIOS']["$($DomainInformation.NetBIOSName)\$($_.Name)"] = $_
$ADDictionary[$Domain]['DomainAdmins'] = "$($DomainInformation.NetBIOSName)\$($_.Name)"
$ADDictionary['BySID'][$_.SID.Value] = $_
}
}
}
foreach ($Domain in $ForestInformation.Forest.Domains) {
if (-not $ADDictionary[$Domain]) {
$ADDictionary[$Domain] = [ordered] @{ }
}
if ($Type -contains 'EnterpriseAdmins') {
$QueryServer = $ForestInformation['QueryServers'][$Domain]['HostName'][0]
$DomainInformation = Get-ADDomain -Server $QueryServer
Get-ADGroup -Filter "SID -eq '$($DomainInformation.DomainSID)-519'" -Server $QueryServer -ErrorAction SilentlyContinue | ForEach-Object {
$ADDictionary['ByNetBIOS']["$($DomainInformation.NetBIOSName)\$($_.Name)"] = $_
$ADDictionary[$Domain]['EnterpriseAdmins'] = "$($DomainInformation.NetBIOSName)\$($_.Name)"
$ADDictionary['BySID'][$_.SID.Value] = $_
}
}
}
return $ADDictionary
}
function Get-ADEncryptionTypes {
<#
.SYNOPSIS
Retrieves the supported encryption types based on the specified value.
.DESCRIPTION
This function returns the list of encryption types supported by Active Directory based on the provided value. Each encryption type is represented by a string.
.PARAMETER Value
Specifies the integer value representing the encryption types to retrieve.
.EXAMPLE
Get-ADEncryptionTypes -Value 24
Retrieves the following encryption types:
- AES128-CTS-HMAC-SHA1-96
- AES256-CTS-HMAC-SHA1-96
.NOTES
This function is designed to provide information about encryption types supported by Active Directory.
#>
[cmdletbinding()]
Param(
[parameter(Mandatory = $false, ValueFromPipeline = $True)][int32]$Value
)
[String[]]$EncryptionTypes = @(
Foreach ($V in $Value) {
if ([int32]$V -band 0x00000001) {
"DES-CBC-CRC"
}
if ([int32]$V -band 0x00000002) {
"DES-CBC-MD5"
}
if ([int32]$V -band 0x00000004) {
"RC4-HMAC"
}
if ([int32]$V -band 0x00000008) {
"AES128-CTS-HMAC-SHA1-96"
}
if ([int32]$V -band 0x00000010) {
"AES256-CTS-HMAC-SHA1-96"
}
if ([int32]$V -band 0x00000020) {
"FAST-supported"
}
if ([int32]$V -band 0x00000040) {
"Compound-identity-supported"
}
if ([int32]$V -band 0x00000080) {
"Claims-supported"
}
if ([int32]$V -band 0x00000200) {
"Resource-SID-compression-disabled"
}
}
)
$EncryptionTypes
}
function Get-ADTrustAttributes {
<#
.SYNOPSIS
Retrieves and interprets Active Directory trust attributes based on the provided value.
.DESCRIPTION
This function retrieves and interprets Active Directory trust attributes based on the provided value. It decodes the binary value into human-readable trust attributes.
.PARAMETER Value
Specifies the integer value representing the trust attributes.
.EXAMPLE
Get-ADTrustAttributes -Value 1
Retrieves and interprets the trust attributes for the value 1.
.EXAMPLE
1, 2, 4 | Get-ADTrustAttributes
Retrieves and interprets the trust attributes for the values 1, 2, and 4.
.NOTES
This function provides a convenient way to decode Active Directory trust attributes.
#>
[cmdletbinding()]
Param(
[parameter(Mandatory = $false, ValueFromPipeline = $True)][int32]$Value
)
[String[]]$TrustAttributes = @(
Foreach ($V in $Value) {
if ([int32]$V -band 0x00000001) {
"Non Transitive"
}
if ([int32]$V -band 0x00000002) {
"UpLevel Only"
}
if ([int32]$V -band 0x00000004) {
"Quarantined Domain"
}
if ([int32]$V -band 0x00000008) {
"Forest Transitive"
}
if ([int32]$V -band 0x00000010) {
"Cross Organization"
}
if ([int32]$V -band 0x00000020) {
"Within Forest"
}
if ([int32]$V -band 0x00000040) {
"Treat as External"
}
if ([int32]$V -band 0x00000080) {
"Uses RC4 Encryption"
}
if ([int32]$V -band 0x00000200) {
"No TGT DELEGATION"
}
if ([int32]$V -band 0x00000800) {
"Enable TGT DELEGATION"
}
if ([int32]$V -band 0x00000400) {
"PIM Trust"
}
}
)
return $TrustAttributes
}
function Get-CimData {
<#
.SYNOPSIS
Helper function for retreiving CIM data from local and remote computers
.DESCRIPTION
Helper function for retreiving CIM data from local and remote computers
.PARAMETER ComputerName
Specifies computer on which you want to run the CIM operation. You can specify a fully qualified domain name (FQDN), a NetBIOS name, or an IP address. If you do not specify this parameter, the cmdlet performs the operation on the local computer using Component Object Model (COM).
.PARAMETER Protocol
Specifies the protocol to use. The acceptable values for this parametDer are: DCOM, Default, or Wsman.
.PARAMETER Class
Specifies the name of the CIM class for which to retrieve the CIM instances. You can use tab completion to browse the list of classes, because PowerShell gets a list of classes from the local WMI server to provide a list of class names.
.PARAMETER Properties
Specifies a set of instance properties to retrieve. Use this parameter when you need to reduce the size of the object returned, either in memory or over the network. The object returned also contains the key properties even if you have not listed them using the Property parameter. Other properties of the class are present but they are not populated.
.PARAMETER NameSpace
Specifies the namespace for the CIM operation. The default namespace is root\cimv2. You can use tab completion to browse the list of namespaces, because PowerShell gets a list of namespaces from the local WMI server to provide a list of namespaces.
.PARAMETER Credential
Specifies a user account that has permission to perform this action. The default is the current user.
.EXAMPLE
Get-CimData -Class 'win32_bios' -ComputerName AD1,EVOWIN
.EXAMPLE
Get-CimData -Class 'win32_bios'
.EXAMPLE
Get-CimClass to get all classes
.NOTES
General notes
#>
[CmdletBinding()]
param(
[parameter(Mandatory)][string] $Class,
[string] $NameSpace = 'root\cimv2',
[string[]] $ComputerName = $Env:COMPUTERNAME,
[ValidateSet('Default', 'Dcom', 'Wsman')][string] $Protocol = 'Default',
[pscredential] $Credential,
[string[]] $Properties = '*'
)
$ExcludeProperties = 'CimClass', 'CimInstanceProperties', 'CimSystemProperties', 'SystemCreationClassName', 'CreationClassName'
[Array] $ComputersSplit = Get-ComputerSplit -ComputerName $ComputerName
$CimObject = @(
[string[]] $PropertiesOnly = $Properties | Where-Object { $_ -ne 'PSComputerName' }
$Computers = $ComputersSplit[1]
if ($Computers.Count -gt 0) {
if ($Protocol -eq 'Default' -and $null -eq $Credential) {
Get-CimInstance -ClassName $Class -ComputerName $Computers -ErrorAction SilentlyContinue -Property $PropertiesOnly -Namespace $NameSpace -Verbose:$false -ErrorVariable ErrorsToProcess | Select-Object -Property $Properties -ExcludeProperty $ExcludeProperties
} else {
$Option = New-CimSessionOption -Protocol $Protocol
$newCimSessionSplat = @{
ComputerName = $Computers
SessionOption = $Option
ErrorAction = 'SilentlyContinue'
}
if ($Credential) {
$newCimSessionSplat['Credential'] = $Credential
}
$Session = New-CimSession @newCimSessionSplat -Verbose:$false
if ($Session) {
Try {
$Info = Get-CimInstance -ClassName $Class -CimSession $Session -ErrorAction Stop -Property $PropertiesOnly -Namespace $NameSpace -Verbose:$false -ErrorVariable ErrorsToProcess | Select-Object -Property $Properties -ExcludeProperty $ExcludeProperties
} catch {
Write-Warning -Message "Get-CimData - No data for computer $($E.OriginInfo.PSComputerName). Failed with errror: $($E.Exception.Message)"
}
try {
$null = Remove-CimSession -CimSession $Session -ErrorAction SilentlyContinue
} catch {
Write-Warning -Message "Get-CimData - Failed to remove CimSession $($Session). Failed with errror: $($E.Exception.Message)"
}
$Info
} else {
Write-Warning -Message "Get-CimData - Failed to create CimSession for $($Computers). Problem with credentials?"
}
}
foreach ($E in $ErrorsToProcess) {
Write-Warning -Message "Get-CimData - No data for computer $($E.OriginInfo.PSComputerName). Failed with errror: $($E.Exception.Message)"
}
} else {
$Computers = $ComputersSplit[0]
if ($Computers.Count -gt 0) {
$Info = Get-CimInstance -ClassName $Class -ErrorAction SilentlyContinue -Property $PropertiesOnly -Namespace $NameSpace -Verbose:$false -ErrorVariable ErrorsLocal | Select-Object -Property $Properties -ExcludeProperty $ExcludeProperties
$Info | Add-Member -Name 'PSComputerName' -Value $Computers -MemberType NoteProperty -Force
$Info
}
foreach ($E in $ErrorsLocal) {
Write-Warning -Message "Get-CimData - No data for computer $($Env:COMPUTERNAME). Failed with errror: $($E.Exception.Message)"
}
}
)
$CimObject
}
function Get-FileName {
<#
.SYNOPSIS
Generates a temporary file name with the specified extension.
.DESCRIPTION
This function generates a temporary file name based on the provided extension. It can generate a temporary file name in the system's temporary folder or just the file name itself.
.PARAMETER Extension
Specifies the extension for the temporary file name. Default is 'tmp'.
.PARAMETER Temporary
Indicates whether to generate a temporary file name in the system's temporary folder.
.PARAMETER TemporaryFileOnly
Indicates whether to generate only the temporary file name without the path.
.EXAMPLE
Get-FileName -Temporary
Generates a temporary file name in the system's temporary folder. Example output: 3ymsxvav.tmp
.EXAMPLE
Get-FileName -Temporary
Generates a temporary file name without the path. Example output: tmpD74C.tmp
.EXAMPLE
Get-FileName -Temporary -Extension 'xlsx'
Generates a temporary file name with the specified extension in the system's temporary folder. Example output: tmp45B6.xlsx
.NOTES
These examples demonstrate how to use the Get-FileName function to generate temporary file names.
#>
[CmdletBinding()]
param(
[string] $Extension = 'tmp',
[switch] $Temporary,
[switch] $TemporaryFileOnly
)
if ($Temporary) {
return [io.path]::Combine([System.IO.Path]::GetTempPath(), "$($([System.IO.Path]::GetRandomFileName()).Split('.')[0]).$Extension")
}
if ($TemporaryFileOnly) {
return "$($([System.IO.Path]::GetRandomFileName()).Split('.')[0]).$Extension"
}
}
function Get-FileOwner {
<#
.SYNOPSIS
Retrieves the owner of the specified file or folder.
.DESCRIPTION
This function retrieves the owner of the specified file or folder. It provides options to resolve the owner's identity and output the results as a hashtable or custom object.
.PARAMETER Path
Specifies the path to the file or folder.
.PARAMETER Recursive
Indicates whether to search for files recursively in subdirectories.
.PARAMETER JustPath
Specifies if only the path information should be returned.
.PARAMETER Resolve
Indicates whether to resolve the owner's identity.
.PARAMETER AsHashTable
Specifies if the output should be in hashtable format.
.EXAMPLE
Get-FileOwner -Path "C:\Example\File.txt"
Retrieves the owner of the specified file "File.txt".
.EXAMPLE
Get-FileOwner -Path "C:\Example" -Recursive
Retrieves the owners of all files in the "Example" directory and its subdirectories.
.EXAMPLE
Get-FileOwner -Path "C:\Example\File.txt" -Resolve
Retrieves the owner of the specified file "File.txt" and resolves the owner's identity.
.EXAMPLE
Get-FileOwner -Path "C:\Example\File.txt" -AsHashTable
Retrieves the owner of the specified file "File.txt" and outputs the result as a hashtable.
#>
[cmdletBinding()]
param(
[Array] $Path,
[switch] $Recursive,
[switch] $JustPath,
[switch] $Resolve,
[switch] $AsHashTable
)
Begin {
}
Process {
foreach ($P in $Path) {
if ($P -is [System.IO.FileSystemInfo]) {
$FullPath = $P.FullName
} elseif ($P -is [string]) {
$FullPath = $P
}
if ($FullPath -and (Test-Path -Path $FullPath)) {
if ($JustPath) {
$FullPath | ForEach-Object -Process {
$ACL = Get-Acl -Path $_
$Object = [ordered]@{
FullName = $_
Owner = $ACL.Owner
}
if ($Resolve) {
$Identity = Convert-Identity -Identity $ACL.Owner
if ($Identity) {
$Object['OwnerName'] = $Identity.Name
$Object['OwnerSid'] = $Identity.SID
$Object['OwnerType'] = $Identity.Type
} else {
$Object['OwnerName'] = ''
$Object['OwnerSid'] = ''
$Object['OwnerType'] = ''
}
}
if ($AsHashTable) {
$Object
} else {
[PSCustomObject] $Object
}
}
} else {
Get-ChildItem -LiteralPath $FullPath -Recurse:$Recursive -Force | ForEach-Object -Process {
$File = $_
$ACL = Get-Acl -Path $File.FullName
$Object = [ordered] @{
FullName = $_.FullName
Extension = $_.Extension
CreationTime = $_.CreationTime
LastAccessTime = $_.LastAccessTime
LastWriteTime = $_.LastWriteTime
Attributes = $_.Attributes
Owner = $ACL.Owner
}
if ($Resolve) {
$Identity = Convert-Identity -Identity $ACL.Owner
if ($Identity) {
$Object['OwnerName'] = $Identity.Name
$Object['OwnerSid'] = $Identity.SID
$Object['OwnerType'] = $Identity.Type
} else {
$Object['OwnerName'] = ''
$Object['OwnerSid'] = ''
$Object['OwnerType'] = ''
}
}
if ($AsHashTable) {
$Object
} else {
[PSCustomObject] $Object
}
}
}
}
}
}
End {
}
}
function Get-FilePermission {
<#
.SYNOPSIS
Retrieves and displays file permissions for the specified file or folder.
.DESCRIPTION
This function retrieves and displays the file permissions for the specified file or folder. It provides options to filter permissions based on inheritance, resolve access control types, and include extended information.
.EXAMPLE
Get-FilePermission -Path "C:\Example\File.txt"
Description:
Retrieves and displays the permissions for the "File.txt" file.
.EXAMPLE
Get-FilePermission -Path "D:\Folder" -Inherited
Description:
Retrieves and displays only the inherited permissions for the "Folder" directory.
.EXAMPLE
Get-FilePermission -Path "E:\Document.docx" -ResolveTypes -Extended
Description:
Retrieves and displays the resolved access control types and extended information for the "Document.docx" file.
.NOTES
This function supports various options to customize the output and handle different permission scenarios.
#>
[alias('Get-PSPermissions', 'Get-FilePermissions')]
[cmdletBinding()]
param(
[Array] $Path,
[switch] $Inherited,
[switch] $NotInherited,
[switch] $ResolveTypes,
[switch] $Extended,
[switch] $IncludeACLObject,
[switch] $AsHashTable,
[System.Security.AccessControl.FileSystemSecurity] $ACLS
)
foreach ($P in $Path) {
if ($P -is [System.IO.FileSystemInfo]) {
$FullPath = $P.FullName
} elseif ($P -is [string]) {
$FullPath = $P
}
$TestPath = Test-Path -Path $FullPath
if ($TestPath) {
if (-not $ACLS) {
try {
$ACLS = (Get-Acl -Path $FullPath -ErrorAction Stop)
} catch {
Write-Warning -Message "Get-FilePermission - Can't access $FullPath. Error $($_.Exception.Message)"
continue
}
}
$Output = foreach ($ACL in $ACLS.Access) {
if ($Inherited) {
if ($ACL.IsInherited -eq $false) {
continue
}
}
if ($NotInherited) {
if ($ACL.IsInherited -eq $true) {
continue
}
}
$TranslateRights = Convert-GenericRightsToFileSystemRights -OriginalRights $ACL.FileSystemRights
$ReturnObject = [ordered] @{ }
$ReturnObject['Path' ] = $FullPath
$ReturnObject['AccessControlType'] = $ACL.AccessControlType
if ($ResolveTypes) {
$Identity = Convert-Identity -Identity $ACL.IdentityReference
if ($Identity) {
$ReturnObject['Principal'] = $ACL.IdentityReference
$ReturnObject['PrincipalName'] = $Identity.Name
$ReturnObject['PrincipalSid'] = $Identity.Sid
$ReturnObject['PrincipalType'] = $Identity.Type
} else {
$ReturnObject['Principal'] = $Identity
$ReturnObject['PrincipalName'] = ''
$ReturnObject['PrincipalSid'] = ''
$ReturnObject['PrincipalType'] = ''
}
} else {
$ReturnObject['Principal'] = $ACL.IdentityReference.Value
}
$ReturnObject['FileSystemRights'] = $TranslateRights
$ReturnObject['IsInherited'] = $ACL.IsInherited
if ($Extended) {
$ReturnObject['InheritanceFlags'] = $ACL.InheritanceFlags
$ReturnObject['PropagationFlags'] = $ACL.PropagationFlags
}
if ($IncludeACLObject) {
$ReturnObject['ACL'] = $ACL
$ReturnObject['AllACL'] = $ACLS
}
if ($AsHashTable) {
$ReturnObject
} else {
[PSCustomObject] $ReturnObject
}
}
$Output
} else {
Write-Warning "Get-PSPermissions - Path $Path doesn't exists. Skipping."
}
}
}
function Get-GitHubLatestRelease {
<#
.SYNOPSIS
Gets one or more releases from GitHub repository
.DESCRIPTION
Gets one or more releases from GitHub repository
.PARAMETER Url
Url to github repository
.EXAMPLE
Get-GitHubLatestRelease -Url "https://api.github.com/repos/evotecit/Testimo/releases" | Format-Table
.NOTES
General notes
#>
[CmdLetBinding()]
param(
[parameter(Mandatory)][alias('ReleasesUrl')][uri] $Url
)
$ProgressPreference = 'SilentlyContinue'
$Responds = Test-Connection -ComputerName $URl.Host -Quiet -Count 1
if ($Responds) {
Try {
[Array] $JsonOutput = (Invoke-WebRequest -Uri $Url -ErrorAction Stop | ConvertFrom-Json)
foreach ($JsonContent in $JsonOutput) {
[PSCustomObject] @{
PublishDate = [DateTime] $JsonContent.published_at
CreatedDate = [DateTime] $JsonContent.created_at
PreRelease = [bool] $JsonContent.prerelease
Version = [version] ($JsonContent.name -replace 'v', '')
Tag = $JsonContent.tag_name
Branch = $JsonContent.target_commitish
Errors = ''
}
}
} catch {
[PSCustomObject] @{
PublishDate = $null
CreatedDate = $null
PreRelease = $null
Version = $null
Tag = $null
Branch = $null
Errors = $_.Exception.Message
}
}
} else {
[PSCustomObject] @{
PublishDate = $null
CreatedDate = $null
PreRelease = $null
Version = $null
Tag = $null
Branch = $null
Errors = "No connection (ping) to $($Url.Host)"
}
}
$ProgressPreference = 'Continue'
}
function Get-IPAddressRangeInformation {
<#
.SYNOPSIS
Provides information about IP Address range
.DESCRIPTION
Provides information about IP Address range
.PARAMETER Network
Network in form of IP/NetworkLength (e.g. 10.2.10.0/24')
.PARAMETER IPAddress
IP Address to use
.PARAMETER NetworkLength
Network length to use
.PARAMETER CIDRObject
CIDRObject to use
.EXAMPLE
$CidrObject = @{
Ip = '10.2.10.0'
NetworkLength = 24
}
Get-IPAddressRangeInformation -CIDRObject $CidrObject | Format-Table
.EXAMPLE
Get-IPAddressRangeInformation -Network '10.2.10.0/24' | Format-Table
.EXAMPLE
Get-IPAddressRangeInformation -IPAddress '10.2.10.0' -NetworkLength 24 | Format-Table
.NOTES
General notes
#>
[cmdletBinding(DefaultParameterSetName = 'Network')]
param(
[Parameter(ParameterSetName = 'Network', Mandatory)][string] $Network,
[Parameter(ParameterSetName = 'IPAddress', Mandatory)][string] $IPAddress,
[Parameter(ParameterSetName = 'IPAddress', Mandatory)][int] $NetworkLength,
[Parameter(ParameterSetName = 'CIDR', Mandatory)][psobject] $CIDRObject
)
$IPv4Regex = '(?:(?:0?0?\d|0?[1-9]\d|1\d\d|2[0-5][0-5]|2[0-4]\d)\.){3}(?:0?0?\d|0?[1-9]\d|1\d\d|2[0-5][0-5]|2[0-4]\d)'
if ($Network) {
$CIDRObject = @{
Ip = $Network.Split('/')[0]
NetworkLength = $Network.Split('/')[1]
}
} elseif ($IPAddress -and $NetworkLength) {
$CIDRObject = @{
Ip = $IPAddress
NetworkLength = $NetworkLength
}
} elseif ($CIDRObject) {
} else {
Write-Error "Get-IPAddressRangeInformation - Invalid parameters specified"
return
}
$o = [ordered] @{}
$o.IP = [string] $CIDRObject.IP
$o.BinaryIP = Convert-IPToBinary $o.IP
if (-not $o.BinaryIP) {
return
}
$o.NetworkLength = [int32] $CIDRObject.NetworkLength
$o.SubnetMask = Convert-BinaryToIP ('1' * $o.NetworkLength).PadRight(32, '0')
$o.BinarySubnetMask = ('1' * $o.NetworkLength).PadRight(32, '0')
$o.BinaryNetworkAddress = $o.BinaryIP.SubString(0, $o.NetworkLength).PadRight(32, '0')
if ($Contains) {
if ($Contains -match "\A${IPv4Regex}\z") {
return Test-IPIsInNetwork $Contains $o.BinaryNetworkAddress $o.BinaryNetworkAddress.SubString(0, $o.NetworkLength).PadRight(32, '1')
} else {
Write-Error "Get-IPAddressRangeInformation - Invalid IPv4 address specified with -Contains"
return
}
}
$o.NetworkAddress = Convert-BinaryToIP $o.BinaryNetworkAddress
if ($o.NetworkLength -eq 32 -or $o.NetworkLength -eq 31) {
$o.HostMin = $o.IP
} else {
$o.HostMin = Convert-BinaryToIP ([System.Convert]::ToString(([System.Convert]::ToInt64($o.BinaryNetworkAddress, 2) + 1), 2)).PadLeft(32, '0')
}
[string] $BinaryBroadcastIP = $o.BinaryNetworkAddress.SubString(0, $o.NetworkLength).PadRight(32, '1')
$o.BinaryBroadcast = $BinaryBroadcastIP
[int64] $DecimalHostMax = [System.Convert]::ToInt64($BinaryBroadcastIP, 2) - 1
[string] $BinaryHostMax = [System.Convert]::ToString($DecimalHostMax, 2).PadLeft(32, '0')
$o.HostMax = Convert-BinaryToIP $BinaryHostMax
$o.TotalHosts = [int64][System.Convert]::ToString(([System.Convert]::ToInt64($BinaryBroadcastIP, 2) - [System.Convert]::ToInt64($o.BinaryNetworkAddress, 2) + 1))
$o.UsableHosts = $o.TotalHosts - 2
if ($o.NetworkLength -eq 32) {
$o.Broadcast = $Null
$o.UsableHosts = [int64] 1
$o.TotalHosts = [int64] 1
$o.HostMax = $o.IP
} elseif ($o.NetworkLength -eq 31) {
$o.Broadcast = $Null
$o.UsableHosts = [int64] 2
$o.TotalHosts = [int64] 2
[int64] $DecimalHostMax2 = [System.Convert]::ToInt64($BinaryBroadcastIP, 2)
[string] $BinaryHostMax2 = [System.Convert]::ToString($DecimalHostMax2, 2).PadLeft(32, '0')
$o.HostMax = Convert-BinaryToIP $BinaryHostMax2
} elseif ($o.NetworkLength -eq 30) {
$o.UsableHosts = [int64] 2
$o.TotalHosts = [int64] 4
$o.Broadcast = Convert-BinaryToIP $BinaryBroadcastIP
} else {
$o.Broadcast = Convert-BinaryToIP $BinaryBroadcastIP
}
if ($Enumerate) {
$IPRange = @(Get-IPRange $o.BinaryNetworkAddress $o.BinaryNetworkAddress.SubString(0, $o.NetworkLength).PadRight(32, '1'))
if ((31, 32) -notcontains $o.NetworkLength ) {
$IPRange = $IPRange[1..($IPRange.Count - 1)]
$IPRange = $IPRange[0..($IPRange.Count - 2)]
}
$o.IPEnumerated = $IPRange
} else {
$o.IPEnumerated = @()
}
[PSCustomObject]$o
}
function Get-ProtocolDefaults {
<#
.SYNOPSIS
Gets a list of default settings for SSL/TLS protocols
.DESCRIPTION
Gets a list of default settings for SSL/TLS protocols
.PARAMETER WindowsVersion
Windows Version to search for
.PARAMETER AsList
If true, returns a list of protocol names for all Windows Versions, otherwise returns a single entry for the specified Windows Version
.EXAMPLE
Get-ProtocolDefaults -AsList | Format-Table
.EXAMPLE
Get-ProtocolDefaults -WindowsVersion 'Windows 10 1809' | Format-Table
.NOTES
Based on: https://docs.microsoft.com/en-us/windows/win32/secauthn/protocols-in-tls-ssl--schannel-ssp-
According to this https://github.com/MicrosoftDocs/windowsserverdocs/issues/2783 SCHANNEL service requires direct enablement so the list is kind of half useful
#>
[cmdletbinding(DefaultParameterSetName = 'WindowsVersion')]
param(
[Parameter(Mandatory, ParameterSetName = 'WindowsVersion')][string] $WindowsVersion,
[Parameter(Mandatory, ParameterSetName = 'AsList')][switch] $AsList
)
$Defaults = [ordered] @{
'Windows Server 2022' = [ordered] @{
'Version' = 'Windows Server 2022'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Enabled'
'TLS13Server' = 'Enabled'
}
'Windows Server 2019 20H2' = [ordered] @{
'Version' = 'Windows Server 2019 20H2'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
'Windows Server 2019 2004' = [ordered] @{
'Version' = 'Windows Server 2019 2004'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
'Windows Server 2019 1909' = [ordered] @{
'Version' = 'Windows Server 2019 1909'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
"Windows Server 2019 1903" = [ordered] @{
'Version' = 'Windows Server 2019 1903'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
"Windows Server 2019 1809" = [ordered] @{
'Version' = 'Windows Server 2019 1809'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
"Windows Server 2016 1803" = [ordered] @{
'Version' = 'Windows Server 2016 1803'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
"Windows Server 2016 1607" = [ordered] @{
'Version' = 'Windows Server 2019 1607'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
'Windows Server 2012 R2' = [ordered] @{
'Version' = 'Windows Server 2012 R2'
'PCT10' = 'Not supported'
'SSL2Client' = 'Disabled'
'SSL2Server' = 'Disabled'
'SSL3Client' = 'Enabled'
'SSL3Server' = 'Enabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
'Windows Server 2012' = [ordered] @{
'Version' = 'Windows Server 2012'
'PCT10' = 'Not supported'
'SSL2Client' = 'Disabled'
'SSL2Server' = 'Disabled'
'SSL3Client' = 'Enabled'
'SSL3Server' = 'Enabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
'Windows Server 2008 R2' = [ordered] @{
'Version' = 'Windows Server 2008 R2'
'PCT10' = 'Not supported'
'SSL2Client' = 'Disabled'
'SSL2Server' = 'Enabled'
'SSL3Client' = 'Enabled'
'SSL3Server' = 'Enabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Disabled'
'TLS11Server' = 'Disabled'
'TLS12Client' = 'Disabled'
'TLS12Server' = 'Disabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
'Windows Server 2008' = [ordered] @{
'Version' = 'Windows Server 2008'
'PCT10' = 'Not supported'
'SSL2Client' = 'Disabled'
'SSL2Server' = 'Enabled'
'SSL3Client' = 'Enabled'
'SSL3Server' = 'Enabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Disabled'
'TLS11Server' = 'Disabled'
'TLS12Client' = 'Disabled'
'TLS12Server' = 'Disabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
'Windows 11 21H2' = [ordered] @{
'Version' = 'Windows 11 21H2'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Enabled'
'TLS13Server' = 'Enabled'
}
'Windows 10 21H1' = [ordered] @{
'Version' = 'Windows 10 21H1'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
'Windows 10 20H2' = [ordered] @{
'Version' = 'Windows 10 20H2'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
'Windows 10 2004' = [ordered] @{
'Version' = 'Windows 10 2004'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
'Windows 10 Insider Preview' = [ordered] @{
'Version' = 'Windows 10 Insider Preview'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
"Windows 10 1909" = [ordered] @{
'Version' = 'Windows 10 1909'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
"Windows 10 1903" = [ordered] @{
'Version' = 'Windows 10 1903'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
"Windows 10 1809" = [ordered] @{
'Version' = 'Windows 10 1809'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
"Windows 10 1803" = [ordered] @{
'Version' = 'Windows 10 1803'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
"Windows 10 1709" = [ordered] @{
'Version' = 'Windows 10 1709'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
"Windows 10 1703" = [ordered] @{
'Version' = 'Windows 10 1703'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
"Windows 10 1607" = [ordered] @{
'Version' = 'Windows 10 1607'
'PCT10' = 'Not supported'
'SSL2Client' = 'Not supported'
'SSL2Server' = 'Not supported'
'SSL3Client' = 'Disabled'
'SSL3Server' = 'Disabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
"Windows 10 1511" = [ordered] @{
'Version' = 'Windows 10 1511'
'PCT10' = 'Not supported'
'SSL2Client' = 'Disabled'
'SSL2Server' = 'Disabled'
'SSL3Client' = 'Enabled'
'SSL3Server' = 'Enabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
"Windows 10 1507" = [ordered] @{
'Version' = 'Windows 10 1507'
'PCT10' = 'Not supported'
'SSL2Client' = 'Disabled'
'SSL2Server' = 'Disabled'
'SSL3Client' = 'Enabled'
'SSL3Server' = 'Enabled'
'TLS10Client' = 'Enabled'
'TLS10Server' = 'Enabled'
'TLS11Client' = 'Enabled'
'TLS11Server' = 'Enabled'
'TLS12Client' = 'Enabled'
'TLS12Server' = 'Enabled'
'TLS13Client' = 'Not supported'
'TLS13Server' = 'Not supported'
}
}
if ($AsList) {
foreach ($Key in $Defaults.Keys) {
[PSCustomObject] $Defaults[$Key]
}
} else {
if ($Defaults[$WindowsVersion]) {
$Defaults[$WindowsVersion]
} else {
[ordered] @{
'Version' = 'Unknown'
'PCT10' = 'Unknown'
'SSL2Client' = 'Unknown'
'SSL2Server' = 'Unknown'
'SSL3Client' = 'Unknown'
'SSL3Server' = 'Unknown'
'TLS10Client' = 'Unknown'
'TLS10Server' = 'Unknown'
'TLS11Client' = 'Unknown'
'TLS11Server' = 'Unknown'
'TLS12Client' = 'Unknown'
'TLS12Server' = 'Unknown'
'TLS13Client' = 'Unknown'
'TLS13Server' = 'Unknown'
}
}
}
}
function Get-PSRegistry {
<#
.SYNOPSIS
Get registry key values.
.DESCRIPTION
Get registry key values.
.PARAMETER RegistryPath
The registry path to get the values from.
.PARAMETER ComputerName
The computer to get the values from. If not specified, the local computer is used.
.PARAMETER ExpandEnvironmentNames
Expand environment names in the registry value.
By default it doesn't do that. If you want to expand environment names, use this parameter.
.EXAMPLE
Get-PSRegistry -RegistryPath 'HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters' -ComputerName AD1
.EXAMPLE
Get-PSRegistry -RegistryPath 'HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters'
.EXAMPLE
Get-PSRegistry -RegistryPath "HKLM\SYSTEM\CurrentControlSet\Services\DFSR\Parameters" -ComputerName AD1,AD2,AD3 | ft -AutoSize
.EXAMPLE
Get-PSRegistry -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Directory Service'
.EXAMPLE
Get-PSRegistry -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Windows PowerShell' | Format-Table -AutoSize
.EXAMPLE
Get-PSRegistry -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Directory Service' -ComputerName AD1 -Advanced
.EXAMPLE
Get-PSRegistry -RegistryPath "HKLM:\Software\Microsoft\Powershell\1\Shellids\Microsoft.Powershell\"
.EXAMPLE
# Get default key and it's value
Get-PSRegistry -RegistryPath "HKEY_CURRENT_USER\Tests" -Key ""
.EXAMPLE
# Get default key and it's value (alternative)
Get-PSRegistry -RegistryPath "HKEY_CURRENT_USER\Tests" -DefaultKey
.NOTES
General notes
#>
[cmdletbinding()]
param(
[alias('Path')][string[]] $RegistryPath,
[string[]] $ComputerName = $Env:COMPUTERNAME,
[string] $Key,
[switch] $Advanced,
[switch] $DefaultKey,
[switch] $ExpandEnvironmentNames,
[Parameter(DontShow)][switch] $DoNotUnmount
)
$Script:CurrentGetCount++
Get-PSRegistryDictionaries
$RegistryPath = Resolve-PrivateRegistry -RegistryPath $RegistryPath
[Array] $Computers = Get-ComputerSplit -ComputerName $ComputerName
[Array] $RegistryTranslated = Get-PSConvertSpecialRegistry -RegistryPath $RegistryPath -Computers $ComputerName -HiveDictionary $Script:HiveDictionary -ExpandEnvironmentNames:$ExpandEnvironmentNames.IsPresent
if ($PSBoundParameters.ContainsKey("Key") -or $DefaultKey) {
[Array] $RegistryValues = Get-PSSubRegistryTranslated -RegistryPath $RegistryTranslated -HiveDictionary $Script:HiveDictionary -Key $Key
foreach ($Computer in $Computers[0]) {
foreach ($R in $RegistryValues) {
Get-PSSubRegistry -Registry $R -ComputerName $Computer -ExpandEnvironmentNames:$ExpandEnvironmentNames.IsPresent
}
}
foreach ($Computer in $Computers[1]) {
foreach ($R in $RegistryValues) {
Get-PSSubRegistry -Registry $R -ComputerName $Computer -Remote -ExpandEnvironmentNames:$ExpandEnvironmentNames.IsPresent
}
}
} else {
[Array] $RegistryValues = Get-PSSubRegistryTranslated -RegistryPath $RegistryTranslated -HiveDictionary $Script:HiveDictionary
foreach ($Computer in $Computers[0]) {
foreach ($R in $RegistryValues) {
Get-PSSubRegistryComplete -Registry $R -ComputerName $Computer -Advanced:$Advanced -ExpandEnvironmentNames:$ExpandEnvironmentNames.IsPresent
}
}
foreach ($Computer in $Computers[1]) {
foreach ($R in $RegistryValues) {
Get-PSSubRegistryComplete -Registry $R -ComputerName $Computer -Remote -Advanced:$Advanced -ExpandEnvironmentNames:$ExpandEnvironmentNames.IsPresent
}
}
}
$Script:CurrentGetCount--
if ($Script:CurrentGetCount -eq 0) {
if (-not $DoNotUnmount) {
Unregister-MountedRegistry
}
}
}
function Get-RandomStringName {
<#
.SYNOPSIS
Generates a random string of specified length with various options.
.DESCRIPTION
This function generates a random string of specified length with options to convert the case and include only letters.
.PARAMETER Size
The length of the random string to generate. Default is 31.
.PARAMETER ToLower
Convert the generated string to lowercase.
.PARAMETER ToUpper
Convert the generated string to uppercase.
.PARAMETER LettersOnly
Generate a random string with only letters.
.EXAMPLE
Get-RandomStringName -Size 10
Generates a random string of length 10.
.EXAMPLE
Get-RandomStringName -Size 8 -ToLower
Generates a random string of length 8 and converts it to lowercase.
.EXAMPLE
Get-RandomStringName -Size 12 -ToUpper
Generates a random string of length 12 and converts it to uppercase.
.EXAMPLE
Get-RandomStringName -Size 15 -LettersOnly
Generates a random string of length 15 with only letters.
#>
[cmdletbinding()]
param(
[int] $Size = 31,
[switch] $ToLower,
[switch] $ToUpper,
[switch] $LettersOnly
)
[string] $MyValue = @(
if ($LettersOnly) {
( -join ((1..$Size) | ForEach-Object { (65..90) + (97..122) | Get-Random } | ForEach-Object { [char]$_ }))
} else {
( -join ((48..57) + (97..122) | Get-Random -Count $Size | ForEach-Object { [char]$_ }))
}
)
if ($ToLower) {
return $MyValue.ToLower()
}
if ($ToUpper) {
return $MyValue.ToUpper()
}
return $MyValue
}
function Get-WinADForestControllers {
<#
.SYNOPSIS
Retrieves information about domain controllers in the specified domain(s).
.DESCRIPTION
This function retrieves detailed information about domain controllers in the specified domain(s), including hostname, IP addresses, roles, and other relevant details.
.PARAMETER TestAvailability
Specifies whether to test the availability of domain controllers.
.EXAMPLE
Get-WinADForestControllers -TestAvailability
Tests the availability of domain controllers in the forest.
.EXAMPLE
Get-WinADDomainControllers
Retrieves information about all domain controllers in the forest.
.EXAMPLE
Get-WinADDomainControllers -Credential $Credential
Retrieves information about all domain controllers in the forest using specified credentials.
.EXAMPLE
Get-WinADDomainControllers | Format-Table *
Displays detailed information about all domain controllers in a tabular format.
Output:
Domain HostName Forest IPV4Address IsGlobalCatalog IsReadOnly SchemaMaster DomainNamingMasterMaster PDCEmulator RIDMaster InfrastructureMaster Comment
------ -------- ------ ----------- --------------- ---------- ------------ ------------------------ ----------- --------- -------------------- -------
ad.evotec.xyz AD1.ad.evotec.xyz ad.evotec.xyz 192.168.240.189 True False True True True True True
ad.evotec.xyz AD2.ad.evotec.xyz ad.evotec.xyz 192.168.240.192 True False False False False False False
ad.evotec.pl ad.evotec.xyz False False False False False Unable to contact the server. This may be becau...
.NOTES
This function provides essential information about domain controllers in the forest.
#>
[alias('Get-WinADDomainControllers')]
[CmdletBinding()]
param(
[string[]] $Domain,
[switch] $TestAvailability,
[switch] $SkipEmpty,
[pscredential] $Credential
)
try {
if ($Credential) {
$Forest = Get-ADForest -Credential $Credential
} else {
$Forest = Get-ADForest
}
if (-not $Domain) {
$Domain = $Forest.Domains
}
} catch {
$ErrorMessage = $_.Exception.Message -replace "`n", " " -replace "`r", " "
Write-Warning "Get-WinADForestControllers - Couldn't use Get-ADForest feature. Error: $ErrorMessage"
return
}
$Servers = foreach ($D in $Domain) {
try {
$LocalServer = Get-ADDomainController -Discover -DomainName $D -ErrorAction Stop -Writable
if ($Credential) {
$DC = Get-ADDomainController -Server $LocalServer.HostName[0] -Credential $Credential -Filter * -ErrorAction Stop
} else {
$DC = Get-ADDomainController -Server $LocalServer.HostName[0] -Filter * -ErrorAction Stop
}
foreach ($S in $DC) {
$Server = [ordered] @{
Domain = $D
HostName = $S.HostName
Name = $S.Name
Forest = $Forest.RootDomain
IPV4Address = $S.IPV4Address
IPV6Address = $S.IPV6Address
IsGlobalCatalog = $S.IsGlobalCatalog
IsReadOnly = $S.IsReadOnly
Site = $S.Site
SchemaMaster = ($S.OperationMasterRoles -contains 'SchemaMaster')
DomainNamingMaster = ($S.OperationMasterRoles -contains 'DomainNamingMaster')
PDCEmulator = ($S.OperationMasterRoles -contains 'PDCEmulator')
RIDMaster = ($S.OperationMasterRoles -contains 'RIDMaster')
InfrastructureMaster = ($S.OperationMasterRoles -contains 'InfrastructureMaster')
LdapPort = $S.LdapPort
SslPort = $S.SslPort
Pingable = $null
Comment = ''
}
if ($TestAvailability) {
$Server['Pingable'] = foreach ($_ in $Server.IPV4Address) {
Test-Connection -Count 1 -Server $_ -Quiet -ErrorAction SilentlyContinue
}
}
[PSCustomObject] $Server
}
} catch {
[PSCustomObject]@{
Domain = $D
HostName = ''
Name = ''
Forest = $Forest.RootDomain
IPV4Address = ''
IPV6Address = ''
IsGlobalCatalog = ''
IsReadOnly = ''
Site = ''
SchemaMaster = $false
DomainNamingMasterMaster = $false
PDCEmulator = $false
RIDMaster = $false
InfrastructureMaster = $false
LdapPort = ''
SslPort = ''
Pingable = $null
Comment = $_.Exception.Message -replace "`n", " " -replace "`r", " "
}
}
}
if ($SkipEmpty) {
return $Servers | Where-Object { $_.HostName -ne '' }
}
return $Servers
}
function Get-WinADForestDetails {
<#
.SYNOPSIS
Get details about Active Directory Forest, Domains and Domain Controllers in a single query
.DESCRIPTION
Get details about Active Directory Forest, Domains and Domain Controllers in a single query
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExcludeDomains
Exclude domain from search, by default whole forest is scanned
.PARAMETER IncludeDomains
Include only specific domains, by default whole forest is scanned
.PARAMETER ExcludeDomainControllers
Exclude specific domain controllers, by default there are no exclusions, as long as VerifyDomainControllers switch is enabled. Otherwise this parameter is ignored.
.PARAMETER IncludeDomainControllers
Include only specific domain controllers, by default all domain controllers are included, as long as VerifyDomainControllers switch is enabled. Otherwise this parameter is ignored.
.PARAMETER SkipRODC
Skip Read-Only Domain Controllers. By default all domain controllers are included.
.PARAMETER ExtendedForestInformation
Ability to provide Forest Information from another command to speed up processing
.PARAMETER Filter
Filter for Get-ADDomainController
.PARAMETER TestAvailability
Check if Domain Controllers are available
.PARAMETER Test
Pick what to check for availability. Options are: All, Ping, WinRM, PortOpen, Ping+WinRM, Ping+PortOpen, WinRM+PortOpen. Default is All
.PARAMETER Ports
Ports to check for availability. Default is 135
.PARAMETER PortsTimeout
Ports timeout for availability check. Default is 100
.PARAMETER PingCount
How many pings to send. Default is 1
.PARAMETER PreferWritable
Prefer writable domain controllers over read-only ones when returning Query Servers
.PARAMETER Extended
Return extended information about domains with NETBIOS names
.EXAMPLE
Get-WinADForestDetails | Format-Table
.EXAMPLE
Get-WinADForestDetails -Forest 'ad.evotec.xyz' | Format-Table
.NOTES
General notes
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers', 'ComputerName')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[string] $Filter = '*',
[switch] $TestAvailability,
[ValidateSet('All', 'Ping', 'WinRM', 'PortOpen', 'Ping+WinRM', 'Ping+PortOpen', 'WinRM+PortOpen')] $Test = 'All',
[int[]] $Ports = 135,
[int] $PortsTimeout = 100,
[int] $PingCount = 1,
[switch] $PreferWritable,
[switch] $Extended,
[System.Collections.IDictionary] $ExtendedForestInformation
)
if ($Global:ProgressPreference -ne 'SilentlyContinue') {
$TemporaryProgress = $Global:ProgressPreference
$Global:ProgressPreference = 'SilentlyContinue'
}
if (-not $ExtendedForestInformation) {
$Findings = [ordered] @{ }
try {
if ($Forest) {
$ForestInformation = Get-ADForest -ErrorAction Stop -Identity $Forest
} else {
$ForestInformation = Get-ADForest -ErrorAction Stop
}
} catch {
Write-Warning "Get-WinADForestDetails - Error discovering DC for Forest - $($_.Exception.Message)"
return
}
if (-not $ForestInformation) {
return
}
$Findings['Forest'] = $ForestInformation
$Findings['ForestDomainControllers'] = @()
$Findings['QueryServers'] = @{ }
$Findings['DomainDomainControllers'] = @{ }
[Array] $Findings['Domains'] = foreach ($Domain in $ForestInformation.Domains) {
if ($IncludeDomains) {
if ($Domain -in $IncludeDomains) {
$Domain.ToLower()
}
continue
}
if ($Domain -notin $ExcludeDomains) {
$Domain.ToLower()
}
}
[Array] $DomainsActive = foreach ($Domain in $Findings['Forest'].Domains) {
try {
$DC = Get-ADDomainController -DomainName $Domain -Discover -ErrorAction Stop -Writable:$PreferWritable.IsPresent
$OrderedDC = [ordered] @{
Domain = $DC.Domain
Forest = $DC.Forest
HostName = [Array] $DC.HostName
IPv4Address = $DC.IPv4Address
IPv6Address = $DC.IPv6Address
Name = $DC.Name
Site = $DC.Site
}
} catch {
Write-Warning "Get-WinADForestDetails - Error discovering DC for domain $Domain - $($_.Exception.Message)"
continue
}
if ($Domain -eq $Findings['Forest']['Name']) {
$Findings['QueryServers']['Forest'] = $OrderedDC
}
$Findings['QueryServers']["$Domain"] = $OrderedDC
$Domain
}
[Array] $Findings['Domains'] = foreach ($Domain in $Findings['Domains']) {
if ($Domain -notin $DomainsActive) {
Write-Warning "Get-WinADForestDetails - Domain $Domain doesn't seem to be active (no DCs). Skipping."
continue
}
$Domain
}
[Array] $Findings['ForestDomainControllers'] = foreach ($Domain in $Findings.Domains) {
$QueryServer = $Findings['QueryServers'][$Domain]['HostName'][0]
[Array] $AllDC = try {
try {
$DomainControllers = Get-ADDomainController -Filter $Filter -Server $QueryServer -ErrorAction Stop
} catch {
Write-Warning "Get-WinADForestDetails - Error listing DCs for domain $Domain - $($_.Exception.Message)"
continue
}
foreach ($S in $DomainControllers) {
if ($IncludeDomainControllers.Count -gt 0) {
If (-not $IncludeDomainControllers[0].Contains('.')) {
if ($S.Name -notin $IncludeDomainControllers) {
continue
}
} else {
if ($S.HostName -notin $IncludeDomainControllers) {
continue
}
}
}
if ($ExcludeDomainControllers.Count -gt 0) {
If (-not $ExcludeDomainControllers[0].Contains('.')) {
if ($S.Name -in $ExcludeDomainControllers) {
continue
}
} else {
if ($S.HostName -in $ExcludeDomainControllers) {
continue
}
}
}
$DSAGuid = (Get-ADObject -Identity $S.NTDSSettingsObjectDN -Server $QueryServer).ObjectGUID
$Server = [ordered] @{
Domain = $Domain
HostName = $S.HostName
Name = $S.Name
Forest = $ForestInformation.RootDomain
Site = $S.Site
IPV4Address = $S.IPV4Address
IPV6Address = $S.IPV6Address
IsGlobalCatalog = $S.IsGlobalCatalog
IsReadOnly = $S.IsReadOnly
IsSchemaMaster = ($S.OperationMasterRoles -contains 'SchemaMaster')
IsDomainNamingMaster = ($S.OperationMasterRoles -contains 'DomainNamingMaster')
IsPDC = ($S.OperationMasterRoles -contains 'PDCEmulator')
IsRIDMaster = ($S.OperationMasterRoles -contains 'RIDMaster')
IsInfrastructureMaster = ($S.OperationMasterRoles -contains 'InfrastructureMaster')
OperatingSystem = $S.OperatingSystem
OperatingSystemVersion = $S.OperatingSystemVersion
OperatingSystemLong = ConvertTo-OperatingSystem -OperatingSystem $S.OperatingSystem -OperatingSystemVersion $S.OperatingSystemVersion
LdapPort = $S.LdapPort
SslPort = $S.SslPort
DistinguishedName = $S.ComputerObjectDN
NTDSSettingsObjectDN = $S.NTDSSettingsObjectDN
DsaGuid = $DSAGuid
DsaGuidName = "$DSAGuid._msdcs.$($ForestInformation.RootDomain)"
Pingable = $null
WinRM = $null
PortOpen = $null
Comment = ''
}
if ($TestAvailability) {
if ($Test -eq 'All' -or $Test -like 'Ping*') {
$Server.Pingable = Test-Connection -ComputerName $Server.IPV4Address -Quiet -Count $PingCount
}
if ($Test -eq 'All' -or $Test -like '*WinRM*') {
$Server.WinRM = (Test-WinRM -ComputerName $Server.HostName).Status
}
if ($Test -eq 'All' -or '*PortOpen*') {
$Server.PortOpen = (Test-ComputerPort -Server $Server.HostName -PortTCP $Ports -Timeout $PortsTimeout).Status
}
}
[PSCustomObject] $Server
}
} catch {
[PSCustomObject]@{
Domain = $Domain
HostName = ''
Name = ''
Forest = $ForestInformation.RootDomain
IPV4Address = ''
IPV6Address = ''
IsGlobalCatalog = ''
IsReadOnly = ''
Site = ''
SchemaMaster = $false
DomainNamingMasterMaster = $false
PDCEmulator = $false
RIDMaster = $false
InfrastructureMaster = $false
LdapPort = ''
SslPort = ''
DistinguishedName = ''
NTDSSettingsObjectDN = ''
DsaGuid = ''
DsaGuidName = ''
Pingable = $null
WinRM = $null
PortOpen = $null
Comment = $_.Exception.Message -replace "`n", " " -replace "`r", " "
}
}
if ($SkipRODC) {
[Array] $Findings['DomainDomainControllers'][$Domain] = $AllDC | Where-Object { $_.IsReadOnly -eq $false }
} else {
[Array] $Findings['DomainDomainControllers'][$Domain] = $AllDC
}
if ($null -ne $Findings['DomainDomainControllers'][$Domain]) {
[Array] $Findings['DomainDomainControllers'][$Domain]
}
}
if ($Extended) {
$Findings['DomainsExtended'] = @{ }
$Findings['DomainsExtendedNetBIOS'] = @{ }
foreach ($DomainEx in $Findings['Domains']) {
try {
$Findings['DomainsExtended'][$DomainEx] = Get-ADDomain -Server $Findings['QueryServers'][$DomainEx].HostName[0] | ForEach-Object {
[ordered] @{
AllowedDNSSuffixes = $_.AllowedDNSSuffixes | ForEach-Object -Process { $_ }
ChildDomains = $_.ChildDomains | ForEach-Object -Process { $_ }
ComputersContainer = $_.ComputersContainer
DeletedObjectsContainer = $_.DeletedObjectsContainer
DistinguishedName = $_.DistinguishedName
DNSRoot = $_.DNSRoot
DomainControllersContainer = $_.DomainControllersContainer
DomainMode = $_.DomainMode
DomainSID = $_.DomainSID.Value
ForeignSecurityPrincipalsContainer = $_.ForeignSecurityPrincipalsContainer
Forest = $_.Forest
InfrastructureMaster = $_.InfrastructureMaster
LastLogonReplicationInterval = $_.LastLogonReplicationInterval
LinkedGroupPolicyObjects = $_.LinkedGroupPolicyObjects | ForEach-Object -Process { $_ }
LostAndFoundContainer = $_.LostAndFoundContainer
ManagedBy = $_.ManagedBy
Name = $_.Name
NetBIOSName = $_.NetBIOSName
ObjectClass = $_.ObjectClass
ObjectGUID = $_.ObjectGUID
ParentDomain = $_.ParentDomain
PDCEmulator = $_.PDCEmulator
PublicKeyRequiredPasswordRolling = $_.PublicKeyRequiredPasswordRolling | ForEach-Object -Process { $_ }
QuotasContainer = $_.QuotasContainer
ReadOnlyReplicaDirectoryServers = $_.ReadOnlyReplicaDirectoryServers | ForEach-Object -Process { $_ }
ReplicaDirectoryServers = $_.ReplicaDirectoryServers | ForEach-Object -Process { $_ }
RIDMaster = $_.RIDMaster
SubordinateReferences = $_.SubordinateReferences | ForEach-Object -Process { $_ }
SystemsContainer = $_.SystemsContainer
UsersContainer = $_.UsersContainer
}
}
$NetBios = $Findings['DomainsExtended'][$DomainEx]['NetBIOSName']
$Findings['DomainsExtendedNetBIOS'][$NetBios] = $Findings['DomainsExtended'][$DomainEx]
} catch {
Write-Warning "Get-WinADForestDetails - Error gathering Domain Information for domain $DomainEx - $($_.Exception.Message)"
continue
}
}
}
if ($TemporaryProgress) {
$Global:ProgressPreference = $TemporaryProgress
}
$Findings
} else {
$Findings = Copy-DictionaryManual -Dictionary $ExtendedForestInformation
[Array] $Findings['Domains'] = foreach ($_ in $Findings.Domains) {
if ($IncludeDomains) {
if ($_ -in $IncludeDomains) {
$_.ToLower()
}
continue
}
if ($_ -notin $ExcludeDomains) {
$_.ToLower()
}
}
foreach ($_ in [string[]] $Findings.DomainDomainControllers.Keys) {
if ($_ -notin $Findings.Domains) {
$Findings.DomainDomainControllers.Remove($_)
}
}
foreach ($_ in [string[]] $Findings.DomainsExtended.Keys) {
if ($_ -notin $Findings.Domains) {
$Findings.DomainsExtended.Remove($_)
$NetBiosName = $Findings.DomainsExtended.$_.'NetBIOSName'
if ($NetBiosName) {
$Findings.DomainsExtendedNetBIOS.Remove($NetBiosName)
}
}
}
[Array] $Findings['ForestDomainControllers'] = foreach ($Domain in $Findings.Domains) {
[Array] $AllDC = foreach ($S in $Findings.DomainDomainControllers["$Domain"]) {
if ($IncludeDomainControllers.Count -gt 0) {
If (-not $IncludeDomainControllers[0].Contains('.')) {
if ($S.Name -notin $IncludeDomainControllers) {
continue
}
} else {
if ($S.HostName -notin $IncludeDomainControllers) {
continue
}
}
}
if ($ExcludeDomainControllers.Count -gt 0) {
If (-not $ExcludeDomainControllers[0].Contains('.')) {
if ($S.Name -in $ExcludeDomainControllers) {
continue
}
} else {
if ($S.HostName -in $ExcludeDomainControllers) {
continue
}
}
}
$S
}
if ($SkipRODC) {
[Array] $Findings['DomainDomainControllers'][$Domain] = $AllDC | Where-Object { $_.IsReadOnly -eq $false }
} else {
[Array] $Findings['DomainDomainControllers'][$Domain] = $AllDC
}
[Array] $Findings['DomainDomainControllers'][$Domain]
}
$Findings
}
}
function Convert-ADGuidToSchema {
<#
.SYNOPSIS
Converts Guid to schema properties
.DESCRIPTION
Converts Guid to schema properties
.PARAMETER Guid
Guid to Convert to Schema Name
.PARAMETER Domain
Domain to query. By default the current domain is used
.PARAMETER RootDSE
RootDSE to query. By default RootDSE is queried from the domain
.PARAMETER DisplayName
Return the schema name by display name. By default it returns as Name
.EXAMPLE
$T2 = '570b9266-bbb3-4fad-a712-d2e3fedc34dd'
$T = [guid] '570b9266-bbb3-4fad-a712-d2e3fedc34dd'
Convert-ADGuidToSchema -Guid $T
Convert-ADGuidToSchema -Guid $T2
.NOTES
General notes
#>
[alias('Get-WinADDomainGUIDs', 'Get-WinADForestGUIDs')]
[cmdletbinding()]
param(
[string] $Guid,
[string] $Domain,
[Microsoft.ActiveDirectory.Management.ADEntity] $RootDSE,
[switch] $DisplayName
)
if (-not $Script:ADSchemaMap -or -not $Script:ADSchemaMapDisplayName) {
if ($RootDSE) {
$Script:RootDSE = $RootDSE
} elseif (-not $Script:RootDSE) {
if ($Domain) {
$Script:RootDSE = Get-ADRootDSE -Server $Domain
} else {
$Script:RootDSE = Get-ADRootDSE
}
}
$DomainCN = ConvertFrom-DistinguishedName -DistinguishedName $Script:RootDSE.defaultNamingContext -ToDomainCN
$QueryServer = (Get-ADDomainController -DomainName $DomainCN -Discover -ErrorAction Stop).Hostname[0]
$Script:ADSchemaMap = @{ }
$Script:ADSchemaMapDisplayName = @{ }
$Script:ADSchemaMapDisplayName['00000000-0000-0000-0000-000000000000'] = 'All'
$Script:ADSchemaMap.Add('00000000-0000-0000-0000-000000000000', 'All')
Write-Verbose "Convert-ADGuidToSchema - Querying Schema from $QueryServer"
$Time = [System.Diagnostics.Stopwatch]::StartNew()
if (-not $Script:StandardRights) {
$Script:StandardRights = Get-ADObject -SearchBase $Script:RootDSE.schemaNamingContext -LDAPFilter "(schemaidguid=*)" -Properties name, lDAPDisplayName, schemaIDGUID -Server $QueryServer -ErrorAction Stop | Select-Object name, lDAPDisplayName, schemaIDGUID
}
foreach ($S in $Script:StandardRights) {
$Script:ADSchemaMap["$(([System.GUID]$S.schemaIDGUID).Guid)"] = $S.name
$Script:ADSchemaMapDisplayName["$(([System.GUID]$S.schemaIDGUID).Guid)"] = $S.lDAPDisplayName
}
$Time.Stop()
$TimeToExecute = "$($Time.Elapsed.Days) days, $($Time.Elapsed.Hours) hours, $($Time.Elapsed.Minutes) minutes, $($Time.Elapsed.Seconds) seconds, $($Time.Elapsed.Milliseconds) milliseconds"
Write-Verbose "Convert-ADGuidToSchema - Querying Schema from $QueryServer took $TimeToExecute"
Write-Verbose "Convert-ADGuidToSchema - Querying Extended Rights from $QueryServer"
$Time = [System.Diagnostics.Stopwatch]::StartNew()
if (-not $Script:ExtendedRightsGuids) {
$Script:ExtendedRightsGuids = Get-ADObject -SearchBase $Script:RootDSE.ConfigurationNamingContext -LDAPFilter "(&(objectclass=controlAccessRight)(rightsguid=*))" -Properties name, displayName, lDAPDisplayName, rightsGuid -Server $QueryServer -ErrorAction Stop | Select-Object name, displayName, lDAPDisplayName, rightsGuid
}
foreach ($S in $Script:ExtendedRightsGuids) {
$Script:ADSchemaMap["$(([System.GUID]$S.rightsGUID).Guid)"] = $S.name
$Script:ADSchemaMapDisplayName["$(([System.GUID]$S.rightsGUID).Guid)"] = $S.displayName
}
$Time.Stop()
$TimeToExecute = "$($Time.Elapsed.Days) days, $($Time.Elapsed.Hours) hours, $($Time.Elapsed.Minutes) minutes, $($Time.Elapsed.Seconds) seconds, $($Time.Elapsed.Milliseconds) milliseconds"
Write-Verbose "Convert-ADGuidToSchema - Querying Extended Rights from $QueryServer took $TimeToExecute"
}
if ($Guid) {
if ($DisplayName) {
$Script:ADSchemaMapDisplayName[$Guid]
} else {
$Script:ADSchemaMap[$Guid]
}
} else {
if ($DisplayName) {
$Script:ADSchemaMapDisplayName
} else {
$Script:ADSchemaMap
}
}
}
function Remove-EmptyValue {
<#
.SYNOPSIS
Removes empty values from a hashtable recursively.
.DESCRIPTION
This function removes empty values from a given hashtable. It can be used to clean up a hashtable by removing keys with null, empty string, empty array, or empty dictionary values. The function supports recursive removal of empty values.
.PARAMETER Hashtable
The hashtable from which empty values will be removed.
.PARAMETER ExcludeParameter
An array of keys to exclude from the removal process.
.PARAMETER Recursive
Indicates whether to recursively remove empty values from nested hashtables.
.PARAMETER Rerun
Specifies the number of times to rerun the removal process recursively.
.PARAMETER DoNotRemoveNull
If specified, null values will not be removed.
.PARAMETER DoNotRemoveEmpty
If specified, empty string values will not be removed.
.PARAMETER DoNotRemoveEmptyArray
If specified, empty array values will not be removed.
.PARAMETER DoNotRemoveEmptyDictionary
If specified, empty dictionary values will not be removed.
.EXAMPLE
$hashtable = @{
'Key1' = '';
'Key2' = $null;
'Key3' = @();
'Key4' = @{}
}
Remove-EmptyValue -Hashtable $hashtable -Recursive
Description
-----------
This example removes empty values from the $hashtable recursively.
#>
[alias('Remove-EmptyValues')]
[CmdletBinding()]
param(
[alias('Splat', 'IDictionary')][Parameter(Mandatory)][System.Collections.IDictionary] $Hashtable,
[string[]] $ExcludeParameter,
[switch] $Recursive,
[int] $Rerun,
[switch] $DoNotRemoveNull,
[switch] $DoNotRemoveEmpty,
[switch] $DoNotRemoveEmptyArray,
[switch] $DoNotRemoveEmptyDictionary
)
foreach ($Key in [string[]] $Hashtable.Keys) {
if ($Key -notin $ExcludeParameter) {
if ($Recursive) {
if ($Hashtable[$Key] -is [System.Collections.IDictionary]) {
if ($Hashtable[$Key].Count -eq 0) {
if (-not $DoNotRemoveEmptyDictionary) {
$Hashtable.Remove($Key)
}
} else {
Remove-EmptyValue -Hashtable $Hashtable[$Key] -Recursive:$Recursive
}
} else {
if (-not $DoNotRemoveNull -and $null -eq $Hashtable[$Key]) {
$Hashtable.Remove($Key)
} elseif (-not $DoNotRemoveEmpty -and $Hashtable[$Key] -is [string] -and $Hashtable[$Key] -eq '') {
$Hashtable.Remove($Key)
} elseif (-not $DoNotRemoveEmptyArray -and $Hashtable[$Key] -is [System.Collections.IList] -and $Hashtable[$Key].Count -eq 0) {
$Hashtable.Remove($Key)
}
}
} else {
if (-not $DoNotRemoveNull -and $null -eq $Hashtable[$Key]) {
$Hashtable.Remove($Key)
} elseif (-not $DoNotRemoveEmpty -and $Hashtable[$Key] -is [string] -and $Hashtable[$Key] -eq '') {
$Hashtable.Remove($Key)
} elseif (-not $DoNotRemoveEmptyArray -and $Hashtable[$Key] -is [System.Collections.IList] -and $Hashtable[$Key].Count -eq 0) {
$Hashtable.Remove($Key)
}
}
}
}
if ($Rerun) {
for ($i = 0; $i -lt $Rerun; $i++) {
Remove-EmptyValue -Hashtable $Hashtable -Recursive:$Recursive
}
}
}
function Remove-PSRegistry {
<#
.SYNOPSIS
Remove registry keys and folders
.DESCRIPTION
Remove registry keys and folders using .NET methods
.PARAMETER ComputerName
The computer to run the command on. Defaults to local computer.
.PARAMETER RegistryPath
The registry path to remove.
.PARAMETER Key
The registry key to remove.
.PARAMETER Recursive
Forces deletion of registry folder and all keys, including nested folders
.PARAMETER Suppress
Suppresses the output of the command. By default the command outputs PSObject with the results of the operation.
.EXAMPLE
Remove-PSRegistry -RegistryPath "HKEY_CURRENT_USER\Tests\Ok\MaybeNot" -Recursive
.EXAMPLE
Remove-PSRegistry -RegistryPath "HKEY_CURRENT_USER\Tests\Ok\MaybeNot" -Key "LimitBlankPass1wordUse"
.EXAMPLE
Remove-PSRegistry -RegistryPath "HKCU:\Tests\Ok"
.NOTES
General notes
#>
[cmdletBinding(SupportsShouldProcess)]
param(
[string[]] $ComputerName = $Env:COMPUTERNAME,
[Parameter(Mandatory)][string] $RegistryPath,
[Parameter()][string] $Key,
[switch] $Recursive,
[switch] $Suppress
)
Get-PSRegistryDictionaries
[Array] $ComputersSplit = Get-ComputerSplit -ComputerName $ComputerName
$RegistryPath = Resolve-PrivateRegistry -RegistryPath $RegistryPath
[Array] $RegistryTranslated = Get-PSConvertSpecialRegistry -RegistryPath $RegistryPath -Computers $ComputerName -HiveDictionary $Script:HiveDictionary
foreach ($Registry in $RegistryTranslated) {
$RegistryValue = Get-PrivateRegistryTranslated -RegistryPath $Registry -HiveDictionary $Script:HiveDictionary -Key $Key -ReverseTypesDictionary $Script:ReverseTypesDictionary
if ($RegistryValue.HiveKey) {
foreach ($Computer in $ComputersSplit[0]) {
Remove-PrivateRegistry -Key $Key -RegistryValue $RegistryValue -Computer $Computer -Suppress:$Suppress.IsPresent -ErrorAction $ErrorActionPreference -WhatIf:$WhatIfPreference
}
foreach ($Computer in $ComputersSplit[1]) {
Remove-PrivateRegistry -Key $Key -RegistryValue $RegistryValue -Computer $Computer -Remote -Suppress:$Suppress.IsPresent -ErrorAction $ErrorActionPreference -WhatIf:$WhatIfPreference
}
} else {
if ($PSBoundParameters.ErrorAction -eq 'Stop') {
Unregister-MountedRegistry
throw
} else {
Write-Warning "Remove-PSRegistry - Removing registry $RegistryPath have failed (recursive: $($Recursive.IsPresent)). Couldn't translate HIVE."
}
}
}
Unregister-MountedRegistry
}
function Rename-LatinCharacters {
<#
.SYNOPSIS
Renames a name to a name without special chars.
.DESCRIPTION
Renames a name to a name without special chars.
.PARAMETER String
Provide a string to rename
.EXAMPLE
Rename-LatinCharacters -String 'Przemysław Kłys'
.EXAMPLE
Rename-LatinCharacters -String 'Przemysław'
.NOTES
General notes
#>
[alias('Remove-StringLatinCharacters')]
[cmdletBinding()]
param(
[string] $String
)
[Text.Encoding]::ASCII.GetString([Text.Encoding]::GetEncoding("Cyrillic").GetBytes($String))
}
function Set-FileOwner {
<#
.SYNOPSIS
Sets the owner of a file or folder.
.DESCRIPTION
This function sets the owner of a specified file or folder to the provided owner.
.PARAMETER Path
Specifies the path to the file or folder.
.PARAMETER Recursive
Indicates whether to process the items in the specified path recursively.
.PARAMETER Owner
Specifies the new owner for the file or folder.
.PARAMETER Exclude
Specifies an array of owners to exclude from ownership change.
.PARAMETER JustPath
Indicates whether to only change the owner of the specified path without recursing into subfolders.
.EXAMPLE
Set-FileOwner -Path "C:\Example\File.txt" -Owner "DOMAIN\User1"
Description:
Sets the owner of the file "File.txt" to "DOMAIN\User1".
.EXAMPLE
Set-FileOwner -Path "C:\Example\Folder" -Owner "DOMAIN\User2" -Recursive
Description:
Sets the owner of the folder "Folder" and all its contents to "DOMAIN\User2" recursively.
#>
[cmdletBinding(SupportsShouldProcess)]
param(
[Array] $Path,
[switch] $Recursive,
[string] $Owner,
[string[]] $Exlude,
[switch] $JustPath
)
Begin {
}
Process {
foreach ($P in $Path) {
if ($P -is [System.IO.FileSystemInfo]) {
$FullPath = $P.FullName
} elseif ($P -is [string]) {
$FullPath = $P
}
$OwnerTranslated = [System.Security.Principal.NTAccount]::new($Owner)
if ($FullPath -and (Test-Path -Path $FullPath)) {
if ($JustPath) {
$FullPath | ForEach-Object -Process {
$File = $_
try {
$ACL = Get-Acl -Path $File -ErrorAction Stop
} catch {
Write-Warning "Set-FileOwner - Getting ACL failed with error: $($_.Exception.Message)"
}
if ($ACL.Owner -notin $Exlude -and $ACL.Owner -ne $OwnerTranslated) {
if ($PSCmdlet.ShouldProcess($File, "Replacing owner $($ACL.Owner) to $OwnerTranslated")) {
try {
$ACL.SetOwner($OwnerTranslated)
Set-Acl -Path $File -AclObject $ACL -ErrorAction Stop
} catch {
Write-Warning "Set-FileOwner - Replacing owner $($ACL.Owner) to $OwnerTranslated failed with error: $($_.Exception.Message)"
}
}
}
}
} else {
Get-ChildItem -LiteralPath $FullPath -Recurse:$Recursive -ErrorAction SilentlyContinue -ErrorVariable err | ForEach-Object -Process {
$File = $_
try {
$ACL = Get-Acl -Path $File.FullName -ErrorAction Stop
} catch {
Write-Warning "Set-FileOwner - Getting ACL failed with error: $($_.Exception.Message)"
}
if ($ACL.Owner -notin $Exlude -and $ACL.Owner -ne $OwnerTranslated) {
if ($PSCmdlet.ShouldProcess($File.FullName, "Replacing owner $($ACL.Owner) to $OwnerTranslated")) {
try {
$ACL.SetOwner($OwnerTranslated)
Set-Acl -Path $File.FullName -AclObject $ACL -ErrorAction Stop
} catch {
Write-Warning "Set-FileOwner - Replacing owner $($ACL.Owner) to $OwnerTranslated failed with error: $($_.Exception.Message)"
}
}
}
}
foreach ($e in $err) {
Write-Warning "Set-FileOwner - Errors processing $($e.Exception.Message) ($($e.CategoryInfo.Reason))"
}
}
}
}
}
End {
}
}
function Set-PSRegistry {
<#
.SYNOPSIS
Sets/Updates registry entries locally and remotely using .NET methods.
.DESCRIPTION
Sets/Updates registry entries locally and remotely using .NET methods. If the registry path to key doesn't exists it will be created.
.PARAMETER ComputerName
The computer to run the command on. Defaults to local computer.
.PARAMETER RegistryPath
Registry Path to Update
.PARAMETER Type
Registry type to use. Options are: REG_SZ, REG_EXPAND_SZ, REG_BINARY, REG_DWORD, REG_MULTI_SZ, REG_QWORD, string, expandstring, binary, dword, multistring, qword
.PARAMETER Key
Registry key to set. If the path to registry key doesn't exists it will be created.
.PARAMETER Value
Registry value to set.
.PARAMETER Suppress
Suppresses the output of the command. By default the command outputs PSObject with the results of the operation.
.EXAMPLE
Set-PSRegistry -RegistryPath 'HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics' -Type REG_DWORD -Key "16 LDAP Interface Events" -Value 2 -ComputerName AD1
.EXAMPLE
Set-PSRegistry -RegistryPath 'HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics' -Type REG_SZ -Key "LDAP Interface Events" -Value 'test' -ComputerName AD1
.EXAMPLE
Set-PSRegistry -RegistryPath "HKCU:\\Tests" -Key "LimitBlankPass1wordUse" -Value "0" -Type REG_DWORD
.EXAMPLE
Set-PSRegistry -RegistryPath "HKCU:\\Tests\MoreTests\Tests1" -Key "LimitBlankPass1wordUse" -Value "0" -Type REG_DWORD
.EXAMPLE
# Setting default value
$ValueData = [byte[]] @(
0, 1, 0, 0, 9, 0, 0, 0, 128, 0, 0, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3,
0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3,
0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3,
0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3, 0, 3,
0, 3, 0, 0, 0, 5, 0, 10, 0, 14, 0, 3, 0, 5, 0, 6, 0, 6, 0, 4, 0, 4, 0
)
Set-PSRegistry -RegistryPath "HKEY_CURRENT_USER\Tests" -Key '' -Value $ValueData -Type 'NONE'
.NOTES
General notes
#>
[cmdletbinding(SupportsShouldProcess)]
param(
[string[]] $ComputerName = $Env:COMPUTERNAME,
[Parameter(Mandatory)][string] $RegistryPath,
[Parameter(Mandatory)][ValidateSet('REG_SZ', 'REG_NONE', 'None', 'REG_EXPAND_SZ', 'REG_BINARY', 'REG_DWORD', 'REG_MULTI_SZ', 'REG_QWORD', 'string', 'binary', 'dword', 'qword', 'multistring', 'expandstring')][string] $Type,
[Parameter()][string] $Key,
[Parameter(Mandatory)][object] $Value,
[switch] $Suppress
)
Unregister-MountedRegistry
Get-PSRegistryDictionaries
[Array] $ComputersSplit = Get-ComputerSplit -ComputerName $ComputerName
$RegistryPath = Resolve-PrivateRegistry -RegistryPath $RegistryPath
[Array] $RegistryTranslated = Get-PSConvertSpecialRegistry -RegistryPath $RegistryPath -Computers $ComputerName -HiveDictionary $Script:HiveDictionary
foreach ($Registry in $RegistryTranslated) {
$RegistryValue = Get-PrivateRegistryTranslated -RegistryPath $Registry -HiveDictionary $Script:HiveDictionary -Key $Key -Value $Value -Type $Type -ReverseTypesDictionary $Script:ReverseTypesDictionary
if ($RegistryValue.HiveKey) {
foreach ($Computer in $ComputersSplit[0]) {
Set-PrivateRegistry -RegistryValue $RegistryValue -Computer $Computer -Suppress:$Suppress.IsPresent -ErrorAction $ErrorActionPreference -WhatIf:$WhatIfPreference
}
foreach ($Computer in $ComputersSplit[1]) {
Set-PrivateRegistry -RegistryValue $RegistryValue -Computer $Computer -Remote -Suppress:$Suppress.IsPresent -ErrorAction $ErrorActionPreference -WhatIf:$WhatIfPreference
}
} else {
if ($PSBoundParameters.ErrorAction -eq 'Stop') {
Unregister-MountedRegistry
throw
} else {
Write-Warning "Set-PSRegistry - Setting registry to $Registry have failed. Couldn't translate HIVE."
}
}
}
Unregister-MountedRegistry
}
function Start-TimeLog {
<#
.SYNOPSIS
Starts a new stopwatch for logging time.
.DESCRIPTION
This function starts a new stopwatch that can be used for logging time durations.
.EXAMPLE
Start-TimeLog
Starts a new stopwatch for logging time.
#>
[CmdletBinding()]
param()
[System.Diagnostics.Stopwatch]::StartNew()
}
function Stop-TimeLog {
<#
.SYNOPSIS
Stops the stopwatch and returns the elapsed time in a specified format.
.DESCRIPTION
The Stop-TimeLog function stops the provided stopwatch and returns the elapsed time in a specified format. The function can output the elapsed time as a single string or an array of days, hours, minutes, seconds, and milliseconds.
.PARAMETER Time
Specifies the stopwatch object to stop and retrieve the elapsed time from.
.PARAMETER Option
Specifies the format in which the elapsed time should be returned. Valid values are 'OneLiner' (default) or 'Array'.
.PARAMETER Continue
Indicates whether the stopwatch should continue running after retrieving the elapsed time.
.EXAMPLE
$stopwatch = [System.Diagnostics.Stopwatch]::StartNew()
# Perform some operations
Stop-TimeLog -Time $stopwatch
# Output: "0 days, 0 hours, 0 minutes, 5 seconds, 123 milliseconds"
.EXAMPLE
$stopwatch = [System.Diagnostics.Stopwatch]::StartNew()
# Perform some operations
Stop-TimeLog -Time $stopwatch -Option Array
# Output: ["0 days", "0 hours", "0 minutes", "5 seconds", "123 milliseconds"]
#>
[CmdletBinding()]
param (
[Parameter(ValueFromPipeline = $true)][System.Diagnostics.Stopwatch] $Time,
[ValidateSet('OneLiner', 'Array')][string] $Option = 'OneLiner',
[switch] $Continue
)
Begin {
}
Process {
if ($Option -eq 'Array') {
$TimeToExecute = "$($Time.Elapsed.Days) days", "$($Time.Elapsed.Hours) hours", "$($Time.Elapsed.Minutes) minutes", "$($Time.Elapsed.Seconds) seconds", "$($Time.Elapsed.Milliseconds) milliseconds"
} else {
$TimeToExecute = "$($Time.Elapsed.Days) days, $($Time.Elapsed.Hours) hours, $($Time.Elapsed.Minutes) minutes, $($Time.Elapsed.Seconds) seconds, $($Time.Elapsed.Milliseconds) milliseconds"
}
}
End {
if (-not $Continue) {
$Time.Stop()
}
return $TimeToExecute
}
}
function Write-Color {
<#
.SYNOPSIS
Write-Color is a wrapper around Write-Host delivering a lot of additional features for easier color options.
.DESCRIPTION
Write-Color is a wrapper around Write-Host delivering a lot of additional features for easier color options.
It provides:
- Easy manipulation of colors,
- Logging output to file (log)
- Nice formatting options out of the box.
- Ability to use aliases for parameters
.PARAMETER Text
Text to display on screen and write to log file if specified.
Accepts an array of strings.
.PARAMETER Color
Color of the text. Accepts an array of colors. If more than one color is specified it will loop through colors for each string.
If there are more strings than colors it will start from the beginning.
Available colors are: Black, DarkBlue, DarkGreen, DarkCyan, DarkRed, DarkMagenta, DarkYellow, Gray, DarkGray, Blue, Green, Cyan, Red, Magenta, Yellow, White
.PARAMETER BackGroundColor
Color of the background. Accepts an array of colors. If more than one color is specified it will loop through colors for each string.
If there are more strings than colors it will start from the beginning.
Available colors are: Black, DarkBlue, DarkGreen, DarkCyan, DarkRed, DarkMagenta, DarkYellow, Gray, DarkGray, Blue, Green, Cyan, Red, Magenta, Yellow, White
.PARAMETER StartTab
Number of tabs to add before text. Default is 0.
.PARAMETER LinesBefore
Number of empty lines before text. Default is 0.
.PARAMETER LinesAfter
Number of empty lines after text. Default is 0.
.PARAMETER StartSpaces
Number of spaces to add before text. Default is 0.
.PARAMETER LogFile
Path to log file. If not specified no log file will be created.
.PARAMETER DateTimeFormat
Custom date and time format string. Default is yyyy-MM-dd HH:mm:ss
.PARAMETER LogTime
If set to $true it will add time to log file. Default is $true.
.PARAMETER LogRetry
Number of retries to write to log file, in case it can't write to it for some reason, before skipping. Default is 2.
.PARAMETER Encoding
Encoding of the log file. Default is Unicode.
.PARAMETER ShowTime
Switch to add time to console output. Default is not set.
.PARAMETER NoNewLine
Switch to not add new line at the end of the output. Default is not set.
.PARAMETER NoConsoleOutput
Switch to not output to console. Default all output goes to console.
.EXAMPLE
Write-Color -Text "Red ", "Green ", "Yellow " -Color Red,Green,Yellow
.EXAMPLE
Write-Color -Text "This is text in Green ",
"followed by red ",
"and then we have Magenta... ",
"isn't it fun? ",
"Here goes DarkCyan" -Color Green,Red,Magenta,White,DarkCyan
.EXAMPLE
Write-Color -Text "This is text in Green ",
"followed by red ",
"and then we have Magenta... ",
"isn't it fun? ",
"Here goes DarkCyan" -Color Green,Red,Magenta,White,DarkCyan -StartTab 3 -LinesBefore 1 -LinesAfter 1
.EXAMPLE
Write-Color "1. ", "Option 1" -Color Yellow, Green
Write-Color "2. ", "Option 2" -Color Yellow, Green
Write-Color "3. ", "Option 3" -Color Yellow, Green
Write-Color "4. ", "Option 4" -Color Yellow, Green
Write-Color "9. ", "Press 9 to exit" -Color Yellow, Gray -LinesBefore 1
.EXAMPLE
Write-Color -LinesBefore 2 -Text "This little ","message is ", "written to log ", "file as well." `
-Color Yellow, White, Green, Red, Red -LogFile "C:\testing.txt" -TimeFormat "yyyy-MM-dd HH:mm:ss"
Write-Color -Text "This can get ","handy if ", "want to display things, and log actions to file ", "at the same time." `
-Color Yellow, White, Green, Red, Red -LogFile "C:\testing.txt"
.EXAMPLE
Write-Color -T "My text", " is ", "all colorful" -C Yellow, Red, Green -B Green, Green, Yellow
Write-Color -t "my text" -c yellow -b green
Write-Color -text "my text" -c red
.EXAMPLE
Write-Color -Text "Testuję czy się ładnie zapisze, czy będą problemy" -Encoding unicode -LogFile 'C:\temp\testinggg.txt' -Color Red -NoConsoleOutput
.NOTES
Understanding Custom date and time format strings: https://learn.microsoft.com/en-us/dotnet/standard/base-types/custom-date-and-time-format-strings
Project support: https://github.com/EvotecIT/PSWriteColor
Original idea: Josh (https://stackoverflow.com/users/81769/josh)
#>
[alias('Write-Colour')]
[CmdletBinding()]
param (
[alias ('T')] [String[]]$Text,
[alias ('C', 'ForegroundColor', 'FGC')] [ConsoleColor[]]$Color = [ConsoleColor]::White,
[alias ('B', 'BGC')] [ConsoleColor[]]$BackGroundColor = $null,
[alias ('Indent')][int] $StartTab = 0,
[int] $LinesBefore = 0,
[int] $LinesAfter = 0,
[int] $StartSpaces = 0,
[alias ('L')] [string] $LogFile = '',
[Alias('DateFormat', 'TimeFormat')][string] $DateTimeFormat = 'yyyy-MM-dd HH:mm:ss',
[alias ('LogTimeStamp')][bool] $LogTime = $true,
[int] $LogRetry = 2,
[ValidateSet('unknown', 'string', 'unicode', 'bigendianunicode', 'utf8', 'utf7', 'utf32', 'ascii', 'default', 'oem')][string]$Encoding = 'Unicode',
[switch] $ShowTime,
[switch] $NoNewLine,
[alias('HideConsole')][switch] $NoConsoleOutput
)
if (-not $NoConsoleOutput) {
$DefaultColor = $Color[0]
if ($null -ne $BackGroundColor -and $BackGroundColor.Count -ne $Color.Count) {
Write-Error "Colors, BackGroundColors parameters count doesn't match. Terminated."
return
}
if ($LinesBefore -ne 0) {
for ($i = 0; $i -lt $LinesBefore; $i++) {
Write-Host -Object "`n" -NoNewline
}
} # Add empty line before
if ($StartTab -ne 0) {
for ($i = 0; $i -lt $StartTab; $i++) {
Write-Host -Object "`t" -NoNewline
}
} # Add TABS before text
if ($StartSpaces -ne 0) {
for ($i = 0; $i -lt $StartSpaces; $i++) {
Write-Host -Object ' ' -NoNewline
}
} # Add SPACES before text
if ($ShowTime) {
Write-Host -Object "[$([datetime]::Now.ToString($DateTimeFormat))] " -NoNewline
} # Add Time before output
if ($Text.Count -ne 0) {
if ($Color.Count -ge $Text.Count) {
# the real deal coloring
if ($null -eq $BackGroundColor) {
for ($i = 0; $i -lt $Text.Length; $i++) {
Write-Host -Object $Text[$i] -ForegroundColor $Color[$i] -NoNewline
}
} else {
for ($i = 0; $i -lt $Text.Length; $i++) {
Write-Host -Object $Text[$i] -ForegroundColor $Color[$i] -BackgroundColor $BackGroundColor[$i] -NoNewline
}
}
} else {
if ($null -eq $BackGroundColor) {
for ($i = 0; $i -lt $Color.Length ; $i++) {
Write-Host -Object $Text[$i] -ForegroundColor $Color[$i] -NoNewline
}
for ($i = $Color.Length; $i -lt $Text.Length; $i++) {
Write-Host -Object $Text[$i] -ForegroundColor $DefaultColor -NoNewline
}
} else {
for ($i = 0; $i -lt $Color.Length ; $i++) {
Write-Host -Object $Text[$i] -ForegroundColor $Color[$i] -BackgroundColor $BackGroundColor[$i] -NoNewline
}
for ($i = $Color.Length; $i -lt $Text.Length; $i++) {
Write-Host -Object $Text[$i] -ForegroundColor $DefaultColor -BackgroundColor $BackGroundColor[0] -NoNewline
}
}
}
}
if ($NoNewLine -eq $true) {
Write-Host -NoNewline
} else {
Write-Host
} # Support for no new line
if ($LinesAfter -ne 0) {
for ($i = 0; $i -lt $LinesAfter; $i++) {
Write-Host -Object "`n" -NoNewline
}
} # Add empty line after
}
if ($Text.Count -and $LogFile) {
# Save to file
$TextToFile = ""
for ($i = 0; $i -lt $Text.Length; $i++) {
$TextToFile += $Text[$i]
}
$Saved = $false
$Retry = 0
Do {
$Retry++
try {
if ($LogTime) {
"[$([datetime]::Now.ToString($DateTimeFormat))] $TextToFile" | Out-File -FilePath $LogFile -Encoding $Encoding -Append -ErrorAction Stop -WhatIf:$false
} else {
"$TextToFile" | Out-File -FilePath $LogFile -Encoding $Encoding -Append -ErrorAction Stop -WhatIf:$false
}
$Saved = $true
} catch {
if ($Saved -eq $false -and $Retry -eq $LogRetry) {
Write-Warning "Write-Color - Couldn't write to log file $($_.Exception.Message). Tried ($Retry/$LogRetry))"
} else {
Write-Warning "Write-Color - Couldn't write to log file $($_.Exception.Message). Retrying... ($Retry/$LogRetry)"
}
}
} Until ($Saved -eq $true -or $Retry -ge $LogRetry)
}
}
function Convert-BinaryToIP {
<#
.SYNOPSIS
Converts a binary string to an IP address format.
.DESCRIPTION
This function takes a binary string as input and converts it to an IP address format. The binary string must be evenly divisible by 8.
.PARAMETER Binary
The binary string to convert to an IP address format.
.EXAMPLE
Convert-BinaryToIP -Binary "01000001000000100000000100000001"
Output: 65.0.1.1
#>
[cmdletBinding()]
param(
[string] $Binary
)
$Binary = $Binary -replace '\s+'
if ($Binary.Length % 8) {
Write-Warning -Message "Convert-BinaryToIP - Binary string '$Binary' is not evenly divisible by 8."
return $Null
}
[int] $NumberOfBytes = $Binary.Length / 8
$Bytes = @(foreach ($i in 0..($NumberOfBytes - 1)) {
try {
[System.Convert]::ToByte($Binary.Substring(($i * 8), 8), 2)
} catch {
Write-Warning -Message "Convert-BinaryToIP - Error converting '$Binary' to bytes. `$i was $i."
return $Null
}
})
return $Bytes -join '.'
}
function Convert-GenericRightsToFileSystemRights {
<#
.SYNOPSIS
Converts generic rights to file system rights for a given set of original rights.
.DESCRIPTION
This function maps generic rights to corresponding file system rights based on the provided original rights.
.PARAMETER OriginalRights
Specifies the original generic rights to be converted to file system rights.
.EXAMPLE
Convert-GenericRightsToFileSystemRights -OriginalRights GENERIC_READ
Converts the generic read rights to file system rights.
.NOTES
This function is based on the mapping provided in the blog post: https://blog.cjwdev.co.uk/2011/06/28/permissions-not-included-in-net-accessrule-filesystemrights-enum/
.LINK
https://blog.cjwdev.co.uk/2011/06/28/permissions-not-included-in-net-accessrule-filesystemrights-enum/
#>
[cmdletBinding()]
param(
[System.Security.AccessControl.FileSystemRights] $OriginalRights
)
Begin {
$FileSystemRights = [System.Security.AccessControl.FileSystemRights]
$GenericRights = @{
GENERIC_READ = 0x80000000;
GENERIC_WRITE = 0x40000000;
GENERIC_EXECUTE = 0x20000000;
GENERIC_ALL = 0x10000000;
FILTER_GENERIC = 0x0FFFFFFF;
}
$MappedGenericRights = @{
FILE_GENERIC_EXECUTE = $FileSystemRights::ExecuteFile -bor $FileSystemRights::ReadPermissions -bor $FileSystemRights::ReadAttributes -bor $FileSystemRights::Synchronize
FILE_GENERIC_READ = $FileSystemRights::ReadAttributes -bor $FileSystemRights::ReadData -bor $FileSystemRights::ReadExtendedAttributes -bor $FileSystemRights::ReadPermissions -bor $FileSystemRights::Synchronize
FILE_GENERIC_WRITE = $FileSystemRights::AppendData -bor $FileSystemRights::WriteAttributes -bor $FileSystemRights::WriteData -bor $FileSystemRights::WriteExtendedAttributes -bor $FileSystemRights::ReadPermissions -bor $FileSystemRights::Synchronize
FILE_GENERIC_ALL = $FileSystemRights::FullControl
}
}
Process {
$MappedRights = [System.Security.AccessControl.FileSystemRights]::new()
if ($OriginalRights -band $GenericRights.GENERIC_EXECUTE) {
$MappedRights = $MappedRights -bor $MappedGenericRights.FILE_GENERIC_EXECUTE
}
if ($OriginalRights -band $GenericRights.GENERIC_READ) {
$MappedRights = $MappedRights -bor $MappedGenericRights.FILE_GENERIC_READ
}
if ($OriginalRights -band $GenericRights.GENERIC_WRITE) {
$MappedRights = $MappedRights -bor $MappedGenericRights.FILE_GENERIC_WRITE
}
if ($OriginalRights -band $GenericRights.GENERIC_ALL) {
$MappedRights = $MappedRights -bor $MappedGenericRights.FILE_GENERIC_ALL
}
(($OriginalRights -bAND $GenericRights.FILTER_GENERIC) -bOR $MappedRights) -as $FileSystemRights
}
End {
}
}
function Convert-IPToBinary {
<#
.SYNOPSIS
Converts an IPv4 address to binary format.
.DESCRIPTION
This function takes an IPv4 address as input and converts it to binary format.
.PARAMETER IP
Specifies the IPv4 address to convert to binary format.
.EXAMPLE
Convert-IPToBinary -IP "192.168.1.1"
Converts the IPv4 address "192.168.1.1" to binary format.
.EXAMPLE
Convert-IPToBinary -IP "10.0.0.1"
Converts the IPv4 address "10.0.0.1" to binary format.
#>
[cmdletBinding()]
param(
[string] $IP
)
$IPv4Regex = '(?:(?:0?0?\d|0?[1-9]\d|1\d\d|2[0-5][0-5]|2[0-4]\d)\.){3}(?:0?0?\d|0?[1-9]\d|1\d\d|2[0-5][0-5]|2[0-4]\d)'
$IP = $IP.Trim()
if ($IP -match "\A${IPv4Regex}\z") {
try {
return ($IP.Split('.') | ForEach-Object { [System.Convert]::ToString([byte] $_, 2).PadLeft(8, '0') }) -join ''
} catch {
Write-Warning -Message "Convert-IPToBinary - Error converting '$IP' to a binary string: $_"
return $Null
}
} else {
Write-Warning -Message "Convert-IPToBinary - Invalid IP detected: '$IP'. Conversion failed."
return $Null
}
}
function Copy-DictionaryManual {
<#
.SYNOPSIS
Copies a dictionary recursively, handling nested dictionaries and lists.
.DESCRIPTION
This function copies a dictionary recursively, handling nested dictionaries and lists. It creates a deep copy of the input dictionary, ensuring that modifications to the copied dictionary do not affect the original dictionary.
.PARAMETER Dictionary
The dictionary to be copied.
.EXAMPLE
$originalDictionary = @{
'Key1' = 'Value1'
'Key2' = @{
'NestedKey1' = 'NestedValue1'
}
}
$copiedDictionary = Copy-DictionaryManual -Dictionary $originalDictionary
This example demonstrates how to copy a dictionary with nested values.
#>
[CmdletBinding()]
param(
[System.Collections.IDictionary] $Dictionary
)
$clone = [ordered] @{}
foreach ($Key in $Dictionary.Keys) {
$value = $Dictionary.$Key
$clonedValue = switch ($Dictionary.$Key) {
{ $null -eq $_ } {
$null
continue
}
{ $_ -is [System.Collections.IDictionary] } {
Copy-DictionaryManual -Dictionary $_
continue
}
{
$type = $_.GetType()
$type.IsPrimitive -or $type.IsValueType -or $_ -is [string]
} {
$_
continue
}
default {
$_ | Select-Object -Property *
}
}
if ($value -is [System.Collections.IList]) {
$clone[$Key] = @($clonedValue)
} else {
$clone[$Key] = $clonedValue
}
}
$clone
}
function Get-ComputerSplit {
<#
.SYNOPSIS
This function splits the list of computer names provided into two arrays: one containing remote computers and another containing the local computer.
.DESCRIPTION
The Get-ComputerSplit function takes an array of computer names as input and splits them into two arrays based on whether they are remote computers or the local computer. It determines the local computer by comparing the provided computer names with the local computer name and DNS name.
.PARAMETER ComputerName
Specifies an array of computer names to split into remote and local computers.
.EXAMPLE
Get-ComputerSplit -ComputerName "Computer1", "Computer2", $Env:COMPUTERNAME
This example splits the computer names "Computer1" and "Computer2" into the remote computers array and the local computer array based on the local computer's name.
#>
[CmdletBinding()]
param(
[string[]] $ComputerName
)
if ($null -eq $ComputerName) {
$ComputerName = $Env:COMPUTERNAME
}
try {
$LocalComputerDNSName = [System.Net.Dns]::GetHostByName($Env:COMPUTERNAME).HostName
} catch {
$LocalComputerDNSName = $Env:COMPUTERNAME
}
$ComputersLocal = $null
[Array] $Computers = foreach ($Computer in $ComputerName) {
if ($Computer -eq '' -or $null -eq $Computer) {
$Computer = $Env:COMPUTERNAME
}
if ($Computer -ne $Env:COMPUTERNAME -and $Computer -ne $LocalComputerDNSName) {
$Computer
} else {
$ComputersLocal = $Computer
}
}
, @($ComputersLocal, $Computers)
}
function Get-IPRange {
<#
.SYNOPSIS
Generates a list of IP addresses within a specified binary range.
.DESCRIPTION
This function takes two binary strings representing the start and end IP addresses and generates a list of IP addresses within that range.
.PARAMETER StartBinary
Specifies the starting IP address in binary format.
.PARAMETER EndBinary
Specifies the ending IP address in binary format.
.EXAMPLE
Get-IPRange -StartBinary '11000000' -EndBinary '11000010'
Description:
Generates a list of IP addresses between '192.0.0.0' and '192.0.2.0'.
.EXAMPLE
Get-IPRange -StartBinary '10101010' -EndBinary '10101100'
Description:
Generates a list of IP addresses between '170.0.0.0' and '172.0.0.0'.
#>
[cmdletBinding()]
param(
[string] $StartBinary,
[string] $EndBinary
)
[int64] $StartInt = [System.Convert]::ToInt64($StartBinary, 2)
[int64] $EndInt = [System.Convert]::ToInt64($EndBinary, 2)
for ($BinaryIP = $StartInt; $BinaryIP -le $EndInt; $BinaryIP++) {
Convert-BinaryToIP ([System.Convert]::ToString($BinaryIP, 2).PadLeft(32, '0'))
}
}
function Get-LocalComputerSid {
<#
.SYNOPSIS
Get the SID of the local computer.
.DESCRIPTION
Get the SID of the local computer.
.EXAMPLE
Get-LocalComputerSid
.NOTES
General notes
#>
[cmdletBinding()]
param()
try {
Add-Type -AssemblyName System.DirectoryServices.AccountManagement
$PrincipalContext = [System.DirectoryServices.AccountManagement.PrincipalContext]::new([System.DirectoryServices.AccountManagement.ContextType]::Machine)
$UserPrincipal = [System.DirectoryServices.AccountManagement.UserPrincipal]::new($PrincipalContext)
$Searcher = [System.DirectoryServices.AccountManagement.PrincipalSearcher]::new()
$Searcher.QueryFilter = $UserPrincipal
$User = $Searcher.FindAll()
foreach ($U in $User) {
if ($U.Sid.Value -like "*-500") {
return $U.Sid.Value.TrimEnd("-500")
}
}
} catch {
Write-Warning -Message "Get-LocalComputerSid - Error: $($_.Exception.Message)"
}
}
function Get-PrivateRegistryTranslated {
<#
.SYNOPSIS
Retrieves translated private registry information based on the provided parameters.
.DESCRIPTION
This function retrieves translated private registry information based on the specified RegistryPath, HiveDictionary, ReverseTypesDictionary, Type, Key, and Value parameters.
.PARAMETER RegistryPath
Specifies the array of registry paths to be translated.
.PARAMETER HiveDictionary
Specifies the dictionary containing mappings of registry hives.
.PARAMETER ReverseTypesDictionary
Specifies the dictionary containing mappings of registry value types.
.PARAMETER Type
Specifies the type of the registry value. Valid values are 'REG_SZ', 'REG_NONE', 'None', 'REG_EXPAND_SZ', 'REG_BINARY', 'REG_DWORD', 'REG_MULTI_SZ', 'REG_QWORD', 'string', 'binary', 'dword', 'qword', 'multistring', 'expandstring'.
.PARAMETER Key
Specifies the key associated with the registry value.
.PARAMETER Value
Specifies the value of the registry key.
.EXAMPLE
Get-PrivateRegistryTranslated -RegistryPath "HKLM\Software\Microsoft" -HiveDictionary @{"HKLM"="HKEY_LOCAL_MACHINE"} -ReverseTypesDictionary @{"string"="REG_SZ"} -Type "string" -Key "Version" -Value "10.0.19041"
Description
-----------
Retrieves translated registry information for the specified registry path.
.EXAMPLE
Get-PrivateRegistryTranslated -RegistryPath "HKCU\Software\Settings" -HiveDictionary @{"HKCU"="HKEY_CURRENT_USER"} -ReverseTypesDictionary @{"dword"="REG_DWORD"} -Type "dword" -Key "SettingA" -Value 1
Description
-----------
Retrieves translated registry information for the specified registry path.
#>
[cmdletBinding()]
param(
[Array] $RegistryPath,
[System.Collections.IDictionary] $HiveDictionary,
[System.Collections.IDictionary] $ReverseTypesDictionary,
[Parameter()][ValidateSet('REG_SZ', 'REG_NONE', 'None', 'REG_EXPAND_SZ', 'REG_BINARY', 'REG_DWORD', 'REG_MULTI_SZ', 'REG_QWORD', 'string', 'binary', 'dword', 'qword', 'multistring', 'expandstring')][string] $Type,
[Parameter()][string] $Key,
[Parameter()][object] $Value
)
foreach ($Registry in $RegistryPath) {
if ($Registry -is [string]) {
$Registry = $Registry.Replace("\\", "\").Replace("\\", "\").TrimStart("\").TrimEnd("\")
} else {
$Registry.RegistryPath = $Registry.RegistryPath.Replace("\\", "\").Replace("\\", "\").TrimStart("\").TrimEnd("\")
}
foreach ($Hive in $HiveDictionary.Keys) {
if ($Registry -is [string] -and $Registry.StartsWith($Hive, [System.StringComparison]::CurrentCultureIgnoreCase)) {
if ($Hive.Length -eq $Registry.Length) {
[ordered] @{
HiveKey = $HiveDictionary[$Hive]
SubKeyName = $null
ValueKind = if ($Type) {
[Microsoft.Win32.RegistryValueKind]::($ReverseTypesDictionary[$Type])
} else {
$null
}
Key = $Key
Value = $Value
}
} else {
[ordered] @{
HiveKey = $HiveDictionary[$Hive]
SubKeyName = $Registry.substring($Hive.Length + 1)
ValueKind = if ($Type) {
[Microsoft.Win32.RegistryValueKind]::($ReverseTypesDictionary[$Type])
} else {
$null
}
Key = $Key
Value = $Value
}
}
break
} elseif ($Registry -isnot [string] -and $Registry.RegistryPath.StartsWith($Hive, [System.StringComparison]::CurrentCultureIgnoreCase)) {
if ($Hive.Length -eq $Registry.RegistryPath.Length) {
[ordered] @{
ComputerName = $Registry.ComputerName
HiveKey = $HiveDictionary[$Hive]
SubKeyName = $null
ValueKind = if ($Type) {
[Microsoft.Win32.RegistryValueKind]::($ReverseTypesDictionary[$Type])
} else {
$null
}
Key = $Key
Value = $Value
}
} else {
[ordered] @{
ComputerName = $Registry.ComputerName
HiveKey = $HiveDictionary[$Hive]
SubKeyName = $Registry.RegistryPath.substring($Hive.Length + 1)
ValueKind = if ($Type) {
[Microsoft.Win32.RegistryValueKind]::($ReverseTypesDictionary[$Type])
} else {
$null
}
Key = $Key
Value = $Value
}
}
break
}
}
}
}
function Get-PSConvertSpecialRegistry {
<#
.SYNOPSIS
Converts special registry paths for specified computers.
.DESCRIPTION
This function converts special registry paths for the specified computers using the provided HiveDictionary.
.PARAMETER RegistryPath
Specifies the array of registry paths to convert.
.PARAMETER Computers
Specifies the array of computers to convert registry paths for.
.PARAMETER HiveDictionary
Specifies the dictionary containing hive keys and their corresponding values.
.PARAMETER ExpandEnvironmentNames
Indicates whether to expand environment names in the registry paths.
.EXAMPLE
Get-PSConvertSpecialRegistry -RegistryPath "Users\Offline_Przemek\Software\Policies1\Microsoft\Windows\CloudContent" -Computers "Computer1", "Computer2" -HiveDictionary $HiveDictionary -ExpandEnvironmentNames
Converts the specified registry path for the specified computers using the provided HiveDictionary.
#>
[cmdletbinding()]
param(
[Array] $RegistryPath,
[Array] $Computers,
[System.Collections.IDictionary] $HiveDictionary,
[switch] $ExpandEnvironmentNames
)
$FixedPath = foreach ($R in $RegistryPath) {
foreach ($DictionaryKey in $HiveDictionary.Keys) {
$SplitParts = $R.Split("\")
$FirstPart = $SplitParts[0]
if ($FirstPart -eq $DictionaryKey) {
if ($HiveDictionary[$DictionaryKey] -in 'All', 'All+Default', 'Default', 'AllDomain+Default', 'AllDomain', 'AllDomain+Other', 'AllDomain+Other+Default') {
foreach ($Computer in $Computers) {
$SubKeys = Get-PSRegistry -RegistryPath "HKEY_USERS" -ComputerName $Computer -ExpandEnvironmentNames:$ExpandEnvironmentNames.IsPresent -DoNotUnmount
if ($SubKeys.PSSubKeys) {
$RegistryKeys = ConvertTo-HKeyUser -SubKeys ($SubKeys.PSSubKeys | Sort-Object) -HiveDictionary $HiveDictionary -DictionaryKey $DictionaryKey -RegistryPath $R
foreach ($S in $RegistryKeys) {
[PSCustomObject] @{
ComputerName = $Computer
RegistryPath = $S
Error = $null
ErrorMessage = $null
}
}
} else {
[PSCustomObject] @{
ComputerName = $Computer
RegistryPath = $R
Error = $true
ErrorMessage = "Couldn't connect to $Computer to list HKEY_USERS"
}
}
}
} elseif ($FirstPart -in 'Users', 'HKEY_USERS', 'HKU' -and $SplitParts[1] -and $SplitParts[1] -like "Offline_*") {
foreach ($Computer in $Computers) {
$SubKeys = Get-PSRegistry -RegistryPath "HKEY_USERS" -ComputerName $Computer -ExpandEnvironmentNames:$ExpandEnvironmentNames.IsPresent -DoNotUnmount
if ($SubKeys.PSSubKeys) {
$RegistryKeys = ConvertTo-HKeyUser -SubKeys ($SubKeys.PSSubKeys + $SplitParts[1] | Sort-Object) -HiveDictionary $HiveDictionary -DictionaryKey $DictionaryKey -RegistryPath $R
foreach ($S in $RegistryKeys) {
[PSCustomObject] @{
ComputerName = $Computer
RegistryPath = $S
Error = $null
ErrorMessage = $null
}
}
} else {
[PSCustomObject] @{
ComputerName = $Computer
RegistryPath = $R
Error = $true
ErrorMessage = "Couldn't connect to $Computer to list HKEY_USERS"
}
}
}
} else {
$R
}
break
}
}
}
$FixedPath
}
function Get-PSRegistryDictionaries {
<#
.SYNOPSIS
Retrieves a set of registry dictionaries for common registry hives and keys.
.DESCRIPTION
This function retrieves a set of registry dictionaries that provide mappings for common registry hives and keys. These dictionaries can be used to easily reference different registry locations in PowerShell scripts.
.EXAMPLE
Get-PSRegistryDictionaries
Description:
Retrieves all the registry dictionaries.
#>
[cmdletBinding()]
param()
if ($Script:Dictionary) {
return
}
$Script:Dictionary = @{
'HKUAD:' = 'HKEY_ALL_USERS_DEFAULT'
'HKUA:' = 'HKEY_ALL_USERS'
'HKUD:' = 'HKEY_DEFAULT_USER'
'HKUDUD:' = 'HKEY_ALL_DOMAIN_USERS_DEFAULT'
'HKUDU:' = 'HKEY_ALL_DOMAIN_USERS'
'HKUDUO:' = 'HKEY_ALL_DOMAIN_USERS_OTHER'
'HKUDUDO:' = 'HKEY_ALL_DOMAIN_USERS_OTHER_DEFAULT'
'HKCR:' = 'HKEY_CLASSES_ROOT'
'HKCU:' = 'HKEY_CURRENT_USER'
'HKLM:' = 'HKEY_LOCAL_MACHINE'
'HKU:' = 'HKEY_USERS'
'HKCC:' = 'HKEY_CURRENT_CONFIG'
'HKDD:' = 'HKEY_DYN_DATA'
'HKPD:' = 'HKEY_PERFORMANCE_DATA'
}
$Script:HiveDictionary = [ordered] @{
'HKEY_ALL_USERS_DEFAULT' = 'All+Default'
'HKUAD' = 'All+Default'
'HKEY_ALL_USERS' = 'All'
'HKUA' = 'All'
'HKEY_ALL_DOMAIN_USERS_DEFAULT' = 'AllDomain+Default'
'HKUDUD' = 'AllDomain+Default'
'HKEY_ALL_DOMAIN_USERS' = 'AllDomain'
'HKUDU' = 'AllDomain'
'HKEY_DEFAULT_USER' = 'Default'
'HKUD' = 'Default'
'HKEY_ALL_DOMAIN_USERS_OTHER' = 'AllDomain+Other'
'HKUDUO' = 'AllDomain+Other'
'HKUDUDO' = 'AllDomain+Other+Default'
'HKEY_ALL_DOMAIN_USERS_OTHER_DEFAULT' = 'AllDomain+Other+Default'
'HKEY_CLASSES_ROOT' = 'ClassesRoot'
'HKCR' = 'ClassesRoot'
'ClassesRoot' = 'ClassesRoot'
'HKCU' = 'CurrentUser'
'HKEY_CURRENT_USER' = 'CurrentUser'
'CurrentUser' = 'CurrentUser'
'HKLM' = 'LocalMachine'
'HKEY_LOCAL_MACHINE' = 'LocalMachine'
'LocalMachine' = 'LocalMachine'
'HKU' = 'Users'
'HKEY_USERS' = 'Users'
'Users' = 'Users'
'HKCC' = 'CurrentConfig'
'HKEY_CURRENT_CONFIG' = 'CurrentConfig'
'CurrentConfig' = 'CurrentConfig'
'HKDD' = 'DynData'
'HKEY_DYN_DATA' = 'DynData'
'DynData' = 'DynData'
'HKPD' = 'PerformanceData'
'HKEY_PERFORMANCE_DATA ' = 'PerformanceData'
'PerformanceData' = 'PerformanceData'
}
$Script:ReverseTypesDictionary = [ordered] @{
'REG_SZ' = 'string'
'REG_NONE' = 'none'
'REG_EXPAND_SZ' = 'expandstring'
'REG_BINARY' = 'binary'
'REG_DWORD' = 'dword'
'REG_MULTI_SZ' = 'multistring'
'REG_QWORD' = 'qword'
'string' = 'string'
'expandstring' = 'expandstring'
'binary' = 'binary'
'dword' = 'dword'
'multistring' = 'multistring'
'qword' = 'qword'
'none' = 'none'
}
}
function Get-PSSubRegistry {
<#
.SYNOPSIS
Retrieves a subkey from the Windows Registry on a local or remote computer.
.DESCRIPTION
The Get-PSSubRegistry function retrieves a subkey from the Windows Registry on a local or remote computer. It can be used to access specific registry keys and their values.
.PARAMETER Registry
Specifies the registry key to retrieve. This parameter should be an IDictionary object containing information about the registry key.
.PARAMETER ComputerName
Specifies the name of the computer from which to retrieve the registry key. This parameter is optional and defaults to the local computer.
.PARAMETER Remote
Indicates that the registry key should be retrieved from a remote computer.
.PARAMETER ExpandEnvironmentNames
Indicates whether environment variable names in the registry key should be expanded.
.EXAMPLE
Get-PSSubRegistry -Registry $Registry -ComputerName "RemoteComputer" -Remote
Retrieves a subkey from the Windows Registry on a remote computer named "RemoteComputer".
.EXAMPLE
Get-PSSubRegistry -Registry $Registry -ExpandEnvironmentNames
Retrieves a subkey from the Windows Registry on the local computer with expanded environment variable names.
#>
[cmdletBinding()]
param(
[System.Collections.IDictionary] $Registry,
[string] $ComputerName,
[switch] $Remote,
[switch] $ExpandEnvironmentNames
)
if ($Registry.ComputerName) {
if ($Registry.ComputerName -ne $ComputerName) {
return
}
}
if (-not $Registry.Error) {
try {
if ($Remote) {
$BaseHive = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey($Registry.HiveKey, $ComputerName, 0 )
} else {
$BaseHive = [Microsoft.Win32.RegistryKey]::OpenBaseKey($Registry.HiveKey, 0 )
}
$PSConnection = $true
$PSError = $null
} catch {
$PSConnection = $false
$PSError = $($_.Exception.Message)
}
} else {
$PSConnection = $false
$PSError = $($Registry.ErrorMessage)
}
if ($PSError) {
[PSCustomObject] @{
PSComputerName = $ComputerName
PSConnection = $PSConnection
PSError = $true
PSErrorMessage = $PSError
PSPath = $Registry.Registry
PSKey = $Registry.Key
PSValue = $null
PSType = $null
}
} else {
try {
$SubKey = $BaseHive.OpenSubKey($Registry.SubKeyName, $false)
if ($null -ne $SubKey) {
[PSCustomObject] @{
PSComputerName = $ComputerName
PSConnection = $PSConnection
PSError = $false
PSErrorMessage = $null
PSPath = $Registry.Registry
PSKey = $Registry.Key
PSValue = if (-not $ExpandEnvironmentNames) {
$SubKey.GetValue($Registry.Key, $null, [Microsoft.Win32.RegistryValueOptions]::DoNotExpandEnvironmentNames)
} else {
$SubKey.GetValue($Registry.Key)
}
PSType = $SubKey.GetValueKind($Registry.Key)
}
} else {
[PSCustomObject] @{
PSComputerName = $ComputerName
PSConnection = $PSConnection
PSError = $true
PSErrorMessage = "Registry path $($Registry.Registry) doesn't exists."
PSPath = $Registry.Registry
PSKey = $Registry.Key
PSValue = $null
PSType = $null
}
}
} catch {
[PSCustomObject] @{
PSComputerName = $ComputerName
PSConnection = $PSConnection
PSError = $true
PSErrorMessage = $_.Exception.Message
PSPath = $Registry.Registry
PSKey = $Registry.Key
PSValue = $null
PSType = $null
}
}
}
if ($null -ne $SubKey) {
$SubKey.Close()
$SubKey.Dispose()
}
if ($null -ne $BaseHive) {
$BaseHive.Close()
$BaseHive.Dispose()
}
}
function Get-PSSubRegistryComplete {
<#
.SYNOPSIS
Retrieves sub-registry information from a specified registry key.
.DESCRIPTION
This function retrieves sub-registry information from a specified registry key on a local or remote computer.
.PARAMETER Registry
Specifies the registry key information to retrieve.
.PARAMETER ComputerName
Specifies the name of the computer from which to retrieve the registry information.
.PARAMETER Remote
Indicates whether the registry key is located on a remote computer.
.PARAMETER Advanced
Indicates whether to retrieve advanced registry information.
.PARAMETER ExpandEnvironmentNames
Indicates whether to expand environment variable names in the registry.
.EXAMPLE
Get-PSSubRegistryComplete -Registry $Registry -ComputerName "Computer01" -Remote -Advanced
Retrieves advanced sub-registry information from the specified registry key on a remote computer named "Computer01".
.EXAMPLE
Get-PSSubRegistryComplete -Registry $Registry -ComputerName "Computer02"
Retrieves sub-registry information from the specified registry key on a local computer named "Computer02".
#>
[cmdletBinding()]
param(
[System.Collections.IDictionary] $Registry,
[string] $ComputerName,
[switch] $Remote,
[switch] $Advanced,
[switch] $ExpandEnvironmentNames
)
if ($Registry.ComputerName) {
if ($Registry.ComputerName -ne $ComputerName) {
return
}
}
if (-not $Registry.Error) {
try {
if ($Remote) {
$BaseHive = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey($Registry.HiveKey, $ComputerName, 0 )
} else {
$BaseHive = [Microsoft.Win32.RegistryKey]::OpenBaseKey($Registry.HiveKey, 0 )
}
$PSConnection = $true
$PSError = $null
} catch {
$PSConnection = $false
$PSError = $($_.Exception.Message)
}
} else {
$PSConnection = $false
$PSError = $($Registry.ErrorMessage)
}
if ($PSError) {
[PSCustomObject] @{
PSComputerName = $ComputerName
PSConnection = $PSConnection
PSError = $true
PSErrorMessage = $PSError
PSSubKeys = $null
PSPath = $Registry.Registry
PSKey = $Registry.Key
}
} else {
try {
$SubKey = $BaseHive.OpenSubKey($Registry.SubKeyName, $false)
if ($null -ne $SubKey) {
$Object = [ordered] @{
PSComputerName = $ComputerName
PSConnection = $PSConnection
PSError = $false
PSErrorMessage = $null
PSSubKeys = $SubKey.GetSubKeyNames()
PSPath = $Registry.Registry
}
$Keys = $SubKey.GetValueNames()
foreach ($K in $Keys) {
if ($K -eq "") {
if ($Advanced) {
$Object['DefaultKey'] = [ordered] @{
Value = if (-not $ExpandEnvironmentNames) {
$SubKey.GetValue($K, $null, [Microsoft.Win32.RegistryValueOptions]::DoNotExpandEnvironmentNames)
} else {
$SubKey.GetValue($K)
}
Type = $SubKey.GetValueKind($K)
}
} else {
$Object['DefaultKey'] = $SubKey.GetValue($K)
}
} else {
if ($Advanced) {
$Object[$K] = [ordered] @{
Value = if (-not $ExpandEnvironmentNames) {
$SubKey.GetValue($K, $null, [Microsoft.Win32.RegistryValueOptions]::DoNotExpandEnvironmentNames)
} else {
$SubKey.GetValue($K)
}
Type = $SubKey.GetValueKind($K)
}
} else {
$Object[$K] = if (-not $ExpandEnvironmentNames) {
$SubKey.GetValue($K, $null, [Microsoft.Win32.RegistryValueOptions]::DoNotExpandEnvironmentNames)
} else {
$SubKey.GetValue($K)
}
}
}
}
[PSCustomObject] $Object
} else {
[PSCustomObject] @{
PSComputerName = $ComputerName
PSConnection = $PSConnection
PSError = $true
PSErrorMessage = "Registry path $($Registry.Registry) doesn't exists."
PSSubKeys = $null
PSPath = $Registry.Registry
}
}
} catch {
[PSCustomObject] @{
PSComputerName = $ComputerName
PSConnection = $PSConnection
PSError = $true
PSErrorMessage = $_.Exception.Message
PSSubKeys = $null
PSPath = $Registry.Registry
}
}
}
if ($null -ne $SubKey) {
$SubKey.Close()
$SubKey.Dispose()
}
if ($null -ne $BaseHive) {
$BaseHive.Close()
$BaseHive.Dispose()
}
}
function Get-PSSubRegistryTranslated {
<#
.SYNOPSIS
Retrieves the translated sub-registry information based on the provided RegistryPath, HiveDictionary, and Key.
.DESCRIPTION
This function retrieves the translated sub-registry information by matching the RegistryPath with the HiveDictionary. It returns an ordered hashtable with details such as Registry, HiveKey, SubKeyName, Key, Error, and ErrorMessage.
.PARAMETER RegistryPath
Specifies an array of registry paths to be translated.
.PARAMETER HiveDictionary
Specifies a dictionary containing mappings of hive names to their corresponding keys.
.PARAMETER Key
Specifies a string key to be included in the output.
.EXAMPLE
Get-PSSubRegistryTranslated -RegistryPath "HKLM\Software\Microsoft" -HiveDictionary @{ "HKLM" = "HKEY_LOCAL_MACHINE" } -Key "Version"
Retrieves the translated sub-registry information for the specified registry path under HKEY_LOCAL_MACHINE hive with the key "Version".
.EXAMPLE
Get-PSSubRegistryTranslated -RegistryPath "HKCU\Software\Microsoft" -HiveDictionary @{ "HKCU" = "HKEY_CURRENT_USER" }
Retrieves the translated sub-registry information for the specified registry path under HKEY_CURRENT_USER hive without specifying a key.
#>
[cmdletBinding()]
param(
[Array] $RegistryPath,
[System.Collections.IDictionary] $HiveDictionary,
[string] $Key
)
foreach ($Registry in $RegistryPath) {
if ($Registry -is [string]) {
$Registry = $Registry.Replace("\\", "\").Replace("\\", "\").TrimStart("\").TrimEnd("\")
$FirstPartSplit = $Registry -split "\\"
$FirstPart = $FirstPartSplit[0]
} else {
$Registry.RegistryPath = $Registry.RegistryPath.Replace("\\", "\").Replace("\\", "\").TrimStart("\").TrimEnd("\")
$FirstPartSplit = $Registry.RegistryPath -split "\\"
$FirstPart = $FirstPartSplit[0]
}
foreach ($Hive in $HiveDictionary.Keys) {
if ($Registry -is [string] -and $FirstPart -eq $Hive) {
if ($Hive.Length -eq $Registry.Length) {
[ordered] @{
Registry = $Registry
HiveKey = $HiveDictionary[$Hive]
SubKeyName = $null
Key = if ($Key -eq "") {
$null
} else {
$Key
}
Error = $null
ErrorMessage = $null
}
} else {
[ordered] @{
Registry = $Registry
HiveKey = $HiveDictionary[$Hive]
SubKeyName = $Registry.substring($Hive.Length + 1)
Key = if ($Key -eq "") {
$null
} else {
$Key
}
Error = $null
ErrorMessage = $null
}
}
break
} elseif ($Registry -isnot [string] -and $FirstPart -eq $Hive) {
if ($Hive.Length -eq $Registry.RegistryPath.Length) {
[ordered] @{
ComputerName = $Registry.ComputerName
Registry = $Registry.RegistryPath
HiveKey = $HiveDictionary[$Hive]
SubKeyName = $null
Key = if ($Key -eq "") {
$null
} else {
$Key
}
Error = $Registry.Error
ErrorMessage = $Registry.ErrorMessage
}
} else {
[ordered] @{
ComputerName = $Registry.ComputerName
Registry = $Registry.RegistryPath
HiveKey = $HiveDictionary[$Hive]
SubKeyName = $Registry.RegistryPath.substring($Hive.Length + 1)
Key = if ($Key -eq "") {
$null
} else {
$Key
}
Error = $Registry.Error
ErrorMessage = $Registry.ErrorMessage
}
}
break
}
}
}
}
function Remove-PrivateRegistry {
<#
.SYNOPSIS
Removes a private registry key on a local or remote computer.
.DESCRIPTION
The Remove-PrivateRegistry function removes a registry key on a specified computer. It can be used to delete registry keys for a specific hive key, subkey, and key value.
.PARAMETER Computer
Specifies the name of the computer where the registry key will be removed.
.PARAMETER Key
Specifies the key value to be removed.
.PARAMETER RegistryValue
Specifies the registry key information to be removed. This should be an IDictionary object containing the hive key, subkey, and key value.
.PARAMETER Remote
Indicates whether the registry operation should be performed on a remote computer.
.PARAMETER Suppress
Suppresses the error message if set to true.
.EXAMPLE
Remove-PrivateRegistry -Computer 'Server01' -Key 'Version' -RegistryValue @{ HiveKey = 'LocalMachine'; SubKeyName = 'Software\MyApp' }
Description:
Removes the registry key 'Version' under 'LocalMachine\Software\MyApp' on the local computer 'Server01'.
.EXAMPLE
Remove-PrivateRegistry -Computer 'Workstation01' -Key 'Wallpaper' -RegistryValue @{ HiveKey = 'CurrentUser'; SubKeyName = 'Control Panel\Desktop' } -Remote
Description:
Removes the registry key 'Wallpaper' under 'CurrentUser\Control Panel\Desktop' on the remote computer 'Workstation01'.
#>
[cmdletBinding(SupportsShouldProcess)]
param(
[string] $Computer,
[string] $Key,
[System.Collections.IDictionary] $RegistryValue,
[switch] $Remote,
[switch] $Suppress
)
$PSConnection = $null
$PSError = $null
$PSErrorMessage = $null
try {
if ($Remote) {
$BaseHive = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey($RegistryValue.HiveKey, $Computer, 0 )
} else {
$BaseHive = [Microsoft.Win32.RegistryKey]::OpenBaseKey($RegistryValue.HiveKey, 0 )
}
$PSConnection = $true
$PSError = $null
} catch {
$PSConnection = $false
$PSError = $($_.Exception.Message)
if ($PSBoundParameters.ErrorAction -eq 'Stop') {
if ($null -ne $BaseHive) {
$BaseHive.Close()
$BaseHive.Dispose()
}
throw
} else {
Write-Warning "Remove-PSRegistry - Removing registry $($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName) key $($RegistryValue.Key) on $Computer have failed. Error: $($_.Exception.Message.Replace([System.Environment]::NewLine, " "))"
}
}
if ($PSError) {
if (-not $Suppress) {
[PSCustomObject] @{
PSComputerName = $Computer
PSConnection = $PSConnection
PSError = $true
PSErrorMessage = $PSError
Path = "$($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName)"
Key = $RegistryValue.Key
}
}
} else {
try {
if ($Key) {
$SubKey = $BaseHive.OpenSubKey($RegistryValue.SubKeyName, $true)
if ($PSCmdlet.ShouldProcess($Computer, "Removing registry $($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName) key $($RegistryValue.Key)")) {
if ($SubKey) {
$SubKey.DeleteValue($RegistryValue.Key, $true)
}
} else {
$PSError = $true
$PSErrorMessage = "WhatIf was used. No changes done."
}
} else {
if ($PSCmdlet.ShouldProcess($Computer, "Removing registry $($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName) folder")) {
if ($BaseHive) {
if ($Recursive) {
$BaseHive.DeleteSubKeyTree($RegistryValue.SubKeyName, $true)
} else {
$BaseHive.DeleteSubKey($RegistryValue.SubKeyName, $true)
}
}
} else {
$PSError = $true
$PSErrorMessage = "WhatIf was used. No changes done."
}
}
if (-not $Suppress) {
[PSCustomObject] @{
PSComputerName = $Computer
PSConnection = $PSConnection
PSError = $PSError
PSErrorMessage = $PSErrorMessage
Path = "$($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName)"
Key = $RegistryValue.Key
}
}
} catch {
if ($PSBoundParameters.ErrorAction -eq 'Stop') {
if ($null -ne $SubKey) {
$SubKey.Close()
$SubKey.Dispose()
}
if ($null -ne $BaseHive) {
$BaseHive.Close()
$BaseHive.Dispose()
}
throw
} else {
Write-Warning "Remove-PSRegistry - Removing registry $($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName) key $($RegistryValue.Key) on $Computer have failed. Error: $($_.Exception.Message.Replace([System.Environment]::NewLine, " "))"
}
if (-not $Suppress) {
[PSCustomObject] @{
PSComputerName = $Computer
PSConnection = $PSConnection
PSError = $true
PSErrorMessage = $_.Exception.Message
Path = "$($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName)"
Key = $RegistryValue.Key
}
}
}
}
if ($null -ne $SubKey) {
$SubKey.Close()
$SubKey.Dispose()
}
if ($null -ne $BaseHive) {
$BaseHive.Close()
$BaseHive.Dispose()
}
}
function Resolve-PrivateRegistry {
<#
.SYNOPSIS
Resolves and standardizes registry paths for consistency and compatibility.
.DESCRIPTION
The Resolve-PrivateRegistry function resolves and standardizes registry paths to ensure uniformity and compatibility across different systems. It cleans up the paths, converts short hive names to full names, and handles special cases like DEFAULT USER mappings.
.PARAMETER RegistryPath
Specifies an array of registry paths to be resolved and standardized.
.EXAMPLE
Resolve-PrivateRegistry -RegistryPath 'Users\.DEFAULT_USER\Software\MyApp'
Resolves the registry path 'Users\.DEFAULT_USER\Software\MyApp' to 'HKUD\Software\MyApp' for consistent usage.
.EXAMPLE
Resolve-PrivateRegistry -RegistryPath 'HKCU\Software\MyApp'
Resolves the registry path 'HKCU\Software\MyApp' to 'HKEY_CURRENT_USER\Software\MyApp' for compatibility with standard naming conventions.
#>
[CmdletBinding()]
param(
[alias('Path')][string[]] $RegistryPath
)
foreach ($R in $RegistryPath) {
$R = $R.Replace("\\", "\").Replace("\\", "\")
If ($R.StartsWith("Users\.DEFAULT_USER") -or $R.StartsWith('HKEY_USERS\.DEFAULT_USER')) {
$R = $R.Replace("Users\.DEFAULT_USER", "HKUD")
$R.Replace('HKEY_USERS\.DEFAULT_USER', "HKUD")
} elseif ($R -like '*:*') {
$Found = $false
foreach ($DictionaryKey in $Script:Dictionary.Keys) {
$SplitParts = $R.Split("\")
$FirstPart = $SplitParts[0]
if ($FirstPart -eq $DictionaryKey) {
$R -replace $DictionaryKey, $Script:Dictionary[$DictionaryKey]
$Found = $true
break
}
}
if (-not $Found) {
$R.Replace(":", "")
}
} else {
$R
}
}
}
function Set-PrivateRegistry {
<#
.SYNOPSIS
Sets a registry value on a local or remote computer.
.DESCRIPTION
The Set-PrivateRegistry function sets a registry value on a specified computer. It can be used to create new registry keys and values, update existing ones, or delete them.
.PARAMETER RegistryValue
Specifies the registry value to be set. This parameter should be an IDictionary object containing the following properties:
- HiveKey: The registry hive key (e.g., 'LocalMachine', 'CurrentUser').
- SubKeyName: The subkey path where the value will be set.
- Key: The name of the registry value.
- Value: The data to be stored in the registry value.
- ValueKind: The type of data being stored (e.g., String, DWord, MultiString).
.PARAMETER Computer
Specifies the name of the computer where the registry value will be set.
.PARAMETER Remote
Indicates that the registry value should be set on a remote computer.
.PARAMETER Suppress
Suppresses error messages and warnings.
.EXAMPLE
Set-PrivateRegistry -RegistryValue @{HiveKey='LocalMachine'; SubKeyName='SOFTWARE\MyApp'; Key='Version'; Value='1.0'; ValueKind='String'} -Computer 'Server01'
Sets the registry value 'Version' under 'HKEY_LOCAL_MACHINE\SOFTWARE\MyApp' to '1.0' on the local computer 'Server01'.
.EXAMPLE
Set-PrivateRegistry -RegistryValue @{HiveKey='CurrentUser'; SubKeyName='Environment'; Key='Path'; Value='C:\MyApp'; ValueKind='String'} -Computer 'Server02' -Remote
Sets the registry value 'Path' under 'HKEY_CURRENT_USER\Environment' to 'C:\MyApp' on the remote computer 'Server02'.
.NOTES
File Name : Set-PrivateRegistry.ps1
Prerequisite : This function requires administrative privileges to modify the registry.
#>
[cmdletBinding(SupportsShouldProcess)]
param(
[System.Collections.IDictionary] $RegistryValue,
[string] $Computer,
[switch] $Remote,
[switch] $Suppress
)
Write-Verbose -Message "Set-PSRegistry - Setting registry $($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName) on $($RegistryValue.Key) to $($RegistryValue.Value) of $($RegistryValue.ValueKind) on $Computer"
if ($RegistryValue.ComputerName) {
if ($RegistryValue.ComputerName -ne $Computer) {
return
}
}
try {
if ($Remote) {
$BaseHive = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey($RegistryValue.HiveKey, $Computer, 0 )
} else {
$BaseHive = [Microsoft.Win32.RegistryKey]::OpenBaseKey($RegistryValue.HiveKey, 0 )
}
$PSConnection = $true
$PSError = $null
} catch {
$PSConnection = $false
$PSError = $($_.Exception.Message)
if ($PSBoundParameters.ErrorAction -eq 'Stop') {
if ($null -ne $BaseHive) {
$BaseHive.Close()
$BaseHive.Dispose()
}
throw
} else {
Write-Warning "Set-PSRegistry - Setting registry $($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName) on $($RegistryValue.Key) to $($RegistryValue.Value) of $($RegistryValue.ValueKind) on $Computer have failed. Error: $($_.Exception.Message.Replace([System.Environment]::NewLine, " "))"
}
}
if ($PSCmdlet.ShouldProcess($Computer, "Setting registry $($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName) on $($RegistryValue.Key) to $($RegistryValue.Value) of $($RegistryValue.ValueKind)")) {
if ($PSError) {
if (-not $Suppress) {
[PSCustomObject] @{
PSComputerName = $Computer
PSConnection = $PSConnection
PSError = $true
PSErrorMessage = $PSError
Path = "$($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName)"
Key = $RegistryValue.Key
Value = $RegistryValue.Value
Type = $RegistryValue.ValueKind
}
}
} else {
try {
$SubKey = $BaseHive.OpenSubKey($RegistryValue.SubKeyName, $true)
if (-not $SubKey) {
$SubKeysSplit = $RegistryValue.SubKeyName.Split('\')
$SubKey = $BaseHive.OpenSubKey($SubKeysSplit[0], $true)
if (-not $SubKey) {
$SubKey = $BaseHive.CreateSubKey($SubKeysSplit[0])
}
$SubKey = $BaseHive.OpenSubKey($SubKeysSplit[0], $true)
foreach ($S in $SubKeysSplit | Select-Object -Skip 1) {
$SubKey = $SubKey.CreateSubKey($S)
}
}
if ($RegistryValue.ValueKind -eq [Microsoft.Win32.RegistryValueKind]::MultiString) {
$SubKey.SetValue($RegistryValue.Key, [string[]] $RegistryValue.Value, $RegistryValue.ValueKind)
} elseif ($RegistryValue.ValueKind -in [Microsoft.Win32.RegistryValueKind]::None, [Microsoft.Win32.RegistryValueKind]::Binary) {
$SubKey.SetValue($RegistryValue.Key, [byte[]] $RegistryValue.Value, $RegistryValue.ValueKind)
} else {
$SubKey.SetValue($RegistryValue.Key, $RegistryValue.Value, $RegistryValue.ValueKind)
}
if (-not $Suppress) {
[PSCustomObject] @{
PSComputerName = $Computer
PSConnection = $PSConnection
PSError = $false
PSErrorMessage = $null
Path = "$($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName)"
Key = $RegistryValue.Key
Value = $RegistryValue.Value
Type = $RegistryValue.ValueKind
}
}
} catch {
if ($PSBoundParameters.ErrorAction -eq 'Stop') {
if ($null -ne $SubKey) {
$SubKey.Close()
$SubKey.Dispose()
}
if ($null -ne $BaseHive) {
$BaseHive.Close()
$BaseHive.Dispose()
}
throw
} else {
Write-Warning "Set-PSRegistry - Setting registry $($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName) on $($RegistryValue.Key) to $($RegistryValue.Value) of $($RegistryValue.ValueKind) on $Computer have failed. Error: $($_.Exception.Message.Replace([System.Environment]::NewLine, " "))"
}
if (-not $Suppress) {
[PSCustomObject] @{
PSComputerName = $Computer
PSConnection = $PSConnection
PSError = $true
PSErrorMessage = $_.Exception.Message
Path = "$($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName)"
Key = $RegistryValue.Key
Value = $RegistryValue.Value
Type = $RegistryValue.ValueKind
}
}
}
}
} else {
if (-not $Suppress) {
[PSCustomObject] @{
PSComputerName = $Computer
PSConnection = $PSConnection
PSError = $true
PSErrorMessage = if ($PSError) {
$PSError
} else {
"WhatIf used - skipping registry setting"
}
Path = "$($RegistryValue.HiveKey)\$($RegistryValue.SubKeyName)"
Key = $RegistryValue.Key
Value = $RegistryValue.Value
Type = $RegistryValue.ValueKind
}
}
}
if ($null -ne $SubKey) {
$SubKey.Close()
$SubKey.Dispose()
}
if ($null -ne $BaseHive) {
$BaseHive.Close()
$BaseHive.Dispose()
}
}
function Test-ComputerPort {
<#
.SYNOPSIS
Tests the connectivity of a computer on specified TCP and UDP ports.
.DESCRIPTION
The Test-ComputerPort function tests the connectivity of a computer on specified TCP and UDP ports. It checks if the specified ports are open and reachable on the target computer.
.PARAMETER ComputerName
Specifies the name of the computer to test the port connectivity.
.PARAMETER PortTCP
Specifies an array of TCP ports to test connectivity.
.PARAMETER PortUDP
Specifies an array of UDP ports to test connectivity.
.PARAMETER Timeout
Specifies the timeout value in milliseconds for the connection test. Default is 5000 milliseconds.
.EXAMPLE
Test-ComputerPort -ComputerName "Server01" -PortTCP 80,443 -PortUDP 53 -Timeout 3000
Tests the connectivity of Server01 on TCP ports 80 and 443, UDP port 53 with a timeout of 3000 milliseconds.
.EXAMPLE
Test-ComputerPort -ComputerName "Server02" -PortTCP 3389 -PortUDP 123
Tests the connectivity of Server02 on TCP port 3389, UDP port 123 with the default timeout of 5000 milliseconds.
#>
[CmdletBinding()]
param (
[alias('Server')][string[]] $ComputerName,
[int[]] $PortTCP,
[int[]] $PortUDP,
[int]$Timeout = 5000
)
begin {
if ($Global:ProgressPreference -ne 'SilentlyContinue') {
$TemporaryProgress = $Global:ProgressPreference
$Global:ProgressPreference = 'SilentlyContinue'
}
}
process {
foreach ($Computer in $ComputerName) {
foreach ($P in $PortTCP) {
$Output = [ordered] @{
'ComputerName' = $Computer
'Port' = $P
'Protocol' = 'TCP'
'Status' = $null
'Summary' = $null
'Response' = $null
}
$TcpClient = Test-NetConnection -ComputerName $Computer -Port $P -InformationLevel Detailed -WarningAction SilentlyContinue
if ($TcpClient.TcpTestSucceeded) {
$Output['Status'] = $TcpClient.TcpTestSucceeded
$Output['Summary'] = "TCP $P Successful"
} else {
$Output['Status'] = $false
$Output['Summary'] = "TCP $P Failed"
$Output['Response'] = $Warnings
}
[PSCustomObject]$Output
}
foreach ($P in $PortUDP) {
$Output = [ordered] @{
'ComputerName' = $Computer
'Port' = $P
'Protocol' = 'UDP'
'Status' = $null
'Summary' = $null
}
$UdpClient = [System.Net.Sockets.UdpClient]::new($Computer, $P)
$UdpClient.Client.ReceiveTimeout = $Timeout
$Encoding = [System.Text.ASCIIEncoding]::new()
$byte = $Encoding.GetBytes("Evotec")
[void]$UdpClient.Send($byte, $byte.length)
$RemoteEndpoint = [System.Net.IPEndPoint]::new([System.Net.IPAddress]::Any, 0)
try {
$Bytes = $UdpClient.Receive([ref]$RemoteEndpoint)
[string]$Data = $Encoding.GetString($Bytes)
If ($Data) {
$Output['Status'] = $true
$Output['Summary'] = "UDP $P Successful"
$Output['Response'] = $Data
}
} catch {
$Output['Status'] = $false
$Output['Summary'] = "UDP $P Failed"
$Output['Response'] = $_.Exception.Message
}
$UdpClient.Close()
$UdpClient.Dispose()
[PSCustomObject]$Output
}
}
}
end {
if ($TemporaryProgress) {
$Global:ProgressPreference = $TemporaryProgress
}
}
}
function Test-IPIsInNetwork {
<#
.SYNOPSIS
Checks if an IP address falls within a specified range defined by binary start and end values.
.DESCRIPTION
This function compares the binary representation of an IP address with the binary start and end values to determine if the IP address falls within the specified range.
.EXAMPLE
Test-IPIsInNetwork -IP "192.168.1.10" -StartBinary "11000000101010000000000100000000" -EndBinary "11000000101010000000000111111111"
Description:
Checks if the IP address 192.168.1.10 falls within the range defined by the binary start and end values.
#>
[cmdletBinding()]
param(
[string] $IP,
[string] $StartBinary,
[string] $EndBinary
)
$TestIPBinary = Convert-IPToBinary $IP
[int64] $TestIPInt64 = [System.Convert]::ToInt64($TestIPBinary, 2)
[int64] $StartInt64 = [System.Convert]::ToInt64($StartBinary, 2)
[int64] $EndInt64 = [System.Convert]::ToInt64($EndBinary, 2)
if ($TestIPInt64 -ge $StartInt64 -and $TestIPInt64 -le $EndInt64) {
return $True
} else {
return $False
}
}
function Test-WinRM {
<#
.SYNOPSIS
Tests the WinRM connectivity on the specified computers.
.DESCRIPTION
The Test-WinRM function tests the WinRM connectivity on the specified computers and returns the status of the connection.
.PARAMETER ComputerName
Specifies the names of the computers to test WinRM connectivity on.
.EXAMPLE
Test-WinRM -ComputerName "Server01", "Server02"
Tests the WinRM connectivity on Server01 and Server02.
.EXAMPLE
Test-WinRM -ComputerName "Server03"
Tests the WinRM connectivity on Server03.
#>
[CmdletBinding()]
param (
[alias('Server')][string[]] $ComputerName
)
$Output = foreach ($Computer in $ComputerName) {
$Test = [PSCustomObject] @{
Output = $null
Status = $null
ComputerName = $Computer
}
try {
$Test.Output = Test-WSMan -ComputerName $Computer -ErrorAction Stop
$Test.Status = $true
} catch {
$Test.Status = $false
}
$Test
}
$Output
}
function Unregister-MountedRegistry {
<#
.SYNOPSIS
Unregisters mounted registry paths.
.DESCRIPTION
This function unregisters mounted registry paths that were previously mounted using Mount-PSRegistryPath.
.EXAMPLE
Unregister-MountedRegistry
Description:
Unregisters all mounted registry paths.
#>
[CmdletBinding()]
param(
)
if ($null -ne $Script:DefaultRegistryMounted) {
Write-Verbose -Message "Unregister-MountedRegistry - Dismounting HKEY_USERS\.DEFAULT_USER"
$null = Dismount-PSRegistryPath -MountPoint "HKEY_USERS\.DEFAULT_USER"
$Script:DefaultRegistryMounted = $null
}
if ($null -ne $Script:OfflineRegistryMounted) {
foreach ($Key in $Script:OfflineRegistryMounted.Keys) {
if ($Script:OfflineRegistryMounted[$Key].Status -eq $true) {
Write-Verbose -Message "Unregister-MountedRegistry - Dismounting HKEY_USERS\$Key"
$null = Dismount-PSRegistryPath -MountPoint "HKEY_USERS\$Key"
}
}
$Script:OfflineRegistryMounted = $null
}
}
function ConvertTo-HkeyUser {
<#
.SYNOPSIS
Converts registry paths based on specified criteria.
.DESCRIPTION
This function converts registry paths based on the provided HiveDictionary, SubKeys, DictionaryKey, and RegistryPath parameters.
.PARAMETER HiveDictionary
Specifies the dictionary containing the criteria for converting registry paths.
.PARAMETER SubKeys
Specifies an array of subkeys to process.
.PARAMETER DictionaryKey
Specifies the key in the RegistryPath to be replaced.
.PARAMETER RegistryPath
Specifies the original registry path to be converted.
.EXAMPLE
ConvertTo-HkeyUser -HiveDictionary @{ 'Key1' = 'AllDomain'; 'Key2' = 'All+Default' } -SubKeys @('S-1-5-21-123456789-123456789-123456789-1001', '.DEFAULT') -DictionaryKey 'Key1' -RegistryPath 'HKLM:\Software\Key1\SubKey'
Description:
Converts the RegistryPath based on the specified criteria in the HiveDictionary for the provided SubKeys.
.EXAMPLE
ConvertTo-HkeyUser -HiveDictionary @{ 'Key1' = 'Users'; 'Key2' = 'AllDomain+Other' } -SubKeys @('S-1-5-21-123456789-123456789-123456789-1001', 'Offline_User1') -DictionaryKey 'Key2' -RegistryPath 'HKLM:\Software\Key2\SubKey'
Description:
Converts the RegistryPath based on the specified criteria in the HiveDictionary for the provided SubKeys.
#>
[CmdletBinding()]
param(
[System.Collections.IDictionary] $HiveDictionary,
[Array] $SubKeys,
[string] $DictionaryKey,
[string] $RegistryPath
)
$OutputRegistryKeys = foreach ($Sub in $Subkeys) {
if ($HiveDictionary[$DictionaryKey] -eq 'All') {
if ($Sub -notlike "*_Classes*" -and $Sub -ne '.DEFAULT') {
$RegistryPath.Replace($DictionaryKey, "Users\$Sub")
}
} elseif ($HiveDictionary[$DictionaryKey] -eq 'All+Default') {
if ($Sub -notlike "*_Classes*") {
if (-not $Script:DefaultRegistryMounted) {
$Script:DefaultRegistryMounted = Mount-DefaultRegistryPath
}
if ($Sub -eq '.DEFAULT') {
$RegistryPath.Replace($DictionaryKey, "Users\.DEFAULT_USER")
} else {
$RegistryPath.Replace($DictionaryKey, "Users\$Sub")
}
}
} elseif ($HiveDictionary[$DictionaryKey] -eq 'Default') {
if ($Sub -eq '.DEFAULT') {
if (-not $Script:DefaultRegistryMounted) {
$Script:DefaultRegistryMounted = Mount-DefaultRegistryPath
}
$RegistryPath.Replace($DictionaryKey, "Users\.DEFAULT_USER")
}
} elseif ($HiveDictionary[$DictionaryKey] -eq 'AllDomain+Default') {
if (($Sub.StartsWith("S-1-5-21") -and $Sub -notlike "*_Classes*") -or $Sub -eq '.DEFAULT') {
if (-not $Script:DefaultRegistryMounted) {
$Script:DefaultRegistryMounted = Mount-DefaultRegistryPath
}
if ($Sub -eq '.DEFAULT') {
$RegistryPath.Replace($DictionaryKey, "Users\.DEFAULT_USER")
} else {
$RegistryPath.Replace($DictionaryKey, "Users\$Sub")
}
}
} elseif ($HiveDictionary[$DictionaryKey] -eq 'AllDomain+Other') {
if (($Sub.StartsWith("S-1-5-21") -and $Sub -notlike "*_Classes*")) {
if (-not $Script:OfflineRegistryMounted) {
$Script:OfflineRegistryMounted = Mount-AllRegistryPath
foreach ($Key in $Script:OfflineRegistryMounted.Keys) {
$RegistryPath.Replace($DictionaryKey, "Users\$Key")
}
}
$RegistryPath.Replace($DictionaryKey, "Users\$Sub")
}
} elseif ($HiveDictionary[$DictionaryKey] -eq 'AllDomain+Other+Default') {
if (($Sub.StartsWith("S-1-5-21") -and $Sub -notlike "*_Classes*") -or $Sub -eq '.DEFAULT') {
if (-not $Script:DefaultRegistryMounted) {
$Script:DefaultRegistryMounted = Mount-DefaultRegistryPath
}
if (-not $Script:OfflineRegistryMounted) {
$Script:OfflineRegistryMounted = Mount-AllRegistryPath
foreach ($Key in $Script:OfflineRegistryMounted.Keys) {
$RegistryPath.Replace($DictionaryKey, "Users\$Key")
}
}
if ($Sub -eq '.DEFAULT') {
$RegistryPath.Replace($DictionaryKey, "Users\.DEFAULT_USER")
} else {
$RegistryPath.Replace($DictionaryKey, "Users\$Sub")
}
}
} elseif ($HiveDictionary[$DictionaryKey] -eq 'AllDomain') {
if ($Sub.StartsWith("S-1-5-21") -and $Sub -notlike "*_Classes*") {
$RegistryPath.Replace($DictionaryKey, "Users\$Sub")
}
} elseif ($HiveDictionary[$DictionaryKey] -eq 'Users') {
if ($Sub -like "Offline_*") {
$Script:OfflineRegistryMounted = Mount-AllRegistryPath -MountUsers $Sub
foreach ($Key in $Script:OfflineRegistryMounted.Keys) {
if ($Script:OfflineRegistryMounted[$Key].Status -eq $true) {
$RegistryPath
}
}
}
}
}
$OutputRegistryKeys | Sort-Object -Unique
}
function Dismount-PSRegistryPath {
<#
.SYNOPSIS
Dismounts a registry path.
.DESCRIPTION
This function dismounts a registry path specified by the MountPoint parameter. It unloads the registry path using reg.exe command.
.PARAMETER MountPoint
Specifies the registry path to be dismounted.
.PARAMETER Suppress
Suppresses the output if set to $true.
.EXAMPLE
Dismount-PSRegistryPath -MountPoint "HKLM:\Software\MyApp" -Suppress
Dismounts the registry path "HKLM:\Software\MyApp" without displaying any output.
.EXAMPLE
Dismount-PSRegistryPath -MountPoint "HKCU:\Software\Settings"
Dismounts the registry path "HKCU:\Software\Settings" and displays output if successful.
#>
[alias('Dismount-RegistryPath')]
[cmdletbinding()]
param(
[Parameter(Mandatory)][string] $MountPoint,
[switch] $Suppress
)
[gc]::Collect()
$pinfo = [System.Diagnostics.ProcessStartInfo]::new()
$pinfo.FileName = "reg.exe"
$pinfo.RedirectStandardError = $true
$pinfo.RedirectStandardOutput = $true
$pinfo.UseShellExecute = $false
$pinfo.Arguments = " unload $MountPoint"
$pinfo.CreateNoWindow = $true
$pinfo.WindowStyle = [System.Diagnostics.ProcessWindowStyle]::Hidden
$p = [System.Diagnostics.Process]::new()
$p.StartInfo = $pinfo
$p.Start() | Out-Null
$p.WaitForExit()
$Output = $p.StandardOutput.ReadToEnd()
$Errors = $p.StandardError.ReadToEnd()
if ($Errors) {
if ($PSBoundParameters.ErrorAction -eq 'Stop') {
throw $Errors
} else {
Write-Warning -Message "Dismount-PSRegistryPath - Couldn't unmount $MountPoint. $Errors"
}
} else {
if ($Output -like "*operation completed*") {
if (-not $Suppress) {
return $true
}
}
}
if (-not $Suppress) {
return $false
}
}
function Mount-AllRegistryPath {
<#
.SYNOPSIS
Mounts offline registry paths to specified mount points.
.DESCRIPTION
This function mounts offline registry paths to specified mount points. It iterates through all offline registry profiles and mounts them to the specified mount point. Optionally, you can specify a specific user profile to mount.
.PARAMETER MountPoint
Specifies the mount point where the registry paths will be mounted. Default is "HKEY_USERS\".
.PARAMETER MountUsers
Specifies the user profile to mount. If specified, only the specified user profile will be mounted.
.EXAMPLE
Mount-AllRegistryPath -MountPoint "HKEY_USERS\" -MountUsers "User1"
Mounts the offline registry path of user profile "User1" to the default mount point "HKEY_USERS\".
.EXAMPLE
Mount-AllRegistryPath -MountPoint "HKEY_LOCAL_MACHINE\SOFTWARE" -MountUsers "User2"
Mounts the offline registry path of user profile "User2" to the specified mount point "HKEY_LOCAL_MACHINE\SOFTWARE".
#>
[CmdletBinding()]
param(
[string] $MountPoint = "HKEY_USERS\",
[string] $MountUsers
)
$AllProfiles = Get-OfflineRegistryProfilesPath
foreach ($Profile in $AllProfiles.Keys) {
if ($MountUsers) {
if ($MountUsers -ne $Profile) {
continue
}
}
$WhereMount = "$MountPoint\$Profile".Replace("\\", "\")
Write-Verbose -Message "Mount-OfflineRegistryPath - Mounting $WhereMount to $($AllProfiles[$Profile].FilePath)"
$AllProfiles[$Profile].Status = Mount-PSRegistryPath -MountPoint $WhereMount -FilePath $AllProfiles[$Profile].FilePath
}
$AllProfiles
}
function Mount-DefaultRegistryPath {
<#
.SYNOPSIS
Mounts the default registry path to a specified mount point.
.DESCRIPTION
This function mounts the default registry path to a specified mount point. If an error occurs during the process, it provides appropriate feedback.
.PARAMETER MountPoint
Specifies the mount point where the default registry path will be mounted. Default value is "HKEY_USERS\.DEFAULT_USER".
.EXAMPLE
Mount-DefaultRegistryPath -MountPoint "HKLM:\Software\CustomMountPoint"
Mounts the default registry path to the specified custom mount point "HKLM:\Software\CustomMountPoint".
.EXAMPLE
Mount-DefaultRegistryPath
Mounts the default registry path to the default mount point "HKEY_USERS\.DEFAULT_USER".
#>
[CmdletBinding()]
param(
[string] $MountPoint = "HKEY_USERS\.DEFAULT_USER"
)
$DefaultRegistryPath = Get-PSRegistry -RegistryPath 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList' -Key 'Default' -ExpandEnvironmentNames -DoNotUnmount
if ($PSError -ne $true) {
$PathToNTUser = [io.path]::Combine($DefaultRegistryPath.PSValue, 'NTUSER.DAT')
Write-Verbose -Message "Mount-DefaultRegistryPath - Mounting $MountPoint to $PathToNTUser"
Mount-PSRegistryPath -MountPoint $MountPoint -FilePath $PathToNTUser
} else {
if ($PSBoundParameters.ErrorAction -eq 'Stop') {
throw $PSErrorMessage
} else {
Write-Warning -Message "Mount-DefaultRegistryPath - Couldn't execute. Error: $PSErrorMessage"
}
}
}
function Get-OfflineRegistryProfilesPath {
<#
.SYNOPSIS
Retrieves the paths of offline user profiles in the Windows registry.
.DESCRIPTION
This function retrieves the paths of offline user profiles in the Windows registry by comparing the profiles listed in 'HKEY_USERS' with those in 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList'. It then checks for the existence of the 'NTUSER.DAT' file for each profile and returns the paths of offline profiles found.
.EXAMPLE
Get-OfflineRegistryProfilesPath
Retrieves the paths of offline user profiles in the Windows registry and returns a hashtable containing the profile paths.
.NOTES
Name Value
---- -----
Przemek {[FilePath, C:\Users\Przemek\NTUSER.DAT], [Status, ]}
test.1 {[FilePath, C:\Users\test.1\NTUSER.DAT], [Status, ]}
#>
[CmdletBinding()]
param(
)
$Profiles = [ordered] @{}
$CurrentMapping = (Get-PSRegistry -RegistryPath 'HKEY_USERS' -ExpandEnvironmentNames -DoNotUnmount).PSSubKeys
$UsersInSystem = (Get-PSRegistry -RegistryPath 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList' -ExpandEnvironmentNames -DoNotUnmount).PSSubKeys
$MissingProfiles = foreach ($Profile in $UsersInSystem) {
if ($Profile.StartsWith("S-1-5-21") -and $CurrentMapping -notcontains $Profile) {
Get-PSRegistry -RegistryPath "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\$Profile" -ExpandEnvironmentNames -DoNotUnmount
}
}
foreach ($Profile in $MissingProfiles) {
$PathToNTUser = [io.path]::Combine($Profile.ProfileImagePath, 'NTUSER.DAT')
$ProfileName = [io.path]::GetFileName($Profile.ProfileImagePath)
$StartPath = "Offline_$ProfileName"
try {
$PathExists = Test-Path -LiteralPath $PathToNTUser -ErrorAction Stop
if ($PathExists) {
$Profiles[$StartPath] = [ordered] @{
FilePath = $PathToNTUser
Status = $null
}
}
} catch {
Write-Warning -Message "Mount-OfflineRegistryPath - Couldn't execute. Error: $($_.Exception.Message)"
continue
}
}
$Profiles
}
function Mount-PSRegistryPath {
<#
.SYNOPSIS
Mounts a registry path to a specified location.
.DESCRIPTION
This function mounts a registry path to a specified location using the reg.exe utility.
.PARAMETER MountPoint
Specifies the registry mount point where the registry path will be mounted.
.PARAMETER FilePath
Specifies the file path of the registry hive to be mounted.
.EXAMPLE
Mount-PSRegistryPath -MountPoint 'HKEY_USERS\.DEFAULT_USER111' -FilePath 'C:\Users\Default\NTUSER.DAT'
Mounts the registry hive located at 'C:\Users\Default\NTUSER.DAT' to the registry key 'HKEY_USERS\.DEFAULT_USER111'.
.NOTES
This function requires administrative privileges to mount registry paths.
#>
[alias('Mount-RegistryPath')]
[cmdletbinding()]
param(
[Parameter(Mandatory)][string] $MountPoint,
[Parameter(Mandatory)][string] $FilePath
)
$pinfo = [System.Diagnostics.ProcessStartInfo]::new()
$pinfo.FileName = "reg.exe"
$pinfo.RedirectStandardError = $true
$pinfo.RedirectStandardOutput = $true
$pinfo.UseShellExecute = $false
$pinfo.Arguments = " load $MountPoint $FilePath"
$pinfo.CreateNoWindow = $true
$pinfo.WindowStyle = [System.Diagnostics.ProcessWindowStyle]::Hidden
$p = [System.Diagnostics.Process]::new()
$p.StartInfo = $pinfo
$p.Start() | Out-Null
$p.WaitForExit()
$Output = $p.StandardOutput.ReadToEnd()
$Errors = $p.StandardError.ReadToEnd()
if ($Errors) {
if ($PSBoundParameters.ErrorAction -eq 'Stop') {
throw $Errors
} else {
Write-Warning -Message "Mount-PSRegistryPath - Couldn't mount $MountPoint. $Errors"
}
} else {
if ($Output -like "*operation completed*") {
if (-not $Suppress) {
return $true
}
}
}
if (-not $Suppress) {
return $false
}
}
function Add-ACLRule {
<#
.SYNOPSIS
Adds an access control rule to a security descriptor.
.DESCRIPTION
The Add-ACLRule function adds an access control rule to a security descriptor. It allows specifying the access rule to add, the security descriptor, and the ACL.
.PARAMETER AccessRuleToAdd
Specifies the access rule to add.
.PARAMETER ntSecurityDescriptor
Specifies the security descriptor to which the access rule will be added.
.PARAMETER ACL
Specifies the ACL to which the access rule will be added.
.EXAMPLE
Add-ACLRule -AccessRuleToAdd $rule -ntSecurityDescriptor $securityDescriptor -ACL $acl
This example adds the access rule $rule to the security descriptor $securityDescriptor and the ACL $acl.
.NOTES
This function is designed to handle errors related to identity references that could not be translated.
#>
[CmdletBinding()]
param(
$AccessRuleToAdd,
$ntSecurityDescriptor,
$ACL
)
try {
Write-Verbose "Add-ADACL - Adding access for $($AccessRuleToAdd.IdentityReference) / $($AccessRuleToAdd.ActiveDirectoryRights) / $($AccessRuleToAdd.AccessControlType) / $($AccessRuleToAdd.ObjectType) / $($AccessRuleToAdd.InheritanceType) to $($ACL.DistinguishedName)"
if ($ACL.ACL) {
$ntSecurityDescriptor = $ACL.ACL
} elseif ($ntSecurityDescriptor) {
} else {
Write-Warning "Add-PrivateACL - No ACL or ntSecurityDescriptor specified"
return
}
$ntSecurityDescriptor.AddAccessRule($AccessRuleToAdd)
@{ Success = $true; Reason = $null }
} catch {
if ($_.Exception.Message -like "*Some or all identity references could not be translated.*") {
Write-Warning "Add-ADACL - Error adding permissions for $($AccessRuleToAdd.IdentityReference) / $($AccessRuleToAdd.ActiveDirectoryRights) due to error: $($_.Exception.Message). Retrying with SID"
@{ Success = $false; Reason = "Identity" }
} else {
Write-Warning "Add-ADACL - Error adding permissions for $($AccessRuleToAdd.IdentityReference) / $($AccessRuleToAdd.ActiveDirectoryRights) due to error: $($_.Exception.Message)"
@{ Success = $false; Reason = $($_.Exception.Message) }
}
}
}
function Add-PrivateACL {
<#
.SYNOPSIS
Adds a new access control rule to a security descriptor.
.DESCRIPTION
This function adds a new access control rule to a security descriptor. It allows specifying various parameters such as the ACL, principal, access rule, access control type, object type name, inherited object type name, inheritance type, and NT security descriptor.
.PARAMETER ACL
Specifies the ACL object to be processed.
.PARAMETER ADObject
Specifies the Active Directory object to which the ACL belongs.
.PARAMETER Principal
Specifies the principal for which the access control rule is added.
.PARAMETER AccessRule
Specifies the access rule to be added.
.PARAMETER AccessControlType
Specifies the type of access control to be added.
.PARAMETER ObjectType
Specifies the object type name.
.PARAMETER InheritedObjectType
Specifies the inherited object type name.
.PARAMETER InheritanceType
Specifies the inheritance type to consider.
.PARAMETER NTSecurityDescriptor
Specifies the NT security descriptor to be updated.
.PARAMETER ActiveDirectoryAccessRule
Specifies the Active Directory access rule to be added.
.EXAMPLE
Add-PrivateACL -ACL $ACLObject -ADObject "CN=Example,DC=Domain,DC=com" -Principal "User1" -AccessRule "Read" -AccessControlType "Allow" -ObjectType "File" -InheritedObjectType "Folder" -InheritanceType All -NTSecurityDescriptor $SecurityDescriptor -ActiveDirectoryAccessRule $ADAccessRule
Adds a new access control rule for User1 with Read access on files within folders with inheritance for all objects.
.NOTES
Author: Your Name
Date: Date
#>
[cmdletBinding(SupportsShouldProcess)]
param(
[PSCustomObject] $ACL,
[string] $ADObject,
[string] $Principal,
[alias('ActiveDirectoryRights')][System.DirectoryServices.ActiveDirectoryRights] $AccessRule,
[System.Security.AccessControl.AccessControlType] $AccessControlType,
[alias('ObjectTypeName')][string] $ObjectType,
[alias('InheritedObjectTypeName')][string] $InheritedObjectType,
[alias('ActiveDirectorySecurityInheritance')][nullable[System.DirectoryServices.ActiveDirectorySecurityInheritance]] $InheritanceType,
[alias('ActiveDirectorySecurity')][System.DirectoryServices.ActiveDirectorySecurity] $NTSecurityDescriptor,
[System.DirectoryServices.ActiveDirectoryAccessRule] $ActiveDirectoryAccessRule
)
if ($ACL) {
$ADObject = $ACL.DistinguishedName
} else {
if (-not $ADObject) {
Write-Warning "Add-PrivateACL - No ACL or ADObject specified"
return
}
}
$DomainName = ConvertFrom-DistinguishedName -ToDomainCN -DistinguishedName $ADObject
if (-not $DomainName) {
Write-Warning -Message "Add-PrivateACL - Unable to determine domain name for $($ADObject)"
return
}
$QueryServer = $Script:ForestDetails['QueryServers'][$DomainName].HostName[0]
if (-not $ActiveDirectoryAccessRule) {
if ($Principal -like '*/*') {
$SplittedName = $Principal -split '/'
[System.Security.Principal.IdentityReference] $Identity = [System.Security.Principal.NTAccount]::new($SplittedName[0], $SplittedName[1])
} else {
[System.Security.Principal.IdentityReference] $Identity = [System.Security.Principal.NTAccount]::new($Principal)
}
}
$OutputRequiresCommit = @(
$newActiveDirectoryAccessRuleSplat = @{
Identity = $Identity
ActiveDirectoryAccessRule = $ActiveDirectoryAccessRule
ObjectType = $ObjectType
InheritanceType = $InheritanceType
InheritedObjectType = $InheritedObjectType
AccessControlType = $AccessControlType
AccessRule = $AccessRule
}
Remove-EmptyValue -Hashtable $newActiveDirectoryAccessRuleSplat
$AccessRuleToAdd = New-ActiveDirectoryAccessRule @newActiveDirectoryAccessRuleSplat
if ($AccessRuleToAdd) {
$RuleAdded = Add-ACLRule -AccessRuleToAdd $AccessRuleToAdd -ntSecurityDescriptor $NTSecurityDescriptor -ACL $ACL
if (-not $RuleAdded.Success -and $RuleAdded.Reason -eq 'Identity') {
# rule failed to add, so we need to convert the identity and try with SID
$AlternativeSID = (Convert-Identity -Identity $Identity).SID
[System.Security.Principal.IdentityReference] $Identity = [System.Security.Principal.SecurityIdentifier]::new($AlternativeSID)
$newActiveDirectoryAccessRuleSplat = @{
Identity = $Identity
ActiveDirectoryAccessRule = $ActiveDirectoryAccessRule
ObjectType = $ObjectType
InheritanceType = $InheritanceType
InheritedObjectType = $InheritedObjectType
AccessControlType = $AccessControlType
AccessRule = $AccessRule
}
Remove-EmptyValue -Hashtable $newActiveDirectoryAccessRuleSplat
$AccessRuleToAdd = New-ActiveDirectoryAccessRule @newActiveDirectoryAccessRuleSplat
$RuleAdded = Add-ACLRule -AccessRuleToAdd $AccessRuleToAdd -ntSecurityDescriptor $NTSecurityDescriptor -ACL $ACL
}
# lets now return value
$RuleAdded.Success
} else {
Write-Warning -Message "Add-PrivateACL - Unable to create ActiveDirectoryAccessRule for $($ADObject). Skipped."
$false
}
)
if ($OutputRequiresCommit -notcontains $false -and $OutputRequiresCommit -contains $true) {
Write-Verbose "Add-ADACL - Saving permissions for $($ADObject)"
Set-ADObject -Identity $ADObject -Replace @{ ntSecurityDescriptor = $ntSecurityDescriptor } -ErrorAction Stop -Server $QueryServer
} elseif ($OutputRequiresCommit -contains $false) {
Write-Warning "Add-ADACL - Skipping saving permissions for $($ADObject) due to errors."
}
}
function Compare-InternalMissingObject {
<#
.SYNOPSIS
Compares internal missing objects between domains.
.DESCRIPTION
This function compares internal missing objects between domains based on the provided ForestInformation, server, source domain, target domains, and limit per domain.
.PARAMETER ForestInformation
Specifies the forest information containing domain controllers.
.PARAMETER Server
Specifies the server to retrieve objects from.
.PARAMETER SourceDomain
Specifies the source domain to compare objects from.
.PARAMETER TargetDomain
Specifies the target domains to compare against.
.PARAMETER LimitPerDomain
Specifies the limit of objects to compare per domain.
.EXAMPLE
Compare-InternalMissingObject -ForestInformation $ForestInfo -Server "Server01" -SourceDomain "DomainA" -TargetDomain @("DomainB", "DomainC") -LimitPerDomain 100
Compares internal missing objects between DomainA and DomainB, DomainC on Server01 with a limit of 100 objects per domain.
.NOTES
Ensure that the necessary permissions are in place to retrieve objects from the server.
#>
[CmdletBinding()]
param(
[System.Collections.IDictionary] $ForestInformation,
[string] $Server,
[string] $SourceDomain,
[string[]] $TargetDomain,
[int] $LimitPerDomain
)
$Today = (Get-Date).AddHours(-24)
$Port = "3268"
$Summary = [ordered] @{
'Summary' = [PSCustomObject] @{
SourceServer = $Server
Domain = $SourceDomain
MissingObject = 0
WrongGuid = 0
MissingObjectDC = [System.Collections.Generic.List[string]]::new()
WrongGuidDC = [System.Collections.Generic.List[string]]::new()
UniqueMissing = [System.Collections.Generic.List[string]]::new()
UniqueWrongGuid = [System.Collections.Generic.List[string]]::new()
}
}
$Source = [ordered] @{}
Write-Color -Text "Getting objects from the source domain [$SourceDomain] on server [$Server]." -Color Yellow, White
try {
[Array] $ListOU = @(
Get-ADObject -Filter 'ObjectClass -eq "container"' -SearchScope OneLevel -Server $Server -ErrorAction Stop | Select-Object Name, DistinguishedName
Get-ADOrganizationalUnit -Filter * -Server $Server -SearchScope OneLevel -ErrorAction Stop | Select-Object Name, DistinguishedName
)
[Array] $Objects = foreach ($OU in $ListOU.DistinguishedName) {
Get-ADObject -Filter * -SearchBase $OU -Server $Server -Properties Name, DistinguishedName, ObjectGuid, WhenChanged -ErrorAction Stop
}
} catch {
Write-Color -Text "Couldn't get the objects from the source domain [$SourceDomain] on server [$Server].", " Error: ", $_.Exception.Message -Color Red, White, Red, White
return $Source
}
foreach ($U in $Objects) {
$Source[$U.DistinguishedName] = $U
}
# Clearing the objects to free up memory
$Objects = $null
$DomainControllers = foreach ($Domain in $TargetDomain) {
if ($LimitPerDomain -gt 0) {
for ($i = 0; $i -le $ForestInformation['DomainDomainControllers'][$Domain].Count; $i++) {
if ($i -ge $LimitPerDomain) {
break
}
$ForestInformation['DomainDomainControllers'][$Domain][$i]
}
} else {
$ForestInformation['DomainDomainControllers'][$Domain]
}
}
$Count = 0
:nextDC foreach ($DC in $DomainControllers) {
$Count++
$Summary[$DC.HostName] = @{
Missing = [System.Collections.Generic.List[Object]]::new()
MissingAtSource = [System.Collections.Generic.List[Object]]::new()
WrongGuid = [System.Collections.Generic.List[Object]]::new()
# Ignored = [System.Collections.Generic.List[Object]]::new()
Errors = [System.Collections.Generic.List[Object]]::new()
}
if ($DC.HostName -eq $Server) {
Write-Color -Text "Skipping [$Count/$($DomainControllers.Count)] ", $DC.HostName, " [Same as Source]" -Color Yellow, White, Green
continue
}
if ($DC.IsGlobalCatalog) {
Write-Color -Text "Processing [$Count/$($DomainControllers.Count)] ", $DC.HostName, " [Is Global Catalog]" -Color Yellow, White, Green
} else {
Write-Color -Text "Processing [$Count/$($DomainControllers.Count)] ", $DC.HostName, " [Is not Global Catalog]" -Color Yellow, White, Red
continue
}
$CountOU = 0
# lets free up memory before we start again
$UsersTarget = $null
# $CacheTarget = [ordered] @{}
[Array] $UsersTarget = foreach ($OU in $ListOU.DistinguishedName) {
$CountOU++
Write-Color -Text "Processing [$Count/$($DomainControllers.Count)][$CountOU/$($ListOU.Count)] ", $DC.HostName, " OU: ", $OU -Color Yellow, White, Yellow, White
if ($Port) {
$QueryServer = "$($DC.HostName):$Port"
} else {
$QueryServer = $DC.HostName
}
try {
Get-ADObject -Filter * -SearchBase $OU -Server $QueryServer -Properties Name, DistinguishedName, ObjectGuid, WhenCreated, WhenChanged -ErrorAction Stop
} catch {
Write-Color -Text "Couldn't get the objects from the target domain [$SourceDomain] on server [$QueryServer].", " Error: ", $_.Exception.Message -Color Red, White, Red, White
$Summary[$DC.Hostname]['Errors'].Add(
[PSCustomObject] @{
GlobalCatalog = $DC.Hostname
Domain = $SourceDomain
Object = $OU
Error = $_.Exception.Message
}
)
continue nextDC
}
}
foreach ($U in $UsersTarget) {
# if ($U.DistinguishedName) {
# $CacheTarget[$U.DistinguishedName] = $U
# }
if (-not $Source[$U.DistinguishedName]) {
if ($U.WhenChanged -lt $Today) {
Write-Color -Text "Missing [$Count/$($DomainControllers.Count)][$CountOU/$($ListOU.Count)] ", $DC.HostName, " OU: ", $OU, " object: ", $U.DistinguishedName, " changed: ", $U.WhenChanged -Color Yellow, White, Yellow, White, Yellow
$Summary[$DC.Hostname]['Missing'].Add(
[PSCustomObject] @{
GlobalCatalog = $DC.Hostname
Type = 'Missing'
Domain = $SourceDomain
DistinguishedName = $U.DistinguishedName
Name = $U.Name
ObjectClass = $U.ObjectClass
ObjectGuid = $U.ObjectGuid.Guid
WhenCreated = $U.WhenCreated
WhenChanged = $U.WhenChanged
}
)
$Summary['Summary'].MissingObject++
if (-not $Summary['Summary'].MissingObjectDC.Contains($DC.Hostname)) {
$Summary['Summary'].MissingObjectDC.Add($DC.Hostname)
}
if (-not $Summary['Summary'].UniqueMissing.Contains($U.DistinguishedName)) {
$Summary['Summary'].UniqueMissing.Add($U.DistinguishedName)
}
}
} else {
if ($Source[$U.DistinguishedName].ObjectGUID.Guid -ne $U.ObjectGuid.Guid) {
Write-Color -Text "Wrong GUID [$Count/$($DomainControllers.Count)][$CountOU/$($ListOU.Count)] ", $DC.HostName, " OU: ", $OU, " object: ", $U.DistinguishedName, " expected: ", $Source[$U.DistinguishedName].ObjectGUID.Guid, " got: ", $U.ObjectGuid.Guid -Color Red, White, Yellow, White, Red
Write-Color -Text "[*] SourceDN: ", $Source[$U.DistinguishedName].DistinguishedName, " SourceName: ", $Source[$U.DistinguishedName].Name -Color Yellow, White, Yellow, White
Write-Color -Text "[*] SourceGuid: ", $Source[$U.DistinguishedName].ObjectGUID.Guid, " SourceWhenCreated: ", $Source[$U.DistinguishedName].WhenCreated, " SourceWhenChanged: ", $Source[$U.DistinguishedName].WhenChanged -Color Yellow, White, Yellow, White, Yellow, White
Write-Color -Text "[*] TargetDN: ", $U.DistinguishedName, " TargetName: ", $U.Name -Color Yellow, White, Yellow, White
Write-Color -Text "[*] TargetGuid: ", $U.ObjectGuid.Guid, " TargetWhenCreated: ", $U.WhenCreated, " TargetWhenChanged: ", $U.WhenChanged -Color Yellow, White, Yellow, White, Yellow, White
try {
$TryToFind = Get-ADObject -Filter "ObjectGuid -eq '$($Source[$U.DistinguishedName].ObjectGUID.Guid)'" -Server $QueryServer -Properties Name, DistinguishedName, ObjectGuid, WhenCreated, WhenChanged -ErrorAction Stop
} catch {
$TryToFind = $null
}
if ($TryToFind) {
Write-Color -Text "[*] Found: ", $TryToFind.DistinguishedName, " Name: ", $TryToFind.Name -Color Yellow, White, Yellow, White
Write-Color -Text "[*] FoundGuid: ", $TryToFind.ObjectGuid.Guid, " FoundWhenCreated: ", $TryToFind.WhenCreated, " FoundWhenChanged: ", $TryToFind.WhenChanged -Color Yellow, White, Yellow, White, Yellow, White
}
if ($U.WhenCreated -gt $Today) {
# the object is too new to try and compare, as it could be it was just created/moved
} else {
$Summary[$DC.Hostname]['WrongGuid'].Add(
[PSCustomObject] @{
GlobalCatalog = $DC.Hostname
Type = 'WrongGuid'
Domain = $SourceDomain
DistinguishedName = $U.DistinguishedName
Name = $U.Name
ObjectClass = $U.ObjectClass
ObjectGuid = $U.ObjectGuid.Guid
WhenCreated = $U.WhenCreated
WhenChanged = $U.WhenChanged
SourceObjectName = $Source[$U.DistinguishedName].Name
SourceObjectDN = $Source[$U.DistinguishedName].DistinguishedName
SourceObjectGuid = $Source[$U.DistinguishedName].ObjectGUID.Guid
SourceObjectWhenCreated = $Source[$U.DistinguishedName].WhenCreated
SourceObjectWhenChanged = $Source[$U.DistinguishedName].WhenChanged
NewDistinguishedName = $TryToFind.DistinguishedName
}
)
$Summary['Summary'].WrongGuid++
if (-not $Summary['Summary'].WrongGuidDC.Contains($DC.Hostname)) {
$Summary['Summary'].WrongGuidDC.Add($DC.Hostname)
}
if (-not $Summary['Summary'].UniqueWrongGuid.Contains($U.DistinguishedName)) {
$Summary['Summary'].UniqueWrongGuid.Add($U.DistinguishedName)
}
}
}
}
}
$UsersTarget = $null
}
# Clearing the objects to free up memory
$Source = $null
$Summary
}
$Script:ConfigurationACLOwners = [ordered] @{
Name = 'Forest ACL Owners'
Enabled = $true
Execute = {
Get-WinADACLForest -Owner #-ExcludeOwnerType Administrative, WellKnownAdministrative
}
Processing = {
$Script:Reporting['ForestACLOwners']['Variables']['OwnersAdministrative'] = 0
$Script:Reporting['ForestACLOwners']['Variables']['OwnersWellKnownAdministrative'] = 0
$Script:Reporting['ForestACLOwners']['Variables']['OwnersUnknown'] = 0
$Script:Reporting['ForestACLOwners']['Variables']['OwnersNotAdministrative'] = 0
$Script:Reporting['ForestACLOwners']['Variables']['RequiringFix'] = 0
$Script:Reporting['ForestACLOwners']['Variables']['Total'] = 0
$Script:Reporting['ForestACLOwners']['LimitedData'] = foreach ($Object in $Script:Reporting['ForestACLOwners']['Data']) {
if ($Object.OwnerType -eq 'Administrative') {
$Script:Reporting['ForestACLOwners']['Variables']['OwnersAdministrative']++
} elseif ($Object.OwnerType -eq 'WellKnownAdministrative') {
$Script:Reporting['ForestACLOwners']['Variables']['OwnersWellKnownAdministrative']++
} elseif ($Object.OwnerType -eq 'NotAdministrative') {
$Script:Reporting['ForestACLOwners']['Variables']['OwnersNotAdministrative']++
$Script:Reporting['ForestACLOwners']['Variables']['RequiringFix']++
$Object
} else {
$Script:Reporting['ForestACLOwners']['Variables']['OwnersUnknown']++
$Script:Reporting['ForestACLOwners']['Variables']['RequiringFix']++
$Object
}
$Script:Reporting['ForestACLOwners']['Variables']['Total']++
}
}
Summary = {
New-HTMLText -TextBlock {
"This report focuses on finding non-administrative owners owning an object in Active Directory. "
"It goes thru every single computer, user, group, organizational unit (and other) object and find if the owner is "
"Administrative (Domain Admins/Enterprise Admins)"
" or "
"WellKnownAdministrative (SYSTEM account or similar)"
". If it's not any of that it exposes those objects to be fixed."
} -FontSize 10pt -LineBreak
New-HTMLList -Type Unordered {
New-HTMLListItem -Text 'Forest ACL Owners in Total: ', $Script:Reporting['ForestACLOwners']['Variables']['Total'] -FontWeight normal, bold
New-HTMLListItem -Text 'Forest ACL Owners ', 'Domain Admins / Enterprise Admins' , ' as Owner: ', $Script:Reporting['ForestACLOwners']['Variables']['OwnersAdministrative'] -FontWeight normal, bold, normal, bold
New-HTMLListItem -Text 'Forest ACL Owners ', 'BUILTIN\Administrators / SYSTEM', ' as Owner: ', $Script:Reporting['ForestACLOwners']['Variables']['OwnersWellKnownAdministrative'] -FontWeight normal, bold, normal, bold
New-HTMLListItem -Text "Forest ACL Owners requiring change: ", $Script:Reporting['ForestACLOwners']['Variables']['RequiringFix'] -FontWeight normal, bold {
New-HTMLList -Type Unordered {
New-HTMLListItem -Text 'Not Administrative: ', $Script:Reporting['ForestACLOwners']['Variables']['OwnersNotAdministrative'] -FontWeight normal, bold
New-HTMLListItem -Text 'Unknown (deleted objects/old trusts): ', $Script:Reporting['ForestACLOwners']['Variables']['OwnersUnknown'] -FontWeight normal, bold
}
}
} -FontSize 10pt
}
Variables = @{
}
Solution = {
New-HTMLSection -Invisible {
New-HTMLPanel {
& $Script:ConfigurationACLOwners['Summary']
}
New-HTMLPanel {
New-HTMLChart {
New-ChartPie -Name 'Administrative Owners' -Value $Script:Reporting['ForestACLOwners']['Variables']['OwnersAdministrative'] -Color SpringGreen
New-ChartPie -Name 'WellKnown Administrative Owners' -Value $Script:Reporting['ForestACLOwners']['Variables']['OwnersWellKnownAdministrative'] -Color SpringGreen
New-ChartPie -Name 'Unknown Owners' -Value $Script:Reporting['ForestACLOwners']['Variables']['OwnersUnknown'] -Color BrilliantRose
New-ChartPie -Name 'Not Administrative Owners' -Value $Script:Reporting['ForestACLOwners']['Variables']['OwnersNotAdministrative'] -Color Salmon
} -Title 'Forest ACL Owners' -TitleAlignment center
}
}
New-HTMLSection -Name 'Forest ACL Owners' {
#if ($Script:Reporting['ForestACLOwners']['Data']) {
New-HTMLTable -DataTable $Script:Reporting['ForestACLOwners']['LimitedData'] -Filtering {
#New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen -FailBackgroundColor BlizzardBlue
#New-HTMLTableCondition -Name 'LapsExpirationDays' -ComparisonType number -Operator lt -Value 0 -BackgroundColor BurntOrange -HighlightHeaders LapsExpirationDays, LapsExpirationTime -FailBackgroundColor LimeGreen
#New-HTMLTableCondition -Name 'Laps' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen -FailBackgroundColor Alizarin
#New-HTMLTableCondition -Name 'Laps' -ComparisonType string -Operator eq -Value $false -BackgroundColor Alizarin -HighlightHeaders LapsExpirationDays, LapsExpirationTime
#New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator gt -Value 60 -BackgroundColor Alizarin -HighlightHeaders LastLogonDays, LastLogonDate -FailBackgroundColor LimeGreen
#New-HTMLTableCondition -Name 'PasswordLastChangedDays' -ComparisonType number -Operator ge -Value 0 -BackgroundColor LimeGreen -HighlightHeaders PasswordLastSet, PasswordLastChangedDays
#New-HTMLTableCondition -Name 'PasswordLastChangedDays' -ComparisonType number -Operator gt -Value 300 -BackgroundColor Orange -HighlightHeaders PasswordLastSet, PasswordLastChangedDays
#New-HTMLTableCondition -Name 'PasswordLastChangedDays' -ComparisonType number -Operator gt -Value 360 -BackgroundColor Alizarin -HighlightHeaders PasswordLastSet, PasswordLastChangedDays
#New-HTMLTableCondition -Name 'PasswordNotRequired' -ComparisonType string -Operator eq -Value $false -BackgroundColor LimeGreen -FailBackgroundColor Alizarin
#New-HTMLTableCondition -Name 'PasswordExpired' -ComparisonType string -Operator eq -Value $false -BackgroundColor LimeGreen -FailBackgroundColor Alizarin
}
#}
}
if ($Script:Reporting['Settings']['HideSteps'] -eq $false) {
New-HTMLSection -Name 'Steps to fix ownership of non-compliant objects in whole forest/domain' {
New-HTMLContainer {
New-HTMLSpanStyle -FontSize 10pt {
New-HTMLWizard {
New-HTMLWizardStep -Name 'Prepare environment' {
New-HTMLText -Text "To be able to execute actions in automated way please install required modules. Those modules will be installed straight from Microsoft PowerShell Gallery."
New-HTMLCodeBlock -Code {
Install-Module ADEssentials -Force
Import-Module ADEssentials -Force
} -Style powershell
New-HTMLText -Text "Using force makes sure newest version is downloaded from PowerShellGallery regardless of what is currently installed. Once installed you're ready for next step."
}
New-HTMLWizardStep -Name 'Prepare a report (up to date)' {
New-HTMLText -Text "Depending when this report was run you may want to prepare new report before proceeding with removal. To generate new report please use:"
New-HTMLCodeBlock -Code {
Invoke-ADEssentials -FilePath $Env:UserProfile\Desktop\ADEssentials-ForestACLOwners.html -Verbose -Type ForestACLOwners
}
New-HTMLText -TextBlock {
"When executed it will take a while to generate all data and provide you with new report depending on size of environment."
"Once confirmed that data is still showing issues and requires fixing please proceed with next step."
}
New-HTMLText -Text "Alternatively if you prefer working with console you can run: "
New-HTMLCodeBlock -Code {
$ForestACLOwner = Get-WinADACLForest -Owner -Verbose -ExcludeOwnerType Administrative, WellKnownAdministrative
$ForestACLOwner | Format-Table
}
New-HTMLText -Text "It includes all the data as you see in table above including all the owner types (including administrative and wellknownadministrative)"
}
New-HTMLWizardStep -Name 'Fix Owners' {
New-HTMLText -Text @(
"Following command when executed, finds all object owners within Forest/Domain that doesn't match WellKnownAdministrative (SYSTEM/BUIILTIN\Administrator) or Administrative (Domain Admins/Enterprise Admins) ownership. "
"Once it finds those non-compliant owners it replaces them with Domain Admins for a given domain. It doesn't change/modify compliant owners."
)
New-HTMLText -Text "Make sure when running it for the first time to run it with ", "WhatIf", " parameter as shown below to prevent accidental removal." -FontWeight normal, bold, normal -Color Black, Red, Black
New-HTMLCodeBlock -Code {
Set-WinADForestACLOwner -WhatIf -Verbose -IncludeOwnerType 'NotAdministrative', 'Unknown'
}
New-HTMLText -TextBlock {
"Alternatively for multi-domain scenario, if you have limited Domain Admin credentials to a single domain please use following command: "
}
New-HTMLCodeBlock -Code {
Set-WinADForestACLOwner -WhatIf -Verbose -IncludeOwnerType 'NotAdministrative', 'Unknown' -IncludeDomains 'YourDomainYouHavePermissionsFor'
}
New-HTMLText -TextBlock {
"After execution please make sure there are no errors, make sure to review provided output, and confirm that what is about to be changed matches expected data. "
} -LineBreak
New-HTMLText -Text "Once happy with results please follow with command (this will start replacement of owners process): " -LineBreak -FontWeight bold
New-HTMLText -TextBlock {
"This command when executed sets new owner only on first X non-compliant AD objects (computers/users/organizational units/contacts etc.). "
"Use LimitProcessing parameter to prevent mass change and increase the counter when no errors occur. "
"Repeat step above as much as needed increasing LimitProcessing count till there's nothing left. In case of any issues please review and action accordingly. "
}
New-HTMLCodeBlock -Code {
Set-WinADForestACLOwner -Verbose -LimitProcessing 2 -IncludeOwnerType 'NotAdministrative', 'Unknown'
}
New-HTMLText -TextBlock {
"Alternatively for multi-domain scenario, if you have limited Domain Admin credentials to a single domain please use following command: "
}
New-HTMLCodeBlock -Code {
Set-WinADForestACLOwner -Verbose -LimitProcessing 2 -IncludeOwnerType 'NotAdministrative', 'Unknown'-IncludeDomains 'YourDomainYouHavePermissionsFor'
}
}
} -RemoveDoneStepOnNavigateBack -Theme arrows -ToolbarButtonPosition center -EnableAllAnchors
}
}
}
}
if ($Script:Reporting['ForestACLOwners']['WarningsAndErrors']) {
New-HTMLSection -Name 'Warnings & Errors to Review' {
New-HTMLTable -DataTable $Script:Reporting['ForestACLOwners']['WarningsAndErrors'] -Filtering {
New-HTMLTableCondition -Name 'Type' -Value 'Warning' -BackgroundColor SandyBrown -ComparisonType string -Row
New-HTMLTableCondition -Name 'Type' -Value 'Error' -BackgroundColor Salmon -ComparisonType string -Row
}
}
}
}
}
$Script:ConfigurationBitLocker = [ordered] @{
Name = 'Bitlocker Summary'
Enabled = $true
Execute = {
Get-WinADBitlockerLapsSummary -BitlockerOnly
}
Processing = {
}
Summary = {
}
Variables = @{
}
Solution = {
if ($Script:Reporting['BitLocker']['Data']) {
New-HTMLChart {
New-ChartLegend -LegendPosition bottom -HorizontalAlign center -Color Red, Blue, Yellow
New-ChartTheme -Palette palette5
foreach ($Object in $DataTable) {
New-ChartRadial -Name $Object.Name -Value $Object.Money
}
# Define event
#New-ChartEvent -DataTableID 'NewIDtoSearchInChart' -ColumnID 0
}
New-HTMLTable -DataTable $Script:Reporting['BitLocker']['Data'] -Filtering -SearchBuilder {
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen -FailBackgroundColor BlizzardBlue
New-HTMLTableCondition -Name 'Encrypted' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen -FailBackgroundColor Salmon
#New-HTMLTableCondition -Name 'LapsExpirationDays' -ComparisonType number -Operator lt -Value 0 -BackgroundColor BurntOrange -HighlightHeaders LapsExpirationDays, LapsExpirationTime -FailBackgroundColor LimeGreen
#New-HTMLTableCondition -Name 'Laps' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen -FailBackgroundColor Alizarin
#New-HTMLTableCondition -Name 'Laps' -ComparisonType string -Operator eq -Value $false -BackgroundColor Alizarin -HighlightHeaders LapsExpirationDays, LapsExpirationTime
New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator gt -Value 60 -BackgroundColor Salmon -HighlightHeaders LastLogonDays, LastLogonDate -FailBackgroundColor LimeGreen
New-HTMLTableCondition -Name 'PasswordLastChangedDays' -ComparisonType number -Operator ge -Value 0 -BackgroundColor LimeGreen -HighlightHeaders PasswordLastSet, PasswordLastChangedDays
New-HTMLTableCondition -Name 'PasswordLastChangedDays' -ComparisonType number -Operator gt -Value 300 -BackgroundColor Orange -HighlightHeaders PasswordLastSet, PasswordLastChangedDays
New-HTMLTableCondition -Name 'PasswordLastChangedDays' -ComparisonType number -Operator gt -Value 360 -BackgroundColor Salmon -HighlightHeaders PasswordLastSet, PasswordLastChangedDays
#New-HTMLTableCondition -Name 'PasswordNotRequired' -ComparisonType string -Operator eq -Value $false -BackgroundColor LimeGreen -FailBackgroundColor Alizarin
#New-HTMLTableCondition -Name 'PasswordExpired' -ComparisonType string -Operator eq -Value $false -BackgroundColor LimeGreen -FailBackgroundColor Alizarin
}
}
}
}
# https://www.flaticon.com/free-icons/group - group icons - Group icons created by Freepik
# https://www.flaticon.com/free-icons/people - people icons - People icons created by Freepik
# https://www.flaticon.com/free-icons/person - person icons - Person icons created by photo3idea_studio
# https://www.flaticon.com/free-icons/monitor - monitor icons - Monitor icons created by Nikita Golubev
$Script:ConfigurationIcons = @{
ImageGroup = 'https://cdn-icons-png.flaticon.com/512/3791/3791146.png'
ImageGroupNested = 'https://cdn-icons-png.flaticon.com/512/476/476863.png'
ImageGroupCircular = 'https://cdn-icons-png.flaticon.com/512/745/745205.png'
ImageComputer = 'https://cdn-icons-png.flaticon.com/512/2289/2289389.png'
ImageUser = 'https://cdn-icons-png.flaticon.com/512/3048/3048122.png'
ImageOther = 'https://cdn-icons-png.flaticon.com/512/8090/8090771.png'
}
$Script:ConfigurationLAPS = [ordered] @{
Name = 'LAPS Summary'
Enabled = $true
Execute = {
Get-WinADBitlockerLapsSummary -LapsOnly
}
Processing = {
foreach ($Computer in $Script:Reporting['LAPS']['Data']) {
$Script:Reporting['LAPS']['Variables']['ComputersTotal']++
if ($Computer.Enabled) {
$Script:Reporting['LAPS']['Variables']['ComputersEnabled']++
if ($Computer.LastLogonDays -lt 60 -and $Computer.System -like "Windows*" -and $Computer.Enabled -eq $true) {
if (($Computer.Laps -eq $true -or $Computer.WindowsLaps -eq $true)) {
$Script:Reporting['LAPS']['Variables']['ComputersActiveWithLaps']++
} else {
# we exclude DC from this count, even tho Windows LAPS is supported there
if ($Computer.IsDC -eq $false) {
$Script:Reporting['LAPS']['Variables']['ComputersActiveNoLaps']++
}
}
}
if ($Computer.LastLogonDays -gt 360) {
$Script:Reporting['LAPS']['Variables']['ComputersOver360days']++
} elseif ($Computer.LastLogonDays -gt 180) {
$Script:Reporting['LAPS']['Variables']['ComputersOver180days']++
} elseif ($Computer.LastLogonDays -gt 90) {
$Script:Reporting['LAPS']['Variables']['ComputersOver90days']++
} elseif ($Computer.LastLogonDays -gt 60) {
$Script:Reporting['LAPS']['Variables']['ComputersOver60days']++
} elseif ($Computer.LastLogonDays -gt 30) {
$Script:Reporting['LAPS']['Variables']['ComputersOver30days']++
} elseif ($Computer.LastLogonDays -gt 15) {
$Script:Reporting['LAPS']['Variables']['ComputersOver15days']++
} else {
$Script:Reporting['LAPS']['Variables']['ComputersRecent']++
}
} else {
$Script:Reporting['LAPS']['Variables']['ComputersDisabled']++
}
if (($Computer.Laps -eq $true -or $Computer.WindowsLaps -eq $true) -and $Computer.Enabled -eq $true) {
$Script:Reporting['LAPS']['Variables']['ComputersLapsEnabled']++
if ($Computer.LapsExpirationDays -lt 0 -or $Computer.WindowsLapsExpirationDays -lt 0) {
$Script:Reporting['LAPS']['Variables']['ComputersLapsExpired']++
} else {
$Script:Reporting['LAPS']['Variables']['ComputersLapsNotExpired']++
}
} elseif ($Computer.Enabled -eq $true) {
if ($Computer.System -notlike "Windows*") {
# since Windows LAPS is supported on DC as well we only check for Windows
$Script:Reporting['LAPS']['Variables']['ComputersLapsNotApplicable']++
} else {
$Script:Reporting['LAPS']['Variables']['ComputersLapsDisabled']++
}
}
if ($Computer.LastLogonDays -gt 60) {
$Script:Reporting['LAPS']['Variables']['ComputersInactive']++
} else {
$Script:Reporting['LAPS']['Variables']['ComputersActive']++
}
if ($Computer.System -like "Windows Server*") {
$Script:Reporting['LAPS']['Variables']['ComputersServer']++
if ($Computer.Enabled) {
$Script:Reporting['LAPS']['Variables']['ComputersServerEnabled']++
if ($Computer.Laps -eq $true -or $Computer.WindowsLaps -eq $true) {
$Script:Reporting['LAPS']['Variables']['ComputersServerLapsEnabled']++
} else {
$Script:Reporting['LAPS']['Variables']['ComputersServerLapsDisabled']++
}
} else {
$Script:Reporting['LAPS']['Variables']['ComputersServerDisabled']++
}
} elseif ($Computer.System -notlike "Windows Server*" -and $Computer.System -like "Windows*") {
$Script:Reporting['LAPS']['Variables']['ComputersWorkstation']++
if ($Computer.Enabled) {
$Script:Reporting['LAPS']['Variables']['ComputersWorkstationEnabled']++
if ($Computer.Laps -eq $true -or $Computer.WindowsLaps -eq $true) {
$Script:Reporting['LAPS']['Variables']['ComputersWorkstationLapsEnabled']++
} else {
$Script:Reporting['LAPS']['Variables']['ComputersWorkstationLapsDisabled']++
}
} else {
$Script:Reporting['LAPS']['Variables']['ComputersWorkstationDisabled']++
}
} else {
$Script:Reporting['LAPS']['Variables']['ComputersOther']++
if ($Computer.Enabled) {
$Script:Reporting['LAPS']['Variables']['ComputersOtherEnabled']++
if ($Computer.Laps -eq $true -or $Computer.WindowsLaps -eq $true) {
$Script:Reporting['LAPS']['Variables']['ComputersOtherLapsEnabled']++
} else {
$Script:Reporting['LAPS']['Variables']['ComputersOtherLapsDisabled']++
}
} else {
$Script:Reporting['LAPS']['Variables']['ComputersOtherDisabled']++
}
}
}
}
Summary = {
New-HTMLText -Text @(
"This report focuses on showing LAPS status of all computer objects in the domain. "
"It shows how many computers are enabled, disabled, have LAPS enabled, disabled, expired, etc."
"It's perfectly normal that some LAPS passwords are expired, due to working over VPN etc."
) -FontSize 10pt -LineBreak
New-HTMLText -Text "Following computer resources are exempt from LAPS: " -FontSize 10pt
New-HTMLList {
New-HTMLListItem -Text "Domain Controllers and Read Only Domain Controllers"
New-HTMLListItem -Text 'Computer Service accounts such as AZUREADSSOACC$'
} -FontSize 10pt
New-HTMLText -Text "Here's an overview of some statistics about computers:" -FontSize 10pt
New-HTMLList {
New-HTMLListItem -Text "Total number of computers: ", $($Script:Reporting['LAPS']['Variables'].ComputersTotal) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of enabled computers: ", $($Script:Reporting['LAPS']['Variables'].ComputersEnabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of disabled computers: ", $($Script:Reporting['LAPS']['Variables'].ComputersDisabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of active computers (less then 60 days): ", $($Script:Reporting['LAPS']['Variables'].ComputersActive) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of inactive computers (over 60 days): ", $($Script:Reporting['LAPS']['Variables'].ComputersInactive) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of active computers with LAPS (less then 60 days): ", $($Script:Reporting['LAPS']['Variables'].ComputersActiveWithLaps) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of active computers without LAPS (less then 60 days): ", $($Script:Reporting['LAPS']['Variables'].ComputersActiveNoLaps) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of computers (enabled) with LAPS: ", $($Script:Reporting['LAPS']['Variables'].ComputersLapsEnabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of computers (enabled) without LAPS: ", $($Script:Reporting['LAPS']['Variables'].ComputersLapsDisabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of servers (enabled): ", $($Script:Reporting['LAPS']['Variables'].ComputersServerEnabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of servers (enabled) with LAPS: ", $($Script:Reporting['LAPS']['Variables'].ComputersServerLapsEnabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of servers (enabled) without LAPS: ", $($Script:Reporting['LAPS']['Variables'].ComputersServerLapsDisabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of servers (disabled): ", $($Script:Reporting['LAPS']['Variables'].ComputersServerDisabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of workstations (enabled) with LAPS: ", $($Script:Reporting['LAPS']['Variables'].ComputersWorkstationLapsEnabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of workstations (enabled) without LAPS: ", $($Script:Reporting['LAPS']['Variables'].ComputersWorkstationLapsDisabled) -Color None, BlueMarguerite -FontWeight normal, bold
} -FontSize 10pt
}
Variables = @{
ComputersActiveNoLaps = 0
ComputersActiveWithLaps = 0
ComputersTotal = 0
ComputersEnabled = 0
ComputersDisabled = 0
ComputersActive = 0
ComputersInactive = 0
ComputersLapsEnabled = 0
ComputersLapsDisabled = 0
ComputersLapsNotApplicable = 0
ComputersLapsExpired = 0
ComputersLapsNotExpired = 0
ComputersServer = 0
ComputersServerEnabled = 0
ComputersServerDisabled = 0
ComputersServerLapsEnabled = 0
ComputersServerLapsDisabled = 0
ComputersServerLapsNotApplicable = 0
ComputersWorkstation = 0
ComputersWorkstationEnabled = 0
ComputersWorkstationDisabled = 0
ComputersWorkstationLapsEnabled = 0
ComputersWorkstationLapsDisabled = 0
ComputersOther = 0
ComputersOtherEnabled = 0
ComputersOtherDisabled = 0
ComputersOtherLapsEnabled = 0
ComputersOtherLapsDisabled = 0
ComputersOver360days = 0
ComputersOver180days = 0
ComputersOver90days = 0
ComputersOver60days = 0
ComputersOver30days = 0
ComputersOver15days = 0
ComputersRecent = 0
}
Solution = {
if ($Script:Reporting['LAPS']['Data']) {
New-HTMLSection -Invisible {
New-HTMLPanel {
$Script:Reporting['LAPS']['Summary']
}
New-HTMLPanel {
New-HTMLCarousel -Height auto -Loop {
New-CarouselSlide -Height auto {
New-HTMLChart {
New-ChartBarOptions -Type bar
New-ChartLegend -Name 'Active Computers (by last logon age)' -Color SpringGreen, Salmon
New-ChartBar -Name 'Computers (over 360 days)' -Value $Script:Reporting['LAPS']['Variables'].ComputersOver360days
New-ChartBar -Name 'Computers (over 180 days)' -Value $Script:Reporting['LAPS']['Variables'].ComputersOver180days
New-ChartBar -Name 'Computers (over 90 days)' -Value $Script:Reporting['LAPS']['Variables'].ComputersOver90days
New-ChartBar -Name 'Computers (over 60 days)' -Value $Script:Reporting['LAPS']['Variables'].ComputersOver60days
New-ChartBar -Name 'Computers (over 30 days)' -Value $Script:Reporting['LAPS']['Variables'].ComputersOver30days
New-ChartBar -Name 'Computers (over 15 days)' -Value $Script:Reporting['LAPS']['Variables'].ComputersOver15days
New-ChartBar -Name 'Computers (Recent)' -Value $Script:Reporting['LAPS']['Variables'].ComputersRecent
New-ChartAxisY -LabelMaxWidth 300 -Show
} -Title 'Active Computers' -TitleAlignment center
}
New-CarouselSlide -Height auto {
New-HTMLChart -Gradient {
New-ChartPie -Name 'Computers Enabled' -Value $Script:Reporting['LAPS']['Variables'].ComputersEnabled
New-ChartPie -Name 'Computers Disabled' -Value $Script:Reporting['LAPS']['Variables'].ComputersDisabled
} -Title "Enabled vs Disabled All Computer Objects"
}
New-CarouselSlide -Height auto {
New-HTMLChart -Gradient {
New-ChartPie -Name 'Clients enabled' -Value $Script:Reporting['LAPS']['Variables'].ComputersWorkstationEnabled
New-ChartPie -Name 'Clients disabled' -Value $Script:Reporting['LAPS']['Variables'].ComputersWorkstationDisabled
} -Title "Enabled vs Disabled Workstations"
}
New-CarouselSlide -Height auto {
New-HTMLChart -Gradient {
New-ChartPie -Name 'Servers enabled' -Value $Script:Reporting['LAPS']['Variables'].ComputersServerEnabled
New-ChartPie -Name 'Servers disabled' -Value $Script:Reporting['LAPS']['Variables'].ComputersServerDisabled
} -Title "Enabled vs Disabled Servers"
}
New-CarouselSlide -Height auto {
New-HTMLChart -Gradient {
New-ChartPie -Name 'Servers' -Value $Script:Reporting['LAPS']['Variables'].ComputersServer
New-ChartPie -Name 'Clients' -Value $Script:Reporting['LAPS']['Variables'].ComputersWorkstation
New-ChartPie -Name 'Non-Windows' -Value $Script:Reporting['LAPS']['Variables'].ComputersOther
} -Title "Computers by Type"
}
}
}
}
New-HTMLSection -HeaderText 'General statistics' -CanCollapse {
New-HTMLPanel {
New-HTMLCarousel -Height auto -Loop {
New-CarouselSlide -Height auto {
New-HTMLChart -Gradient {
New-ChartPie -Name 'With LAPS' -Value $Script:Reporting['LAPS']['Variables'].ComputersLapsEnabled -Color '#94ffc8'
New-ChartPie -Name 'Without LAPS' -Value $Script:Reporting['LAPS']['Variables'].ComputersLapsDisabled -Color 'Salmon'
New-ChartPie -Name 'LAPS N/A' -Value $Script:Reporting['LAPS']['Variables'].ComputersLapsNotApplicable -Color 'LightGray'
} -Title "All Computers with LAPS"
}
New-CarouselSlide -Height auto {
New-HTMLChart -Gradient {
New-ChartPie -Name 'With LAPS' -Value $Script:Reporting['LAPS']['Variables'].ComputersActiveWithLaps -Color '#94ffc8'
New-ChartPie -Name 'Without LAPS' -Value $Script:Reporting['LAPS']['Variables'].ComputersActiveNoLaps -Color 'Salmon'
} -Title "Active Computers with LAPS" -SubTitle "Logged on within the last 60 days"
}
New-CarouselSlide -Height auto {
New-HTMLChart -Gradient {
New-ChartPie -Name 'With LAPS' -Value $Script:Reporting['LAPS']['Variables'].ComputersActiveWithLaps -Color '#94ffc8'
New-ChartPie -Name 'Without LAPS' -Value $Script:Reporting['LAPS']['Variables'].ComputersActiveNoLaps -Color 'Salmon'
} -Title "Active Computers with LAPS" -SubTitle "Logged on within the last 60 days"
}
}
}
New-HTMLPanel {
New-HTMLCarousel -Height auto -Loop -AutoPlay {
New-CarouselSlide -Height auto {
New-HTMLChart -Gradient {
New-ChartPie -Name 'With LAPS' -Value $Script:Reporting['LAPS']['Variables'].ComputersWorkstationLapsEnabled -Color '#94ffc8'
New-ChartPie -Name 'Without LAPS' -Value $Script:Reporting['LAPS']['Variables'].ComputersWorkstationLapsDisabled -Color 'Salmon'
} -Title "Workstations with LAPS"
}
New-CarouselSlide -Height auto {
New-HTMLChart -Gradient {
New-ChartPie -Name 'With LAPS' -Value $Script:Reporting['LAPS']['Variables'].ComputersServerLapsEnabled -Color '#94ffc8'
New-ChartPie -Name 'Without LAPS' -Value $Script:Reporting['LAPS']['Variables'].ComputersServerLapsDisabled -Color 'Salmon'
} -Title "Servers with LAPS"
}
}
}
}
}
New-HTMLTable -DataTable $Script:Reporting['LAPS']['Data'] -Filtering {
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen -FailBackgroundColor BlizzardBlue
New-HTMLTableCondition -Name 'LapsExpirationDays' -ComparisonType number -Operator lt -Value 0 -BackgroundColor BurntOrange -HighlightHeaders LapsExpirationDays, LapsExpirationTime -FailBackgroundColor LimeGreen
New-HTMLTableCondition -Name 'Laps' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen -FailBackgroundColor Alizarin
New-HTMLTableCondition -Name 'Laps' -ComparisonType string -Operator eq -Value $false -BackgroundColor Alizarin -HighlightHeaders LapsExpirationDays, LapsExpirationTime
New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator gt -Value 60 -BackgroundColor Alizarin -HighlightHeaders LastLogonDays, LastLogonDate -FailBackgroundColor LimeGreen
New-HTMLTableCondition -Name 'PasswordLastChangedDays' -ComparisonType number -Operator ge -Value 0 -BackgroundColor LimeGreen -HighlightHeaders PasswordLastSet, PasswordLastChangedDays
New-HTMLTableCondition -Name 'PasswordLastChangedDays' -ComparisonType number -Operator gt -Value 300 -BackgroundColor Orange -HighlightHeaders PasswordLastSet, PasswordLastChangedDays
New-HTMLTableCondition -Name 'PasswordLastChangedDays' -ComparisonType number -Operator gt -Value 360 -BackgroundColor Alizarin -HighlightHeaders PasswordLastSet, PasswordLastChangedDays
New-HTMLTableCondition -Name 'IsDC' -ComparisonType string -Operator eq -Value $true -BackgroundColor BlizzardBlue -HighlightHeaders IsDC, Laps, LapsExpirationDays, LapsExpirationTime
New-HTMLTableCondition -Name 'WindowsLapsExpirationDays' -ComparisonType number -Operator lt -Value 0 -BackgroundColor BurntOrange -HighlightHeaders WindowsLapsExpirationDays, WindowsLapsExpirationTime -FailBackgroundColor LimeGreen
New-HTMLTableCondition -Name 'WindowsLaps' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen -FailBackgroundColor Alizarin
New-HTMLTableCondition -Name 'WindowsLaps' -ComparisonType string -Operator eq -Value $false -BackgroundColor Alizarin -HighlightHeaders WindowsLaps, WindowsLapsExpirationDays, WindowsLapsExpirationTime
New-HTMLTableCondition -Name 'WindowsLaps' -ComparisonType string -Operator eq -Value "" -BackgroundColor BlizzardBlue -HighlightHeaders WindowsLaps, WindowsLapsExpirationDays, WindowsLapsExpirationTime
}
}
}
$Script:ConfigurationLAPSACL = [ordered] @{
Name = 'LAPS ACL'
Enabled = $true
Execute = {
Get-WinADComputerACLLAPS -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains
}
Processing = {
foreach ($Object in $Script:Reporting['LAPSACL']['Data']) {
if ($Object.Enabled) {
$Script:Reporting['LAPSACL']['Variables']['ComputersEnabled']++
if ($Object.LapsACL) {
$Script:Reporting['LAPSACL']['Variables']['LapsACL']++
if ($Object.OperatingSystem -like "Windows Server*") {
$Script:Reporting['LAPSACL']['Variables']['LapsACLOKServer']++
} elseif ($Object.OperatingSystem -notlike "Windows Server*" -and $Object.OperatingSystem -like "Windows*") {
$Script:Reporting['LAPSACL']['Variables']['LapsACLOKClient']++
}
} else {
if ($Object.IsDC -eq $false) {
$Script:Reporting['LAPSACL']['Variables']['LapsACLNot']++
if ($Object.OperatingSystem -like "Windows Server*") {
$Script:Reporting['LAPSACL']['Variables']['LapsACLNotServer']++
} elseif ($Object.OperatingSystem -notlike "Windows Server*" -and $Object.OperatingSystem -like "Windows*") {
$Script:Reporting['LAPSACL']['Variables']['LapsACLNotClient']++
}
}
}
} else {
$Script:Reporting['LAPSACL']['Variables']['ComputersDisabled']++
}
}
}
Summary = {
New-HTMLText -Text @(
"This report focuses on detecting whether computer has ability to read/write to LAPS properties in Active Directory. "
"Often for many reasons such as broken ACL inheritance or not fully implemented SELF write access to LAPS - LAPS is implemented only partially. "
"This means while IT may be thinking that LAPS should be functioning properly - the computer itself may not have rights to write password back to AD, making LAPS not functional. "
) -FontSize 10pt -LineBreak
New-HTMLText -Text "Following computer resources are exempt from LAPS: " -FontSize 10pt
New-HTMLList {
New-HTMLListItem -Text "Domain Controllers and Read Only Domain Controllers"
New-HTMLListItem -Text 'Computer Service accounts such as AZUREADSSOACC$'
} -FontSize 10pt
New-HTMLText -Text 'Everything else should have proper LAPS ACL for the computer to provide data.' -FontSize 10pt
}
Variables = @{
ComputersEnabled = 0
ComputersDisabled = 0
LapsACL = 0
LapsACLNot = 0
LapsACLOKServer = 0
LapsACLOKClient = 0
LapsACLNotServer = 0
LapsACLNotClient = 0
}
Solution = {
if ($Script:Reporting['LAPSACL']['Data']) {
New-HTMLSection -Invisible {
New-HTMLPanel {
$Script:Reporting['LAPSACL']['Summary']
}
New-HTMLPanel {
New-HTMLChart {
New-ChartBarOptions -Type barStacked
New-ChartLegend -Names 'Enabled', 'Disabled' -Color SpringGreen, Salmon
New-ChartBar -Name 'Computers' -Value $Script:Reporting['LAPSACL']['Variables'].ComputersEnabled, $Script:Reporting['LAPSACL']['Variables'].ComputersDisabled
# New-ChartAxisY -LabelMaxWidth 300 -Show
} -Title 'Active Computers' -TitleAlignment center
}
}
New-HTMLSection -HeaderText 'General statistics' -CanCollapse {
New-HTMLPanel {
New-HTMLChart -Gradient {
New-ChartPie -Name 'Computers Enabled' -Value $Script:Reporting['LAPSACL']['Variables'].ComputersEnabled
New-ChartPie -Name 'Computers Disabled' -Value $Script:Reporting['LAPSACL']['Variables'].ComputersDisabled
} -Title "Enabled vs Disabled All Computer Objects"
}
New-HTMLPanel {
New-HTMLChart -Gradient {
New-ChartPie -Name 'LAPS ACL OK' -Value $Script:Reporting['LAPSACL']['Variables'].LapsACL
New-ChartPie -Name 'LAPS ACL Not OK' -Value $Script:Reporting['LAPSACL']['Variables'].LapsACLNot
} -Title "LAPS ACL OK vs Not OK"
}
New-HTMLPanel {
New-HTMLChart -Gradient {
New-ChartPie -Name 'LAPS ACL OK - Server' -Value $Script:Reporting['LAPSACL']['Variables'].LapsACLOKServer -Color SpringGreen
New-ChartPie -Name 'LAPS ACL OK - Client' -Value $Script:Reporting['LAPSACL']['Variables'].LapsACLOKClient -Color LimeGreen
New-ChartPie -Name 'LAPS ACL Not OK - Server' -Value $Script:Reporting['LAPSACL']['Variables'].LapsACLNotServer -Color Salmon
New-ChartPie -Name 'LAPS ACL Not OK - Client' -Value $Script:Reporting['LAPSACL']['Variables'].LapsACLNotClient -Color Red
} -Title "LAPS ACL OK vs Not OK by Computer Type"
}
}
New-HTMLSection -Name 'LAPS ACL Summary' {
New-HTMLTable -DataTable $Script:Reporting['LAPSACL']['Data'] -Filtering {
New-HTMLTableConditionGroup -Logic AND {
New-HTMLTableCondition -Name 'LapsACL' -ComparisonType string -Operator eq -Value $true
New-HTMLTableCondition -Name 'LapsExpirationACL' -ComparisonType string -Operator eq -Value $true
New-HTMLTableCondition -Name 'IsDC' -ComparisonType string -Operator eq -Value $false
} -BackgroundColor LimeGreen -HighlightHeaders LapsACL, LapsExpirationACL
New-HTMLTableConditionGroup -Logic AND {
New-HTMLTableCondition -Name 'LapsACL' -ComparisonType string -Operator eq -Value $false
New-HTMLTableCondition -Name 'LapsExpirationACL' -ComparisonType string -Operator eq -Value $false
New-HTMLTableCondition -Name 'IsDC' -ComparisonType string -Operator eq -Value $false
} -BackgroundColor Alizarin -HighlightHeaders LapsACL, LapsExpirationACL
New-HTMLTableCondition -Name 'WindowsLAPSACL' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen
New-HTMLTableCondition -Name 'WindowsLAPSExpirationACL' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen
New-HTMLTableCondition -Name 'WindowsLAPSEncryptedPassword' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen
New-HTMLTableCondition -Name 'WindowsLAPSACL' -ComparisonType string -Operator eq -Value $false -BackgroundColor Alizarin
New-HTMLTableCondition -Name 'WindowsLAPSExpirationACL' -ComparisonType string -Operator eq -Value $false -BackgroundColor Alizarin
New-HTMLTableCondition -Name 'WindowsLAPSEncryptedPassword' -ComparisonType string -Operator eq -Value $false -BackgroundColor Alizarin
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen -FailBackgroundColor BlizzardBlue
New-HTMLTableCondition -Name 'IsDC' -ComparisonType string -Operator eq -Value $false -BackgroundColor LimeGreen -FailBackgroundColor BlizzardBlue
New-HTMLTableCondition -Name 'IsDC' -ComparisonType string -Operator eq -Value $true -BackgroundColor BlizzardBlue -HighlightHeaders LapsACL, LapsExpirationACL
New-HTMLTableCondition -Name 'IsDC' -ComparisonType string -Operator eq -Value $true -BackgroundColor BlizzardBlue -HighlightHeaders WindowsLAPSACL, WindowsLAPSExpirationACL, WindowsLAPSEncryptedPassword
}
}
if ($Script:Reporting['LAPSACL']['WarningsAndErrors']) {
New-HTMLSection -Name 'Warnings & Errors to Review' {
New-HTMLTable -DataTable $Script:Reporting['LAPSACL']['WarningsAndErrors'] -Filtering {
New-HTMLTableCondition -Name 'Type' -Value 'Warning' -BackgroundColor SandyBrown -ComparisonType string -Row
New-HTMLTableCondition -Name 'Type' -Value 'Error' -BackgroundColor Salmon -ComparisonType string -Row
} -PagingOptions 10, 20, 30, 40, 50
}
}
}
}
}
$Script:ConfigurationLAPSAndBitlocker = [ordered] @{
Name = 'LAPS and BITLOCKER'
Enabled = $true
Execute = {
Get-WinADBitlockerLapsSummary
}
Processing = {
}
Summary = {
}
Variables = @{
}
Solution = {
if ($Script:Reporting['LapsAndBitLocker']['Data']) {
New-HTMLChart {
New-ChartLegend -LegendPosition bottom -HorizontalAlign center -Color Red, Blue, Yellow
New-ChartTheme -Palette palette5
foreach ($Object in $DataTable) {
New-ChartRadial -Name $Object.Name -Value $Object.Money
}
}
New-HTMLTable -DataTable $Script:Reporting['LapsAndBitLocker']['Data'] -Filtering {
New-HTMLTableCondition -Name 'Encrypted' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen -FailBackgroundColor Salmon
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen -FailBackgroundColor BlizzardBlue
New-HTMLTableCondition -Name 'LapsExpirationDays' -ComparisonType number -Operator lt -Value 0 -BackgroundColor BurntOrange -HighlightHeaders LapsExpirationDays, LapsExpirationTime -FailBackgroundColor LimeGreen
New-HTMLTableCondition -Name 'Laps' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen -FailBackgroundColor Alizarin
New-HTMLTableCondition -Name 'Laps' -ComparisonType string -Operator eq -Value $false -BackgroundColor Alizarin -HighlightHeaders LapsExpirationDays, LapsExpirationTime
New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator gt -Value 60 -BackgroundColor Alizarin -HighlightHeaders LastLogonDays, LastLogonDate -FailBackgroundColor LimeGreen
New-HTMLTableCondition -Name 'PasswordLastChangedDays' -ComparisonType number -Operator ge -Value 0 -BackgroundColor LimeGreen -HighlightHeaders PasswordLastSet, PasswordLastChangedDays
New-HTMLTableCondition -Name 'PasswordLastChangedDays' -ComparisonType number -Operator gt -Value 300 -BackgroundColor Orange -HighlightHeaders PasswordLastSet, PasswordLastChangedDays
New-HTMLTableCondition -Name 'PasswordLastChangedDays' -ComparisonType number -Operator gt -Value 360 -BackgroundColor Alizarin -HighlightHeaders PasswordLastSet, PasswordLastChangedDays
New-HTMLTableCondition -Name 'IsDC' -ComparisonType string -Operator eq -Value $true -BackgroundColor BlizzardBlue -HighlightHeaders IsDC, Laps, LapsExpirationDays, LapsExpirationTime
New-HTMLTableCondition -Name 'WindowsLapsExpirationDays' -ComparisonType number -Operator lt -Value 0 -BackgroundColor BurntOrange -HighlightHeaders WindowsLapsExpirationDays, WindowsLapsExpirationTime -FailBackgroundColor LimeGreen
New-HTMLTableCondition -Name 'WindowsLaps' -ComparisonType string -Operator eq -Value $true -BackgroundColor LimeGreen -FailBackgroundColor Alizarin
New-HTMLTableCondition -Name 'WindowsLaps' -ComparisonType string -Operator eq -Value $false -BackgroundColor Alizarin -HighlightHeaders WindowsLaps, WindowsLapsExpirationDays, WindowsLapsExpirationTime
New-HTMLTableCondition -Name 'WindowsLaps' -ComparisonType string -Operator eq -Value "" -BackgroundColor BlizzardBlue -HighlightHeaders WindowsLaps, WindowsLapsExpirationDays, WindowsLapsExpirationTime
}
}
}
}
$Script:ConfigurationServiceAccounts = [ordered] @{
Name = 'Service Accounts'
Enabled = $true
Execute = {
Get-WinADServiceAccount -PerDomain
}
Processing = {
}
Summary = {
}
Variables = @{
}
Solution = {
if ($Script:Reporting['ServiceAccounts']['Data'] -is [System.Collections.IDictionary]) {
New-HTMLTabPanel {
foreach ($Domain in $Script:Reporting['ServiceAccounts']['Data'].Keys) {
New-HTMLTab -Name $Domain {
New-HTMLTable -DataTable $Script:Reporting['ServiceAccounts']['Data'][$Domain] -Filtering {
}
}
}
}
}
}
}
$Script:ShowWinADAccountDelegation = [ordered] @{
Name = 'All Accounts Delegation'
Enabled = $true
Execute = {
Get-WinADDelegatedAccounts
}
Processing = {
}
Summary = {
}
Variables = @{
}
Solution = {
New-HTMLTable -DataTable $Script:Reporting['AccountDelegation']['Data'] -Filtering {
# # highlight whole row as blue if the computer is disabled
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $false -Row -BackgroundColor LightYellow
# # highlight enabled column as red if the computer is disabled
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $true -BackgroundColor PaleGreen
New-HTMLTableConditionGroup {
New-HTMLTableCondition -Name 'FullDelegation' -ComparisonType string -Operator eq -Value $true
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $true
New-HTMLTableCondition -Name 'IsDC' -ComparisonType string -Operator eq -Value $false
} -BackgroundColor Salmon -HighlightHeaders 'FullDelegation' -FailBackgroundColor PaleGreen
New-HTMLTableCondition -Name 'ConstrainedDelegation' -ComparisonType string -Operator eq -Value $true -BackgroundColor PaleGreen -FailBackgroundColor Yellow
New-HTMLTableCondition -Name 'ResourceDelegation' -ComparisonType string -Operator eq -Value $true -BackgroundColor PaleGreen -FailBackgroundColor Yellow
# # highlight whole row as green if the computer is enabled and LastLogon, PasswordDays Over 30
# New-HTMLTableConditionGroup -Conditions {
# New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
# New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator le -Value 30
# New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType number -Operator le -Value 30
# } -BackgroundColor PaleGreen -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
# New-HTMLTableConditionGroup -Conditions {
# New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
# New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator gt -Value 30
# New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType string -Operator eq -Value ''
# } -BackgroundColor LightPink -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
# New-HTMLTableConditionGroup -Conditions {
# New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
# New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType string -Operator eq -Value ''
# New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType number -Operator gt -Value 30
# } -BackgroundColor LightPink -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
# New-HTMLTableConditionGroup -Conditions {
# New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
# New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType string -Operator eq -Value ''
# New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType string -Operator eq -Value ''
# } -BackgroundColor LightPink -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
# # highlight whole row as green if the computer is enabled and LastLogon, PasswordDays Over 30
# New-HTMLTableConditionGroup -Conditions {
# New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
# New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator gt -Value 30
# New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType number -Operator gt -Value 30
# } -BackgroundColor Salmon -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
# New-HTMLTableConditionGroup -Conditions {
# New-HTMLTableCondition -Name 'TrustedForDelegation' -ComparisonType string -Operator eq -Value $True
# New-HTMLTableCondition -Name 'IsDC' -ComparisonType string -Operator eq -Value $false
# } -BackgroundColor Red -HighlightHeaders Name, SamAccountName, TrustedForDelegation, IsDC
# New-HTMLTableConditionGroup -Conditions {
# New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
# New-HTMLTableCondition -Name 'PasswordNotRequired' -ComparisonType string -Operator eq -Value $True
# } -BackgroundColor Red -HighlightHeaders Name, SamAccountName, Enabled, PasswordNotRequired
} -ScrollX
}
}
$Script:ShowWinADBrokenProtectedFromDeletion = [ordered] @{
Name = 'Protected From Accidental Deletion Status'
Enabled = $true
Execute = {
Get-WinADBrokenProtectedFromDeletion -Type All
}
Processing = {
foreach ($Object in $Script:Reporting['BrokenProtectedFromDeletion']['Data']) {
if ($Object.HasBrokenPermissions) {
$Script:Reporting['BrokenProtectedFromDeletion']['Variables']['ObjectsBrokenTotal']++
$Script:Reporting['BrokenProtectedFromDeletion']['Variables']['ObjectsBrokenByClass'][$Object.ObjectClass]++
$Script:Reporting['BrokenProtectedFromDeletion']['Variables']['ObjectsBrokenByDomain'][$Object.Domain]++
if (-not $Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsBrokenPerOU[$Object.ParentContainer]) {
$Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsBrokenPerOU[$Object.ParentContainer] = $true
$Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsBrokenPerOUTotal++
}
$null = $Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsBroken.Add($Object)
}
$Script:Reporting['BrokenProtectedFromDeletion']['Variables']['ObjectsTotal']++
$Script:Reporting['BrokenProtectedFromDeletion']['Variables']['ObjectsByClass'][$Object.ObjectClass]++
$Script:Reporting['BrokenProtectedFromDeletion']['Variables']['ObjectsByDomain'][$Object.Domain]++
}
}
Summary = {
New-HTMLText -Text @(
"This report focuses on Active Directory objects that have inconsistent protection from accidental deletion settings. ",
"It helps identify objects where the ProtectedFromAccidentalDeletion flag doesn't match the actual ACL settings, ",
"which could put critical objects at risk of accidental deletion."
) -FontSize 10pt -LineBreak
New-HTMLText -Text @(
"Here's a summary of findings:"
) -FontSize 10pt
New-HTMLList -Type Unordered {
New-HTMLListItem -Text "Total objects scanned: ", $($Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsTotal) -FontWeight normal, bold
New-HTMLListItem -Text "Objects with broken protection: ", $($Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsBrokenTotal) -FontWeight normal, bold -Color None, Red
New-HTMLListItem -Text "Objects with broken protection per OU: ", $($Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsBrokenPerOUTotal) -FontWeight normal, bold -Color None, Red
if ($($Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsBrokenTotal -gt 0)) {
New-HTMLListItem -Text "Broken objects by type:" -FontWeight bold {
New-HTMLList -Type Unordered {
foreach ($Class in $Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsBrokenByClass.Keys) {
New-HTMLListItem -Text "$Class objects: ", $($Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsBrokenByClass[$Class]) -FontWeight normal, bold
}
}
}
New-HTMLListItem -Text "Broken objects by domain:" -FontWeight bold {
New-HTMLList -Type Unordered {
foreach ($Domain in $Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsBrokenByDomain.Keys) {
New-HTMLListItem -Text "$($Domain): ", $($Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsBrokenByDomain[$Domain]) -FontWeight normal, bold
}
}
}
}
} -FontSize 10pt
}
Variables = @{
ObjectsTotal = 0
ObjectsBrokenTotal = 0
ObjectsByClass = @{}
ObjectsBrokenByClass = @{}
ObjectsByDomain = @{}
ObjectsBrokenByDomain = @{}
ObjectsBrokenPerOU = @{}
ObjectsBrokenPerOUTotal = 0
ObjectsBroken = [System.Collections.Generic.List[PSCustomObject]]::new()
}
Solution = {
New-HTMLSection -Invisible {
New-HTMLPanel {
$Script:Reporting['BrokenProtectedFromDeletion']['Summary']
}
New-HTMLPanel {
New-HTMLChart -Title 'Objects Protection Status' {
New-ChartBarOptions -Type barStacked
New-ChartLegend -Name 'Protected', 'Broken Protection' -Color Green, Red
foreach ($Class in $Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsByClass.Keys) {
$Protected = $Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsByClass[$Class] -
$Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsBrokenByClass[$Class]
$Broken = $Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsBrokenByClass[$Class]
New-ChartBar -Name $Class -Value $Protected, $Broken
}
} -TitleAlignment center
}
}
New-HTMLSection -Name 'Objects with Broken Protection' {
New-HTMLTable -DataTable $Script:Reporting['BrokenProtectedFromDeletion']['Variables'].ObjectsBroken -Filtering {
New-HTMLTableCondition -Name 'HasBrokenPermissions' -Value $true -Operator eq -BackgroundColor Salmon #-FailBackgroundColor MintGreen
} -PagingOptions 7, 15, 30, 45, 60 -ScrollX
}
New-HTMLSection -Name 'Steps to fix - Protected From Deletion' {
New-HTMLContainer {
New-HTMLSpanStyle -FontSize 10pt {
New-HTMLWizard {
New-HTMLWizardStep -Name 'Prepare environment' {
New-HTMLText -Text "To be able to execute actions in automated way please install required modules. The module will be installed from PowerShell Gallery."
New-HTMLCodeBlock -Code {
Install-Module ADEssentials -Force
Import-Module ADEssentials -Force
} -Style powershell
New-HTMLText -Text "Using force makes sure newest version is downloaded from PowerShellGallery regardless of what is currently installed."
}
New-HTMLWizardStep -Name 'Prepare report' {
New-HTMLText -Text "To generate a new report before proceeding with fixes, use:"
New-HTMLCodeBlock -Code {
Get-WinADBrokenProtectedFromDeletion -Type All -ReturnBrokenOnly | Format-Table
}
New-HTMLText -Text "This will show you all objects with their current protection status. Review the output before proceeding with fixes."
}
New-HTMLWizardStep -Name 'Test fixes' {
New-HTMLText -Text "First, test the repair process using -WhatIf to see what would be changed:"
New-HTMLCodeBlock -Code {
Repair-WinADBrokenProtectedFromDeletion -Type All -WhatIf -LimitProcessing 5
}
New-HTMLText -Text "Review the output to ensure the correct objects will be modified."
}
New-HTMLWizardStep -Name 'Apply fixes' {
New-HTMLText -Text "Once you've verified the changes, run the repair command without -WhatIf:"
New-HTMLCodeBlock -Code {
Repair-WinADBrokenProtectedFromDeletion -Type All -LimitProcessing 5 -Verbose
}
New-HTMLText -TextBlock {
"The command will process objects in batches (5 at a time by default). "
"Increase the LimitProcessing parameter value once you're confident in the changes."
}
}
New-HTMLWizardStep -Name 'Verify changes' {
New-HTMLText -Text "After applying fixes, verify the changes by running another report:"
New-HTMLCodeBlock -Code {
Get-WinADBrokenProtectedFromDeletion -Type All -ReturnBrokenOnly | Format-Table
}
New-HTMLText -Text "The report should show fewer or no objects with broken protection settings."
}
} -RemoveDoneStepOnNavigateBack -Theme arrows -ToolbarButtonPosition center -EnableAllAnchors
}
}
}
}
}
$Script:ConfigurationGlobalCatalogObjects = [ordered] @{
Name = 'Global Catalogs Object Summary'
Enabled = $true
Execute = {
Compare-WinADGlobalCatalogObjects -Advanced -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains
}
Processing = {
}
Summary = {
New-HTMLText -Text @(
"This report compares all objects on every domain controller in the forest and reports on missing objects and objects with wrong GUIDs between them."
"By comparing the objects on each domain controller, you can identify replication issues and inconsistencies between domain controllers."
"This report is useful for identifying issues with the global catalog and replication in your Active Directory forest."
"The report is split into two sections: Missing Objects and Wrong GUID Objects."
) -FontSize 10pt -LineBreak
foreach ($Domain in $Script:Reporting['GlobalCatalogComparison']['Data'].Keys) {
New-HTMLText -Text "Summary for ", $Domain, " domain" -FontSize 10pt -FontWeight normal, bold, normal
New-HTMLList {
New-HTMLListItem -Text "Missing Objects: ", $($Script:Reporting['GlobalCatalogComparison']['Data'][$Domain].Summary.MissingObject) -Color Black, Red -FontWeight normal, bold
# New-HTMLListItem -Text "Missing Objects in Global Catalog (Reverse Lookup): ", $($Script:Reporting['GlobalCatalogComparison']['Data'][$Domain].Summary.MissingAtSource) -Color Black, Red -FontWeight normal, bold
New-HTMLListItem -Text "Wrong GUID Objects: ", $($Script:Reporting['GlobalCatalogComparison']['Data'][$Domain].Summary.WrongGuid) -Color Black, Red -FontWeight normal, bold
New-HTMLListItem -Text "Domain Controllers with Missing Objects: ", $Script:Reporting['GlobalCatalogComparison']['Data'][$Domain].Summary.MissingObjectDC.Count -FontSize 10pt -FontWeight normal, bold
#New-HTMLListItem -Text "Domain Controllers with Missing Objects in Global Catalog (Reverse Lookup): ", $Script:Reporting['GlobalCatalogComparison']['Data'][$Domain].Summary.MissingAtSourceDC.Count -FontSize 10pt -FontWeight normal, bold
New-HTMLListItem -Text "Domain Controllers with Wrong GUID Objects: ", $Script:Reporting['GlobalCatalogComparison']['Data'][$Domain].Summary.WrongGuidD.Count -FontSize 10pt -FontWeight normal, bold
New-HTMLListItem -Text "Errors during scan: ", $Script:Reporting['GlobalCatalogComparison']['Data'][$Domain].Summary.Errors.Count -FontSize 10pt -FontWeight normal, bold
} -FontSize 10pt
}
New-HTMLText -Text @(
"While it's possible to have some missing objects, it should be investigated why that is. ",
"We also ignore objects that were modified in the last 24 hours to avoid false positives, and that don't exists in the Global Catalog on any given domain controller."
#"Those objects are shown in the Ignored Objects section, but they are not considered as missing or wrong GUID objects."
#"However you can investigate them further if needed."
) -FontSize 10pt
}
Variables = @{
}
Solution = {
if ($Script:Reporting['GlobalCatalogComparison']['Data']) {
New-HTMLSection -Invisible {
New-HTMLPanel {
$Script:Reporting['GlobalCatalogComparison']['Summary']
}
}
New-HTMLTabPanel {
foreach ($Domain in $Script:Reporting['GlobalCatalogComparison']['Data'].Keys) {
New-HTMLTab -Name $Domain {
New-HTMLSection -HeaderText "Domain details" {
New-HTMLPanel {
New-HTMLText -Text "Domain: ", $Domain -FontWeight normal, bold
New-HTMLText -Text "Source Domain Controller: ", $Script:Reporting['GlobalCatalogComparison']['Data'][$Domain]['Summary'].'SourceServer' -FontWeight normal, bold
} -Invisible
New-HTMLPanel {
New-HTMLText -Text "Missing Unique Objects: " -Color Black -FontWeight bold
New-HTMLList {
foreach ($Unique in $Script:Reporting['GlobalCatalogComparison']['Data'][$Domain].Summary.UniqueMissing) {
New-HTMLListItem -Text $Unique -Color Black, Red -FontWeight normal, bold
}
}
} -Invisible
New-HTMLPanel {
New-HTMLText -Text "Wrong GUID Unique Objects: " -Color Black -FontWeight bold
New-HTMLList {
foreach ($Unique in $Script:Reporting['GlobalCatalogComparison']['Data'][$Domain].Summary.UniqueWrongGuid) {
New-HTMLListItem -Text $Unique -Color Black, Red -FontWeight normal, bold
}
}
} -Invisible
}
New-HTMLSection -HeaderText "Missing Objects in $Domain per Domain Controller" {
$Data = foreach ($Key in $Script:Reporting['GlobalCatalogComparison']['Data'][$Domain].Keys) {
if ($Key -eq 'Summary') {
continue
}
$Script:Reporting['GlobalCatalogComparison']['Data'][$Domain][$Key].Missing
}
New-HTMLTable -DataTable $Data -Filtering {
} -IncludeProperty 'GlobalCatalog', 'Domain', 'Type', 'DistinguishedName', 'Name', 'ObjectClass', 'WhenCreated', 'WhenChanged' -ScrollX
}
# New-HTMLSection -HeaderText "Missing Objects in $Domain per Global Catalog (Reverse Lookup)" {
# $Data = foreach ($Key in $Script:Reporting['GlobalCatalogComparison']['Data'][$Domain].Keys) {
# if ($Key -eq 'Summary') {
# continue
# }
# $Script:Reporting['GlobalCatalogComparison']['Data'][$Domain][$Key].MissingAtSource
# }
# New-HTMLTable -DataTable $Data -Filtering -ScrollX {
# } -IncludeProperty 'GlobalCatalog', 'Domain', 'Type', 'DistinguishedName', 'Name', 'ObjectClass', 'WhenCreated', 'WhenChanged', 'ObjectGuid'
# }
New-HTMLSection -HeaderText "Wrong GUID Objects in $Domain per Domain Controller" {
$Data = foreach ($Key in $Script:Reporting['GlobalCatalogComparison']['Data'][$Domain].Keys) {
if ($Key -eq 'Summary') {
continue
}
$Script:Reporting['GlobalCatalogComparison']['Data'][$Domain][$Key].WrongGuid
}
New-HTMLTable -DataTable $Data -Filtering -ScrollX {
} -IncludeProperty 'GlobalCatalog', 'Domain', 'Type', 'DistinguishedName', 'Name', 'ObjectClass', 'WhenCreated', 'WhenChanged', 'ObjectGuid', 'NewDistinguishedName', 'SourceObjectName', 'SourceObjectDN', 'SourceObjectGuid', 'SourceObjectWhenCreated', 'SourceObjectWhenChanged'
}
New-HTMLSection -HeaderText "Errors during scan in $Domain per Domain Controller" {
$Data = foreach ($Key in $Script:Reporting['GlobalCatalogComparison']['Data'][$Domain].Keys) {
if ($Key -eq 'Summary') {
continue
}
$Script:Reporting['GlobalCatalogComparison']['Data'][$Domain][$Key].Errors
}
New-HTMLTable -DataTable $Data -Filtering -ScrollX {
} -IncludeProperty 'GlobalCatalog', 'Domain', 'Object', 'Error'
}
}
}
}
}
}
}
$Script:ShowWinADComputer = [ordered] @{
Name = 'All Computers'
Enabled = $true
Execute = {
Get-WinADComputers -PerDomain -AddOwner
}
Processing = {
foreach ($Domain in $Script:Reporting['Computers']['Data'].Keys) {
$Script:Reporting['Computers']['Variables'][$Domain] = [ordered] @{}
foreach ($Computer in $Script:Reporting['Computers']['Data'][$Domain]) {
$Script:Reporting['Computers']['Variables']['ComputersTotal']++
if ($Computer.Enabled) {
$Script:Reporting['Computers']['Variables'][$Domain]['ComputersEnabled']++
$Script:Reporting['Computers']['Variables']['ComputersEnabled']++
if ($Computer.IsDC) {
$Script:Reporting['Computers']['Variables'][$Domain]['ComputersDC']++
} else {
$Script:Reporting['Computers']['Variables'][$Domain]['ComputersNotDC']++
}
if ($Computer.OperatingSystem -like "Windows Server*") {
$Script:Reporting['Computers']['Variables'][$Domain]['ComputersServer']++
} elseif ($Computer.OperatingSystem -notlike "Windows Server*" -and $Computer.OperatingSystem -like "Windows*") {
$Script:Reporting['Computers']['Variables'][$Domain]['ComputersClient']++
}
} else {
$Script:Reporting['Computers']['Variables'][$Domain]['ComputersDisabled']++
$Script:Reporting['Computers']['Variables']['ComputersDisabled']++
}
if ($Computer.OperatingSystem) {
$Script:Reporting['Computers']['Variables']['Systems'][$computer.OperatingSystem]++
} else {
$Script:Reporting['Computers']['Variables']['Systems']['Unknown']++
}
if ($Computer.OperatingSystem -like "Windows Server*") {
$Script:Reporting['Computers']['Variables']['ComputersServer']++
if ($Computer.Enabled) {
$Script:Reporting['Computers']['Variables']['ComputersServerEnabled']++
} else {
$Script:Reporting['Computers']['Variables']['ComputersServerDisabled']++
}
} elseif ($Computer.OperatingSystem -notlike "Windows Server*" -and $Computer.OperatingSystem -like "Windows*") {
$Script:Reporting['Computers']['Variables']['ComputersWorkstation']++
if ($Computer.Enabled) {
$Script:Reporting['Computers']['Variables']['ComputersWorkstationEnabled']++
} else {
$Script:Reporting['Computers']['Variables']['ComputersWorkstationDisabled']++
}
} else {
$Script:Reporting['Computers']['Variables']['ComputersOther']++
if ($Computer.Enabled) {
$Script:Reporting['Computers']['Variables']['ComputersOtherEnabled']++
} else {
$Script:Reporting['Computers']['Variables']['ComputersOtherDisabled']++
}
}
}
}
}
Summary = {
New-HTMLText -Text @(
"This report focuses on showing status of all computer objects in the Active Directory forest. "
"It shows how many computers are enabled, disabled, expired, etc."
) -FontSize 10pt -LineBreak
New-HTMLText -Text "Here's an overview of some statistics about computers:" -FontSize 10pt
New-HTMLList {
New-HTMLListItem -Text "Total number of computers: ", $($Script:Reporting['Computers']['Variables'].ComputersTotal) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of enabled computers: ", $($Script:Reporting['Computers']['Variables'].ComputersEnabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of disabled computers: ", $($Script:Reporting['Computers']['Variables'].ComputersDisabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of workstations: ", $($Script:Reporting['Computers']['Variables'].ComputersWorkstation) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of enabled workstations: ", $($Script:Reporting['Computers']['Variables'].ComputersWorkstationEnabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of disabled workstations: ", $($Script:Reporting['Computers']['Variables'].ComputersWorkstationDisabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of servers: ", $($Script:Reporting['Computers']['Variables'].ComputersServer) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of enabled servers: ", $($Script:Reporting['Computers']['Variables'].ComputersServerEnabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of disabled servers: ", $($Script:Reporting['Computers']['Variables'].ComputersServerDisabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of other computers: ", $($Script:Reporting['Computers']['Variables'].ComputersOther) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of enabled other computers: ", $($Script:Reporting['Computers']['Variables'].ComputersOtherEnabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of disabled other computers: ", $($Script:Reporting['Computers']['Variables'].ComputersOtherDisabled) -Color None, BlueMarguerite -FontWeight normal, bold
} -FontSize 10pt
}
Variables = @{
ComputersTotal = 0
ComputersEnabled = 0
ComputersDisabled = 0
ComputersWorkstation = 0
ComputersWorkstationEnabled = 0
ComputersWorkstationDisabled = 0
ComputersServer = 0
ComputersServerEnabled = 0
ComputersServerDisabled = 0
ComputersOther = 0
ComputersOtherEnabled = 0
ComputersOtherDisabled = 0
Systems = [ordered] @{
Unknown = 0
}
}
Solution = {
if ($Script:Reporting['Computers']['Data'] -is [System.Collections.IDictionary]) {
New-HTMLSection -Invisible {
New-HTMLPanel {
$Script:Reporting['Computers']['Summary']
}
New-HTMLPanel {
New-HTMLChart {
New-ChartBarOptions -Type bar
New-ChartLegend -Name 'Computers by Operating System' -Color SpringGreen, Salmon
foreach ($System in $Script:Reporting['Computers']['Variables'].Systems.Keys) {
New-ChartBar -Name $System -Value $Script:Reporting['Computers']['Variables']['Systems'][$System]
}
New-ChartAxisY -LabelMaxWidth 300 -Show
} -Title 'Computers by Operating System' -TitleAlignment center
}
}
New-HTMLSection -HeaderText 'General statistics' -CanCollapse {
New-HTMLPanel {
New-HTMLChart -Gradient {
New-ChartPie -Name 'Computers Enabled' -Value $Script:Reporting['Computers']['Variables'].ComputersEnabled
New-ChartPie -Name 'Computers Disabled' -Value $Script:Reporting['Computers']['Variables'].ComputersDisabled
} -Title "Enabled vs Disabled All Computer Objects"
}
New-HTMLPanel {
New-HTMLChart -Gradient {
New-ChartPie -Name 'Clients enabled' -Value $Script:Reporting['Computers']['Variables'].ComputersWorkstationEnabled
New-ChartPie -Name 'Clients disabled' -Value $Script:Reporting['Computers']['Variables'].ComputersWorkstationDisabled
} -Title "Enabled vs Disabled Workstations"
}
New-HTMLPanel {
New-HTMLChart -Gradient {
New-ChartPie -Name 'Servers enabled' -Value $Script:Reporting['Computers']['Variables'].ComputersServerEnabled
New-ChartPie -Name 'Servers disabled' -Value $Script:Reporting['Computers']['Variables'].ComputersServerDisabled
} -Title "Enabled vs Disabled Servers"
}
New-HTMLPanel {
New-HTMLChart -Gradient {
New-ChartPie -Name 'Servers' -Value $Script:Reporting['Computers']['Variables'].ComputersServer
New-ChartPie -Name 'Clients' -Value $Script:Reporting['Computers']['Variables'].ComputersWorkstation
New-ChartPie -Name 'Non-Windows' -Value $Script:Reporting['Computers']['Variables'].ComputersOther
} -Title "Computers by Type"
}
}
New-HTMLTabPanel {
foreach ($Domain in $Script:Reporting['Computers']['Data'].Keys) {
New-HTMLTab -Name $Domain {
New-HTMLTable -DataTable $Script:Reporting['Computers']['Data'][$Domain] -Filtering {
# highlight whole row as blue if the computer is disabled
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $false -Row -BackgroundColor LightYellow
# highlight enabled column as red if the computer is disabled
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $false -BackgroundColor Salmon
# highlight whole row as green if the computer is enabled and LastLogon, PasswordDays Over 30
New-HTMLTableConditionGroup -Conditions {
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator le -Value 30
New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType number -Operator le -Value 30
} -BackgroundColor PaleGreen -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
New-HTMLTableConditionGroup -Conditions {
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator gt -Value 30
New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType string -Operator eq -Value ''
} -BackgroundColor LightPink -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
New-HTMLTableConditionGroup -Conditions {
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType string -Operator eq -Value ''
New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType number -Operator gt -Value 30
} -BackgroundColor LightPink -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
New-HTMLTableConditionGroup -Conditions {
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType string -Operator eq -Value ''
New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType string -Operator eq -Value ''
} -BackgroundColor LightPink -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
# highlight whole row as green if the computer is enabled and LastLogon, PasswordDays Over 30
New-HTMLTableConditionGroup -Conditions {
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator gt -Value 30
New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType number -Operator gt -Value 30
} -BackgroundColor Salmon -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
New-HTMLTableConditionGroup -Conditions {
New-HTMLTableCondition -Name 'TrustedForDelegation' -ComparisonType string -Operator eq -Value $True
New-HTMLTableCondition -Name 'IsDC' -ComparisonType string -Operator eq -Value $false
} -BackgroundColor Red -HighlightHeaders Name, SamAccountName, TrustedForDelegation, IsDC
New-HTMLTableConditionGroup -Conditions {
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
New-HTMLTableCondition -Name 'PasswordNotRequired' -ComparisonType string -Operator eq -Value $True
} -BackgroundColor Red -HighlightHeaders Name, SamAccountName, Enabled, PasswordNotRequired
} -ScrollX
}
}
}
}
}
}
$Script:ShowWinADGroup = [ordered] @{
Name = 'All Groups'
Enabled = $true
Execute = {
Get-WinADGroups -PerDomain -AddOwner
}
Processing = {
}
Summary = {
}
Variables = @{
}
Solution = {
if ($Script:Reporting['Groups']['Data'] -is [System.Collections.IDictionary]) {
New-HTMLTabPanel {
foreach ($Domain in $Script:Reporting['Groups']['Data'].Keys) {
New-HTMLTab -Name $Domain {
New-HTMLTable -DataTable $Script:Reporting['Groups']['Data'][$Domain] -Filtering {
New-HTMLTableColumnOption -ColumnIndex 17 -Width 3000
New-HTMLTableCondition -Name 'ManagerCanUpdateGroupMembership' -ComparisonType string -Operator eq -Value $true -BackgroundColor LightYellow
New-HTMLTableCondition -Name 'ManagerCanUpdateGroupMembership' -ComparisonType string -Operator eq -Value $false -BackgroundColor PaleGreen
#New-HTMLTableCondition -Name 'GroupWriteBack' -ComparisonType string -Operator eq -Value $true -BackgroundColor Pink
#New-HTMLTableCondition -Name 'GroupWriteBack' -ComparisonType string -Operator eq -Value $false -BackgroundColor PaleGreen
# highlight whole row as blue if the computer is disabled
# New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $false -Row -BackgroundColor LightYellow
# # highlight enabled column as red if the computer is disabled
# New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $false -BackgroundColor Salmon
# # highlight whole row as green if the computer is enabled and LastLogon, PasswordDays Over 30
# New-HTMLTableConditionGroup -Conditions {
# New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
# New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator le -Value 30
# New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType number -Operator le -Value 30
# } -BackgroundColor PaleGreen -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
# New-HTMLTableConditionGroup -Conditions {
# New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
# New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator gt -Value 30
# New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType string -Operator eq -Value ''
# } -BackgroundColor LightPink -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
# New-HTMLTableConditionGroup -Conditions {
# New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
# New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType string -Operator eq -Value ''
# New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType number -Operator gt -Value 30
# } -BackgroundColor LightPink -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
# New-HTMLTableConditionGroup -Conditions {
# New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
# New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType string -Operator eq -Value ''
# New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType string -Operator eq -Value ''
# } -BackgroundColor LightPink -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
# # highlight whole row as green if the computer is enabled and LastLogon, PasswordDays Over 30
# New-HTMLTableConditionGroup -Conditions {
# New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
# New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator gt -Value 30
# New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType number -Operator gt -Value 30
# } -BackgroundColor Salmon -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
# New-HTMLTableConditionGroup -Conditions {
# New-HTMLTableCondition -Name 'TrustedForDelegation' -ComparisonType string -Operator eq -Value $True
# New-HTMLTableCondition -Name 'IsDC' -ComparisonType string -Operator eq -Value $false
# } -BackgroundColor Red -HighlightHeaders Name, SamAccountName, TrustedForDelegation, IsDC
# New-HTMLTableConditionGroup -Conditions {
# New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
# New-HTMLTableCondition -Name 'PasswordNotRequired' -ComparisonType string -Operator eq -Value $True
# } -BackgroundColor Red -HighlightHeaders Name, SamAccountName, Enabled, PasswordNotRequired
} -ScrollX
}
}
}
}
}
}
$Script:ConfigurationPasswordPolicies = [ordered] @{
Name = 'Password Policies Summary'
Enabled = $true
Execute = {
Get-WinADPasswordPolicy
}
Processing = {
foreach ($PasswordPolicy in $Script:Reporting['PasswordPolicies']['Data']) {
if ($PasswordPolicy.Name -eq 'Default Password Policy') {
$Script:Reporting['PasswordPolicies']['Variables'].DefaultPasswordPolicy += 1
} else {
$Script:Reporting['PasswordPolicies']['Variables'].FineGrainedPasswordPolicies += 1
}
}
}
Summary = {
New-HTMLText -Text @(
"This report focuses on showing all Password Policies in Active Directory forest. "
"It shows default password policies and fine grained password policies. "
"Keep in mind that there can only be one valid Default Password Policy per domain. "
"If you have multiple password policies defined (that are not FGPP), only one will work, the one with the lowest precedence on the Domain Controller OU."
"Any other Password Policy that you defined will not be shown here."
"If you are not seeing FGPP password policies and you have them defined, make sure that you have extended rights to read them."
) -FontSize 10pt -LineBreak
}
Variables = @{
}
Solution = {
if ($Script:Reporting['PasswordPolicies']['Data']) {
New-HTMLSection -Invisible {
New-HTMLPanel {
$Script:Reporting['PasswordPolicies']['Summary']
}
}
New-HTMLTable -DataTable $Script:Reporting['PasswordPolicies']['Data'] -Filtering -SearchBuilder {
New-HTMLTableCondition -Name 'MinPasswordLength' -ComparisonType number -Operator le -Value 8 -BackgroundColor Salmon
New-HTMLTableCondition -Name 'MinPasswordLength' -ComparisonType number -Operator le -Value 4 -BackgroundColor Red
New-HTMLTableCondition -Name 'MinPasswordLength' -ComparisonType number -Operator between -Value 8, 16 -BackgroundColor Yellow
New-HTMLTableCondition -Name 'MinPasswordLength' -ComparisonType number -Operator between -Value 16, 20 -BackgroundColor LightGreen
New-HTMLTableCondition -Name 'MinPasswordLength' -ComparisonType number -Operator ge -Value 20 -BackgroundColor Green
New-HTMLTableCondition -Name 'ComplexityEnabled' -ComparisonType string -Operator eq -Value $false -BackgroundColor Salmon -FailBackgroundColor LightGreen
New-HTMLTableCondition -Name 'ReversibleEncryptionEnabled' -ComparisonType string -Operator eq -Value $true -BackgroundColor Salmon -FailBackgroundColor LightGreen
} -ScrollX
}
}
}
$Script:ConfigurationSchema = [ordered] @{
Name = 'Schema Information'
Enabled = $true
Execute = {
Get-WinADForestSchemaDetails
}
Processing = {
# foreach ($PasswordPolicy in $Script:Reporting['PasswordPolicies']['Data']) {
# if ($PasswordPolicy.Name -eq 'Default Password Policy') {
# $Script:Reporting['PasswordPolicies']['Variables'].DefaultPasswordPolicy += 1
# } else {
# $Script:Reporting['PasswordPolicies']['Variables'].FineGrainedPasswordPolicies += 1
# }
# }
}
Summary = {
New-HTMLPanel {
New-HTMLText -Text @(
"This report focuses on showing all Default Schema Permissions in Active Directory forest. "
# "It shows default password policies and fine grained password policies. "
# "Keep in mind that there can only be one valid Default Password Policy per domain. "
# "If you have multiple password policies defined (that are not FGPP), only one will work, the one with the lowest precedence on the Domain Controller OU."
# "Any other Password Policy that you defined will not be shown here."
# "If you are not seeing FGPP password policies and you have them defined, make sure that you have extended rights to read them."
) -FontSize 10pt
New-HTMLList {
New-HTMLListItem -Text "Schema List: ", "shows all Schema objects in the forest" -Color None, BlueDiamond -FontWeight normal, bold
New-HTMLListItem -Text "Schema Permissions: ", "shows all Schema Permissions in the forest" -Color None, BlueDiamond -FontWeight normal, bold
New-HTMLListItem -Text "Schema Default Permissions: ", "shows all Schema Default Permissions in the forest for specific objects" -Color None, BlueDiamond -FontWeight normal, bold
} -FontSize 10pt
New-HTMLText -Text @(
"This is supposed to tell you who can modify the Schema in your forest, but also who can create/modify/delete specific objects once they are created."
) -FontSize 10pt
}
New-HTMLPanel {
New-HTMLText -Text "Forest Information" -FontSize 10pt
New-HTMLList {
New-HTMLListItem -Text "Forest Name: ", $Script:Reporting['Schema']['Data'].ForestInformation.Name -Color None, BlueDiamond -FontWeight normal, bold
New-HTMLListItem -Text "Forest Domain (s): ", ($Script:Reporting['Schema']['Data'].ForestInformation.Domains -join ", ") -Color None, BlueDiamond -FontWeight normal, bold
New-HTMLListItem -Text "Forest Level: ", $Script:Reporting['Schema']['Data'].ForestInformation.ForestMode -Color None, BlueDiamond -FontWeight normal, bold
New-HTMLListItem -Text "Schema Master: ", $Script:Reporting['Schema']['Data'].ForestInformation.SchemaMaster -Color None, BlueDiamond -FontWeight normal, bold
New-HTMLListItem -Text "Schema DistinguishedName: ", $Script:Reporting['Schema']['Data'].SchemaObject.DistinguishedName -Color None, BlueDiamond -FontWeight normal, bold
} -FontSize 10pt
}
}
Variables = @{
}
Solution = {
if ($Script:Reporting['Schema']['Data']) {
New-HTMLSection -Invisible {
$Script:Reporting['Schema']['Summary']
}
New-HTMLTabPanel {
New-HTMLTab -Name "Schema List" {
New-HTMLTable -DataTable $Script:Reporting['Schema']['Data'].SchemaList -Filtering {
} -ScrollX -PagingLength 15 -DataTableID 'SchemaList' -ExcludeProperty NTSecurityDescriptor -PagingOptions 5, 7, 10, 15, 20, 25, 50, 100
}
New-HTMLTab -Name "Schema Owners" {
New-HTMLTable -DataTable $Script:Reporting['Schema']['Data'].SchemaOwners.Values -Filtering {
} -ScrollX -PagingLength 15 -DataTableID 'SchemaOwners' -PagingOptions 5, 7, 10, 15, 20, 25, 50, 100
}
New-HTMLTab -Name "Schema Permissions" {
New-HTMLSection -HeaderText 'Summary' {
New-HTMLTable -DataTable $Script:Reporting['Schema']['Data'].SchemaSummaryPermissions.Values -Filtering {
New-TableEvent -ID 'SchemaPermissions' -SourceColumnID 17 -TargetColumnID 0
New-HTMLTableCondition -Name 'PermissionsChanged' -ComparisonType string -Operator eq -Value $true -BackgroundColor Salmon -FailBackgroundColor LightGreen
New-HTMLTableCondition -Name 'DefaultPermissionsAvailable' -ComparisonType string -Operator eq -Value $true -BackgroundColor MoonYellow
} -ScrollX -PagingLength 7 -DataTableID 'SchemaSummaryPermission' -PagingOptions 5, 7, 10, 15, 20, 25, 50, 100
}
New-HTMLSection -HeaderText 'Details' {
# Remove empty values
$FilteredData = $Script:Reporting['Schema']['Data'].SchemaPermissions.Values | ForEach-Object { if ($_) {
$_
} }
New-HTMLTable -DataTable $FilteredData -Filtering {
New-HTMLTableCondition -Name 'AccessControlType' -ComparisonType string -Operator eq -Value 'Allow' -BackgroundColor LightGreen -FailBackgroundColor Salmon
} -ScrollX -PagingLength 7 -DataTableID 'SchemaPermissions' -PagingOptions 5, 7, 10, 15, 20, 25, 50, 100
}
}
New-HTMLTab -Name "Schema Default Permissions" {
New-HTMLSection -HeaderText 'Summary' {
New-HTMLTable -DataTable $Script:Reporting['Schema']['Data'].SchemaSummaryDefaultPermissions.Values -Filtering {
New-TableEvent -ID 'SchemaDefaultPermissions' -SourceColumnID 16 -TargetColumnID 0
New-HTMLTableCondition -Name 'PermissionsAvailable' -ComparisonType string -Operator eq -Value $true -BackgroundColor MoonYellow
} -ScrollX -PagingLength 7 -DataTableID 'SchemaSummary' -PagingOptions 5, 7, 10, 15, 20, 25, 50, 100
}
New-HTMLSection -HeaderText 'Details' {
# Remove empty values
$FilteredData = $Script:Reporting['Schema']['Data'].SchemaDefaultPermissions.Values | ForEach-Object { if ($_) {
$_
} }
New-HTMLTable -DataTable $FilteredData -Filtering {
New-HTMLTableCondition -Name 'AccessControlType' -ComparisonType string -Operator eq -Value 'Allow' -BackgroundColor LightGreen -FailBackgroundColor Salmon
} -ScrollX -PagingLength 7 -DataTableID 'SchemaDefaultPermissions' -PagingOptions 5, 7, 10, 15, 20, 25, 50, 100
}
}
}
}
}
}
$Script:ShowWinADUser = [ordered] @{
Name = 'All Users'
Enabled = $true
Execute = {
Get-WinADUsers -PerDomain -AddOwner
}
Processing = {
foreach ($Domain in $Script:Reporting['Users']['Data'].Keys) {
foreach ($User in $Script:Reporting['Users']['Data'][$Domain]) {
$Script:Reporting['Users']['Variables']['UsersTotal']++
if ($User.Enabled) {
$Script:Reporting['Users']['Variables']['UsersEnabled']++
if ($User.PasswordNeverExpires) {
$Script:Reporting['Users']['Variables']['PasswordNeverExpires']++
} else {
$Script:Reporting['Users']['Variables']['PasswordExpires']++
}
if ($User.PasswordNotRequired) {
$Script:Reporting['Users']['Variables']['PasswordNotRequired']++
}
if ($User.PasswordLastDays -gt 360) {
$Script:Reporting['Users']['Variables']['PasswordLastDays360']++
} elseif ($User.PasswordLastDays -gt 300) {
$Script:Reporting['Users']['Variables']['PasswordLastDays300']++
} elseif ($User.PasswordLastDays -gt 180) {
$Script:Reporting['Users']['Variables']['PasswordLastDays180']++
} elseif ($User.PasswordLastDays -gt 90) {
$Script:Reporting['Users']['Variables']['PasswordLastDays90']++
} elseif ($User.PasswordLastDays -gt 60) {
$Script:Reporting['Users']['Variables']['PasswordLastDays60']++
} else {
$Script:Reporting['Users']['Variables']['PasswordLastDaysRecent']++
}
if ($User.LastLogonDays -gt 360) {
$Script:Reporting['Users']['Variables']['LastLogonDays360']++
} elseif ($User.LastLogonDays -gt 300) {
$Script:Reporting['Users']['Variables']['LastLogonDays300']++
} elseif ($User.LastLogonDays -gt 180) {
$Script:Reporting['Users']['Variables']['LastLogonDays180']++
} elseif ($User.LastLogonDays -gt 90) {
$Script:Reporting['Users']['Variables']['LastLogonDays90']++
} elseif ($User.LastLogonDays -gt 60) {
$Script:Reporting['Users']['Variables']['LastLogonDays60']++
} else {
$Script:Reporting['Users']['Variables']['LastLogonDaysRecent']++
}
} else {
$Script:Reporting['Users']['Variables']['UsersDisabled']++
}
if ($User.OwnerType -notin "WellKnownAdministrative", 'Administrative') {
$Script:Reporting['Users']['Variables']['OwnerNotAdministrative']++
} else {
$Script:Reporting['Users']['Variables']['OwnerAdministrative']++
}
$Script:Reporting['Users']['Variables'].PasswordPolicies[$User.PasswordPolicyName]++
}
}
}
Variables = @{
PasswordPolicies = [ordered] @{}
}
Summary = {
New-HTMLText -Text @(
"This report focuses on showing status of all users objects in the Active Directory forest. "
"It shows how many users are enabled, disabled, expired, etc."
) -FontSize 10pt -LineBreak
New-HTMLText -Text "Here's an overview of some statistics about users:" -FontSize 10pt
New-HTMLList {
New-HTMLListItem -Text "Total number of users: ", $($Script:Reporting['Users']['Variables'].UsersTotal) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of enabled users: ", $($Script:Reporting['Users']['Variables'].UsersEnabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of disabled users: ", $($Script:Reporting['Users']['Variables'].UsersDisabled) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of owners that are Domain Admins/Enterprise Admins: ", $($Script:Reporting['Users']['Variables'].OwnerAdministrative) -Color None, BlueMarguerite -FontWeight normal, bold
New-HTMLListItem -Text "Total number of owenrs that are non-administrative: ", $($Script:Reporting['Users']['Variables'].OwnerNotAdministrative) -Color None, BlueMarguerite -FontWeight normal, bold
foreach ($PasswordPolicy in $Script:Reporting['Users']['Variables'].PasswordPolicies.Keys) {
$Number = $Script:Reporting['Users']['Variables'].PasswordPolicies[$PasswordPolicy]
New-HTMLListItem -Text "Total number of users with password policy '$PasswordPolicy': ", $Number -Color None, BlueMarguerite -FontWeight normal, bold
}
} -FontSize 10pt
}
Solution = {
if ($Script:Reporting['Users']['Data'] -is [System.Collections.IDictionary]) {
New-HTMLSection -Invisible {
New-HTMLPanel {
$Script:Reporting['Users']['Summary']
}
New-HTMLPanel {
New-HTMLChart {
New-ChartBarOptions -Type bar
New-ChartLegend -Name 'Users by Password Policies' -Color SpringGreen, Salmon
foreach ($PasswordPolicy in $Script:Reporting['Users']['Variables'].PasswordPolicies.Keys) {
New-ChartBar -Name $PasswordPolicy -Value $Script:Reporting['Users']['Variables']['PasswordPolicies'][$PasswordPolicy]
}
New-ChartAxisY -LabelMaxWidth 300 -Show
} -Title 'Users by Password Policies' -TitleAlignment center
}
}
New-HTMLSection -HeaderText 'General statistics' -CanCollapse {
New-HTMLPanel {
New-HTMLChart {
New-ChartPie -Name 'Users Enabled' -Value $Script:Reporting['Users']['Variables'].UsersEnabled -Color '#58ffc5'
New-ChartPie -Name 'Users Disabled' -Value $Script:Reporting['Users']['Variables'].UsersDisabled -Color CoralRed
} -Title "Enabled vs Disabled All User Objects"
}
New-HTMLPanel {
New-HTMLChart {
New-ChartPie -Name 'Administrative' -Value $Script:Reporting['Users']['Variables'].OwnerAdministrative -Color '#58ffc5'
New-ChartPie -Name 'Other' -Value $Script:Reporting['Users']['Variables'].OwnerNotAdministrative -Color CoralRed
} -Title "Owner being Administrative vs Other"
}
New-HTMLPanel {
New-HTMLChart {
New-ChartPie -Name 'Password Never Expires' -Value $Script:Reporting['Users']['Variables'].PasswordNeverExpires -Color CoralRed
New-ChartPie -Name 'Password Expires' -Value $Script:Reporting['Users']['Variables'].PasswordExpires -Color '#58ffc5'
} -Title "Password Never Expires vs Expires" -SubTitle 'Enabled Only'
}
}
New-HTMLTabPanel -Orientation horizontal {
foreach ($Domain in $Script:Reporting['Users']['Data'].Keys) {
New-HTMLTab -Name $Domain {
New-HTMLTable -DataTable $Script:Reporting['Users']['Data'][$Domain] -Filtering {
# highlight whole row as blue if the computer is disabled
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $false -Row -BackgroundColor LightYellow
# highlight enabled column as red if the computer is disabled
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $false -BackgroundColor Salmon
# highlight enabled column as BrightTurquoise if the computer is enabled
# we don't know if it's any good, but lets try it
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $true -BackgroundColor BrightTurquoise
# highlight whole row as green if the computer is enabled and LastLogon, PasswordDays Over 30
New-HTMLTableConditionGroup -Conditions {
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator le -Value 30
New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType number -Operator le -Value 30
} -BackgroundColor PaleGreen -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
New-HTMLTableConditionGroup -Conditions {
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator gt -Value 30
New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType string -Operator eq -Value ''
} -BackgroundColor LightPink -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
New-HTMLTableConditionGroup -Conditions {
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType string -Operator eq -Value ''
New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType number -Operator gt -Value 30
} -BackgroundColor LightPink -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
New-HTMLTableConditionGroup -Conditions {
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType string -Operator eq -Value ''
New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType string -Operator eq -Value ''
} -BackgroundColor LightPink -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
# highlight whole row as green if the computer is enabled and LastLogon, PasswordDays Over 30
New-HTMLTableConditionGroup -Conditions {
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
New-HTMLTableCondition -Name 'LastLogonDays' -ComparisonType number -Operator gt -Value 30
New-HTMLTableCondition -Name 'PasswordLastDays' -ComparisonType number -Operator gt -Value 30
} -BackgroundColor Salmon -HighlightHeaders LastLogonDays, PasswordLastDays, Enabled
New-HTMLTableConditionGroup -Conditions {
New-HTMLTableCondition -Name 'Enabled' -ComparisonType string -Operator eq -Value $True
New-HTMLTableCondition -Name 'PasswordNotRequired' -ComparisonType string -Operator eq -Value $True
} -BackgroundColor Red -HighlightHeaders Name, SamAccountName, Enabled, PasswordNotRequired
} -ScrollX
}
}
}
}
}
}
function Convert-TrustForestTrustInfo {
<#
.SYNOPSIS
Converts the binary data of forest trust information into a readable format.
.DESCRIPTION
This function takes the binary data of forest trust information and converts it into a readable format, providing details about the trust status, domain names, SIDs, and creation timestamps.
.PARAMETER msDSTrustForestTrustInfo
The binary data containing forest trust information.
.EXAMPLE
Convert-TrustForestTrustInfo -msDSTrustForestTrustInfo $binaryData
Converts the binary forest trust information into a readable format.
.NOTES
Author: Your Name
Date: Current Date
Version: 1.0
#>
[CmdletBinding()]
param(
[byte[]] $msDSTrustForestTrustInfo
)
# https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/66387402-cb2b-490c-bf2a-f4ad687397e4
$Flags = [ordered] @{
'0' = 'Enabled'
'LsaTlnDisabledNew' = 'Not yet enabled'
'LsaTlnDisabledAdmin' = 'Disabled by administrator'
'LsaTlnDisabledConflict' = 'Disabled due to a conflict with another trusted domain'
'LsaSidDisabledAdmin' = 'Disabled for SID, NetBIOS, and DNS name-based matches by the administrator'
'LsaSidDisabledConflict' = 'Disabled for SID, NetBIOS, and DNS name-based matches due to a SID or DNS name-based conflict with another trusted domain'
'LsaNBDisabledAdmin' = 'Disabled for NetBIOS name-based matches by the administrator'
'LsaNBDisabledConflict' = 'Disabled for NetBIOS name-based matches due to a NetBIOS domain name conflict with another trusted domain'
}
if ($msDSTrustForestTrustInfo) {
$Read = Get-ForestTrustInfo -Byte $msDSTrustForestTrustInfo
$ForestTrustDomainInfo = [ordered]@{}
[Array] $Records = foreach ($Record in $Read.Records) {
if ($Record.RecordType -ne 'ForestTrustDomainInfo') {
# ForestTrustTopLevelName, ForestTrustTopLevelNameEx
if ($Record.RecordType -eq 'ForestTrustTopLevelName') {
$Type = 'Included'
} else {
$Type = 'Excluded'
}
[PSCustomObject] @{
DnsName = $null
NetbiosName = $null
Sid = $null
Type = $Type
Suffix = $Record.ForestTrustData
Status = $Flags["$($Record.Flags)"]
StatusFlag = $Record.Flags
WhenCreated = $Record.Timestamp
}
} else {
$ForestTrustDomainInfo['DnsName'] = $Record.ForestTrustData.DnsName
$ForestTrustDomainInfo['NetbiosName'] = $Record.ForestTrustData.NetbiosName
$ForestTrustDomainInfo['Sid'] = $Record.ForestTrustData.Sid
}
}
foreach ($Record in $Records) {
$Record.DnsName = $ForestTrustDomainInfo['DnsName']
$Record.NetbiosName = $ForestTrustDomainInfo['NetbiosName']
$Record.Sid = $ForestTrustDomainInfo['Sid']
}
$Records
}
}
function ConvertFrom-SimplifiedDelegation {
<#
.SYNOPSIS
Experimental way to define permissions that are prepopulated
.DESCRIPTION
Experimental way to define permissions that are prepopulated
.PARAMETER Principal
Principal to apply the permission to
.PARAMETER SimplifiedDelegation
Simplified delegation to apply
.PARAMETER AccessControlType
Access control type
.PARAMETER InheritanceType
Inheritance type, if not specified, it will be set to Descendents
.PARAMETER OneLiner
If specified, the output will be in one line, rather than a multilevel object
.EXAMPLE
ConvertFrom-SimplifiedDelegation -Principal $ConvertedPrincipal -SimplifiedDelegation $SimplifiedDelegation -OneLiner:$OneLiner.IsPresent -AccessControlType $AccessControlType -InheritanceType $InheritanceType
.NOTES
General notes
#>
[CmdletBinding()]
param(
[string] $Principal,
[string[]] $SimplifiedDelegation,
[System.Security.AccessControl.AccessControlType] $AccessControlType,
[alias('ActiveDirectorySecurityInheritance')][nullable[System.DirectoryServices.ActiveDirectorySecurityInheritance]] $InheritanceType,
[switch] $OneLiner
)
# Remember to change SimplifiedDelegationDefinitionList below!!!
$Script:SimplifiedDelegationDefinition = [ordered] @{
ComputerDomainJoin = @(
# allows only to join computers to domain, but not rejoin or move
if (-not $InheritanceType) {
$InheritanceType = [System.DirectoryServices.ActiveDirectorySecurityInheritance]::Descendents
}
ConvertTo-Delegation -ConvertedPrincipal $Principal -AccessControlType $AccessControlType -AccessRule 'CreateChild' -InheritanceType $InheritanceType -InheritedObjectType 'Computer' -OneLiner:$OneLiner
)
ComputerDomainReJoin = @(
# allows to join computers to domain, but also rejoin them on demand
if (-not $InheritanceType) {
$InheritanceType = [System.DirectoryServices.ActiveDirectorySecurityInheritance]::Descendents
}
ConvertTo-Delegation -ConvertedPrincipal $Principal -AccessControlType $AccessControlType -AccessRule 'CreateChild', 'DeleteChild' -InheritanceType $InheritanceType -InheritedObjectType 'Computer' -OneLiner:$OneLiner
ConvertTo-Delegation -ConvertedPrincipal $Principal -AccessControlType $AccessControlType -AccessRule 'ExtendedRight' -ObjectType 'Reset Password' -InheritanceType $InheritanceType -InheritedObjectType 'Computer' -OneLiner:$OneLiner
ConvertTo-Delegation -ConvertedPrincipal $Principal -AccessControlType $AccessControlType -AccessRule 'ExtendedRight' -ObjectType 'Account Restrictions' -InheritanceType $InheritanceType -InheritedObjectType 'Computer' -OneLiner:$OneLiner
ConvertTo-Delegation -ConvertedPrincipal $Principal -AccessControlType $AccessControlType -AccessRule 'ExtendedRight' -ObjectType 'Validated write to DNS host name' -InheritanceType $InheritanceType -InheritedObjectType 'Computer' -OneLiner:$OneLiner
ConvertTo-Delegation -ConvertedPrincipal $Principal -AccessControlType $AccessControlType -AccessRule 'ExtendedRight' -ObjectType 'Validated write to service principal name' -InheritanceType $InheritanceType -InheritedObjectType 'Computer' -OneLiner:$OneLiner
)
FullControl = @(
if (-not $InheritanceType) {
$InheritanceType = [System.DirectoryServices.ActiveDirectorySecurityInheritance]::All
}
ConvertTo-Delegation -ConvertedPrincipal $Principal -AccessControlType $AccessControlType -AccessRule 'GenericAll' -InheritanceType $InheritanceType -OneLiner:$OneLiner
)
}
foreach ($Simple in $SimplifiedDelegation) {
$Script:SimplifiedDelegationDefinition[$Simple]
}
}
$Script:SimplifiedDelegationDefinitionList = @(
'ComputerDomainJoin'
'ComputerDomainReJoin'
'FullControl'
)
[scriptblock] $ConvertSimplifiedDelegationDefinition = {
param($commandName, $parameterName, $wordToComplete, $commandAst, $fakeBoundParameters)
$Script:SimplifiedDelegationDefinitionList | Sort-Object | Where-Object { $_ -like "*$wordToComplete*" }
}
Register-ArgumentCompleter -CommandName ConvertFrom-SimplifiedDelegation -ParameterName SimplifiedDelegation -ScriptBlock $ConvertSimplifiedDelegationDefinition
function ConvertTo-ComputerFQDN {
<#
.SYNOPSIS
Converts a computer name to its fully qualified domain name (FQDN).
.DESCRIPTION
This function checks if the provided computer name is an IP address and converts it to a DNS name to ensure SSL functionality.
.PARAMETER Computer
The computer name or IP address to convert to FQDN.
.EXAMPLE
ConvertTo-ComputerFQDN -Computer "192.168.1.1"
Converts the IP address to its corresponding DNS name.
.NOTES
Author: Your Name
Date: Current Date
Version: 1.0
#>
[cmdletBinding()]
param(
[string] $Computer
)
# Checks for ServerName - Makes sure to convert IPAddress to DNS, otherwise SSL won't work
$IPAddressCheck = [System.Net.IPAddress]::TryParse($Computer, [ref][ipaddress]::Any)
$IPAddressMatch = $Computer -match '^(\d+\.){3}\d+$'
if ($IPAddressCheck -and $IPAddressMatch) {
[Array] $ADServerFQDN = (Resolve-DnsName -Name $Computer -ErrorAction SilentlyContinue -Type PTR -Verbose:$false)
if ($ADServerFQDN.Count -gt 0) {
$ServerName = $ADServerFQDN[0].NameHost
} else {
$ServerName = $Computer
}
} else {
[Array] $ADServerFQDN = (Resolve-DnsName -Name $Computer -ErrorAction SilentlyContinue -Type A -Verbose:$false)
if ($ADServerFQDN.Count -gt 0) {
$ServerName = $ADServerFQDN[0].Name
} else {
$ServerName = $Computer
}
}
$ServerName
}
function ConvertTo-Date {
<#
.SYNOPSIS
Converts a numerical account expiration value to a readable date.
.DESCRIPTION
This function takes a numerical account expiration value and converts it to a readable date format. If the value is 0 or exceeds the maximum DateTime value, it returns $null.
.PARAMETER AccountExpires
The numerical account expiration value to convert.
.EXAMPLE
ConvertTo-Date -AccountExpires 1324567890
Converts the numerical account expiration value to a readable date.
.NOTES
Author: Your Name
Date: Current Date
Version: 1.0
#>
[cmdletBinding()]
Param (
[Parameter(ValueFromPipeline, Mandatory)]$AccountExpires
)
process {
$lngValue = $AccountExpires
if (($lngValue -eq 0) -or ($lngValue -gt [DateTime]::MaxValue.Ticks)) {
$AccountExpirationDate = $null
} else {
$Date = [DateTime]$lngValue
$AccountExpirationDate = $Date.AddYears(1600).ToLocalTime()
}
$AccountExpirationDate
}
}
function ConvertTo-Delegation {
<#
.SYNOPSIS
Converts delegation parameters into a custom object.
.DESCRIPTION
This function converts delegation parameters into a custom object based on the provided input. It allows for defining permissions in a structured manner for a given principal.
.PARAMETER Principal
Specifies the principal to which the delegation applies.
.PARAMETER AccessRule
Specifies the Active Directory rights to assign for the delegation.
.PARAMETER AccessControlType
Specifies the type of access control to be applied.
.PARAMETER ObjectType
Specifies the type of object being targeted for the delegation.
.PARAMETER InheritedObjectType
Specifies the type of inherited object for the delegation.
.PARAMETER InheritanceType
Specifies the type of inheritance to consider for the delegation.
.PARAMETER OneLiner
If specified, the output will be in a single line format.
.EXAMPLE
ConvertTo-Delegation -Principal "User1" -AccessRule "Read" -AccessControlType "Allow" -ObjectType "File" -InheritedObjectType "Folder" -InheritanceType "Descendents" -OneLiner
Converts the delegation parameters into a custom object in a single line format.
.NOTES
Author: Your Name
Date: Current Date
Version: 1.0
#>
[CmdletBinding()]
param(
[string] $Principal,
[System.DirectoryServices.ActiveDirectoryRights] $AccessRule,
[System.Security.AccessControl.AccessControlType] $AccessControlType,
[alias('ObjectTypeName')][string] $ObjectType,
[alias('InheritedObjectTypeName')][string] $InheritedObjectType,
[alias('ActiveDirectorySecurityInheritance')][nullable[System.DirectoryServices.ActiveDirectorySecurityInheritance]] $InheritanceType,
[switch] $OneLiner
)
if ($OneLiner) {
[PSCustomObject] @{
Principal = $Principal
ActiveDirectoryRights = $AccessRule
AccessControlType = $AccessControlType
ObjectTypeName = $ObjectType
InheritedObjectTypeName = $InheritedObjectType
InheritanceType = $InheritanceType
}
} else {
[PSCustomObject] @{
Principal = $Principal
Permissions = [PSCustomObject] @{
'ActiveDirectoryRights' = $AccessRule
'AccessControlType' = $AccessControlType
'ObjectTypeName' = $ObjectType
'InheritedObjectTypeName' = $InheritedObjectType
'InheritanceType' = $InheritanceType
}
}
}
}
[scriptblock] $ConvertToDelegationAutocompleter = {
param($commandName, $parameterName, $wordToComplete, $commandAst, $fakeBoundParameters)
if (-not $Script:ADSchemaGuids) {
Import-Module ActiveDirectory -Verbose:$false
$Script:ADSchemaGuids = Convert-ADSchemaToGuid
}
$Script:ADSchemaGuids.Keys | Where-Object { $_ -like "*$wordToComplete*" } | ForEach-Object { "'$($_)'" } #| Sort-Object
}
Register-ArgumentCompleter -CommandName ConvertTo-Delegation -ParameterName ObjectType -ScriptBlock $ConvertToDelegationAutocompleter
Register-ArgumentCompleter -CommandName ConvertTo-Delegation -ParameterName InheritedObjectType -ScriptBlock $ConvertToDelegationAutocompleter
function ConvertTo-TimeSpanFromRepadmin {
<#
.SYNOPSIS
Converts a string representation of time from Repadmin into a TimeSpan object.
.DESCRIPTION
This function takes a string representation of time from Repadmin and converts it into a TimeSpan object.
.PARAMETER timeString
The string representation of time from Repadmin to convert.
.EXAMPLE
ConvertTo-TimeSpanFromRepadmin -timeString "3d.5h:30m:15s"
Converts the string representation of time from Repadmin into a TimeSpan object.
.NOTES
Author: Your Name
Date: Current Date
Version: 1.0
#>
[cmdletBinding()]
param (
[Parameter(Mandatory)][string]$timeString
)
switch -Regex ($timeString) {
'^\s*(\d+)d\.(\d+)h:(\d+)m:(\d+)s\s*$' {
$days = $Matches[1]
$hours = $Matches[2]
$minutes = $Matches[3]
$seconds = $Matches[4]
New-TimeSpan -Days $days -Hours $hours -Minutes $minutes -Seconds $seconds
}
'^\s*(\d+)h:(\d+)m:(\d+)s\s*$' {
$hours = $Matches[1]
$minutes = $Matches[2]
$seconds = $Matches[3]
New-TimeSpan -Hours $hours -Minutes $minutes -Seconds $seconds
}
'^\s*(\d+)m:(\d+)s\s*$' {
$minutes = $Matches[1]
$seconds = $Matches[2]
New-TimeSpan -Minutes $minutes -Seconds $seconds
}
'^\s*:(\d+)s\s*$' {
$seconds = $Matches[1]
New-TimeSpan -Seconds $seconds
}
'^\s*(\d+)s\s*$' {
$seconds = $Matches[1]
New-TimeSpan -Seconds $seconds
}
'^>60 days\s*$' {
New-TimeSpan -Days 60
}
'^\s*\(unknown\)\s*$' {
$null
}
default {
$null
}
}
}
function Get-ADConfigurationPermission {
<#
.SYNOPSIS
Retrieves AD configuration permissions based on specified criteria.
.DESCRIPTION
This function retrieves AD configuration permissions based on the provided AD object splat, object type, and optional filters.
.PARAMETER ADObjectSplat
The AD object splat containing LDAP filter and search base information.
.PARAMETER ObjectType
Specifies the type of object to retrieve permissions for.
.PARAMETER FilterOut
If specified, filters out specific object types.
.PARAMETER Owner
If specified, retrieves the owner information for each object.
.EXAMPLE
Get-ADConfigurationPermission -ADObjectSplat $ADObjectSplat -ObjectType "site" -FilterOut -Owner
Retrieves AD configuration permissions for site objects, filters out specific object types, and retrieves owner information.
.NOTES
Author: Your Name
Date: Current Date
Version: 1.0
#>
[cmdletBinding()]
param(
[System.Collections.IDictionary]$ADObjectSplat,
[string] $ObjectType,
[switch] $FilterOut,
[switch] $Owner
)
try {
$Objects = Get-ADObject @ADObjectSplat -ErrorAction Stop
} catch {
Write-Warning "Get-ADConfigurationPermission - LDAP Filter: $($ADObjectSplat.LDAPFilter), SearchBase: $($ADObjectSplat.SearchBase)), Error: $($_.Exception.Message)"
}
foreach ($O in $Objects) {
if ($FilterOut) {
if ($ObjectType -eq 'site') {
if ($O.DistinguishedName -like '*CN=Subnets,CN=Sites,CN=Configuration*') {
continue
}
if ($O.DistinguishedName -like '*CN=Inter-Site Transports,CN=Sites,CN=Configuration*') {
continue
}
}
}
if ($Owner) {
Write-Verbose "Get-ADConfigurationPermission - Getting Owner from $($O.DistinguishedName)"
$OwnerACL = Get-ADACLOwner -ADObject $O.DistinguishedName -Resolve
[PSCustomObject] @{
Name = $O.Name
CanonicalName = $O.CanonicalName
ObjectType = $ObjectType
ObjectClass = $O.ObjectClass
Owner = $OwnerACL.Owner
OwnerName = $OwnerACL.OwnerName
OwnerType = $OwnerACL.OwnerType
WhenCreated = $O.WhenCreated
WhenChanged = $O.WhenChanged
DistinguishedName = $O.DistinguishedName
}
} else {
Get-ADACL -ADObject $O.DistinguishedName -ResolveTypes
}
}
}
function Get-ADSubnet {
<#
.SYNOPSIS
Retrieve Active Directory subnet details.
.DESCRIPTION
Retrieves subnet information from Active Directory. This function processes the provided subnet objects and provides details such as IP address, network length, site information, and more.
.PARAMETER Subnets
Specifies an array of subnet objects for which information needs to be retrieved.
.PARAMETER AsHashTable
If specified, the subnet information is returned as a hashtable.
.EXAMPLE
Get-ADSubnet -Subnets $SubnetArray -AsHashTable
Retrieves subnet details for the specified subnet array and returns the information as a hashtable.
.NOTES
Author: Your Name
Date: Current Date
Version: 1.0
#>
[cmdletBinding()]
param(
[Array] $Subnets,
[switch] $AsHashTable
)
foreach ($Subnet in $Subnets) {
if ($Subnet.SiteObject) {
$SiteObject = ConvertFrom-DistinguishedName -DistinguishedName $Subnet.SiteObject
} else {
$SiteObject = ''
}
$Addr = $Subnet.Name.Split('/')
$Address = [PSCustomObject] @{
IP = $Addr[0]
NetworkLength = $Addr[1]
}
try {
$IPAddress = ([IPAddress] $Address.IP)
} catch {
Write-Warning "Get-ADSubnet - Conversion to IP failed. Error: $($_.Exception.Message)"
}
if ($IPAddress.AddressFamily -eq 'InterNetwork') {
# IPv4
$AddressRange = Get-IPAddressRangeInformation -CIDRObject $Address
$MaskBits = ([int](($Subnet.Name -split "/")[1]))
if ($AsHashTable) {
[ordered] @{
Name = $Subnet.Name
Type = 'IPv4'
SiteName = $SiteObject
SiteStatus = if ($SiteObject) {
$true
} else {
$false
}
OverLap = $null
OverLapList = $null
Subnet = ([IPAddress](($Subnet.Name -split "/")[0]))
MaskBits = ([int](($Subnet.Name -split "/")[1]))
SubnetMask = ([IPAddress]"$([system.convert]::ToInt64(("1"*$MaskBits).PadRight(32,"0"),2))")
TotalHosts = $AddressRange.TotalHosts
UsableHosts = $AddressRange.UsableHosts
HostMin = $AddressRange.HostMin
HostMax = $AddressRange.HostMax
Broadcast = $AddressRange.Broadcast
}
} else {
[PSCustomObject] @{
Name = $Subnet.Name
Type = 'IPv4'
SiteName = $SiteObject
SiteStatus = if ($SiteObject) {
$true
} else {
$false
}
Subnet = ([IPAddress](($Subnet.Name -split "/")[0]))
MaskBits = ([int](($Subnet.Name -split "/")[1]))
SubnetMask = ([IPAddress]"$([system.convert]::ToInt64(("1"*$MaskBits).PadRight(32,"0"),2))")
TotalHosts = $AddressRange.TotalHosts
UsableHosts = $AddressRange.UsableHosts
HostMin = $AddressRange.HostMin
HostMax = $AddressRange.HostMax
Broadcast = $AddressRange.Broadcast
}
}
} else {
# IPv6
$AddressRange = $null
if ($AsHashTable) {
[ordered] @{
Name = $Subnet.Name
Type = 'IPv6'
SiteName = $SiteObject
SiteStatus = if ($SiteObject) {
$true
} else {
$false
}
OverLap = $null
OverLapList = $null
Subnet = ([IPAddress](($Subnet.Name -split "/")[0]))
MaskBits = ([int](($Subnet.Name -split "/")[1]))
SubnetMask = $null # Ipv6 doesn't have a subnet mask
TotalHosts = $AddressRange.TotalHosts
UsableHosts = $AddressRange.UsableHosts
HostMin = $AddressRange.HostMin
HostMax = $AddressRange.HostMax
Broadcast = $AddressRange.Broadcast
}
} else {
[PSCustomObject] @{
Name = $Subnet.Name
Type = 'IPv6'
SiteName = $SiteObject
SiteStatus = if ($SiteObject) {
$true
} else {
$false
}
Subnet = ([IPAddress](($Subnet.Name -split "/")[0]))
MaskBits = ([int](($Subnet.Name -split "/")[1]))
SubnetMask = $null # Ipv6 doesn't have a subnet mask
TotalHosts = $AddressRange.TotalHosts
UsableHosts = $AddressRange.UsableHosts
HostMin = $AddressRange.HostMin
HostMax = $AddressRange.HostMax
Broadcast = $AddressRange.Broadcast
}
}
}
}
}
function Get-FilteredACL {
<#
.SYNOPSIS
Retrieves filtered Active Directory Access Control List (ACL) details based on specified criteria.
.DESCRIPTION
This function retrieves and filters Active Directory Access Control List (ACL) details based on the provided criteria. It allows for filtering by various parameters such as access control type, inheritance status, active directory rights, and more.
.PARAMETER ACL
Specifies the Active Directory Access Control List (ACL) to filter.
.PARAMETER Resolve
If specified, resolves the identity reference in the ACL.
.PARAMETER Principal
Specifies the principal to filter by.
.PARAMETER Inherited
If specified, includes only inherited ACLs.
.PARAMETER NotInherited
If specified, includes only non-inherited ACLs.
.PARAMETER AccessControlType
Specifies the type of access control to filter by.
.PARAMETER IncludeObjectTypeName
Specifies the object type names to include in the filter.
.PARAMETER IncludeInheritedObjectTypeName
Specifies the inherited object type names to include in the filter.
.PARAMETER ExcludeObjectTypeName
Specifies the object type names to exclude from the filter.
.PARAMETER ExcludeInheritedObjectTypeName
Specifies the inherited object type names to exclude from the filter.
.PARAMETER IncludeActiveDirectoryRights
Specifies the Active Directory rights to include in the filter.
.PARAMETER IncludeActiveDirectoryRightsExactMatch
Specifies the Active Directory rights to include in the filter as an exact match (all rights must be present).
.PARAMETER ExcludeActiveDirectoryRights
Specifies the Active Directory rights to exclude from the filter.
.PARAMETER IncludeActiveDirectorySecurityInheritance
Specifies the Active Directory security inheritance types to include in the filter.
.PARAMETER ExcludeActiveDirectorySecurityInheritance
Specifies the Active Directory security inheritance types to exclude from the filter.
.PARAMETER PrincipalRequested
Specifies the requested principal object.
.PARAMETER Bundle
If specified, bundles the filtered ACL details.
.PARAMETER DistinguishedName
Specifies the distinguished name of the ACL.
This parameter is used only to display the distinguished name in the output.
.PARAMETER SkipDistinguishedName
If specified, skips the distinguished name in the output.
.EXAMPLE
Get-FilteredACL -ACL $ACL -Resolve -Principal "User1" -Inherited -AccessControlType "Allow" -IncludeObjectTypeName "File" -ExcludeInheritedObjectTypeName "Folder" -IncludeActiveDirectoryRights "Read" -ExcludeActiveDirectoryRights "Write" -IncludeActiveDirectorySecurityInheritance "Descendents" -ExcludeActiveDirectorySecurityInheritance "SelfAndChildren" -PrincipalRequested $PrincipalRequested -Bundle
Retrieves and filters Active Directory Access Control List (ACL) details based on the specified criteria.
.NOTES
Additional information about the function.
#>
[cmdletBinding()]
param(
[System.DirectoryServices.ActiveDirectoryAccessRule] $ACL,
[alias('ResolveTypes')][switch] $Resolve,
[string] $Principal,
[switch] $Inherited,
[switch] $NotInherited,
[System.Security.AccessControl.AccessControlType] $AccessControlType,
[Alias('ObjectTypeName')][string[]] $IncludeObjectTypeName,
[Alias('InheritedObjectTypeName')][string[]] $IncludeInheritedObjectTypeName,
[string[]] $ExcludeObjectTypeName,
[string[]] $ExcludeInheritedObjectTypeName,
[Alias('ActiveDirectoryRights')][System.DirectoryServices.ActiveDirectoryRights[]] $IncludeActiveDirectoryRights,
[System.DirectoryServices.ActiveDirectoryRights[]] $IncludeActiveDirectoryRightsExactMatch,
[System.DirectoryServices.ActiveDirectoryRights[]] $ExcludeActiveDirectoryRights,
[Alias('InheritanceType', 'IncludeInheritanceType')][System.DirectoryServices.ActiveDirectorySecurityInheritance[]] $IncludeActiveDirectorySecurityInheritance,
[Alias('ExcludeInheritanceType')][System.DirectoryServices.ActiveDirectorySecurityInheritance[]] $ExcludeActiveDirectorySecurityInheritance,
[PSCustomObject] $PrincipalRequested,
[switch] $Bundle,
[string] $DistinguishedName,
[switch] $SkipDistinguishedName
)
# Let's make sure we have all the required data
if (-not $Script:ForestGUIDs) {
Write-Verbose "Get-ADACL - Gathering Forest GUIDS"
$Script:ForestGUIDs = Get-WinADForestGUIDs
}
if (-not $Script:ForestDetails) {
Write-Verbose "Get-ADACL - Gathering Forest Details"
$Script:ForestDetails = Get-WinADForestDetails
}
[Array] $ADRights = $ACL.ActiveDirectoryRights -split ', '
if ($AccessControlType) {
if ($ACL.AccessControlType -ne $AccessControlType) {
continue
}
}
if ($Inherited) {
if ($ACL.IsInherited -eq $false) {
# if it's not inherited and we require inherited lets continue
continue
}
}
if ($NotInherited) {
if ($ACL.IsInherited -eq $true) {
continue
}
}
if ($IncludeActiveDirectoryRightsExactMatch) {
# We expect all rights to be found in the ACL (could be more rights than specified, but all of them have to be there)
[Array] $FoundIncludeList = foreach ($Right in $IncludeActiveDirectoryRightsExactMatch) {
if ($ADRights -eq $Right) {
$true
}
}
if ($FoundIncludeList.Count -ne $IncludeActiveDirectoryRightsExactMatch.Count) {
continue
}
}
if ($IncludeActiveDirectoryRights) {
$FoundInclude = $false
foreach ($Right in $ADRights) {
if ($IncludeActiveDirectoryRights -contains $Right) {
$FoundInclude = $true
break
}
}
if (-not $FoundInclude) {
continue
}
}
if ($ExcludeActiveDirectoryRights) {
foreach ($Right in $ADRights) {
$FoundExclusion = $false
if ($ExcludeActiveDirectoryRights -contains $Right) {
$FoundExclusion = $true
break
}
if ($FoundExclusion) {
continue
}
}
}
if ($IncludeActiveDirectorySecurityInheritance) {
if ($IncludeActiveDirectorySecurityInheritance -notcontains $ACL.InheritanceType) {
continue
}
}
if ($ExcludeActiveDirectorySecurityInheritance) {
if ($ExcludeActiveDirectorySecurityInheritance -contains $ACL.InheritanceType) {
continue
}
}
$IdentityReference = $ACL.IdentityReference.Value
$ReturnObject = [ordered] @{ }
if (-not $SkipDistinguishedName) {
$ReturnObject['DistinguishedName' ] = $DistinguishedName
}
if ($CanonicalName) {
$ReturnObject['CanonicalName'] = $CanonicalName
}
if ($ObjectClass) {
$ReturnObject['ObjectClass'] = $ObjectClass
}
$ReturnObject['AccessControlType'] = $ACL.AccessControlType
$ReturnObject['Principal'] = $IdentityReference
if ($Resolve) {
$IdentityResolve = Get-WinADObject -Identity $IdentityReference -AddType -Verbose:$false -Cache
if (-not $IdentityResolve) {
#Write-Verbose "Get-ADACL - Reverting to Convert-Identity for $IdentityReference"
$ConvertIdentity = Convert-Identity -Identity $IdentityReference -Verbose:$false
$ReturnObject['PrincipalType'] = $ConvertIdentity.Type
# it's not really foreignSecurityPrincipal but can't tell what it is... # https://superuser.com/questions/1067246/is-nt-authority-system-a-user-or-a-group
$ReturnObject['PrincipalObjectType'] = 'foreignSecurityPrincipal'
$ReturnObject['PrincipalObjectDomain'] = $ConvertIdentity.DomainName
$ReturnObject['PrincipalObjectSid'] = $ConvertIdentity.SID
} else {
if ($ReturnObject['Principal']) {
$ReturnObject['Principal'] = $IdentityResolve.Name
}
$ReturnObject['PrincipalType'] = $IdentityResolve.Type
$ReturnObject['PrincipalObjectType'] = $IdentityResolve.ObjectClass
$ReturnObject['PrincipalObjectDomain' ] = $IdentityResolve.DomainName
$ReturnObject['PrincipalObjectSid'] = $IdentityResolve.ObjectSID
}
if (-not $ReturnObject['PrincipalObjectDomain']) {
$ReturnObject['PrincipalObjectDomain'] = ConvertFrom-DistinguishedName -DistinguishedName $DistinguishedName -ToDomainCN
}
# We compare principal to real principal based on Resolve, we compare both PrincipalName and SID to cover our ground
if ($PrincipalRequested -and $PrincipalRequested.SID -ne $ReturnObject['PrincipalObjectSid']) {
continue
}
} else {
# We compare principal to principal as returned without resolve
if ($Principal -and $Principal -ne $IdentityReference) {
continue
}
}
$ReturnObject['ObjectTypeName'] = $Script:ForestGUIDs["$($ACL.objectType)"]
$ReturnObject['InheritedObjectTypeName'] = $Script:ForestGUIDs["$($ACL.inheritedObjectType)"]
if ($IncludeObjectTypeName) {
if ($IncludeObjectTypeName -notcontains $ReturnObject['ObjectTypeName']) {
continue
}
}
if ($IncludeInheritedObjectTypeName) {
if ($IncludeInheritedObjectTypeName -notcontains $ReturnObject['InheritedObjectTypeName']) {
continue
}
}
if ($ExcludeObjectTypeName) {
if ($ExcludeObjectTypeName -contains $ReturnObject['ObjectTypeName']) {
continue
}
}
if ($ExcludeInheritedObjectTypeName) {
if ($ExcludeInheritedObjectTypeName -contains $ReturnObject['InheritedObjectTypeName']) {
continue
}
}
if ($ADRightsAsArray) {
$ReturnObject['ActiveDirectoryRights'] = $ADRights
} else {
$ReturnObject['ActiveDirectoryRights'] = $ACL.ActiveDirectoryRights
}
$ReturnObject['InheritanceType'] = $ACL.InheritanceType
$ReturnObject['IsInherited'] = $ACL.IsInherited
if ($Extended) {
$ReturnObject['ObjectType'] = $ACL.ObjectType
$ReturnObject['InheritedObjectType'] = $ACL.InheritedObjectType
$ReturnObject['ObjectFlags'] = $ACL.ObjectFlags
$ReturnObject['InheritanceFlags'] = $ACL.InheritanceFlags
$ReturnObject['PropagationFlags'] = $ACL.PropagationFlags
}
if ($Bundle) {
$ReturnObject['Bundle'] = $ACL
}
[PSCustomObject] $ReturnObject
}
function Get-ForestTrustInfo {
<#
.SYNOPSIS
Retrieves and processes forest trust information from an array of bytes.
.DESCRIPTION
This function retrieves and processes forest trust information from the provided array of bytes.
.PARAMETER Byte
An array of bytes containing the forest trust information to be processed.
.EXAMPLE
Get-ForestTrustInfo -Byte $ByteData
Retrieves and processes forest trust information from the specified array of bytes.
.NOTES
Author: Chris Dent
#>
[CmdletBinding()]
param (
[Parameter(Mandatory)][byte[]]$Byte
)
$reader = [System.IO.BinaryReader][System.IO.MemoryStream]$Byte
$trustInfo = [PSCustomObject]@{
Version = $reader.ReadUInt32()
RecordCount = $reader.ReadUInt32()
Records = $null
}
$trustInfo.Records = for ($i = 0; $i -lt $trustInfo.RecordCount; $i++) {
Get-ForestTrustRecord -BinaryReader $reader
}
$trustInfo
}
function Get-ForestTrustRecord {
<#
.SYNOPSIS
Retrieves and processes forest trust record information.
.DESCRIPTION
This function retrieves and processes forest trust record information from the provided BinaryReader.
.PARAMETER BinaryReader
Specifies the BinaryReader object containing the forest trust record information.
.EXAMPLE
Get-ForestTrustRecord -BinaryReader $BinaryReader
Retrieves and processes forest trust record information from the BinaryReader object.
.NOTES
Author: Chris Dent
#>
[CmdletBinding()]
param (
[Parameter(Mandatory)][System.IO.BinaryReader]$BinaryReader
)
[Flags()]
enum TrustFlags {
LsaTlnDisabledNew = 0x1
LsaTlnDisabledAdmin = 0x2
LsaTlnDisabledConflict = 0x4
}
[Flags()]
enum ForestTrustFlags {
LsaSidDisabledAdmin = 0x1
LsaSidDisabledConflict = 0x2
LsaNBDisabledAdmin = 0x4
LsaNBDisabledConflict = 0x8
}
enum RecordType {
ForestTrustTopLevelName
ForestTrustTopLevelNameEx
ForestTrustDomainInfo
}
$record = [PSCustomObject]@{
RecordLength = $BinaryReader.ReadUInt32()
Flags = $BinaryReader.ReadUInt32()
Timestamp = $BinaryReader.ReadUInt32(), $BinaryReader.ReadUInt32()
RecordType = $BinaryReader.ReadByte() -as [RecordType]
ForestTrustData = $null
}
$record.Timestamp = [DateTime]::FromFileTimeUtc(
($record.Timestamp[0] -as [UInt64] -shl 32) + $record.Timestamp[1]
)
$record.Flags = switch ($record.RecordType) {
([RecordType]::ForestTrustDomainInfo) {
$record.Flags -as [ForestTrustFlags]
}
default {
$record.Flags -as [TrustFlags]
}
}
if ($record.RecordLength -gt 11) {
switch ($record.RecordType) {
([RecordType]::ForestTrustDomainInfo) {
$record.ForestTrustData = [PSCustomObject]@{
Sid = $null
DnsName = $null
NetbiosName = $null
}
$sidLength = $BinaryReader.ReadUInt32()
if ($sidLength -gt 0) {
$record.ForestTrustData.Sid = [System.Security.Principal.SecurityIdentifier]::new(
$BinaryReader.ReadBytes($sidLength),
0
)
}
$dnsNameLen = $BinaryReader.ReadUInt32()
if ($dnsNameLen -gt 0) {
$record.ForestTrustData.DnsName = [string]::new($BinaryReader.ReadBytes($dnsNameLen) -as [char[]])
}
$NetbiosNameLen = $BinaryReader.ReadUInt32()
if ($NetbiosNameLen -gt 0) {
$record.ForestTrustData.NetbiosName = [string]::new($BinaryReader.ReadBytes($NetbiosNameLen) -as [char[]])
}
}
default {
$nameLength = $BinaryReader.ReadUInt32()
if ($nameLength -gt 0) {
$record.ForestTrustData = [String]::new($BinaryReader.ReadBytes($nameLength) -as [char[]])
}
}
}
}
$record
}
function Get-GitHubVersion {
<#
.SYNOPSIS
Retrieves the latest version information from GitHub for a specified cmdlet.
.DESCRIPTION
This function retrieves the latest version information from GitHub for a specified cmdlet and compares it with the current version.
.PARAMETER Cmdlet
Specifies the name of the cmdlet to check for the latest version.
.PARAMETER RepositoryOwner
Specifies the owner of the GitHub repository.
.PARAMETER RepositoryName
Specifies the name of the GitHub repository.
.EXAMPLE
Get-GitHubVersion -Cmdlet "YourCmdlet" -RepositoryOwner "OwnerName" -RepositoryName "RepoName"
Retrieves and compares the latest version information for the specified cmdlet from the GitHub repository.
.NOTES
Author: Your Name
Date: Current Date
Version: 1.0
#>
[cmdletBinding()]
param(
[Parameter(Mandatory)][string] $Cmdlet,
[Parameter(Mandatory)][string] $RepositoryOwner,
[Parameter(Mandatory)][string] $RepositoryName
)
$App = Get-Command -Name $Cmdlet -ErrorAction SilentlyContinue
if ($App) {
[Array] $GitHubReleases = (Get-GitHubLatestRelease -Url "https://api.github.com/repos/$RepositoryOwner/$RepositoryName/releases" -Verbose:$false)
$LatestVersion = $GitHubReleases[0]
if (-not $LatestVersion.Errors) {
if ($App.Version -eq $LatestVersion.Version) {
"Current/Latest: $($LatestVersion.Version) at $($LatestVersion.PublishDate)"
} elseif ($App.Version -lt $LatestVersion.Version) {
"Current: $($App.Version), Published: $($LatestVersion.Version) at $($LatestVersion.PublishDate). Update?"
} elseif ($App.Version -gt $LatestVersion.Version) {
"Current: $($App.Version), Published: $($LatestVersion.Version) at $($LatestVersion.PublishDate). Lucky you!"
}
} else {
"Current: $($App.Version)"
}
}
}
function Get-PrivateACL {
<#
.SYNOPSIS
Get ACL from AD Object
.DESCRIPTION
Get ACL from AD Object
.PARAMETER ADObject
AD Object to get ACL from
.PARAMETER FullObject
Returns full object instead of just ACL
.EXAMPLE
Get-PrivateACL -ADObject 'DC=ad,DC=evotec,DC=xyz'
.NOTES
General notes
#>
[cmdletBinding()]
param(
[parameter(Mandatory)][alias('DistinguishedName')][string] $ADObject,
[switch] $FullObject
)
try {
$ADObjectData = Get-ADObject -Identity $ADObject -Properties ntSecurityDescriptor, CanonicalName -ErrorAction Stop
} catch {
Write-Warning -Message "Get-PrivateACL - Unable to get ADObject data for $ADObject. Error: $($_.Exception.Message)"
return
}
if ($FullObject) {
$ADObjectData
} else {
$ADObjectData.ntSecurityDescriptor
}
}
function Get-ProtocolStatus {
<#
.SYNOPSIS
Translates registry of protocol to status
.DESCRIPTION
Translates registry of protocol to status
.PARAMETER RegistryEntry
Accepts registry entry from Get-PSRegistry
.EXAMPLE
$Client = Get-PSRegistry -ComputerName 'AD1' -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client'
Get-ProtocolStatus -RegistryEntry $Client
.NOTES
When DisabledByDefault flag is set to 1, SSL / TLS version X is not used by default. If an SSPI app requests to use this version of SSL / TLS, it will be negotiated. In a nutshell, SSL is not disabled when you use DisabledByDefault flag.
When Enabled flag is set to 0, SSL / TLS version X is disabled and cannot be nagotiated by any SSPI app (even if DisabledByDefault flag is set to 0).
#>
[CmdletBinding()]
param(
[PSCustomObject] $RegistryEntry,
[string] $WindowsVersion,
[System.Collections.IDictionary] $ProtocolDefaults,
[string] $Protocol
)
if ($Protocol) {
$Default = $ProtocolDefaults[$Protocol]
if ($Default -eq 'Not supported') {
return $Default
}
} else {
Write-Warning -Message "Get-ProtocolStatus - protocol not specified."
}
if ($RegistryEntry.PSConnection -eq $true) {
if ($RegistryEntry.PSError -eq $true) {
#$Status = 'Not set, enabled'
$Status = 'Enabled'
} else {
if ($RegistryEntry.DisabledByDefault -eq 0 -and $RegistryEntry.Enabled -eq 1) {
$Status = 'Enabled'
} elseif ($RegistryEntry.DisabledByDefault -eq 1 -and $RegistryEntry.Enabled -eq 0) {
$Status = 'Disabled'
} elseif ($RegistryEntry.DisabledByDefault -eq 1 -and $RegistryEntry.Enabled -eq 1) {
$Status = 'Enabled'
} elseif ($RegistryEntry.DisabledByDefault -eq 0 -and $RegistryEntry.Enabled -eq 0) {
$Status = 'Disabled'
} elseif ($RegistryEntry.DisabledByDefault -eq 0) {
$Status = 'Enabled'
} elseif ($RegistryEntry.DisabledByDefault -eq 1) {
$Status = 'DisabledDefault'
} elseif ($RegistryEntry.Enabled -eq 1) {
$Status = 'Enabled'
} elseif ($RegistryEntry.Enabled -eq 0) {
$Status = 'Disabled'
} else {
$Status = 'Wont happen'
}
}
} else {
$Status = 'No connection'
}
$Status
}
function Get-WinADCache {
<#
.SYNOPSIS
Retrieves Windows Active Directory cache information.
.DESCRIPTION
This function retrieves Windows Active Directory cache information based on specified parameters.
.PARAMETER ByDN
Specifies to retrieve AD cache information by DistinguishedName.
.PARAMETER ByNetBiosName
Specifies to retrieve AD cache information by NetBIOSName.
.EXAMPLE
Get-WinADCache -ByDN
Retrieves AD cache information by DistinguishedName.
.EXAMPLE
Get-WinADCache -ByNetBiosName
Retrieves AD cache information by NetBIOSName.
.NOTES
This cmdlet retrieves and organizes Active Directory cache information for specified parameters.
Author: Your Name
Date: Current Date
Version: 1.0
#>
[alias('Get-ADCache')]
[cmdletbinding()]
param(
[switch] $ByDN,
[switch] $ByNetBiosName
)
$ForestObjectsCache = [ordered] @{ }
$Forest = Get-ADForest
foreach ($Domain in $Forest.Domains) {
$Server = Get-ADDomainController -Discover -DomainName $Domain
try {
$DomainInformation = Get-ADDomain -Server $Server.Hostname[0]
$Users = Get-ADUser -Filter "*" -Server $Server.Hostname[0]
$Groups = Get-ADGroup -Filter "*" -Server $Server.Hostname[0]
$Computers = Get-ADComputer -Filter "*" -Server $Server.Hostname[0]
} catch {
Write-Warning "Get-ADCache - Can't process domain $Domain - $($_.Exception.Message)"
continue
}
if ($ByDN) {
foreach ($_ in $Users) {
$ForestObjectsCache["$($_.DistinguishedName)"] = $_
}
foreach ($_ in $Groups) {
$ForestObjectsCache["$($_.DistinguishedName)"] = $_
}
foreach ($_ in $Computers) {
$ForestObjectsCache["$($_.DistinguishedName)"] = $_
}
} elseif ($ByNetBiosName) {
foreach ($_ in $Users) {
$Identity = -join ($DomainInformation.NetBIOSName, '\', $($_.SamAccountName))
$ForestObjectsCache["$Identity"] = $_
}
foreach ($_ in $Groups) {
$Identity = -join ($DomainInformation.NetBIOSName, '\', $($_.SamAccountName))
$ForestObjectsCache["$Identity"] = $_
}
foreach ($_ in $Computers) {
$Identity = -join ($DomainInformation.NetBIOSName, '\', $($_.SamAccountName))
$ForestObjectsCache["$Identity"] = $_
}
} else {
Write-Warning "Get-ADCache - No choice made."
}
}
$ForestObjectsCache
}
function Get-WinADDomainOrganizationalUnitsACLExtended {
<#
.SYNOPSIS
Retrieves ACL information for specified Organizational Units in Active Directory.
.DESCRIPTION
This function retrieves Access Control List (ACL) information for the specified Organizational Units (OUs) in Active Directory. It allows for querying ACLs for multiple OUs within a domain.
.PARAMETER DomainOrganizationalUnitsClean
Specifies an array of clean Domain Organizational Units to retrieve ACL information for.
.PARAMETER Domain
Specifies the domain to query for ACL information. Defaults to the current user's DNS domain.
.PARAMETER NetBiosName
Specifies the NetBIOS name of the domain.
.PARAMETER RootDomainNamingContext
Specifies the root domain naming context.
.PARAMETER GUID
Specifies a dictionary of GUIDs for reference.
.PARAMETER ForestObjectsCache
Specifies a dictionary of cached forest objects for reference.
.PARAMETER Server
Specifies the server to connect to for querying ACL information.
.NOTES
Author: Your Name
Date: Current Date
Version: 1.0
#>
[cmdletbinding()]
param(
[Array] $DomainOrganizationalUnitsClean,
[string] $Domain = $Env:USERDNSDOMAIN,
[string] $NetBiosName,
[string] $RootDomainNamingContext,
[System.Collections.IDictionary] $GUID,
[System.Collections.IDictionary] $ForestObjectsCache,
$Server
)
if (-not $GUID) {
$GUID = @{ }
}
if (-not $ForestObjectsCache) {
$ForestObjectsCache = @{ }
}
$OUs = @(
#@{ Name = 'Root'; Value = $RootDomainNamingContext }
foreach ($OU in $DomainOrganizationalUnitsClean) {
@{ Name = 'Organizational Unit'; Value = $OU.DistinguishedName }
}
)
if ($Server) {
$null = New-PSDrive -Name $NetBiosName -Root '' -PSProvider ActiveDirectory -Server $Server
} else {
$null = New-PSDrive -Name $NetBiosName -Root '' -PSProvider ActiveDirectory -Server $Domain
}
foreach ($OU in $OUs) {
$ACLs = Get-Acl -Path "$NetBiosName`:\$($OU.Value)" | Select-Object -ExpandProperty Access
foreach ($ACL in $ACLs) {
if ($ACL.IdentityReference -like '*\*') {
$TemporaryIdentity = $ForestObjectsCache["$($ACL.IdentityReference)"]
$IdentityReferenceType = $TemporaryIdentity.ObjectClass
$IdentityReference = $ACL.IdentityReference.Value
} elseif ($ACL.IdentityReference -like '*-*-*-*') {
$ConvertedSID = ConvertFrom-SID -SID $ACL.IdentityReference
$TemporaryIdentity = $ForestObjectsCache["$($ConvertedSID.Name)"]
$IdentityReferenceType = $TemporaryIdentity.ObjectClass
$IdentityReference = $ConvertedSID.Name
} else {
$IdentityReference = $ACL.IdentityReference
$IdentityReferenceType = 'Unknown'
}
[PSCustomObject] @{
'Distinguished Name' = $OU.Value
'Type' = $OU.Name
'AccessControlType' = $ACL.AccessControlType
'Rights' = $Global:Rights["$($ACL.ActiveDirectoryRights)"]["$($ACL.ObjectFlags)"]
'ObjectType Name' = $GUID["$($ACL.objectType)"]
'Inherited ObjectType Name' = $GUID["$($ACL.inheritedObjectType)"]
'ActiveDirectoryRights' = $ACL.ActiveDirectoryRights
'InheritanceType' = $ACL.InheritanceType
#'ObjectType' = $ACL.ObjectType
#'InheritedObjectType' = $ACL.InheritedObjectType
'ObjectFlags' = $ACL.ObjectFlags
'IdentityReference' = $IdentityReference
'IdentityReferenceType' = $IdentityReferenceType
'IsInherited' = $ACL.IsInherited
'InheritanceFlags' = $ACL.InheritanceFlags
'PropagationFlags' = $ACL.PropagationFlags
}
}
}
}
function Get-WinADTrustObject {
<#
.SYNOPSIS
Retrieves trust relationship information for a specified domain in Active Directory.
.DESCRIPTION
This function retrieves trust relationship information for the specified domain in Active Directory. It provides details about the trust type, trust direction, trust attributes, and security identifier.
.PARAMETER Identity
Specifies the domain identity for which trust relationship information is to be retrieved.
.PARAMETER AsHashTable
Indicates whether the output should be returned as a hashtable.
.NOTES
Author: Your Name
Date: Current Date
Version: 1.0
#>
[cmdletBinding()]
param(
[Parameter(Mandatory, Position = 0)][alias('Domain')][string] $Identity,
[switch] $AsHashTable
)
$Summary = [ordered] @{}
# https://docs.microsoft.com/en-us/dotnet/api/system.directoryservices.activedirectory.trusttype?view=dotnet-plat-ext-3.1
$TrustType = @{
CrossLink = 'The trust relationship is a shortcut between two domains that exists to optimize the authentication processing between two domains that are in separate domain trees.' # 2
External = 'The trust relationship is with a domain outside of the current forest.' # 3
Forest = 'The trust relationship is between two forest root domains in separate Windows Server 2003 forests.' # 4
Kerberos = 'The trusted domain is an MIT Kerberos realm.' # 5
ParentChild = 'The trust relationship is between a parent and a child domain.' # 1
TreeRoot = 'One of the domains in the trust relationship is a tree root.' # 0
Unknown = 'The trust is a non-specific type.' #6
}
# https://docs.microsoft.com/en-us/dotnet/api/system.directoryservices.activedirectory.trustdirection?view=dotnet-plat-ext-3.1
$TrustDirection = @{
Bidirectional = 'Each domain or forest has access to the resources of the other domain or forest.' # 3
Inbound = 'This is a trusting domain or forest. The other domain or forest has access to the resources of this domain or forest. This domain or forest does not have access to resources that belong to the other domain or forest.' # 1
Outbound = 'This is a trusted domain or forest. This domain or forest has access to resources of the other domain or forest. The other domain or forest does not have access to the resources of this domain or forest.' # 2
}
if ($Identity -contains 'DC=') {
$DomainName = "LDAP://$Domain"
$TrustSource = ConvertFrom-DistinguishedName -DistinguishedName $DomainName -ToDomainCN
} else {
$DomainDN = ConvertTo-DistinguishedName -CanonicalName $Identity -ToDomain
$DomainName = "LDAP://$DomainDN"
$TrustSource = $Identity
}
$searcher = [adsisearcher]'(objectClass=trustedDomain)'
$searcher.SearchRoot = [adsi] $DomainName #'LDAP://DC=TEST,DC=EVOTEC,DC=PL'
$Trusts = $searcher.FindAll()
foreach ($Trust in $Trusts) {
$TrustD = [System.DirectoryServices.ActiveDirectory.TrustDirection] $Trust.properties.trustdirection[0]
$TrustT = [System.DirectoryServices.ActiveDirectory.TrustType] $Trust.properties.trusttype[0]
if ($Trust.properties.'msds-trustforesttrustinfo') {
$msDSTrustForestTrustInfo = Convert-TrustForestTrustInfo -msDSTrustForestTrustInfo $Trust.properties.'msds-trustforesttrustinfo'[0]
} else {
$msDSTrustForestTrustInfo = $null
}
if ($Trust.properties.trustattributes) {
$TrustAttributes = Get-ADTrustAttributes -Value ([int] $Trust.properties.trustattributes[0])
} else {
$TrustAttributes = $null
}
if ($Trust.properties.securityidentifier) {
try {
$ObjectSID = [System.Security.Principal.SecurityIdentifier]::new($Trust.properties.securityidentifier[0], 0).Value
} catch {
$ObjectSID = $null
}
} else {
$ObjectSID = $null
}
$TrustObject = [PSCustomObject] @{
#Name = [string] $Trust.properties.name # {ad.evotec.xyz}
TrustSource = $TrustSource
TrustPartner = [string] $Trust.properties.trustpartner # {ad.evotec.xyz}
TrustPartnerNetBios = [string] $Trust.properties.flatname # {EVOTEC}
TrustDirection = $TrustD.ToString() # {3}
TrustType = $TrustT.ToString() # {2}
TrustAttributes = $TrustAttributes # {32}
TrustDirectionText = $TrustDirection[$TrustD.ToString()]
TrustTypeText = $TrustType[$TrustT.ToString()]
WhenCreated = [DateTime] $Trust.properties.whencreated[0] # {26.07.2018 10:59:52}
WhenChanged = [DateTime] $Trust.properties.whenchanged[0] # {14.08.2020 22:23:14}
ObjectSID = $ObjectSID
Distinguishedname = [string] $Trust.properties.distinguishedname # {CN=ad.evotec.xyz,CN=System,DC=ad,DC=evotec,DC=pl}
IsCriticalSystemObject = [bool]::Parse($Trust.properties.iscriticalsystemobject[0]) # {True}
ObjectGuid = [guid]::new($Trust.properties.objectguid[0])
ObjectCategory = [string] $Trust.properties.objectcategory # {CN=Trusted-Domain,CN=Schema,CN=Configuration,DC=ad,DC=evotec,DC=xyz}
ObjectClass = ([array] $Trust.properties.objectclass)[-1] # {top, leaf, trustedDomain}
UsnCreated = [string] $Trust.properties.usncreated # {14149}
UsnChanged = [string] $Trust.properties.usnchanged # {4926091}
ShowInAdvancedViewOnly = [bool]::Parse($Trust.properties.showinadvancedviewonly) # {True}
TrustPosixOffset = [string] $Trust.properties.trustposixoffset # {-2147483648}
msDSTrustForestTrustInfo = $msDSTrustForestTrustInfo
msDSSupportedEncryptionTypes = if ($Trust.properties.'msds-supportedencryptiontypes') {
Get-ADEncryptionTypes -Value ([int] $Trust.properties.'msds-supportedencryptiontypes'[0])
} else {
$null
}
#SecurityIdentifier = [string] $Trust.properties.securityidentifier # {1 4 0 0 0 0 0 5 21 0 0 0 113 37 225 50 27 133 23 171 67 175 144 188}
#InstanceType = $Trust.properties.instancetype # {4}
#AdsPath = [string] $Trust.properties.adspath # {LDAP://CN=ad.evotec.xyz,CN=System,DC=ad,DC=evotec,DC=pl}
#CN = [string] $Trust.properties.cn # {ad.evotec.xyz}
#ObjectGuid = $Trust.properties.objectguid # {193 58 187 220 218 30 146 77 162 218 90 74 159 98 153 219}
#dscorepropagationdata = $Trust.properties.dscorepropagationdata # {01.01.1601 00:00:00}
}
if ($AsHashTable) {
$Summary[$TrustObject.trustpartner] = $TrustObject
} else {
$TrustObject
}
}
if ($AsHashTable) {
$Summary
}
}
function Get-WinDnsRootHint {
<#
.SYNOPSIS
Retrieves DNS root hints from specified computers.
.DESCRIPTION
This function retrieves DNS root hints from the specified computers. If no ComputerName is provided, it uses the default domain controller.
.PARAMETER ComputerName
Specifies an array of computer names from which to retrieve DNS root hints.
.PARAMETER Domain
Specifies the domain to use for retrieving DNS root hints. Defaults to the current user's DNS domain.
.EXAMPLE
Get-WinDnsRootHint -ComputerName "Server01", "Server02" -Domain "contoso.com"
Retrieves DNS root hints from Server01 and Server02 in the contoso.com domain.
.EXAMPLE
Get-WinDnsRootHint -Domain "fabrikam.com"
Retrieves DNS root hints from the default domain controller in the fabrikam.com domain.
#>
[CmdLetBinding()]
param(
[string[]] $ComputerName,
[string] $Domain = $ENV:USERDNSDOMAIN
)
if ($Domain -and -not $ComputerName) {
$ComputerName = (Get-ADDomainController -Filter * -Server $Domain).HostName
}
foreach ($Computer in $ComputerName) {
$ServerRootHints = Get-DnsServerRootHint -ComputerName $Computer
foreach ($_ in $ServerRootHints.IPAddress) {
[PSCustomObject] @{
DistinguishedName = $_.DistinguishedName
HostName = $_.HostName
RecordClass = $_.RecordClass
IPv4Address = $_.RecordData.IPv4Address.IPAddressToString
IPv6Address = $_.RecordData.IPv6Address.IPAddressToString
#RecordData = $_.RecordData.IPv4Address -join ', '
#RecordData1 = $_.RecordData
RecordType = $_.RecordType
Timestamp = $_.Timestamp
TimeToLive = $_.TimeToLive
Type = $_.Type
GatheredFrom = $Computer
}
}
}
}
function Get-WinDnsServerCache {
<#
.SYNOPSIS
Retrieves DNS server cache information for specified computers.
.DESCRIPTION
This function retrieves DNS server cache information for the specified computers. If no ComputerName is provided, it retrieves cache information from the default domain controller.
.PARAMETER ComputerName
Specifies an array of computer names from which to retrieve DNS server cache information.
.PARAMETER Domain
Specifies the domain to use for retrieving DNS server cache information. Defaults to the current user's DNS domain.
.EXAMPLE
Get-WinDnsServerCache -ComputerName "Server01", "Server02" -Domain "contoso.com"
Retrieves DNS server cache information from Server01 and Server02 in the contoso.com domain.
.EXAMPLE
Get-WinDnsServerCache -Domain "fabrikam.com"
Retrieves DNS server cache information from the default domain controller in the fabrikam.com domain.
#>
[CmdLetBinding()]
param(
[string[]] $ComputerName,
[string] $Domain = $ENV:USERDNSDOMAIN
)
if ($Domain -and -not $ComputerName) {
$ComputerName = (Get-ADDomainController -Filter * -Server $Domain).HostName
}
foreach ($Computer in $ComputerName) {
$DnsServerCache = Get-DnsServerCache -ComputerName $Computer
foreach ($_ in $DnsServerCache) {
[PSCustomObject] @{
DistinguishedName = $_.DistinguishedName
IsAutoCreated = $_.IsAutoCreated
IsDsIntegrated = $_.IsDsIntegrated
IsPaused = $_.IsPaused
IsReadOnly = $_.IsReadOnly
IsReverseLookupZone = $_.IsReverseLookupZone
IsShutdown = $_.IsShutdown
ZoneName = $_.ZoneName
ZoneType = $_.ZoneType
EnablePollutionProtection = $_.EnablePollutionProtection
IgnorePolicies = $_.IgnorePolicies
LockingPercent = $_.LockingPercent
MaxKBSize = $_.MaxKBSize
MaxNegativeTtl = $_.MaxNegativeTtl
MaxTtl = $_.MaxTtl
GatheredFrom = $Computer
}
}
}
}
function Get-WinDnsServerDiagnostics {
<#
.SYNOPSIS
Retrieves DNS server diagnostics information for a specified computer.
.DESCRIPTION
This function retrieves DNS server diagnostics information for the specified computer. It provides details about various settings and configurations related to DNS server operations.
.PARAMETER ComputerName
Specifies the name of the computer for which DNS server diagnostics information is to be retrieved.
.NOTES
Author: Your Name
Date: Current Date
Version: 1.0
#>
[CmdLetBinding()]
param(
[string] $ComputerName
)
$DnsServerDiagnostics = Get-DnsServerDiagnostics -ComputerName $ComputerName
foreach ($_ in $DnsServerDiagnostics) {
[PSCustomObject] @{
FilterIPAddressList = $_.FilterIPAddressList
Answers = $_.Answers
EnableLogFileRollover = $_.EnableLogFileRollover
EnableLoggingForLocalLookupEvent = $_.EnableLoggingForLocalLookupEvent
EnableLoggingForPluginDllEvent = $_.EnableLoggingForPluginDllEvent
EnableLoggingForRecursiveLookupEvent = $_.EnableLoggingForRecursiveLookupEvent
EnableLoggingForRemoteServerEvent = $_.EnableLoggingForRemoteServerEvent
EnableLoggingForServerStartStopEvent = $_.EnableLoggingForServerStartStopEvent
EnableLoggingForTombstoneEvent = $_.EnableLoggingForTombstoneEvent
EnableLoggingForZoneDataWriteEvent = $_.EnableLoggingForZoneDataWriteEvent
EnableLoggingForZoneLoadingEvent = $_.EnableLoggingForZoneLoadingEvent
EnableLoggingToFile = $_.EnableLoggingToFile
EventLogLevel = $_.EventLogLevel
FullPackets = $_.FullPackets
LogFilePath = $_.LogFilePath
MaxMBFileSize = $_.MaxMBFileSize
Notifications = $_.Notifications
Queries = $_.Queries
QuestionTransactions = $_.QuestionTransactions
ReceivePackets = $_.ReceivePackets
SaveLogsToPersistentStorage = $_.SaveLogsToPersistentStorage
SendPackets = $_.SendPackets
TcpPackets = $_.TcpPackets
UdpPackets = $_.UdpPackets
UnmatchedResponse = $_.UnmatchedResponse
Update = $_.Update
UseSystemEventLog = $_.UseSystemEventLog
WriteThrough = $_.WriteThrough
GatheredFrom = $ComputerName
}
}
}
function Get-WinDnsServerDirectoryPartition {
<#
.SYNOPSIS
Retrieves directory partition information for a specified DNS server.
.DESCRIPTION
This function retrieves directory partition information for the specified DNS server. It provides details about different directory partitions, including their names, distinguished names, flags, replicas, state, and zone count.
.PARAMETER ComputerName
Specifies the name of the DNS server for which directory partition information is to be retrieved.
.PARAMETER Splitter
Specifies a character to use for splitting replica information if needed.
.NOTES
Author: Your Name
Date: Current Date
Version: 1.0
#>
[CmdLetBinding()]
param(
[string] $ComputerName,
[string] $Splitter
)
$DnsServerDirectoryPartition = Get-DnsServerDirectoryPartition -ComputerName $ComputerName
foreach ($_ in $DnsServerDirectoryPartition) {
[PSCustomObject] @{
DirectoryPartitionName = $_.DirectoryPartitionName
CrossReferenceDistinguishedName = $_.CrossReferenceDistinguishedName
DirectoryPartitionDistinguishedName = $_.DirectoryPartitionDistinguishedName
Flags = $_.Flags
Replica = if ($Splitter -ne '') {
$_.Replica -join $Splitter
} else {
$_.Replica
}
State = $_.State
ZoneCount = $_.ZoneCount
GatheredFrom = $ComputerName
}
}
}
function Get-WinDnsServerDsSetting {
<#
.SYNOPSIS
Retrieves DNS server Directory Services settings for a specified computer.
.DESCRIPTION
This function retrieves DNS server Directory Services settings for the specified computer. It provides details about various settings related to Directory Services, including Directory Partition Auto Enlist Interval, Lazy Update Interval, Minimum Background Load Threads, Remote Replication Delay, Tombstone Interval, and the computer from which the settings were gathered.
.PARAMETER ComputerName
Specifies the name of the computer for which DNS server Directory Services settings are to be retrieved.
.EXAMPLE
Get-WinDnsServerDsSettings -ComputerName "Server01"
Retrieves DNS server Directory Services settings from Server01.
.EXAMPLE
Get-WinDnsServerDsSettings -ComputerName "Server02"
Retrieves DNS server Directory Services settings from Server02.
#>
[CmdLetBinding()]
param(
[string] $ComputerName
)
$DnsServerDsSetting = Get-DnsServerDsSetting -ComputerName $ComputerName
foreach ($_ in $DnsServerDsSetting) {
[PSCustomObject] @{
DirectoryPartitionAutoEnlistInterval = $_.DirectoryPartitionAutoEnlistInterval
LazyUpdateInterval = $_.LazyUpdateInterval
MinimumBackgroundLoadThreads = $_.MinimumBackgroundLoadThreads
RemoteReplicationDelay = $_.RemoteReplicationDelay
TombstoneInterval = $_.TombstoneInterval
GatheredFrom = $ComputerName
}
}
}
function Get-WinDnsServerEDns {
<#
.SYNOPSIS
Retrieves DNS server EDNS settings for a specified computer.
.DESCRIPTION
This function retrieves DNS server EDNS settings for the specified computer. It provides details about various settings related to EDNS, including Cache Timeout, Enable Probes, Enable Reception, and the computer from which the settings were gathered.
.PARAMETER ComputerName
Specifies the name of the computer for which DNS server EDNS settings are to be retrieved.
.EXAMPLE
Get-WinDnsServerEDns -ComputerName "Server01"
Retrieves DNS server EDNS settings from Server01.
.EXAMPLE
Get-WinDnsServerEDns -ComputerName "Server02"
Retrieves DNS server EDNS settings from Server02.
#>
[CmdLetBinding()]
param(
[string] $ComputerName
)
$DnsServerDsSetting = Get-DnsServerEDns -ComputerName $ComputerName
foreach ($_ in $DnsServerDsSetting) {
[PSCustomObject] @{
CacheTimeout = $_.CacheTimeout
EnableProbes = $_.EnableProbes
EnableReception = $_.EnableReception
GatheredFrom = $ComputerName
}
}
}
function Get-WinDnsServerGlobalNameZone {
<#
.SYNOPSIS
Retrieves global name zone settings for specified DNS servers.
.DESCRIPTION
This function retrieves global name zone settings for the specified DNS servers. It provides details about various settings related to global name zones, including AlwaysQueryServer, BlockUpdates, Enable, EnableEDnsProbes, GlobalOverLocal, PreferAaaa, SendTimeout, ServerQueryInterval, and the computer from which the settings were gathered.
.PARAMETER ComputerName
Specifies an array of computer names from which to retrieve global name zone settings.
.PARAMETER Domain
Specifies the domain to use for retrieving global name zone settings. Defaults to the current user's DNS domain.
.EXAMPLE
Get-WinDnsServerGlobalNameZone -ComputerName "Server01", "Server02" -Domain "contoso.com"
Retrieves global name zone settings from Server01 and Server02 in the contoso.com domain.
.EXAMPLE
Get-WinDnsServerGlobalNameZone -Domain "fabrikam.com"
Retrieves global name zone settings from the default domain controller in the fabrikam.com domain.
#>
[CmdLetBinding()]
param(
[string[]] $ComputerName,
[string] $Domain = $ENV:USERDNSDOMAIN
)
if ($Domain -and -not $ComputerName) {
$ComputerName = (Get-ADDomainController -Filter * -Server $Domain).HostName
}
foreach ($Computer in $ComputerName) {
$DnsServerGlobalNameZone = Get-DnsServerGlobalNameZone -ComputerName $Computer
foreach ($_ in $DnsServerGlobalNameZone) {
[PSCustomObject] @{
AlwaysQueryServer = $_.AlwaysQueryServer
BlockUpdates = $_.BlockUpdates
Enable = $_.Enable
EnableEDnsProbes = $_.EnableEDnsProbes
GlobalOverLocal = $_.GlobalOverLocal
PreferAaaa = $_.PreferAaaa
SendTimeout = $_.SendTimeout
ServerQueryInterval = $_.ServerQueryInterval
GatheredFrom = $Computer
}
}
}
}
#Get-WinDnsServerGlobalNameZone -ComputerName 'AD1'
function Get-WinDnsServerGlobalQueryBlockList {
<#
.SYNOPSIS
Retrieves the global query block list from DNS servers.
.DESCRIPTION
This function retrieves the global query block list from DNS servers specified by the ComputerName parameter.
.PARAMETER ComputerName
Specifies the DNS server(s) from which to retrieve the global query block list.
.PARAMETER Domain
Specifies the domain to query for DNS servers. Defaults to the current user's DNS domain.
.PARAMETER Formatted
Indicates whether the output should be formatted.
.PARAMETER Splitter
Specifies the delimiter to use when formatting the output list.
.EXAMPLE
Get-WinDnsServerGlobalQueryBlockList -ComputerName "dns-server1", "dns-server2" -Formatted -Splitter ";"
Retrieves the global query block list from "dns-server1" and "dns-server2" and formats the output with ";" as the delimiter.
#>
[CmdLetBinding()]
param(
[string[]] $ComputerName,
[string] $Domain = $ENV:USERDNSDOMAIN,
[switch] $Formatted,
[string] $Splitter = ', '
)
if ($Domain -and -not $ComputerName) {
$ComputerName = (Get-ADDomainController -Filter * -Server $Domain).HostName
}
foreach ($Computer in $ComputerName) {
$ServerGlobalQueryBlockList = Get-DnsServerGlobalQueryBlockList -ComputerName $Computer
foreach ($_ in $ServerGlobalQueryBlockList) {
if ($Formatted) {
[PSCustomObject] @{
Enable = $_.Enable
List = $_.List -join $Splitter
GatheredFrom = $Computer
}
} else {
[PSCustomObject] @{
Enable = $_.Enable
List = $_.List
GatheredFrom = $Computer
}
}
}
}
}
function Get-WinDnsServerRecursion {
<#
.SYNOPSIS
Retrieves DNS server recursion settings from specified computers.
.DESCRIPTION
This function retrieves DNS server recursion settings from the specified computers. If no ComputerName is provided, it retrieves the settings from the domain controller associated with the specified domain.
.PARAMETER ComputerName
Specifies the names of the computers from which to retrieve DNS server recursion settings.
.PARAMETER Domain
Specifies the domain from which to retrieve DNS server recursion settings. Defaults to the current user's DNS domain.
.EXAMPLE
Get-WinDnsServerRecursion -ComputerName "Server01", "Server02" -Domain "contoso.com"
Retrieves DNS server recursion settings from Server01 and Server02 in the contoso.com domain.
.EXAMPLE
Get-WinDnsServerRecursion -Domain "fabrikam.com"
Retrieves DNS server recursion settings from the domain controller associated with the fabrikam.com domain.
#>
[CmdLetBinding()]
param(
[string[]] $ComputerName,
[string] $Domain = $ENV:USERDNSDOMAIN
)
if ($Domain -and -not $ComputerName) {
$ComputerName = (Get-ADDomainController -Filter * -Server $Domain).HostName
}
foreach ($Computer in $ComputerName) {
$DnsServerRecursion = Get-DnsServerRecursion -ComputerName $Computer
foreach ($_ in $DnsServerRecursion) {
[PSCustomObject] @{
AdditionalTimeout = $_.AdditionalTimeout
Enable = $_.Enable
RetryInterval = $_.RetryInterval
SecureResponse = $_.SecureResponse
Timeout = $_.Timeout
GatheredFrom = $Computer
}
}
}
}
function Get-WinDnsServerRecursionScope {
<#
.SYNOPSIS
Retrieves DNS server recursion scope settings from specified computers.
.DESCRIPTION
This function retrieves DNS server recursion scope settings from the specified computers. If no ComputerName is provided, it retrieves the settings from the domain controller associated with the specified domain.
.PARAMETER ComputerName
Specifies the names of the computers from which to retrieve DNS server recursion scope settings.
.PARAMETER Domain
Specifies the domain from which to retrieve DNS server recursion scope settings. Defaults to the current user's DNS domain.
.EXAMPLE
Get-WinDnsServerRecursionScope -ComputerName "Server01", "Server02" -Domain "contoso.com"
Retrieves DNS server recursion scope settings from Server01 and Server02 in the contoso.com domain.
.EXAMPLE
Get-WinDnsServerRecursionScope -Domain "fabrikam.com"
Retrieves DNS server recursion scope settings from the domain controller associated with the fabrikam.com domain.
#>
[CmdLetBinding()]
param(
[string[]] $ComputerName,
[string] $Domain = $ENV:USERDNSDOMAIN
)
if ($Domain -and -not $ComputerName) {
$ComputerName = (Get-ADDomainController -Filter * -Server $Domain).HostName
}
foreach ($Computer in $ComputerName) {
$DnsServerRecursionScope = Get-DnsServerRecursionScope -ComputerName $Computer
foreach ($_ in $DnsServerRecursionScope) {
[PSCustomObject] @{
Name = $_.Name
Forwarder = $_.Forwarder
EnableRecursion = $_.EnableRecursion
GatheredFrom = $Computer
}
}
}
}
function Get-WinDnsServerResponseRateLimiting {
<#
.SYNOPSIS
Retrieves DNS server response rate limiting settings from specified computers.
.DESCRIPTION
This function retrieves DNS server response rate limiting settings from the specified computers. If no ComputerName is provided, it retrieves the settings from the domain controller associated with the specified domain.
.PARAMETER ComputerName
Specifies the names of the computers from which to retrieve DNS server response rate limiting settings.
.PARAMETER Domain
Specifies the domain from which to retrieve DNS server response rate limiting settings. Defaults to the current user's DNS domain.
.EXAMPLE
Get-WinDnsServerResponseRateLimiting -ComputerName "Server01", "Server02" -Domain "contoso.com"
Retrieves DNS server response rate limiting settings from Server01 and Server02 in the contoso.com domain.
.EXAMPLE
Get-WinDnsServerResponseRateLimiting -Domain "fabrikam.com"
Retrieves DNS server response rate limiting settings from the domain controller associated with the fabrikam.com domain.
#>
[CmdLetBinding()]
param(
[string[]] $ComputerName,
[string] $Domain = $ENV:USERDNSDOMAIN
)
if ($Domain -and -not $ComputerName) {
$ComputerName = (Get-ADDomainController -Filter * -Server $Domain).HostName
}
foreach ($Computer in $ComputerName) {
$DnsServerResponseRateLimiting = Get-DnsServerResponseRateLimiting -ComputerName $Computer
foreach ($_ in $DnsServerResponseRateLimiting) {
[PSCustomObject] @{
ResponsesPerSec = $_.ResponsesPerSec
ErrorsPerSec = $_.ErrorsPerSec
WindowInSec = $_.WindowInSec
IPv4PrefixLength = $_.IPv4PrefixLength
IPv6PrefixLength = $_.IPv6PrefixLength
LeakRate = $_.LeakRate
TruncateRate = $_.TruncateRate
MaximumResponsesPerWindow = $_.MaximumResponsesPerWindow
Mode = $_.Mode
GatheredFrom = $Computer
}
}
}
}
function Get-WinDnsServerSettings {
<#
.SYNOPSIS
Retrieves DNS server settings for a specified computer.
.DESCRIPTION
This function retrieves various DNS server settings for a specified computer.
.PARAMETER ComputerName
Specifies the name of the computer for which to retrieve DNS server settings.
.EXAMPLE
Get-WinDnsServerSettings -ComputerName "AD1.ad.evotec.xyz"
Retrieves DNS server settings for the computer "AD1.ad.evotec.xyz".
#>
[CmdLetBinding()]
param(
[string] $ComputerName
)
<#
ComputerName : AD1.ad.evotec.xyz
MajorVersion : 10
MinorVersion : 0
BuildNumber : 14393
IsReadOnlyDC : False
EnableDnsSec : False
EnableIPv6 : True
EnableOnlineSigning : True
NameCheckFlag : 2
AddressAnswerLimit : 0
XfrConnectTimeout(s) : 30
BootMethod : 3
AllowUpdate : True
UpdateOptions : 783
DsAvailable : True
DisableAutoReverseZone : False
AutoCacheUpdate : False
RoundRobin : True
LocalNetPriority : True
StrictFileParsing : False
LooseWildcarding : False
BindSecondaries : False
WriteAuthorityNS : False
ForwardDelegations : False
AutoConfigFileZones : 1
EnableDirectoryPartitions : True
RpcProtocol : 5
EnableVersionQuery : 0
EnableDuplicateQuerySuppression : True
LameDelegationTTL : 00:00:00
AutoCreateDelegation : 2
AllowCnameAtNs : True
RemoteIPv4RankBoost : 5
RemoteIPv6RankBoost : 0
EnableRsoForRodc : True
MaximumRodcRsoQueueLength : 300
MaximumRodcRsoAttemptsPerCycle : 100
OpenAclOnProxyUpdates : True
NoUpdateDelegations : False
EnableUpdateForwarding : False
MaxResourceRecordsInNonSecureUpdate : 30
EnableWinsR : True
LocalNetPriorityMask : 255
DeleteOutsideGlue : False
AppendMsZoneTransferTag : False
AllowReadOnlyZoneTransfer : False
MaximumUdpPacketSize : 4000
TcpReceivePacketSize : 65536
EnableSendErrorSuppression : True
SelfTest : 4294967295
XfrThrottleMultiplier : 10
SilentlyIgnoreCnameUpdateConflicts : False
EnableIQueryResponseGeneration : False
SocketPoolSize : 2500
AdminConfigured : True
SocketPoolExcludedPortRanges : {}
ForestDirectoryPartitionBaseName : ForestDnsZones
DomainDirectoryPartitionBaseName : DomainDnsZones
ServerLevelPluginDll :
EnableRegistryBoot :
PublishAutoNet : False
QuietRecvFaultInterval(s) : 0
QuietRecvLogInterval(s) : 0
ReloadException : False
SyncDsZoneSerial : 2
EnableDuplicateQuerySuppression : True
SendPort : Random
MaximumSignatureScanPeriod : 2.00:00:00
MaximumTrustAnchorActiveRefreshInterval : 15.00:00:00
ListeningIPAddress : {192.168.240.189}
AllIPAddress : {192.168.240.189}
ZoneWritebackInterval : 00:01:00
RootTrustAnchorsURL : https://data.iana.org/root-anchors/root-anchors.xml
ScopeOptionValue : 0
IgnoreServerLevelPolicies : False
IgnoreAllPolicies : False
VirtualizationInstanceOptionValue : 0
#>
$DnsServerSetting = Get-DnsServerSetting -ComputerName $ComputerName -All
foreach ($_ in $DnsServerSetting) {
[PSCustomObject] @{
AllIPAddress = $_.AllIPAddress
ListeningIPAddress = $_.ListeningIPAddress
BuildNumber = $_.BuildNumber
ComputerName = $_.ComputerName
EnableDnsSec = $_.EnableDnsSec
EnableIPv6 = $_.EnableIPv6
IsReadOnlyDC = $_.IsReadOnlyDC
MajorVersion = $_.MajorVersion
MinorVersion = $_.MinorVersion
GatheredFrom = $ComputerName
}
}
}
#Get-WinDnsServerSettings -ComputerName 'AD1'
#Get-DnsServerSetting -ComputerName AD1 -All
function Get-WinDnsServerVirtualizationInstance {
<#
.SYNOPSIS
Retrieves information about DNS server virtualization instances on a specified computer.
.DESCRIPTION
This function retrieves information about DNS server virtualization instances on a specified computer.
.PARAMETER ComputerName
Specifies the name of the computer from which to retrieve DNS server virtualization instances.
.EXAMPLE
Get-WinDnsServerVirtualizationInstance -ComputerName "Server01"
Retrieves DNS server virtualization instances from a computer named Server01.
#>
[CmdLetBinding()]
param(
[string] $ComputerName
)
$DnsServerVirtualizationInstance = Get-DnsServerVirtualizationInstance -ComputerName $ComputerName
foreach ($_ in $DnsServerVirtualizationInstance) {
[PSCustomObject] @{
VirtualizationInstance = $_.VirtualizationInstance
FriendlyName = $_.FriendlyName
Description = $_.Description
GatheredFrom = $ComputerName
}
}
}
$Script:Rights = @{
"Self" = @{
"InheritedObjectAceTypePresent" = ""
"ObjectAceTypePresent" = ""
"ObjectAceTypePresent, InheritedObjectAceTypePresent" = ""
'None' = ""
}
"DeleteChild, DeleteTree, Delete" = @{
"InheritedObjectAceTypePresent" = "DeleteChild, DeleteTree, Delete"
"ObjectAceTypePresent" = "DeleteChild, DeleteTree, Delete"
"ObjectAceTypePresent, InheritedObjectAceTypePresent" = "DeleteChild, DeleteTree, Delete"
'None' = "DeleteChild, DeleteTree, Delete"
}
"GenericRead" = @{
"InheritedObjectAceTypePresent" = "Read Permissions,List Contents,Read All Properties,List"
"ObjectAceTypePresent" = "Read Permissions,List Contents,Read All Properties,List"
"ObjectAceTypePresent, InheritedObjectAceTypePresent" = "Read Permissions,List Contents,Read All Properties,List"
'None' = "Read Permissions,List Contents,Read All Properties,List"
}
"CreateChild" = @{
"InheritedObjectAceTypePresent" = "Create"
"ObjectAceTypePresent" = "Create"
"ObjectAceTypePresent, InheritedObjectAceTypePresent" = "Create"
'None' = "Create"
}
"DeleteChild" = @{
"InheritedObjectAceTypePresent" = "Delete"
"ObjectAceTypePresent" = "Delete"
"ObjectAceTypePresent, InheritedObjectAceTypePresent" = "Delete"
'None' = "Delete"
}
"GenericAll" = @{
"InheritedObjectAceTypePresent" = "Full Control"
"ObjectAceTypePresent" = "Full Control"
"ObjectAceTypePresent, InheritedObjectAceTypePresent" = "Full Control"
'None' = "Full Control"
}
"CreateChild, DeleteChild" = @{
"InheritedObjectAceTypePresent" = "Create/Delete"
"ObjectAceTypePresent" = "Create/Delete"
"ObjectAceTypePresent, InheritedObjectAceTypePresent" = "Create/Delete"
'None' = "Create/Delete"
}
"ReadProperty, WriteProperty" = @{
"InheritedObjectAceTypePresent" = "Read All Properties;Write All Properties"
"ObjectAceTypePresent" = "Read All Properties;Write All Properties"
"ObjectAceTypePresent, InheritedObjectAceTypePresent" = "Read All Properties;Write All Properties"
'None' = "Read All Properties;Write All Properties"
}
"WriteProperty" = @{
"InheritedObjectAceTypePresent" = "Write All Properties"
"ObjectAceTypePresent" = "Write"
"ObjectAceTypePresent, InheritedObjectAceTypePresent" = "Write"
'None' = "Write All Properties"
}
"ReadProperty" = @{
"InheritedObjectAceTypePresent" = "Read All Properties"
"ObjectAceTypePresent" = "Read"
"ObjectAceTypePresent, InheritedObjectAceTypePresent" = "Read"
'None' = "Read All Properties"
}
}
function New-ActiveDirectoryAccessRule {
<#
.SYNOPSIS
Creates a new Active Directory access rule based on the provided parameters.
.DESCRIPTION
This function creates a new Active Directory access rule based on the provided parameters. It allows for flexibility in defining the access rule by specifying various attributes such as object type, inheritance type, inherited object type, access control type, access rule, and identity.
.PARAMETER ActiveDirectoryAccessRule
Specifies an existing Active Directory access rule object to use as a template for the new rule.
.PARAMETER ObjectType
Specifies the type of object for which the access rule applies.
.PARAMETER InheritanceType
Specifies the inheritance type for the access rule.
.PARAMETER InheritedObjectType
Specifies the inherited object type for the access rule.
.PARAMETER AccessControlType
Specifies the type of access control for the access rule.
.PARAMETER AccessRule
Specifies the access rule to apply.
.PARAMETER Identity
Specifies the identity to which the access rule applies.
.EXAMPLE
New-ActiveDirectoryAccessRule -ObjectType "User" -InheritanceType "All" -AccessControlType "Allow" -AccessRule "Read" -Identity "Domain Admins"
Creates a new Active Directory access rule allowing "Domain Admins" to read objects of type "User" with inheritance for all child objects.
.EXAMPLE
New-ActiveDirectoryAccessRule -ActiveDirectoryAccessRule $existingRule -InheritanceType "None" -AccessControlType "Deny" -AccessRule "Write" -Identity "Guests"
Creates a new Active Directory access rule based on an existing rule, denying "Guests" the ability to write to objects with no inheritance.
#>
[CmdletBinding()]
param(
$ActiveDirectoryAccessRule,
$ObjectType,
$InheritanceType,
$InheritedObjectType,
$AccessControlType,
$AccessRule,
$Identity
)
try {
if ($ActiveDirectoryAccessRule) {
$AccessRuleToAdd = $ActiveDirectoryAccessRule
} elseif ($ObjectType -and $InheritanceType -and $InheritedObjectType) {
$ObjectTypeGuid = Convert-ADSchemaToGuid -SchemaName $ObjectType
$InheritedObjectTypeGuid = Convert-ADSchemaToGuid -SchemaName $InheritedObjectType
if ($ObjectTypeGuid -and $InheritedObjectTypeGuid) {
$AccessRuleToAdd = [System.DirectoryServices.ActiveDirectoryAccessRule]::new($Identity, $AccessRule, $AccessControlType, $ObjectTypeGuid, $InheritanceType, $InheritedObjectTypeGuid)
} else {
if (-not $ObjectTypeGuid -and -not $InheritedObjectTypeGuid) {
Write-Warning "Add-PrivateACL - Object type '$ObjectType' or '$InheritedObjectType' not found in schema"
} elseif (-not $ObjectTypeGuid) {
Write-Warning "Add-PrivateACL - Object type '$ObjectType' not found in schema"
} else {
Write-Warning "Add-PrivateACL - Object type '$InheritedObjectType' not found in schema"
}
return
}
} elseif ($ObjectType -and $InheritanceType) {
$ObjectTypeGuid = Convert-ADSchemaToGuid -SchemaName $ObjectType
if ($ObjectTypeGuid) {
$AccessRuleToAdd = [System.DirectoryServices.ActiveDirectoryAccessRule]::new($Identity, $AccessRule, $AccessControlType, $ObjectTypeGuid, $InheritanceType)
} else {
Write-Warning "Add-PrivateACL - Object type '$ObjectType' not found in schema"
return
}
} elseif ($ObjectType) {
$ObjectTypeGuid = Convert-ADSchemaToGuid -SchemaName $ObjectType
if ($ObjectTypeGuid) {
$AccessRuleToAdd = [System.DirectoryServices.ActiveDirectoryAccessRule]::new($Identity, $AccessRule, $AccessControlType, $ObjectTypeGuid)
} else {
Write-Warning "Add-PrivateACL - Object type '$ObjectType' not found in schema"
return
}
} else {
$AccessRuleToAdd = [System.DirectoryServices.ActiveDirectoryAccessRule]::new($Identity, $AccessRule, $AccessControlType)
}
} catch {
Write-Warning "Add-PrivateACL - Error creating ActiveDirectoryAccessRule: $_"
return
}
$AccessRuleToAdd
}
function New-ADForestDrives {
<#
.SYNOPSIS
Maps network drives for all domains in a specified Active Directory forest.
.DESCRIPTION
The New-ADForestDrives function maps network drives for all domains in a specified Active Directory forest. It retrieves domain information and maps drives accordingly.
.PARAMETER ForestName
Specifies the name of the Active Directory forest to map drives for.
.PARAMETER ObjectDN
Specifies the distinguished name of the object to map drives for.
.EXAMPLE
New-ADForestDrives -ForestName "example.com" -ObjectDN "CN=Users,DC=example,DC=com"
This example maps network drives for the specified forest and object distinguished name.
.NOTES
File Name : New-ADForestDrives.ps1
Author : Your Name
Prerequisite : This function requires the Active Directory module.
#>
[cmdletbinding()]
param(
[string] $ForestName,
[string] $ObjectDN
)
if (-not $Global:ADDrivesMapped) {
if ($ForestName) {
$Forest = Get-ADForest -Identity $ForestName
} else {
$Forest = Get-ADForest
}
if ($ObjectDN) {
$DNConverted = (ConvertFrom-DistinguishedName -DistinguishedName $ObjectDN -ToDC) -replace '=' -replace ','
if (-not(Get-PSDrive -Name $DNConverted -ErrorAction SilentlyContinue)) {
try {
if ($Server) {
$null = New-PSDrive -Name $DNConverted -Root '' -PSProvider ActiveDirectory -Server $Server.Hostname[0] -Scope Global -WhatIf:$false
Write-Verbose "New-ADForestDrives - Mapped drive $Domain / $($Server.Hostname[0])"
} else {
$null = New-PSDrive -Name $DNConverted -Root '' -PSProvider ActiveDirectory -Server $Domain -Scope Global -WhatIf:$false
}
} catch {
Write-Warning "New-ADForestDrives - Couldn't map new AD psdrive for $Domain / $($Server.Hostname[0])"
}
}
} else {
foreach ($Domain in $Forest.Domains) {
try {
$Server = Get-ADDomainController -Discover -DomainName $Domain -Writable
$DomainInformation = Get-ADDomain -Server $Server.Hostname[0]
} catch {
Write-Warning "New-ADForestDrives - Can't process domain $Domain - $($_.Exception.Message)"
continue
}
$ObjectDN = $DomainInformation.DistinguishedName
$DNConverted = (ConvertFrom-DistinguishedName -DistinguishedName $ObjectDN -ToDC) -replace '=' -replace ','
if (-not(Get-PSDrive -Name $DNConverted -ErrorAction SilentlyContinue)) {
try {
if ($Server) {
$null = New-PSDrive -Name $DNConverted -Root '' -PSProvider ActiveDirectory -Server $Server.Hostname[0] -Scope Global -WhatIf:$false
Write-Verbose "New-ADForestDrives - Mapped drive $Domain / $Server"
} else {
$null = New-PSDrive -Name $DNConverted -Root '' -PSProvider ActiveDirectory -Server $Domain -Scope Global -WhatIf:$false
}
} catch {
Write-Warning "New-ADForestDrives - Couldn't map new AD psdrive for $Domain / $Server $($_.Exception.Message)"
}
}
}
}
$Global:ADDrivesMapped = $true
}
}
function New-HTMLGroupDiagramDefault {
<#
.SYNOPSIS
Creates a new HTML group diagram with customizable options.
.DESCRIPTION
This function creates a new HTML group diagram with customizable options. It allows for displaying Active Directory groups and their members in a visual diagram format.
.PARAMETER ADGroup
Specifies an array of Active Directory group objects to be displayed in the diagram.
.PARAMETER HideAppliesTo
Specifies whether to hide groups based on their membership type. Valid values are 'Default', 'Hierarchical', or 'Both'. Default is 'Both'.
.PARAMETER HideComputers
Indicates whether to hide computer objects in the diagram.
.PARAMETER HideUsers
Indicates whether to hide user objects in the diagram.
.PARAMETER HideOther
Indicates whether to hide other types of objects in the diagram.
.PARAMETER DataTableID
Specifies the ID of the data table associated with the diagram.
.PARAMETER ColumnID
Specifies the ID of the column associated with the diagram.
.PARAMETER Online
Indicates whether to display user nodes as online or offline.
.EXAMPLE
New-HTMLGroupDiagramDefault -ADGroup $ADGroupArray -HideAppliesTo 'Default' -HideComputers -DataTableID 'DataTable1' -ColumnID 1 -Online
Creates a new HTML group diagram displaying the specified AD groups with default settings, hiding computers, showing online users, and associating with a data table.
.NOTES
Author: Your Name
Date: Current Date
#>
[cmdletBinding()]
param(
[Array] $ADGroup,
[ValidateSet('Default', 'Hierarchical', 'Both')][string] $HideAppliesTo = 'Both',
[switch] $HideComputers,
[switch] $HideUsers,
[switch] $HideOther,
[string] $DataTableID,
[int] $ColumnID,
[switch] $Online,
[switch] $EnableDiagramFiltering,
[switch] $EnableDiagramFilteringButton,
[int] $DiagramFilteringMinimumCharacters = 3
)
New-HTMLDiagram -Height 'calc(100vh - 200px)' {
#if ($DataTableID) {
# New-DiagramEvent -ID $DataTableID -ColumnID $ColumnID
#}
#New-DiagramOptionsLayout -HierarchicalEnabled $true -HierarchicalDirection FromLeftToRight #-HierarchicalSortMethod directed
#New-DiagramOptionsPhysics -Enabled $true -HierarchicalRepulsionAvoidOverlap 1 -HierarchicalRepulsionNodeDistance 50
New-DiagramOptionsPhysics -RepulsionNodeDistance 150 -Solver repulsion
if ($ADGroup) {
# Add it's members to diagram
foreach ($ADObject in $ADGroup) {
# Lets build our diagram
#[int] $Level = $($ADObject.Nesting) + 1
$ID = "$($ADObject.DomainName)$($ADObject.DistinguishedName)"
#[int] $LevelParent = $($ADObject.Nesting)
$IDParent = "$($ADObject.ParentGroupDomain)$($ADObject.ParentGroupDN)"
if ($ADObject.Type -eq 'User') {
if (-not $HideUsers -or $HideAppliesTo -notin 'Both', 'Default') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageUser
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid user -IconColor LightSteelBlue
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Blue -ArrowsToEnabled -Dashes
}
} elseif ($ADObject.Type -eq 'Group') {
if ($ADObject.Nesting -eq -1) {
$BorderColor = 'Red'
$Image = $Script:ConfigurationIcons.ImageGroup
} else {
$BorderColor = 'Blue'
$Image = $Script:ConfigurationIcons.ImageGroupNested
}
$SummaryMembers = -join ('Total: ', $ADObject.TotalMembers, ' Direct: ', $ADObject.DirectMembers, ' Groups: ', $ADObject.DirectGroups, ' Indirect: ', $ADObject.IndirectMembers)
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName + [System.Environment]::NewLine + $SummaryMembers
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Image -ColorBorder $BorderColor
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid user-friends -IconColor VeryLightGrey
}
New-DiagramLink -ColorOpacity 0.5 -From $ID -To $IDParent -Color Orange -ArrowsToEnabled
} elseif ($ADObject.Type -eq 'Computer') {
if (-not $HideComputers -or $HideAppliesTo -notin 'Both', 'Default') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageComputer
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid desktop -IconColor LightGray
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Arsenic -ArrowsToEnabled -Dashes
}
} else {
if (-not $HideOther -or $HideAppliesTo -notin 'Both', 'Default') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageOther
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid robot -IconColor LightSalmon
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Boulder -ArrowsToEnabled -Dashes
}
}
}
}
} -EnableFiltering:$EnableDiagramFiltering.IsPresent -MinimumFilteringChars $DiagramFilteringMinimumCharacters -EnableFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
function New-HTMLGroupDiagramHierachical {
<#
.SYNOPSIS
Creates an HTML diagram representing Active Directory groups and their members in a hierarchical layout.
.DESCRIPTION
The New-HTMLGroupDiagramHierachical function generates an HTML diagram that visually represents Active Directory groups and their members in a hierarchical structure. The diagram includes nodes for users, groups, computers, and other objects, with customizable options for displaying and organizing the information.
.PARAMETER ADGroup
Specifies an array of Active Directory objects (groups) to be included in the diagram.
.PARAMETER HideAppliesTo
Specifies whether to hide specific types of objects in the diagram. Valid values are 'Default', 'Hierarchical', and 'Both'. Default value is 'Both'.
.PARAMETER HideComputers
Indicates whether to hide computer objects in the diagram.
.PARAMETER HideUsers
Indicates whether to hide user objects in the diagram.
.PARAMETER HideOther
Indicates whether to hide other types of objects in the diagram.
.PARAMETER Online
Indicates whether to display online status information in the diagram.
.EXAMPLE
New-HTMLGroupDiagramHierachical -ADGroup $ADGroupArray -HideAppliesTo 'Both' -Online
Generates an HTML diagram displaying all objects in the $ADGroupArray with online status information included.
.EXAMPLE
New-HTMLGroupDiagramHierachical -ADGroup $ADGroupArray -HideComputers -HideUsers
Generates an HTML diagram excluding computer and user objects from the $ADGroupArray.
.NOTES
File Name : New-HTMLGroupDiagramHierachical.ps1
Author : Your Name
Prerequisite : PowerShell V5
Copyright 2021 - Your Company
#>
[cmdletBinding()]
param(
[Array] $ADGroup,
[ValidateSet('Default', 'Hierarchical', 'Both')][string] $HideAppliesTo = 'Both',
[switch] $HideComputers,
[switch] $HideUsers,
[switch] $HideOther,
[switch] $Online,
[switch] $EnableDiagramFiltering,
[switch] $EnableDiagramFilteringButton,
[int] $DiagramFilteringMinimumCharacters = 3
)
New-HTMLDiagram -Height 'calc(100vh - 200px)' {
New-DiagramOptionsLayout -HierarchicalEnabled $true #-HierarchicalDirection FromLeftToRight #-HierarchicalSortMethod directed
New-DiagramOptionsPhysics -Enabled $true -HierarchicalRepulsionAvoidOverlap 1 -HierarchicalRepulsionNodeDistance 200
#New-DiagramOptionsPhysics -RepulsionNodeDistance 150 -Solver repulsion
if ($ADGroup) {
# Add it's members to diagram
foreach ($ADObject in $ADGroup) {
# Lets build our diagram
[int] $Level = $($ADObject.Nesting) + 1
$ID = "$($ADObject.DomainName)$($ADObject.DistinguishedName)$Level"
[int] $LevelParent = $($ADObject.Nesting)
$IDParent = "$($ADObject.ParentGroupDomain)$($ADObject.ParentGroupDN)$LevelParent"
[int] $Level = $($ADObject.Nesting) + 1
if ($ADObject.Type -eq 'User') {
if (-not $HideUsers -or $HideAppliesTo -notin 'Both', 'Hierarchical') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageUser -Level $Level
} else {
New-DiagramNode -Id $ID -Label $Label -Level $Level -IconSolid user -IconColor LightSteelBlue
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Blue -ArrowsToEnabled -Dashes
}
} elseif ($ADObject.Type -eq 'Group') {
if ($ADObject.Nesting -eq -1) {
$BorderColor = 'LightGreen'
$Image = $Script:ConfigurationIcons.ImageGroup
$IconSolid = 'user-friends'
} elseif ($ADObject.CircularIndirect -eq $true -or $ADObject.CircularDirect -eq $true) {
$Image = $Script:ConfigurationIcons.ImageGroupCircular
$BorderColor = 'PaleVioletRed'
$IconSolid = 'circle-notch'
} else {
$BorderColor = 'VeryLightGrey'
$Image = $Script:ConfigurationIcons.ImageGroupNested
$IconSolid = 'users'
}
$SummaryMembers = -join ('Total: ', $ADObject.TotalMembers, ' Direct: ', $ADObject.DirectMembers, ' Groups: ', $ADObject.DirectGroups, ' Indirect: ', $ADObject.IndirectMembers)
if ($ADObject.CircularIndirect -eq $true -or $ADObject.CircularDirect -eq $true) {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName + [System.Environment]::NewLine + $SummaryMembers + [System.Environment]::NewLine + "Circular: $True"
} else {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName + [System.Environment]::NewLine + $SummaryMembers
}
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Image -Level $Level -ColorBorder $BorderColor
} else {
New-DiagramNode -Id $ID -Label $Label -Level $Level -IconSolid $IconSolid -IconColor $BorderColor
}
New-DiagramLink -ColorOpacity 0.5 -From $ID -To $IDParent -Color Orange -ArrowsToEnabled
} elseif ($ADObject.Type -eq 'Computer') {
if (-not $HideComputers -or $HideAppliesTo -notin 'Both', 'Hierarchical') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageComputer -Level $Level
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid desktop -IconColor LightGray -Level $Level
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Arsenic -ArrowsToEnabled -Dashes
}
} else {
if (-not $HideOther -or $HideAppliesTo -notin 'Both', 'Hierarchical') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageOther -Level $Level
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid robot -IconColor LightSalmon -Level $Level
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Boulder -ArrowsToEnabled -Dashes
}
}
}
}
} -EnableFiltering:$EnableDiagramFiltering.IsPresent -MinimumFilteringChars $DiagramFilteringMinimumCharacters -EnableFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
function New-HTMLGroupDiagramSummary {
<#
.SYNOPSIS
Creates an HTML group diagram summary based on the provided Active Directory group information.
.DESCRIPTION
The New-HTMLGroupDiagramSummary function generates an HTML diagram summary representing the relationships between Active Directory groups and their members. It allows customization of the diagram layout and appearance based on the input parameters.
.PARAMETER ADGroup
Specifies an array of Active Directory group objects to be included in the diagram.
.PARAMETER HideAppliesTo
Specifies whether to hide specific types of objects in the diagram. Valid values are 'Default', 'Hierarchical', and 'Both'.
.PARAMETER HideComputers
Indicates whether to hide computer objects in the diagram.
.PARAMETER HideUsers
Indicates whether to hide user objects in the diagram.
.PARAMETER HideOther
Indicates whether to hide other types of objects in the diagram.
.PARAMETER DataTableID
Specifies the ID of the data table associated with the diagram.
.PARAMETER ColumnID
Specifies the ID of the column associated with the diagram.
.PARAMETER Online
Indicates whether to display online status information in the diagram.
.EXAMPLE
New-HTMLGroupDiagramSummary -ADGroup $ADGroupArray -HideAppliesTo 'Default' -HideComputers -Online
Generates an HTML group diagram summary for the specified AD groups, hiding computers and displaying only default objects with online status.
#>
[cmdletBinding()]
param(
[Array] $ADGroup,
[ValidateSet('Default', 'Hierarchical', 'Both')][string] $HideAppliesTo = 'Both',
[switch] $HideComputers,
[switch] $HideUsers,
[switch] $HideOther,
[string] $DataTableID,
[int] $ColumnID,
[switch] $Online,
[switch] $EnableDiagramFiltering,
[switch] $EnableDiagramFilteringButton,
[int] $DiagramFilteringMinimumCharacters = 3
)
$ConnectionsTracker = @{}
New-HTMLDiagram -Height 'calc(100vh - 200px)' {
#if ($DataTableID) {
# New-DiagramEvent -ID $DataTableID -ColumnID $ColumnID
#}
#New-DiagramOptionsLayout -HierarchicalEnabled $true -HierarchicalDirection FromLeftToRight #-HierarchicalSortMethod directed
#New-DiagramOptionsPhysics -Enabled $true -HierarchicalRepulsionAvoidOverlap 1 -HierarchicalRepulsionNodeDistance 50
New-DiagramOptionsPhysics -RepulsionNodeDistance 150 -Solver repulsion
if ($ADGroup) {
# Add it's members to diagram
foreach ($ADObject in $ADGroup) {
# Lets build our diagram
# This diagram of Summary doesn't use level checking because it's a summary of a groups, and the level will be different per group
# This means that it will look a bit different than what is there when comparing 1 to 1 with the other diagrams
#[int] $Level = $($ADObject.Nesting) + 1
$ID = "$($ADObject.DomainName)$($ADObject.DistinguishedName)"
#[int] $LevelParent = $($ADObject.Nesting)
$IDParent = "$($ADObject.ParentGroupDomain)$($ADObject.ParentGroupDN)"
# We track connection for ID to make sure that only once the conenction is added
if (-not $ConnectionsTracker[$ID]) {
$ConnectionsTracker[$ID] = @{}
}
if (-not $ConnectionsTracker[$ID][$IDParent]) {
if ($ADObject.Type -eq 'User') {
if (-not $HideUsers -or $HideAppliesTo -notin 'Both', 'Default') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageUser
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid user -IconColor LightSteelBlue
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Blue -ArrowsToEnabled -Dashes
}
} elseif ($ADObject.Type -eq 'Group') {
if ($ADObject.Nesting -eq -1) {
$BorderColor = 'Red'
$Image = $Script:ConfigurationIcons.ImageGroup
} else {
$BorderColor = 'Blue'
$Image = $Script:ConfigurationIcons.ImageGroupNested
}
$SummaryMembers = -join ('Total: ', $ADObject.TotalMembers, ' Direct: ', $ADObject.DirectMembers, ' Groups: ', $ADObject.DirectGroups, ' Indirect: ', $ADObject.IndirectMembers)
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName + [System.Environment]::NewLine + $SummaryMembers
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Image -ArrowsToEnabled -ColorBorder $BorderColor
} else {
New-DiagramNode -Id $ID -Label $Label -ArrowsToEnabled -IconSolid user-friends -IconColor VeryLightGrey
}
New-DiagramLink -ColorOpacity 0.5 -From $ID -To $IDParent -Color Orange -ArrowsToEnabled
} elseif ($ADObject.Type -eq 'Computer') {
if (-not $HideComputers -or $HideAppliesTo -notin 'Both', 'Default') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageComputer
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid desktop -IconColor LightGray
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Arsenic -ArrowsToEnabled -Dashes
}
} else {
if (-not $HideOther -or $HideAppliesTo -notin 'Both', 'Default') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageOther
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid robot -IconColor LightSalmon
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Boulder -ArrowsToEnabled -Dashes
}
}
$ConnectionsTracker[$ID][$IDParent] = $true
}
}
}
} -EnableFiltering:$EnableDiagramFiltering.IsPresent -MinimumFilteringChars $DiagramFilteringMinimumCharacters -EnableFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
function New-HTMLGroupDiagramSummaryHierarchical {
<#
.SYNOPSIS
Creates an HTML group diagram summary in a hierarchical layout based on the provided Active Directory group information.
.DESCRIPTION
The New-HTMLGroupDiagramSummaryHierarchical function generates an HTML diagram summary representing the relationships between Active Directory groups and their members in a hierarchical structure. It allows customization of the diagram layout and appearance based on the input parameters.
.PARAMETER ADGroup
Specifies an array of Active Directory group objects to be included in the diagram.
.PARAMETER HideAppliesTo
Specifies whether to hide specific types of objects in the diagram. Valid values are 'Default', 'Hierarchical', and 'Both'.
.PARAMETER HideComputers
Indicates whether to hide computer objects in the diagram.
.PARAMETER HideUsers
Indicates whether to hide user objects in the diagram.
.PARAMETER HideOther
Indicates whether to hide other types of objects in the diagram.
.PARAMETER Online
Indicates whether to display online status information in the diagram.
.EXAMPLE
New-HTMLGroupDiagramSummaryHierarchical -ADGroup $ADGroupArray -HideAppliesTo 'Default' -HideComputers -Online
Generates an HTML group diagram summary for the specified AD groups, hiding computers and displaying only default objects with online status in a hierarchical layout.
#>
[cmdletBinding()]
param(
[Array] $ADGroup,
[ValidateSet('Default', 'Hierarchical', 'Both')][string] $HideAppliesTo = 'Both',
[switch] $HideComputers,
[switch] $HideUsers,
[switch] $HideOther,
[switch] $Online,
[switch] $EnableDiagramFiltering,
[switch] $EnableDiagramFilteringButton,
[int] $DiagramFilteringMinimumCharacters = 3
)
New-HTMLDiagram -Height 'calc(100vh - 200px)' {
New-DiagramOptionsLayout -HierarchicalEnabled $true #-HierarchicalDirection FromLeftToRight #-HierarchicalSortMethod directed
New-DiagramOptionsPhysics -Enabled $true -HierarchicalRepulsionAvoidOverlap 1 -HierarchicalRepulsionNodeDistance 200
#New-DiagramOptionsPhysics -RepulsionNodeDistance 150 -Solver repulsion
if ($ADGroup) {
# Add it's members to diagram
foreach ($ADObject in $ADGroup) {
# Lets build our diagram
# This diagram of Summary doesn't use level checking because it's a summary of a groups, and the level will be different per group
# This means that it will look a bit different than what is there when comparing 1 to 1 with the other diagrams
#[int] $Level = $($ADObject.Nesting) + 1
$ID = "$($ADObject.DomainName)$($ADObject.DistinguishedName)"
#[int] $LevelParent = $($ADObject.Nesting)
$IDParent = "$($ADObject.ParentGroupDomain)$($ADObject.ParentGroupDN)"
[int] $Level = $($ADObject.Nesting) + 1
if ($ADObject.Type -eq 'User') {
if (-not $HideUsers -or $HideAppliesTo -notin 'Both', 'Hierarchical') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageUser -Level $Level
} else {
New-DiagramNode -Id $ID -Label $Label -Level $Level -IconSolid user -IconColor LightSteelBlue
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Blue -ArrowsToEnabled -Dashes
}
} elseif ($ADObject.Type -eq 'Group') {
if ($ADObject.Nesting -eq -1) {
$BorderColor = 'Red'
$Image = $Script:ConfigurationIcons.ImageGroup
} else {
$BorderColor = 'Blue'
$Image = $Script:ConfigurationIcons.ImageGroupNested
}
$SummaryMembers = -join ('Total: ', $ADObject.TotalMembers, ' Direct: ', $ADObject.DirectMembers, ' Groups: ', $ADObject.DirectGroups, ' Indirect: ', $ADObject.IndirectMembers)
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName + [System.Environment]::NewLine + $SummaryMembers
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Image -Level $Level -ColorBorder $BorderColor
} else {
New-DiagramNode -Id $ID -Label $Label -Level $Level -IconSolid user-friends
}
New-DiagramLink -ColorOpacity 0.5 -From $ID -To $IDParent -Color Orange -ArrowsToEnabled
} elseif ($ADObject.Type -eq 'Computer') {
if (-not $HideComputers -or $HideAppliesTo -notin 'Both', 'Hierarchical') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageComputer -Level $Level
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid desktop -IconColor LightGray -Level $Level
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Arsenic -ArrowsToEnabled -Dashes
}
} else {
if (-not $HideOther -or $HideAppliesTo -notin 'Both', 'Hierarchical') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageOther -Level $Level
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid robot -IconColor LightSalmon -Level $Level
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Boulder -ArrowsToEnabled -Dashes
}
}
}
}
} -EnableFiltering:$EnableDiagramFiltering.IsPresent -MinimumFilteringChars $DiagramFilteringMinimumCharacters -EnableFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
function New-HTMLGroupOfDiagramDefault {
<#
.SYNOPSIS
Creates a default HTML group diagram with specified parameters.
.DESCRIPTION
This function creates a default HTML group diagram with the ability to customize various display options.
.PARAMETER Identity
Specifies an array of objects to be included in the diagram.
.PARAMETER HideAppliesTo
Specifies whether to hide elements based on their type. Valid values are 'Default', 'Hierarchical', or 'Both'. Default is 'Both'.
.PARAMETER HideComputers
Indicates whether to hide computer objects in the diagram.
.PARAMETER HideUsers
Indicates whether to hide user objects in the diagram.
.PARAMETER HideOther
Indicates whether to hide other types of objects in the diagram.
.PARAMETER DataTableID
Specifies the ID of the data table associated with the diagram.
.PARAMETER ColumnID
Specifies the ID of the column associated with the data table.
.PARAMETER Online
Indicates whether to display objects as online in the diagram.
.EXAMPLE
New-HTMLGroupOfDiagramDefault -Identity $ADObjects -HideUsers -DataTableID "DataTable1" -ColumnID 1 -Online
Creates a default HTML group diagram with Active Directory objects, hides user objects, associates it with DataTable1, and displays objects as online.
.EXAMPLE
New-HTMLGroupOfDiagramDefault -Identity $ADObjects -HideComputers -HideAppliesTo 'Hierarchical'
Creates a default HTML group diagram with Active Directory objects, hides computer objects, and only displays elements based on the hierarchical setting.
#>
[cmdletBinding()]
param(
[Array] $Identity,
[ValidateSet('Default', 'Hierarchical', 'Both')][string] $HideAppliesTo = 'Both',
[switch] $HideComputers,
[switch] $HideUsers,
[switch] $HideOther,
[string] $DataTableID,
[int] $ColumnID,
[switch] $Online,
[switch] $EnableDiagramFiltering,
[switch] $EnableDiagramFilteringButton,
[int] $DiagramFilteringMinimumCharacters = 3
)
New-HTMLDiagram -Height 'calc(100vh - 200px)' {
#if ($DataTableID) {
# New-DiagramEvent -ID $DataTableID -ColumnID $ColumnID
#}
#New-DiagramOptionsLayout -HierarchicalEnabled $true -HierarchicalDirection FromLeftToRight #-HierarchicalSortMethod directed
#New-DiagramOptionsPhysics -Enabled $true -HierarchicalRepulsionAvoidOverlap 1 -HierarchicalRepulsionNodeDistance 50
New-DiagramOptionsPhysics -RepulsionNodeDistance 150 -Solver repulsion
if ($Identity) {
# Add it's members to diagram
foreach ($ADObject in $Identity) {
# Lets build our diagram
#[int] $Level = $($ADObject.Nesting) + 1
$ID = "$($ADObject.DomainName)$($ADObject.DistinguishedName)"
#[int] $LevelParent = $($ADObject.Nesting)
$IDParent = "$($ADObject.ParentGroupDomain)$($ADObject.ParentGroupDN)"
if ($ADObject.Type -eq 'User') {
if (-not $HideUsers -or $HideAppliesTo -notin 'Both', 'Default') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageUser
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid user -IconColor LightSteelBlue
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Blue -ArrowsFromEnabled -Dashes
}
} elseif ($ADObject.Type -eq 'Group') {
if ($ADObject.Nesting -eq -1) {
$BorderColor = 'Red'
$Image = $Script:ConfigurationIcons.ImageGroup
} else {
$BorderColor = 'Blue'
$Image = $Script:ConfigurationIcons.ImageGroupNested
}
#$SummaryMembers = -join ('Total: ', $ADObject.TotalMembers, ' Direct: ', $ADObject.DirectMembers, ' Groups: ', $ADObject.DirectGroups, ' Indirect: ', $ADObject.IndirectMembers)
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName + [System.Environment]::NewLine #+ $SummaryMembers
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Image -ColorBorder $BorderColor
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid user-friends -IconColor VeryLightGrey
}
New-DiagramLink -ColorOpacity 0.5 -From $ID -To $IDParent -Color Orange -ArrowsFromEnabled
} elseif ($ADObject.Type -eq 'Computer') {
if (-not $HideComputers -or $HideAppliesTo -notin 'Both', 'Default') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageComputer
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid desktop -IconColor LightGray
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Arsenic -ArrowsFromEnabled -Dashes
}
} else {
if (-not $HideOther -or $HideAppliesTo -notin 'Both', 'Default') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageOther
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid robot -IconColor LightSalmon
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Boulder -ArrowsFromEnabled -Dashes
}
}
}
}
} -EnableFiltering:$EnableDiagramFiltering.IsPresent -MinimumFilteringChars $DiagramFilteringMinimumCharacters -EnableFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
function New-HTMLGroupOfDiagramHierarchical {
<#
.SYNOPSIS
Creates a new HTML group diagram with hierarchical layout and customizable options.
.DESCRIPTION
This function creates a new HTML group diagram with a hierarchical layout and customizable options. It allows for displaying Active Directory groups and their members in a visual diagram format with hierarchical organization.
.PARAMETER Identity
Specifies an array of objects to be included in the diagram.
.PARAMETER HideAppliesTo
Specifies whether to hide elements based on their type. Valid values are 'Default', 'Hierarchical', or 'Both'. Default is 'Both'.
.PARAMETER HideComputers
Indicates whether to hide computer objects in the diagram.
.PARAMETER HideUsers
Indicates whether to hide user objects in the diagram.
.PARAMETER HideOther
Indicates whether to hide other types of objects in the diagram.
.PARAMETER Online
Indicates whether to display objects as online in the diagram.
.EXAMPLE
New-HTMLGroupOfDiagramHierarchical -Identity $ADObjects -HideUsers -Online
Creates a new HTML group diagram with hierarchical layout, includes Active Directory objects, hides user objects, and displays objects as online.
.EXAMPLE
New-HTMLGroupOfDiagramHierarchical -Identity $ADObjects -HideComputers -HideAppliesTo 'Hierarchical'
Creates a new HTML group diagram with hierarchical layout, includes Active Directory objects, hides computer objects, and only displays elements based on the hierarchical setting.
#>
[cmdletBinding()]
param(
[Array] $Identity,
[ValidateSet('Default', 'Hierarchical', 'Both')][string] $HideAppliesTo = 'Both',
[switch] $HideComputers,
[switch] $HideUsers,
[switch] $HideOther,
[switch] $Online,
[switch] $EnableDiagramFiltering,
[switch] $EnableDiagramFilteringButton,
[int] $DiagramFilteringMinimumCharacters = 3
)
New-HTMLDiagram -Height 'calc(100vh - 200px)' {
New-DiagramOptionsLayout -HierarchicalEnabled $true #-HierarchicalDirection FromLeftToRight #-HierarchicalSortMethod directed
New-DiagramOptionsPhysics -Enabled $true -HierarchicalRepulsionAvoidOverlap 1 -HierarchicalRepulsionNodeDistance 200
#New-DiagramOptionsPhysics -RepulsionNodeDistance 150 -Solver repulsion
if ($Identity) {
# Add it's members to diagram
foreach ($ADObject in $Identity) {
# Lets build our diagram
[int] $Level = $($ADObject.Nesting) + 1
$ID = "$($ADObject.DomainName)$($ADObject.DistinguishedName)$Level"
[int] $LevelParent = $($ADObject.Nesting)
$IDParent = "$($ADObject.ParentGroupDomain)$($ADObject.ParentGroupDN)$LevelParent"
[int] $Level = $($ADObject.Nesting) + 1
if ($ADObject.Type -eq 'User') {
if (-not $HideUsers -or $HideAppliesTo -notin 'Both', 'Hierarchical') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageUser -Level $Level
} else {
New-DiagramNode -Id $ID -Label $Label -Level $Level -IconSolid user -IconColor LightSteelBlue
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Blue -ArrowsFromEnabled -Dashes
}
} elseif ($ADObject.Type -eq 'Group') {
if ($ADObject.Nesting -eq -1) {
$BorderColor = 'Red'
$Image = $Script:ConfigurationIcons.ImageGroup
} else {
$BorderColor = 'Blue'
$Image = $Script:ConfigurationIcons.ImageGroupNested
}
# $SummaryMembers = -join ('Total: ', $ADObject.TotalMembers, ' Direct: ', $ADObject.DirectMembers, ' Groups: ', $ADObject.DirectGroups, ' Indirect: ', $ADObject.IndirectMembers)
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName + [System.Environment]::NewLine # + $SummaryMembers
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Image -Level $Level -ColorBorder $BorderColor
} else {
New-DiagramNode -Id $ID -Label $Label -Level $Level -IconSolid user-friends
}
New-DiagramLink -ColorOpacity 0.5 -From $ID -To $IDParent -Color Orange -ArrowsFromEnabled
} elseif ($ADObject.Type -eq 'Computer') {
if (-not $HideComputers -or $HideAppliesTo -notin 'Both', 'Hierarchical') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageComputer -Level $Level
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid desktop -IconColor LightGray -Level $Level
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Arsenic -ArrowsFromEnabled -Dashes
}
} else {
if (-not $HideOther -or $HideAppliesTo -notin 'Both', 'Hierarchical') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageOther -Level $Level
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid robot -IconColor LightSalmon -Level $Level
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Boulder -ArrowsFromEnabled -Dashes
}
}
}
}
} -EnableFiltering:$EnableDiagramFiltering.IsPresent -MinimumFilteringChars $DiagramFilteringMinimumCharacters -EnableFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
function New-HTMLGroupOfDiagramSummary {
<#
.SYNOPSIS
Creates an HTML group diagram summary based on the provided Active Directory group information.
.DESCRIPTION
The New-HTMLGroupOfDiagramSummary function generates an HTML diagram summary representing the relationships between Active Directory groups and their members. It allows customization of the diagram layout and appearance based on the input parameters.
.PARAMETER ADGroup
Specifies an array of Active Directory group objects to be included in the diagram.
.PARAMETER HideAppliesTo
Specifies whether to hide specific types of objects in the diagram. Valid values are 'Default', 'Hierarchical', and 'Both'. Default value is 'Both'.
.PARAMETER HideComputers
Indicates whether to hide computer objects in the diagram.
.PARAMETER HideUsers
Indicates whether to hide user objects in the diagram.
.PARAMETER HideOther
Indicates whether to hide other types of objects in the diagram.
.PARAMETER DataTableID
Specifies the ID of the data table associated with the diagram.
.PARAMETER ColumnID
Specifies the ID of the column associated with the data table.
.PARAMETER Online
Indicates whether to display online status information in the diagram.
.EXAMPLE
New-HTMLGroupOfDiagramSummary -ADGroup $ADGroupArray -HideAppliesTo 'Default' -HideComputers -Online
Generates an HTML group diagram summary for the specified AD groups, hiding computers and displaying only default objects with online status.
.EXAMPLE
New-HTMLGroupOfDiagramSummary -ADGroup $ADGroupArray -HideComputers -HideUsers -HideOther -DataTableID "DataTable1" -ColumnID 1 -Online
Generates an HTML group diagram summary for the specified AD groups, hiding computers, users, and other objects, associating it with DataTable1, and displaying online status.
#>
[cmdletBinding()]
param(
[Array] $ADGroup,
[ValidateSet('Default', 'Hierarchical', 'Both')][string] $HideAppliesTo = 'Both',
[switch] $HideComputers,
[switch] $HideUsers,
[switch] $HideOther,
[string] $DataTableID,
[int] $ColumnID,
[switch] $Online,
[switch] $EnableDiagramFiltering,
[switch] $EnableDiagramFilteringButton,
[int] $DiagramFilteringMinimumCharacters = 3
)
$ConnectionsTracker = @{}
New-HTMLDiagram -Height 'calc(100vh - 200px)' {
#if ($DataTableID) {
# New-DiagramEvent -ID $DataTableID -ColumnID $ColumnID
#}
#New-DiagramOptionsLayout -HierarchicalEnabled $true -HierarchicalDirection FromLeftToRight #-HierarchicalSortMethod directed
#New-DiagramOptionsPhysics -Enabled $true -HierarchicalRepulsionAvoidOverlap 1 -HierarchicalRepulsionNodeDistance 50
New-DiagramOptionsPhysics -RepulsionNodeDistance 150 -Solver repulsion
if ($ADGroup) {
# Add it's members to diagram
foreach ($ADObject in $ADGroup) {
# Lets build our diagram
# This diagram of Summary doesn't use level checking because it's a summary of a groups, and the level will be different per group
# This means that it will look a bit different than what is there when comparing 1 to 1 with the other diagrams
#[int] $Level = $($ADObject.Nesting) + 1
$ID = "$($ADObject.DomainName)$($ADObject.DistinguishedName)"
#[int] $LevelParent = $($ADObject.Nesting)
$IDParent = "$($ADObject.ParentGroupDomain)$($ADObject.ParentGroupDN)"
# We track connection for ID to make sure that only once the conenction is added
if (-not $ConnectionsTracker[$ID]) {
$ConnectionsTracker[$ID] = @{}
}
if (-not $ConnectionsTracker[$ID][$IDParent]) {
if ($ADObject.Type -eq 'User') {
if (-not $HideUsers -or $HideAppliesTo -notin 'Both', 'Default') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageUser
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid user -IconColor LightSteelBlue
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Blue -ArrowsFromEnabled -Dashes
}
} elseif ($ADObject.Type -eq 'Group') {
if ($ADObject.Nesting -eq -1) {
$BorderColor = 'Red'
$Image = $Script:ConfigurationIcons.ImageGroup
} else {
$BorderColor = 'Blue'
$Image = $Script:ConfigurationIcons.ImageGroupNested
}
#$SummaryMembers = -join ('Total: ', $ADObject.TotalMembers, ' Direct: ', $ADObject.DirectMembers, ' Groups: ', $ADObject.DirectGroups, ' Indirect: ', $ADObject.IndirectMembers)
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName + [System.Environment]::NewLine #+ $SummaryMembers
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Image -ColorBorder $BorderColor
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid user-friends -IconColor VeryLightGrey
}
New-DiagramLink -ColorOpacity 0.5 -From $ID -To $IDParent -Color Orange -ArrowsFromEnabled
} elseif ($ADObject.Type -eq 'Computer') {
if (-not $HideComputers -or $HideAppliesTo -notin 'Both', 'Default') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageComputer
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid desktop -IconColor LightGray
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Arsenic -ArrowsFromEnabled -Dashes
}
} else {
if (-not $HideOther -or $HideAppliesTo -notin 'Both', 'Default') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageOther
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid robot -IconColor LightSalmon
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Boulder -ArrowsFromEnabled -Dashes
}
}
$ConnectionsTracker[$ID][$IDParent] = $true
}
}
}
} -EnableFiltering:$EnableDiagramFiltering.IsPresent -MinimumFilteringChars $DiagramFilteringMinimumCharacters -EnableFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
function New-HTMLGroupOfDiagramSummaryHierarchical {
<#
.SYNOPSIS
Creates an HTML group diagram summary in a hierarchical layout based on the provided Active Directory group information.
.DESCRIPTION
The New-HTMLGroupDiagramSummaryHierarchical function generates an HTML diagram summary representing the relationships between Active Directory groups and their members in a hierarchical structure. It allows customization of the diagram layout and appearance based on the input parameters.
.PARAMETER ADGroup
Specifies an array of Active Directory group objects to be included in the diagram.
.PARAMETER HideAppliesTo
Specifies whether to hide specific types of objects in the diagram. Valid values are 'Default', 'Hierarchical', and 'Both'.
.PARAMETER HideComputers
Indicates whether to hide computer objects in the diagram.
.PARAMETER HideUsers
Indicates whether to hide user objects in the diagram.
.PARAMETER HideOther
Indicates whether to hide other types of objects in the diagram.
.PARAMETER Online
Indicates whether to display online status information in the diagram.
.EXAMPLE
New-HTMLGroupDiagramSummaryHierarchical -ADGroup $ADGroupArray -HideAppliesTo 'Default' -HideComputers -Online
Generates an HTML group diagram summary for the specified AD groups, hiding computers and displaying only default objects with online status in a hierarchical layout.
#>
[cmdletBinding()]
param(
[Array] $ADGroup,
[ValidateSet('Default', 'Hierarchical', 'Both')][string] $HideAppliesTo = 'Both',
[switch] $HideComputers,
[switch] $HideUsers,
[switch] $HideOther,
[switch] $Online,
[switch] $EnableDiagramFiltering,
[switch] $EnableDiagramFilteringButton,
[int] $DiagramFilteringMinimumCharacters = 3
)
New-HTMLDiagram -Height 'calc(100vh - 200px)' {
New-DiagramOptionsLayout -HierarchicalEnabled $true #-HierarchicalDirection FromLeftToRight #-HierarchicalSortMethod directed
New-DiagramOptionsPhysics -Enabled $true -HierarchicalRepulsionAvoidOverlap 1 -HierarchicalRepulsionNodeDistance 200
#New-DiagramOptionsPhysics -RepulsionNodeDistance 150 -Solver repulsion
if ($ADGroup) {
# Add it's members to diagram
foreach ($ADObject in $ADGroup) {
# This diagram of Summary doesn't use level checking because it's a summary of a groups, and the level will be different per group
# This means that it will look a bit different than what is there when comparing 1 to 1 with the other diagrams
# Lets build our diagram
#[int] $Level = $($ADObject.Nesting) + 1
$ID = "$($ADObject.DomainName)$($ADObject.DistinguishedName)"
#[int] $LevelParent = $($ADObject.Nesting)
$IDParent = "$($ADObject.ParentGroupDomain)$($ADObject.ParentGroupDN)"
[int] $Level = $($ADObject.Nesting) + 1
if ($ADObject.Type -eq 'User') {
if (-not $HideUsers -or $HideAppliesTo -notin 'Both', 'Hierarchical') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageUser -Level $Level
} else {
New-DiagramNode -Id $ID -Label $Label -Level $Level -IconSolid user -IconColor LightSteelBlue
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Blue -ArrowsFromEnabled -Dashes
}
} elseif ($ADObject.Type -eq 'Group') {
if ($ADObject.Nesting -eq -1) {
$BorderColor = 'Red'
$Image = $Script:ConfigurationIcons.ImageGroup
} else {
$BorderColor = 'Blue'
$Image = $Script:ConfigurationIcons.ImageGroupNested
}
#$SummaryMembers = -join ('Total: ', $ADObject.TotalMembers, ' Direct: ', $ADObject.DirectMembers, ' Groups: ', $ADObject.DirectGroups, ' Indirect: ', $ADObject.IndirectMembers)
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName + [System.Environment]::NewLine #+ $SummaryMembers
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Image -Level $Level -ColorBorder $BorderColor
} else {
New-DiagramNode -Id $ID -Label $Label -Level $Level -IconSolid user-friends
}
New-DiagramLink -ColorOpacity 0.5 -From $ID -To $IDParent -Color Orange -ArrowsFromEnabled
} elseif ($ADObject.Type -eq 'Computer') {
if (-not $HideComputers -or $HideAppliesTo -notin 'Both', 'Hierarchical') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageComputer -Level $Level
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid desktop -IconColor LightGray -Level $Level
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Arsenic -ArrowsFromEnabled -Dashes
}
} else {
if (-not $HideOther -or $HideAppliesTo -notin 'Both', 'Hierarchical') {
$Label = $ADObject.Name + [System.Environment]::NewLine + $ADObject.DomainName
if ($Online) {
New-DiagramNode -Id $ID -Label $Label -Image $Script:ConfigurationIcons.ImageOther -Level $Level
} else {
New-DiagramNode -Id $ID -Label $Label -IconSolid robot -IconColor LightSalmon -Level $Level
}
New-DiagramLink -ColorOpacity 0.2 -From $ID -To $IDParent -Color Boulder -ArrowsFromEnabled -Dashes
}
}
}
}
} -EnableFiltering:$EnableDiagramFiltering.IsPresent -MinimumFilteringChars $DiagramFilteringMinimumCharacters -EnableFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
function New-HTMLReportADEssentials {
<#
.SYNOPSIS
Generates an HTML report for ADEssentials.
.DESCRIPTION
This function generates an HTML report for ADEssentials based on the specified type. It provides options to generate the report online and hide the HTML output.
.PARAMETER Type
Specifies the type of report to generate.
.PARAMETER Online
Switch to indicate if the report should be generated online.
.PARAMETER HideHTML
Switch to hide the HTML output.
.PARAMETER FilePath
Specifies the file path where the report will be saved.
.EXAMPLE
New-HTMLReportADEssentials -Type @('Type1') -Online -HideHTML -FilePath "C:\Reports\"
Generates an HTML report for 'Type1', hides the HTML output, and saves the report in the specified file path.
.NOTES
Ensure that the necessary permissions are in place to generate the report.
#>
[cmdletBinding()]
param(
[Array] $Type,
[switch] $Online,
[switch] $HideHTML,
[string] $FilePath
)
New-HTML -Author 'Przemysław Kłys' -TitleText 'ADEssentials Report' {
New-HTMLTabStyle -BorderRadius 0px -TextTransform capitalize -BackgroundColorActive SlateGrey
New-HTMLSectionStyle -BorderRadius 0px -HeaderBackGroundColor Grey -RemoveShadow
New-HTMLPanelStyle -BorderRadius 0px
New-HTMLTableOption -DataStore JavaScript -BoolAsString -ArrayJoinString ', ' -ArrayJoin
New-HTMLHeader {
New-HTMLSection -Invisible {
New-HTMLSection {
New-HTMLText -Text "Report generated on $(Get-Date)" -Color Blue
} -JustifyContent flex-start -Invisible
New-HTMLSection {
New-HTMLText -Text "ADEssentials - $($Script:Reporting['Version'])" -Color Blue
} -JustifyContent flex-end -Invisible
}
}
if ($Type.Count -eq 1) {
foreach ($T in $Script:ADEssentialsConfiguration.Keys) {
if ($Script:ADEssentialsConfiguration[$T].Enabled -eq $true) {
if ($Script:ADEssentialsConfiguration[$T]['Summary']) {
$Script:Reporting[$T]['Summary'] = Invoke-Command -ScriptBlock $Script:ADEssentialsConfiguration[$T]['Summary']
}
& $Script:ADEssentialsConfiguration[$T]['Solution']
}
}
} else {
foreach ($T in $Script:ADEssentialsConfiguration.Keys) {
if ($Script:ADEssentialsConfiguration[$T].Enabled -eq $true) {
if ($Script:ADEssentialsConfiguration[$T]['Summary']) {
$Script:Reporting[$T]['Summary'] = Invoke-Command -ScriptBlock $Script:ADEssentialsConfiguration[$T]['Summary']
}
New-HTMLTab -Name $Script:ADEssentialsConfiguration[$T]['Name'] {
& $Script:ADEssentialsConfiguration[$T]['Solution']
}
}
}
}
} -Online:$Online.IsPresent -ShowHTML:(-not $HideHTML) -FilePath $FilePath
}
function New-HTMLReportADEssentialsWithSplit {
<#
.SYNOPSIS
Generates HTML reports for ADEssentials with the option to split into multiple files.
.DESCRIPTION
This function generates HTML reports for ADEssentials. It provides the flexibility to split the reports into multiple files for easier viewing.
.PARAMETER Type
Specifies the type of report to generate.
.PARAMETER Online
Switch to indicate if the report should be generated online.
.PARAMETER HideHTML
Switch to hide the HTML output.
.PARAMETER FilePath
Specifies the file path where the report will be saved.
.PARAMETER CurrentReport
Specifies the current report to generate.
.EXAMPLE
New-HTMLReportADEssentialsWithSplit -Type @('Type1', 'Type2') -Online -HideHTML -FilePath "C:\Reports\" -CurrentReport "Type1"
Generates HTML reports for 'Type1' and 'Type2', hides the HTML output, and saves the reports in the specified file path.
.NOTES
Ensure that the necessary permissions are in place to generate the reports.
#>
[cmdletBinding()]
param(
[Array] $Type,
[switch] $Online,
[switch] $HideHTML,
[string] $FilePath,
[string] $CurrentReport
)
# Split reports into multiple files for easier viewing
$DateName = $(Get-Date -f yyyy-MM-dd_HHmmss)
$FileName = [io.path]::GetFileNameWithoutExtension($FilePath)
$DirectoryName = [io.path]::GetDirectoryName($FilePath)
foreach ($T in $Script:ADEssentialsConfiguration.Keys) {
if ($Script:ADEssentialsConfiguration[$T].Enabled -eq $true -and ((-not $CurrentReport) -or ($CurrentReport -and $CurrentReport -eq $T))) {
$NewFileName = $FileName + '_' + $T + "_" + $DateName + '.html'
$FilePath = [io.path]::Combine($DirectoryName, $NewFileName)
New-HTML -Author 'Przemysław Kłys' -TitleText "ADEssentials $CurrentReport Report" {
New-HTMLTabStyle -BorderRadius 0px -TextTransform capitalize -BackgroundColorActive SlateGrey
New-HTMLSectionStyle -BorderRadius 0px -HeaderBackGroundColor Grey -RemoveShadow
New-HTMLPanelStyle -BorderRadius 0px
New-HTMLTableOption -DataStore JavaScript -BoolAsString -ArrayJoinString ', ' -ArrayJoin
New-HTMLHeader {
New-HTMLSection -Invisible {
New-HTMLSection {
New-HTMLText -Text "Report generated on $(Get-Date)" -Color Blue
} -JustifyContent flex-start -Invisible
New-HTMLSection {
New-HTMLText -Text "ADEssentials - $($Script:Reporting['Version'])" -Color Blue
} -JustifyContent flex-end -Invisible
}
}
if ($Script:ADEssentialsConfiguration[$T]['Summary']) {
$Script:Reporting[$T]['Summary'] = Invoke-Command -ScriptBlock $Script:ADEssentialsConfiguration[$T]['Summary']
}
& $Script:ADEssentialsConfiguration[$T]['Solution']
} -Online:$Online.IsPresent -ShowHTML:(-not $HideHTML) -FilePath $FilePath
}
}
}
function Remove-PrivateACL {
<#
.SYNOPSIS
Removes private ACLs based on specified criteria.
.DESCRIPTION
This function removes private ACLs based on the provided ACL object, principal, access rule, access control type, object type name, inherited object type name, inheritance type, force flag, and NT security descriptor.
.PARAMETER ACL
Specifies the ACL object to be processed.
.PARAMETER Principal
Specifies the principal for which the ACL should be removed.
.PARAMETER AccessRule
Specifies the access rule to be removed.
.PARAMETER AccessControlType
Specifies the type of access control to be removed.
.PARAMETER IncludeObjectTypeName
Specifies the object type names to include.
.PARAMETER IncludeInheritedObjectTypeName
Specifies the inherited object type names to include.
.PARAMETER InheritanceType
Specifies the inheritance type to consider.
.PARAMETER Force
Indicates whether to force the removal of inherited ACLs.
.PARAMETER NTSecurityDescriptor
Specifies the NT security descriptor to be updated.
.EXAMPLE
Remove-PrivateACL -ACL $ACLObject -Principal "User1" -AccessRule "Read" -AccessControlType "Allow" -IncludeObjectTypeName "File" -Force
Removes the specified ACL for User1 with Read access on files.
.NOTES
Author: Your Name
Date: Date
#>
[cmdletBinding(SupportsShouldProcess)]
param(
[PSCustomObject] $ACL,
[string] $Principal,
[alias('ActiveDirectoryRights')][System.DirectoryServices.ActiveDirectoryRights] $AccessRule,
[System.Security.AccessControl.AccessControlType] $AccessControlType,
[Alias('ObjectTypeName')][string[]] $IncludeObjectTypeName,
[Alias('InheritedObjectTypeName')][string[]] $IncludeInheritedObjectTypeName,
[alias('ActiveDirectorySecurityInheritance', 'IncludeActiveDirectorySecurityInheritance')][nullable[System.DirectoryServices.ActiveDirectorySecurityInheritance]] $InheritanceType,
[switch] $Force,
[alias('ActiveDirectorySecurity')][System.DirectoryServices.ActiveDirectorySecurity] $NTSecurityDescriptor
)
$DomainName = ConvertFrom-DistinguishedName -ToDomainCN -DistinguishedName $ACL.DistinguishedName
$QueryServer = $Script:ForestDetails['QueryServers'][$DomainName].HostName[0]
$OutputRequiresCommit = @(
# if access rule is defined with just remove access rule we want to remove
if ($ntSecurityDescriptor -and $ACL.PSObject.Properties.Name -notcontains 'ACLAccessRules') {
try {
# We do last minute filtering here to ensure we don't remove the wrong ACL
if ($Principal) {
$PrincipalRequested = Convert-Identity -Identity $Principal -Verbose:$false
}
$SplatFilteredACL = @{
# I am not sure on this $ACL, needs testing
ACL = $ACL.Bundle
Resolve = $true
Principal = $Principal
#Inherited = $Inherited
#NotInherited = $NotInherited
AccessControlType = $AccessControlType
IncludeObjectTypeName = $IncludeObjectTypeName
IncludeInheritedObjectTypeName = $IncludeInheritedObjectTypeName
#ExcludeObjectTypeName = $ExcludeObjectTypeName
#ExcludeInheritedObjectTypeName = $ExcludeInheritedObjectTypeName
#IncludeActiveDirectoryRights = $IncludeActiveDirectoryRights
#ExcludeActiveDirectoryRights = $ExcludeActiveDirectoryRights
IncludeActiveDirectorySecurityInheritance = $InheritanceType
ExcludeActiveDirectorySecurityInheritance = $ExcludeActiveDirectorySecurityInheritance
PrincipalRequested = $PrincipalRequested
Bundle = $Bundle
}
Remove-EmptyValue -Hashtable $SplatFilteredACL
$CheckAgainstFilters = Get-FilteredACL @SplatFilteredACL
if (-not $CheckAgainstFilters) {
continue
}
# Now we do remove the ACL
Write-Verbose -Message "Remove-ADACL - Removing access from $($ACL.CanonicalName) (type: $($ACL.ObjectClass), IsInherited: $($ACL.IsInherited)) for $($ACL.Principal) / $($ACL.ActiveDirectoryRights) / $($ACL.AccessControlType) / $($ACL.ObjectTypeName) / $($ACL.InheritanceType) / $($ACL.InheritedObjectTypeName)"
#Write-Verbose -Message "Remove-ADACL - Removing access from $($Rule.CanonicalName) (type: $($Rule.ObjectClass), IsInherited: $($Rule.IsInherited)) for $($Rule.Principal) / $($Rule.ActiveDirectoryRights) / $($Rule.AccessControlType) / $($Rule.ObjectTypeName) / $($Rule.InheritanceType) / $($Rule.InheritedObjectTypeName)"
if ($ACL.IsInherited) {
if ($Force) {
# isProtected - true to protect the access rules associated with this ObjectSecurity object from inheritance; false to allow inheritance.
# preserveInheritance - true to preserve inherited access rules; false to remove inherited access rules. This parameter is ignored if isProtected is false.
$ntSecurityDescriptor.SetAccessRuleProtection($true, $true)
} else {
Write-Warning "Remove-ADACL - Rule for $($ACL.Principal) / $($ACL.ActiveDirectoryRights) / $($ACL.AccessControlType) / $($ACL.ObjectTypeName) / $($ACL.InheritanceType) / $($ACL.InheritedObjectTypeName) is inherited. Use -Force to remove it."
continue
}
}
$ntSecurityDescriptor.RemoveAccessRuleSpecific($ACL.Bundle)
$true
} catch {
Write-Warning "Remove-ADACL - Removing access from $($ACL.CanonicalName) (type: $($ACL.ObjectClass), IsInherited: $($ACL.IsInherited)) failed: $($_.Exception.Message)"
$false
}
} elseif ($ACL.PSObject.Properties.Name -contains 'ACLAccessRules') {
foreach ($Rule in $ACL.ACLAccessRules) {
# We do last minute filtering here to ensure we don't remove the wrong ACL
if ($Principal) {
$PrincipalRequested = Convert-Identity -Identity $Principal -Verbose:$false
}
$SplatFilteredACL = @{
ACL = $Rule.Bundle
Resolve = $true
Principal = $Principal
#Inherited = $Inherited
#NotInherited = $NotInherited
AccessControlType = $AccessControlType
IncludeObjectTypeName = $IncludeObjectTypeName
IncludeInheritedObjectTypeName = $IncludeInheritedObjectTypeName
#ExcludeObjectTypeName = $ExcludeObjectTypeName
#ExcludeInheritedObjectTypeName = $ExcludeInheritedObjectTypeName
#IncludeActiveDirectoryRights = $IncludeActiveDirectoryRights
#ExcludeActiveDirectoryRights = $ExcludeActiveDirectoryRights
IncludeActiveDirectorySecurityInheritance = $InheritanceType
ExcludeActiveDirectorySecurityInheritance = $ExcludeActiveDirectorySecurityInheritance
PrincipalRequested = $PrincipalRequested
Bundle = $Bundle
}
Remove-EmptyValue -Hashtable $SplatFilteredACL
$CheckAgainstFilters = Get-FilteredACL @SplatFilteredACL
if (-not $CheckAgainstFilters) {
continue
}
# Now we do remove the ACL
$ntSecurityDescriptor = $ACL.ACL
try {
Write-Verbose -Message "Remove-ADACL - Removing access from $($Rule.CanonicalName) (type: $($Rule.ObjectClass), IsInherited: $($Rule.IsInherited)) for $($Rule.Principal) / $($Rule.ActiveDirectoryRights) / $($Rule.AccessControlType) / $($Rule.ObjectTypeName) / $($Rule.InheritanceType) / $($Rule.InheritedObjectTypeName)"
if ($Rule.IsInherited) {
if ($Force) {
# isProtected - true to protect the access rules associated with this ObjectSecurity object from inheritance; false to allow inheritance.
# preserveInheritance - true to preserve inherited access rules; false to remove inherited access rules. This parameter is ignored if isProtected is false.
$ntSecurityDescriptor.SetAccessRuleProtection($true, $true)
} else {
Write-Warning "Remove-ADACL - Rule for $($Rule.Principal) / $($Rule.ActiveDirectoryRights) / $($Rule.AccessControlType) / $($Rule.ObjectTypeName) / $($Rule.InheritanceType) / $($Rule.InheritedObjectTypeName) is inherited. Use -Force to remove it."
continue
}
}
$ntSecurityDescriptor.RemoveAccessRuleSpecific($Rule.Bundle)
#Write-Verbose -Message "Remove-ADACL - Removing access for $($Identity) / $AccessControlType / $Rule"
$true
} catch {
Write-Warning "Remove-ADACL - Removing access from $($Rule.CanonicalName) (type: $($Rule.ObjectClass), IsInherited: $($Rule.IsInherited)) failed: $($_.Exception.Message)"
$false
}
}
} else {
$AllRights = $false
$ntSecurityDescriptor = $ACL.ACL
# ACL not provided, we need to get all ourselves
if ($Principal -like '*-*-*-*') {
$Identity = [System.Security.Principal.SecurityIdentifier]::new($Principal)
} else {
[System.Security.Principal.IdentityReference] $Identity = [System.Security.Principal.NTAccount]::new($Principal)
}
if ($ObjectType -and $InheritanceType -and $AccessRule -and $AccessControlType) {
$ObjectTypeGuid = Convert-ADSchemaToGuid -SchemaName $ObjectType
if ($ObjectTypeGuid) {
$AccessRuleToRemove = [System.DirectoryServices.ActiveDirectoryAccessRule]::new($Identity, $AccessRule, $AccessControlType, $ObjectTypeGuid, $InheritanceType)
} else {
Write-Warning "Remove-PrivateACL - Object type '$ObjectType' not found in schema"
return
}
} elseif ($ObjectType -and $AccessRule -and $AccessControlType) {
$ObjectTypeGuid = Convert-ADSchemaToGuid -SchemaName $ObjectType
if ($ObjectTypeGuid) {
$AccessRuleToRemove = [System.DirectoryServices.ActiveDirectoryAccessRule]::new($Identity, $AccessRule, $AccessControlType, $ObjectTypeGuid)
} else {
Write-Warning "Remove-PrivateACL - Object type '$ObjectType' not found in schema"
return
}
} elseif ($AccessRule -and $AccessControlType) {
$AccessRuleToRemove = [System.DirectoryServices.ActiveDirectoryAccessRule]::new($Identity, $AccessRule, $AccessControlType)
} else {
# this is kind of special we fix it later on, it means user requersted Identity, AccessControlType but nothing else
# Since there's no direct option with ActiveDirectoryAccessRule we fix it using RemoveAccess
$AllRights = $true
}
try {
if ($AllRights) {
Write-Verbose "Remove-ADACL - Removing access for $($Identity) / $AccessControlType / All Rights"
$ntSecurityDescriptor.RemoveAccess($Identity, $AccessControlType)
} else {
Write-Verbose "Remove-ADACL - Removing access for $($AccessRuleToRemove.IdentityReference) / $($AccessRuleToRemove.ActiveDirectoryRights) / $($AccessRuleToRemove.AccessControlType) / $($AccessRuleToRemove.ObjectType) / $($AccessRuleToRemove.InheritanceType) to $($ACL.DistinguishedName)"
$ntSecurityDescriptor.RemoveAccessRule($AccessRuleToRemove)
}
$true
} catch {
Write-Warning "Remove-ADACL - Error removing permissions for $($Identity) / $($AccessControlType) due to error: $($_.Exception.Message)"
$false
}
}
)
if ($OutputRequiresCommit -notcontains $false -and $OutputRequiresCommit -contains $true) {
Write-Verbose "Remove-ADACL - Saving permissions for $($ACL.DistinguishedName) on $($QueryServer)"
try {
# TODO: This is a workaround for a ProtectedFromAccidentalDeletion
# It seems if there's Everyone involved in ntSecurityDescriptor it sets back Protected from Accidental Deletion
# Need to write some detection mechanism around it
$TemporaryObject = Get-ADObject -Identity $ACL.DistinguishedName -Properties ProtectedFromAccidentalDeletion -Server $QueryServer
Set-ADObject -Identity $ACL.DistinguishedName -Replace @{ ntSecurityDescriptor = $ntSecurityDescriptor } -ErrorAction Stop -Server $QueryServer #-ProtectedFromAccidentalDeletion $true
$AfterTemporaryObject = Get-ADObject -Identity $ACL.DistinguishedName -Properties ProtectedFromAccidentalDeletion -Server $QueryServer
if ($TemporaryObject.ProtectedFromAccidentalDeletion -ne $AfterTemporaryObject.ProtectedFromAccidentalDeletion) {
Write-Warning -Message "Remove-ADACL - Restoring ProtectedFromAccidentalDeletion from $($AfterTemporaryObject.ProtectedFromAccidentalDeletion) to $($TemporaryObject.ProtectedFromAccidentalDeletion) for $($ACL.DistinguishedName) as a workaround on $($QueryServer)"
Set-ADObject -Identity $ACL.DistinguishedName -ProtectedFromAccidentalDeletion $TemporaryObject.ProtectedFromAccidentalDeletion -ErrorAction Stop -Server $QueryServer
}
# Old way of doing things
# Set-Acl -Path $ACL.Path -AclObject $ntSecurityDescriptor -ErrorAction Stop
} catch {
Write-Warning "Remove-ADACL - Saving permissions for $($ACL.DistinguishedName) failed: $($_.Exception.Message) oon $($QueryServer)"
}
} elseif ($OutputRequiresCommit -contains $false) {
Write-Warning "Remove-ADACL - Skipping saving permissions for $($ACL.DistinguishedName) due to errors."
} else {
Write-Verbose "Remove-ADACL - No changes for $($ACL.DistinguishedName)"
}
}
function Reset-ADEssentialsStatus {
<#
.SYNOPSIS
Resets the status of ADEssentialsConfiguration based on DefaultTypes.
.DESCRIPTION
This function resets the status of ADEssentialsConfiguration based on DefaultTypes. It enables the types specified in DefaultTypes and disables the rest.
.PARAMETER DefaultTypes
Specifies the default types to be enabled.
.EXAMPLE
Reset-ADEssentialsStatus -DefaultTypes 'Type1', 'Type2'
Resets the status of ADEssentialsConfiguration enabling 'Type1' and 'Type2' and disabling the rest.
.NOTES
Author: [Author Name]
Date: [Date]
Version: [Version]
#>
[cmdletBinding()]
param(
)
if (-not $Script:DefaultTypes) {
$Script:DefaultTypes = foreach ($T in $Script:ADEssentialsConfiguration.Keys) {
if ($Script:ADEssentialsConfiguration[$T].Enabled) {
$T
}
}
} else {
foreach ($T in $Script:ADEssentialsConfiguration.Keys) {
if ($Script:ADEssentialsConfiguration[$T]) {
$Script:ADEssentialsConfiguration[$T]['Enabled'] = $false
}
}
foreach ($T in $Script:DefaultTypes) {
if ($Script:ADEssentialsConfiguration[$T]) {
$Script:ADEssentialsConfiguration[$T]['Enabled'] = $true
}
}
}
}
$Script:ADEssentialsConfiguration = [ordered] @{
AccountDelegation = $Script:ShowWinADAccountDelegation
Users = $Script:ShowWinADUser
BrokenProtectedFromDeletion = $Script:ShowWinADBrokenProtectedFromDeletion
Computers = $Script:ShowWinADComputer
Groups = $Script:ShowWinADGroup
Schema = $Script:ConfigurationSchema
Laps = $Script:ConfigurationLAPS
LapsACL = $Script:ConfigurationLAPSACL
LapsAndBitLocker = $Script:ConfigurationLAPSAndBitlocker
BitLocker = $Script:ConfigurationBitLocker
ServiceAccounts = $Script:ConfigurationServiceAccounts
ForestACLOwners = $Script:ConfigurationACLOwners
PasswordPolicies = $Script:ConfigurationPasswordPolicies
GlobalCatalogComparison = $Script:ConfigurationGlobalCatalogObjects
}
function Test-ADSubnet {
<#
.SYNOPSIS
Tests for overlapping subnets within the provided array of subnets.
.DESCRIPTION
This function checks for overlapping subnets within the array of subnets provided. It specifically focuses on IPv4 subnets.
.PARAMETER Subnets
Specifies an array of subnets to check for overlapping subnets.
.EXAMPLE
Test-ADSubnet -Subnets @($Subnet1, $Subnet2, $Subnet3)
Checks for overlapping subnets within the array of subnets provided.
.NOTES
This function only checks for overlapping IPv4 subnets.
#>
[cmdletBinding()]
param(
[Array] $Subnets
)
foreach ($Subnet in $Subnets) {
# we only check for IPV4, I have no clue for IPV6
if ($Subnet.Type -ne 'IPV4') {
continue
}
$SmallSubnets = $Subnets | Where-Object { $_.MaskBits -gt $Subnet.MaskBits -and $Subnet.Type -ne 'IPV4' }
foreach ($SmallSubnet in $SmallSubnets ) {
if (($SmallSubnet.Subnet.Address -band $Subnet.SubnetMask.Address) -eq $Subnet.Subnet.Address) {
[PSCustomObject]@{
Name = $Subnet.Name
SiteName = $Subnet.SiteName
SiteStatus = $Subnet.SiteStatus
SubnetRange = $Subnet.Subnet
OverlappingSubnet = $SmallSubnet.Name
OverlappingSubnetRange = $SmallSubnet.Subnet
SiteCollission = $Subnet.Name -ne $SmallSubnet.Name
}
}
}
}
}
function Test-DomainTrust {
<#
.SYNOPSIS
Test the trust relationship between two domains.
.DESCRIPTION
This function tests the trust relationship between the specified domain and a trusted domain.
.PARAMETER Domain
Specifies the domain to test the trust relationship for.
.PARAMETER TrustedDomain
Specifies the trusted domain to test the trust relationship against.
.EXAMPLE
Test-DomainTrust -Domain "contoso.com" -TrustedDomain "fabrikam.com"
Tests the trust relationship between the "contoso.com" domain and the "fabrikam.com" trusted domain.
.NOTES
Author: Your Name
Date: Date
Version: 1.0
#>
[cmdletBinding()]
param(
[string] $Domain,
[string] $TrustedDomain
)
#$DomainPDC = $ForestInformation['DomainDomainControllers'][$Domain] | Where-Object { $_.IsPDC -eq $true }
$DomainInformation = Get-WinADDomain -Domain $Domain
$DomainPDC = $DomainInformation.PdcRoleOwner.Name
$PropertiesTrustWMI = @(
'FlatName',
'SID',
'TrustAttributes',
'TrustDirection',
'TrustedDCName',
'TrustedDomain',
'TrustIsOk',
'TrustStatus',
'TrustStatusString', # TrustIsOk/TrustStatus are covered by this
'TrustType'
)
$getCimInstanceSplat = @{
ClassName = 'Microsoft_DomainTrustStatus'
Namespace = 'root\MicrosoftActiveDirectory'
ComputerName = $DomainPDC
ErrorAction = 'SilentlyContinue'
Property = $PropertiesTrustWMI
Verbose = $false
}
if ($TrustedDomain) {
$getCimInstanceSplat['Filter'] = "TrustedDomain = `"$TrustedDomain`""
}
$TrustStatatuses = Get-CimInstance @getCimInstanceSplat
if ($TrustStatatuses) {
foreach ($Status in $TrustStatatuses) {
[PSCustomObject] @{
'TrustSource' = $DomainInformation.Name
'TrustPartner' = $Status.TrustedDomain
'TrustAttributes' = if ($Status.TrustAttributes) {
Get-ADTrustAttributes -Value $Status.TrustAttributes
} else {
'Error - needs fixing'
}
'TrustStatus' = if ($null -ne $Status) {
$Status.TrustStatusString
} else {
'N/A'
}
'TrustSourceDC' = if ($null -ne $Status) {
$Status.PSComputerName
} else {
''
}
'TrustTargetDC' = if ($null -ne $Status) {
$Status.TrustedDCName.Replace('\\', '')
} else {
''
}
#'TrustOK' = if ($null -ne $Status) { $Status.TrustIsOK } else { $false }
#'TrustStatusInt' = if ($null -ne $Status) { $Status.TrustStatus } else { -1 }
}
}
} else {
[PSCustomObject] @{
'TrustSource' = $DomainInformation.Name
'TrustPartner' = $TrustedDomain
'TrustAttributes' = 'Error - needs fixing'
'TrustStatus' = 'N/A'
'TrustSourceDC' = ''
'TrustTargetDC' = ''
#'TrustOK' = $false
#'TrustStatusInt' = -1
}
}
}
function Test-LDAPCertificate {
<#
.SYNOPSIS
Test-LDAPCertificate function to verify LDAP certificate on a specified computer and port.
.DESCRIPTION
This function tests the LDAP certificate on a specified computer and port using either Basic or Kerberos authentication.
.PARAMETER Computer
Specifies the name of the computer to test the LDAP certificate.
.PARAMETER Port
Specifies the port number to test the LDAP certificate.
.PARAMETER Credential
Specifies the credentials to use for authentication.
.EXAMPLE
Test-LDAPCertificate -Computer "ldap.example.com" -Port 636 -Credential $Credential
Tests the LDAP certificate on the computer "ldap.example.com" using port 636 with specified credentials.
.NOTES
This function is based on code by ChrisDent.
#>
[CmdletBinding()]
param(
[string] $Computer,
[int] $Port,
[PSCredential] $Credential
)
$Date = Get-Date
if ($Credential) {
Write-Verbose "Test-LDAPCertificate - Certificate verification $Computer/$Port/Auth Basic"
} else {
Write-Verbose "Test-LDAPCertificate - Certificate verification $Computer/$Port/Auth Kerberos"
}
# code based on ChrisDent
$Connection = $null
$DirectoryIdentifier = [DirectoryServices.Protocols.LdapDirectoryIdentifier]::new($Computer, $Port)
if ($psboundparameters.ContainsKey("Credential")) {
$Connection = [DirectoryServices.Protocols.LdapConnection]::new($DirectoryIdentifier, $Credential.GetNetworkCredential())
$Connection.AuthType = [DirectoryServices.Protocols.AuthType]::Basic
} else {
$Connection = [DirectoryServices.Protocols.LdapConnection]::new($DirectoryIdentifier)
$Connection.AuthType = [DirectoryServices.Protocols.AuthType]::Kerberos
}
$Connection.SessionOptions.ProtocolVersion = 3
$Connection.SessionOptions.SecureSocketLayer = $true
# Declare a script level variable which can be used to return information from the delegate.
New-Variable LdapCertificate -Scope Script -Force
# Create a callback delegate to retrieve the negotiated certificate.
# Note:
# * The certificate is unlikely to return the subject.
# * The delegate is documented as using the X509Certificate type, automatically casting this to X509Certificate2 allows access to more information.
$Connection.SessionOptions.VerifyServerCertificate = {
param(
[DirectoryServices.Protocols.LdapConnection]$Connection,
[Security.Cryptography.X509Certificates.X509Certificate2]$Certificate
)
$Script:LdapCertificate = $Certificate
return $true
}
$State = $true
try {
$Connection.Bind()
$ErrorMessage = ''
} catch {
$State = $false
$ErrorMessage = $_.Exception.Message.Trim()
}
$KeyExchangeAlgorithm = @{
# https://docs.microsoft.com/en-us/dotnet/api/system.security.authentication.exchangealgorithmtype?view=netcore-3.1
'0' = 'None' # No key exchange algorithm is used.
'43522' = 'DiffieHellman' # The Diffie Hellman ephemeral key exchange algorithm.
'41984' = 'RsaKeyX' # The RSA public-key exchange algorithm.
'9216' = 'RsaSign' # The RSA public-key signature algorithm.
'44550' = 'ECDH_Ephem'
}
if ($Script:LdapCertificate.NotBefore -is [DateTime]) {
$X509NotBeforeDays = (New-TimeSpan -Start $Date -End $Script:LdapCertificate.NotBefore).Days
} else {
$X509NotBeforeDays = $null
}
if ($Script:LdapCertificate.NotAfter -is [DateTime]) {
$X509NotAfterDays = (New-TimeSpan -Start $Date -End $Script:LdapCertificate.NotAfter).Days
} else {
$X509NotAfterDays = $null
}
$Certificate = [ordered]@{
State = $State
X509NotBeforeDays = $X509NotBeforeDays
X509NotAfterDays = $X509NotAfterDays
X509DnsNameList = $Script:LdapCertificate.DnsNameList.Unicode
X509NotBefore = $Script:LdapCertificate.NotBefore
X509NotAfter = $Script:LdapCertificate.NotAfter
AlgorithmIdentifier = $Connection.SessionOptions.SslInformation.AlgorithmIdentifier
CipherStrength = $Connection.SessionOptions.SslInformation.CipherStrength
X509FriendlyName = $Script:LdapCertificate.FriendlyName
X509SendAsTrustedIssuer = $Script:LdapCertificate.SendAsTrustedIssuer
X509SerialNumber = $Script:LdapCertificate.SerialNumber
X509Thumbprint = $Script:LdapCertificate.Thumbprint
X509SubjectName = $Script:LdapCertificate.Subject
X509Issuer = $Script:LdapCertificate.Issuer
X509HasPrivateKey = $Script:LdapCertificate.HasPrivateKey
X509Version = $Script:LdapCertificate.Version
X509Archived = $Script:LdapCertificate.Archived
Protocol = $Connection.SessionOptions.SslInformation.Protocol
Hash = $Connection.SessionOptions.SslInformation.Hash
HashStrength = $Connection.SessionOptions.SslInformation.HashStrength
KeyExchangeAlgorithm = $KeyExchangeAlgorithm["$($Connection.SessionOptions.SslInformation.KeyExchangeAlgorithm)"]
ExchangeStrength = $Connection.SessionOptions.SslInformation.ExchangeStrength
ErrorMessage = $ErrorMessage
}
$Certificate
}
function Test-LDAPPorts {
<#
.SYNOPSIS
Tests the connectivity to an LDAP server using the specified parameters.
.DESCRIPTION
This function tests the connectivity to an LDAP server by attempting to establish a connection using the provided server name, port, and optional credentials.
.PARAMETER ServerName
Specifies the name of the LDAP server to test connectivity.
.PARAMETER Port
Specifies the port number on the LDAP server to test connectivity.
.PARAMETER Credential
Specifies the credentials to use for authentication when testing the LDAP server. Optional.
.PARAMETER Identity
Specifies the user to search for using an LDAP query by objectGUID, objectSID, SamAccountName, UserPrincipalName, Name, or DistinguishedName.
.EXAMPLE
Test-LDAPPorts -ServerName 'SomeServer' -Port 3269 -Credential (Get-Credential)
Tests the connectivity to the LDAP server 'SomeServer' on port 3269 using provided credentials.
.EXAMPLE
Test-LDAPPorts -ServerName 'SomeServer' -Port 3269
Tests the connectivity to the LDAP server 'SomeServer' on port 3269 without specifying credentials.
.NOTES
Ensure that the necessary permissions and network access are in place to perform LDAP server connectivity testing.
#>
[CmdletBinding()]
param(
[string] $ServerName,
[int] $Port,
[pscredential] $Credential,
[string] $Identity
)
if ($ServerName -and $Port -ne 0) {
Write-Verbose "Test-LDAPPorts - Processing $ServerName / $Port"
try {
$LDAP = "LDAP://" + $ServerName + ':' + $Port
if ($Credential) {
$Connection = [ADSI]::new($LDAP, $Credential.UserName, $Credential.GetNetworkCredential().Password)
} else {
$Connection = [ADSI]($LDAP)
}
$Connection.Close()
$ReturnData = [ordered] @{
Computer = $ServerName
Port = $Port
Status = $true
ErrorMessage = ''
}
} catch {
$ErrorMessage = $($_.Exception.Message) -replace [System.Environment]::NewLine
if ($_.Exception.ToString() -match "The server is not operational") {
Write-Warning "Test-LDAPPorts - Can't open $ServerName`:$Port. Error: $ErrorMessage"
} elseif ($_.Exception.ToString() -match "The user name or password is incorrect") {
Write-Warning "Test-LDAPPorts - Current user ($Env:USERNAME) doesn't seem to have access to to LDAP on port $ServerName`:$Port. Error: $ErrorMessage"
} else {
Write-Warning -Message "Test-LDAPPorts - Error: $ErrorMessage"
}
$ReturnData = [ordered] @{
Computer = $ServerName
Port = $Port
Status = $false
ErrorMessage = $ErrorMessage
}
}
if ($Identity) {
if ($ReturnData.Status -eq $true) {
try {
Write-Verbose "Test-LDAPPorts - Processing $ServerName / $Port / $Identity"
$LDAP = "LDAP://" + $ServerName + ':' + $Port
if ($Credential) {
$Connection = [ADSI]::new($LDAP, $Credential.UserName, $Credential.GetNetworkCredential().Password)
} else {
$Connection = [ADSI]($LDAP)
}
$Searcher = [System.DirectoryServices.DirectorySearcher]$Connection
$Searcher.Filter = "(|(DistinguishedName=$Identity)(Name=$Identity)(SamAccountName=$Identity)(UserPrincipalName=$Identity)(objectGUID=$Identity)(objectSid=$Identity))"
$SearchResult = $Searcher.FindOne()
#$SearchResult
if ($SearchResult) {
$UserFound = $true
} else {
$UserFound = $false
}
$ReturnData['Identity'] = $Identity
$ReturnData['IdentityStatus'] = $UserFound
$ReturnData['IdentityData'] = $SearchResult
$ReturnData['IdentityErrorMessage'] = if ($UserFound) {
''
} else {
"Connection succeeded, but user not found"
}
$Connection.Close()
} catch {
$ErrorMessage = $($_.Exception.Message) -replace [System.Environment]::NewLine
if ($_.Exception.ToString() -match "The server is not operational") {
Write-Warning "Test-LDAPPorts - Can't open $ServerName`:$Port. Error: $ErrorMessage"
} elseif ($_.Exception.ToString() -match "The user name or password is incorrect") {
Write-Warning "Test-LDAPPorts - Current user ($Env:USERNAME) doesn't seem to have access to to LDAP on port $ServerName`:$Port. Error: $ErrorMessage"
} else {
Write-Warning -Message "Test-LDAPPorts - Error: $ErrorMessage"
}
$ReturnData['Identity'] = $Identity
$ReturnData['IdentityStatus'] = $false
$ReturnData['IdentityData'] = $null
$ReturnData['IdentityErrorMessage'] = $ErrorMessage
}
} else {
$ReturnData['Identity'] = $Identity
$ReturnData['IdentityStatus'] = $false
$ReturnData['IdentityData'] = $null
$ReturnData['IdentityErrorMessage'] = $ReturnData.ErrorMessage
}
}
[PSCustomObject] $ReturnData
}
}
function Test-LdapServer {
<#
.SYNOPSIS
Test the LDAP server ports for connectivity.
.DESCRIPTION
This function tests the LDAP server ports for connectivity using specified parameters.
.PARAMETER ServerName
The name of the LDAP server to test.
.PARAMETER Computer
The computer name.
.PARAMETER Advanced
An advanced object.
.PARAMETER GCPortLDAP
The port number for Global Catalog LDAP (default: 3268).
.PARAMETER GCPortLDAPSSL
The port number for Global Catalog LDAP SSL (default: 3269).
.PARAMETER PortLDAP
The LDAP port number (default: 389).
.PARAMETER PortLDAPS
The LDAPS port number (default: 636).
.PARAMETER VerifyCertificate
Switch to verify the certificate.
.PARAMETER Credential
The credential to use for testing.
.PARAMETER Identity
The identity for testing.
.PARAMETER SkipCheckGC
Switch to skip checking Global Catalog.
.PARAMETER RetryCount
The number of retries for testing.
.PARAMETER CertificateIncludeDomainName
The certificate must include the specified domain name.
.EXAMPLE
Test-LdapServer -ServerName "ldap.contoso.com" -Computer "MyComputer" -GCPortLDAP 3268 -GCPortLDAPSSL 3269 -PortLDAP 389 -PortLDAPS 636 -VerifyCertificate -Credential $cred -Identity "TestUser" -SkipCheckGC -RetryCount 3
Tests the LDAP server ports for connectivity with specified parameters.
.NOTES
Ensure that the necessary permissions are in place to perform the LDAP server port testing.
#>
[cmdletBinding()]
param(
[string] $ServerName,
[string] $Computer,
[PSCustomObject] $Advanced,
[int] $GCPortLDAP = 3268,
[int] $GCPortLDAPSSL = 3269,
[int] $PortLDAP = 389,
[int] $PortLDAPS = 636,
[switch] $VerifyCertificate,
[PSCredential] $Credential,
[string] $Identity,
[switch] $SkipCheckGC,
[int] $RetryCount,
[Array] $CertificateIncludeDomainName
)
$RetryCountList = [System.Collections.Generic.List[int]]::new()
$ScriptRetryCount = $RetryCount
$testLDAPPortsSplat = @{
ServerName = $ServerName
Port = $GCPortLDAP
Identity = $Identity
}
if ($PSBoundParameters.ContainsKey('Credential')) {
$testLDAPPortsSplat.Credential = $Credential
}
if (-not $SkipCheckGC) {
if ($Advanced -and $Advanced.IsGlobalCatalog -or -not $Advanced) {
# Test GC LDAP Port
$testLDAPPortsSplat['Port'] = $GCPortLDAP
# Reset RetryCount
$RetryCount = $ScriptRetryCount
Do {
$GlobalCatalogNonSSL = Test-LDAPPorts @testLDAPPortsSplat
if ($GlobalCatalogNonSSL.Status -eq $false -or $GlobalCatalogNonSSL.IdentityStatus -eq $false) {
if ($RetryCount -le 0) {
break
}
$RetryCount--
}
} until ($GlobalCatalogNonSSL.Status -eq $true -and ($GlobalCatalogNonSSL.IdentityStatus -eq $true -or $null -eq $GlobalCatalogNonSSL.IdentityStatus))
$RetryCountList.Add($ScriptRetryCount - $RetryCount)
# # Test GC LDAPS Port
if ($ServerName -notlike '*.*') {
# querying SSL won't work for non-fqdn, we check if after all our checks it's string with dot.
$GlobalCatalogSSL = [PSCustomObject] @{ Status = $false; ErrorMessage = 'No FQDN' }
} else {
$testLDAPPortsSplat['Port'] = $GCPortLDAPSSL
# Reset RetryCount
$RetryCount = $ScriptRetryCount
Do {
$GlobalCatalogSSL = Test-LDAPPorts @testLDAPPortsSplat
if ($GlobalCatalogSSL.Status -eq $false -or $GlobalCatalogSSL.IdentityStatus -eq $false) {
if ($RetryCount -le 0) {
break
}
$RetryCount--
}
} until ($GlobalCatalogSSL.Status -eq $true -and ($GlobalCatalogSSL.IdentityStatus -eq $true -or $null -eq $GlobalCatalogSSL.IdentityStatus))
$RetryCountList.Add($ScriptRetryCount - $RetryCount)
}
} else {
$GlobalCatalogSSL = [PSCustomObject] @{ Status = $null; ErrorMessage = 'Not Global Catalog' }
$GlobalCatalogNonSSL = [PSCustomObject] @{ Status = $null; ErrorMessage = 'Not Global Catalog' }
}
} else {
$GlobalCatalogSSL = [PSCustomObject] @{ Status = $null; ErrorMessage = 'Not Global Catalog' }
$GlobalCatalogNonSSL = [PSCustomObject] @{ Status = $null; ErrorMessage = 'Not Global Catalog' }
}
$testLDAPPortsSplat['Port'] = $PortLDAP
# Reset RetryCount
$RetryCount = $ScriptRetryCount
Do {
$ConnectionLDAP = Test-LDAPPorts @testLDAPPortsSplat
if ($ConnectionLDAP.Status -eq $false -or $ConnectionLDAP.IdentityStatus -eq $false) {
$RetryCount--
if ($RetryCount -le 0) {
break
}
}
} until ($ConnectionLDAP.Status -eq $true -and ($ConnectionLDAP.IdentityStatus -eq $true -or $null -eq $ConnectionLDAP.IdentityStatus))
$RetryCountList.Add($ScriptRetryCount - $RetryCount)
$RetryCount = $ScriptRetryCount
if ($ServerName -notlike '*.*') {
# querying SSL won't work for non-fqdn, we check if after all our checks it's string with dot.
$ConnectionLDAPS = [PSCustomObject] @{ Status = $false; ErrorMessage = 'No FQDN' }
} else {
$testLDAPPortsSplat['Port'] = $PortLDAPS
Do {
$ConnectionLDAPS = Test-LDAPPorts @testLDAPPortsSplat
if ($ConnectionLDAPS.Status -eq $false -or $ConnectionLDAPS.IdentityStatus -eq $false) {
if ($RetryCount -le 0) {
break
}
$RetryCount--
}
} until ($ConnectionLDAPS.Status -eq $true -and ($ConnectionLDAPS.IdentityStatus -eq $true -or $null -eq $ConnectionLDAPS.IdentityStatus))
$RetryCountList.Add($ScriptRetryCount - $RetryCount)
}
$PortsThatWork = @(
if ($GlobalCatalogNonSSL.Status) {
$GCPortLDAP
}
if ($GlobalCatalogSSL.Status) {
$GCPortLDAPSSL
}
if ($ConnectionLDAP.Status) {
$PortLDAP
}
if ($ConnectionLDAPS.Status) {
$PortLDAPS
}
) | Sort-Object
$PortsIdentityStatus = @(
if ($GlobalCatalogNonSSL.IdentityStatus) {
$GCPortLDAP
}
if ($GlobalCatalogSSL.IdentityStatus) {
$GCPortLDAPSSL
}
if ($ConnectionLDAP.IdentityStatus) {
$PortLDAP
}
if ($ConnectionLDAPS.IdentityStatus) {
$PortLDAPS
}
) | Sort-Object
$ListIdentityStatus = @(
$GlobalCatalogSSL.IdentityStatus
$GlobalCatalogNonSSL.IdentityStatus
$ConnectionLDAP.IdentityStatus
$ConnectionLDAPS.IdentityStatus
)
if ($ListIdentityStatus -contains $false) {
$IsIdentical = $false
} else {
$IsIdentical = $true
}
if ($VerifyCertificate) {
$testLDAPCertificateSplat = @{
Computer = $ServerName
Port = $PortLDAPS
}
if ($PSBoundParameters.ContainsKey("Credential")) {
$testLDAPCertificateSplat.Credential = $Credential
}
# Reset RetryCount
$RetryCount = $ScriptRetryCount
Do {
$Certificate = Test-LDAPCertificate @testLDAPCertificateSplat
if ($Certificate.State -eq $false) {
if ($RetryCount -le 0) {
break
}
$RetryCount--
}
} until ($Certificate.State -eq $true)
$RetryCountList.Add($ScriptRetryCount - $RetryCount)
if (-not $SkipCheckGC) {
if (-not $Advanced -or $Advanced.IsGlobalCatalog) {
$testLDAPCertificateSplat['Port'] = $GCPortLDAPSSL
# Reset RetryCount
$RetryCount = $ScriptRetryCount
Do {
$CertificateGC = Test-LDAPCertificate @testLDAPCertificateSplat
if ($CertificateGC.State -eq $false) {
if ($RetryCount -le 0) {
break
}
$RetryCount--
}
} until ($CertificateGC.State -eq $true)
$RetryCountList.Add($ScriptRetryCount - $RetryCount)
} else {
$CertificateGC = [PSCustomObject] @{ Status = 'N/A'; ErrorMessage = 'Not Global Catalog' }
}
}
}
if ($VerifyCertificate) {
$Output = [ordered] @{
Computer = $ServerName
Site = $Advanced.Site
IsRO = $Advanced.IsReadOnly
IsGC = $Advanced.IsGlobalCatalog
StatusDate = $null
StatusPorts = $null
StatusIdentity = $null
AvailablePorts = $PortsThatWork -join ','
X509NotBeforeDays = $null
X509NotAfterDays = $null
X509DnsNameStatus = $null
X509DnsNameList = $null
GlobalCatalogLDAP = $GlobalCatalogNonSSL.Status
GlobalCatalogLDAPS = $GlobalCatalogSSL.Status
GlobalCatalogLDAPSBind = $null
LDAP = $ConnectionLDAP.Status
LDAPS = $ConnectionLDAPS.Status
LDAPSBind = $null
Identity = $Identity
IdentityStatus = $IsIdentical
IdentityAvailablePorts = $PortsIdentityStatus -join ','
IdentityData = $null
IdentityErrorMessage = $null
IdentityGCLDAP = $GlobalCatalogNonSSL.IdentityStatus
IdentityGCLDAPS = $GlobalCatalogSSL.IdentityStatus
IdentityLDAP = $ConnectionLDAP.IdentityStatus
IdentityLDAPS = $ConnectionLDAPS.IdentityStatus
OperatingSystem = $Advanced.OperatingSystem
IPV4Address = $Advanced.IPV4Address
IPV6Address = $Advanced.IPV6Address
X509NotBefore = $null
X509NotAfter = $null
AlgorithmIdentifier = $null
CipherStrength = $null
X509FriendlyName = $null
X509SendAsTrustedIssuer = $null
X509SerialNumber = $null
X509Thumbprint = $null
X509SubjectName = $null
X509Issuer = $null
X509HasPrivateKey = $null
X509Version = $null
X509Archived = $null
Protocol = $null
Hash = $null
HashStrength = $null
KeyExchangeAlgorithm = $null
ExchangeStrength = $null
ErrorMessage = $null
RetryCount = $RetryCountList -join ','
}
} else {
$Output = [ordered] @{
Computer = $ServerName
Site = $Advanced.Site
IsRO = $Advanced.IsReadOnly
IsGC = $Advanced.IsGlobalCatalog
StatusDate = $null
StatusPorts = $null
StatusIdentity = $null
AvailablePorts = $PortsThatWork -join ','
GlobalCatalogLDAP = $GlobalCatalogNonSSL.Status
GlobalCatalogLDAPS = $GlobalCatalogSSL.Status
GlobalCatalogLDAPSBind = $null
LDAP = $ConnectionLDAP.Status
LDAPS = $ConnectionLDAPS.Status
LDAPSBind = $null
Identity = $Identity
IdentityStatus = $IsIdentical
IdentityAvailablePorts = $PortsIdentityStatus -join ','
IdentityData = $null
IdentityErrorMessage = $null
OperatingSystem = $Advanced.OperatingSystem
IPV4Address = $Advanced.IPV4Address
IPV6Address = $Advanced.IPV6Address
ErrorMessage = $null
RetryCount = $RetryCountList -join ','
}
}
if ($VerifyCertificate) {
$Output['LDAPSBind'] = $Certificate.State
$Output['GlobalCatalogLDAPSBind'] = $CertificateGC.State
$Output['X509NotBeforeDays'] = $Certificate['X509NotBeforeDays']
$Output['X509NotAfterDays'] = $Certificate['X509NotAfterDays']
$Output['X509DnsNameList'] = $Certificate['X509DnsNameList']
$Output['X509NotBefore'] = $Certificate['X509NotBefore']
$Output['X509NotAfter'] = $Certificate['X509NotAfter']
$Output['AlgorithmIdentifier'] = $Certificate['AlgorithmIdentifier']
$Output['CipherStrength'] = $Certificate['CipherStrength']
$Output['X509FriendlyName'] = $Certificate['X509FriendlyName']
$Output['X509SendAsTrustedIssuer'] = $Certificate['X509SendAsTrustedIssuer']
$Output['X509SerialNumber'] = $Certificate['X509SerialNumber']
$Output['X509Thumbprint'] = $Certificate['X509Thumbprint']
$Output['X509SubjectName'] = $Certificate['X509SubjectName']
$Output['X509Issuer'] = $Certificate['X509Issuer']
$Output['X509HasPrivateKey'] = $Certificate['X509HasPrivateKey']
$Output['X509Version'] = $Certificate['X509Version']
$Output['X509Archived'] = $Certificate['X509Archived']
$Output['Protocol'] = $Certificate['Protocol']
$Output['Hash'] = $Certificate['Hash']
$Output['HashStrength'] = $Certificate['HashStrength']
$Output['KeyExchangeAlgorithm'] = $Certificate['KeyExchangeAlgorithm']
$Output['ExchangeStrength'] = $Certificate['ExchangeStrength']
[Array] $X509DnsNameStatus = foreach ($Name in $CertificateIncludeDomainName) {
if ($Output['X509DnsNameList'] -contains $Name) {
$true
} else {
$false
}
}
$Output['X509DnsNameStatus'] = if ($X509DnsNameStatus -notcontains $false) {
"OK"
} else {
"Failed"
}
} else {
$Output.Remove('LDAPSBind')
$Output.Remove('GlobalCatalogLDAPSBind')
}
$GlobalErrorMessage = @(
if ($GlobalCatalogNonSSL.ErrorMessage) {
$GlobalCatalogNonSSL.ErrorMessage
}
if ($GlobalCatalogSSL.ErrorMessage) {
$GlobalCatalogSSL.ErrorMessage
}
if ($ConnectionLDAP.ErrorMessage) {
$ConnectionLDAP.ErrorMessage
}
if ($ConnectionLDAPS.ErrorMessage) {
$ConnectionLDAPS.ErrorMessage
}
if ($Certificate.ErrorMessage) {
$Certificate.ErrorMessage
}
if ($CertificateGC.ErrorMessage) {
$CertificateGC.ErrorMessage
}
)
if ($GlobalErrorMessage.Count -gt 0) {
$Output['ErrorMessage'] = ($GlobalErrorMessage | Sort-Object -Unique) -join ', '
}
if ($Identity) {
$Output['IdentityData'] = $ConnectionLDAP.IdentityData
$IdentityErrorMessages = @(
if ($GlobalCatalogNonSSL.IdentityErrorMessage) {
$GlobalCatalogNonSSL.IdentityErrorMessage
}
if ($GlobalCatalogSSL.IdentityErrorMessage) {
$GlobalCatalogSSL.IdentityErrorMessage
}
if ($ConnectionLDAP.IdentityErrorMessage) {
$ConnectionLDAP.IdentityErrorMessage
}
if ($ConnectionLDAPS.IdentityErrorMessage) {
$ConnectionLDAPS.IdentityErrorMessage
}
)
if ($IdentityErrorMessages.Count -gt 0) {
$Output['IdentityErrorMessage'] = ($IdentityErrorMessages | Sort-Object -Unique) -join ', '
}
} else {
$Output.Remove('Identity')
$Output.Remove('IdentityStatus')
$Output.Remove("StatusIdentity")
$Output.Remove('IdentityAvailablePorts')
$Output.Remove('IdentityData')
$Output.Remove('IdentityErrorMessage')
$Output.Remove('IdentityGCLDAP')
$Output.Remove('IdentityGCLDAPS')
$Output.Remove('IdentityLDAP')
$Output.Remove('IdentityLDAPS')
}
if (-not $Advanced) {
$Output.Remove('IPV4Address')
$Output.Remove('OperatingSystem')
$Output.Remove('IPV6Address')
$Output.Remove('Site')
$Output.Remove('IsRO')
$Output.Remove('IsGC')
}
# lets return the objects if required
if ($Extended) {
$Output['GlobalCatalogSSL'] = $GlobalCatalogSSL
$Output['GlobalCatalogNonSSL'] = $GlobalCatalogNonSSL
$Output['ConnectionLDAP'] = $ConnectionLDAP
$Output['ConnectionLDAPS'] = $ConnectionLDAPS
$Output['Certificate'] = $Certificate
$Output['CertificateGC'] = $CertificateGC
}
if (-not $VerifyCertificate) {
$StatusDate = 'Not available'
} elseif ($VerifyCertificate -and $Output.X509NotAfterDays -lt 0) {
$StatusDate = 'Failed'
} else {
$StatusDate = 'OK'
}
if ($Output.IsGC) {
if ($Output.GlobalCatalogLDAP -eq $true -and $Output.GlobalCatalogLDAPS -eq $true -and $Output.LDAP -eq $true -and $Output.LDAPS -eq $true) {
if ($VerifyCertificate) {
if ($Output.LDAPSBind -eq $true -and $Output.GlobalCatalogLDAPSBind -eq $true) {
$StatusPorts = 'OK'
} else {
$StatusPorts = 'Failed'
}
} else {
$StatusPorts = 'OK'
}
} else {
$StatusPorts = 'Failed'
}
} else {
if ($Output.LDAP -eq $true -and $Output.LDAPS -eq $true) {
if ($VerifyCertificate) {
if ($Output.LDAPSBind -eq $true) {
$StatusPorts = 'OK'
} else {
$StatusPorts = 'Failed'
}
} else {
$StatusPorts = 'OK'
}
} else {
$StatusPorts = 'Failed'
}
}
if ($Identity) {
if ($null -eq $Output.IdentityStatus) {
$StatusIdentity = 'Not available'
} elseif ($Output.IdentityStatus -eq $true) {
$StatusIdentity = 'OK'
} else {
$StatusIdentity = 'Failed'
}
$Output['StatusIdentity'] = $StatusIdentity
}
$Output['StatusDate'] = $StatusDate
$Output['StatusPorts'] = $StatusPorts
[PSCustomObject] $Output
}
function Add-ADACL {
<#
.SYNOPSIS
Adds an access control entry (ACE) to one or more Active Directory objects or security principals.
.DESCRIPTION
The Add-ADACL function allows you to add an ACE to Active Directory objects or security principals. It provides flexibility to specify the object, ACL, principal, access rule, access control type, object type, inherited object type, inheritance type, and NT security descriptor.
.PARAMETER ADObject
Specifies the Active Directory object to which the ACE will be added.
.PARAMETER ACL
Specifies the access control list (ACL) to be added.
.PARAMETER Principal
Specifies the security principal to which the ACE applies.
.PARAMETER AccessRule
Specifies the access rights granted by the ACE.
.PARAMETER AccessControlType
Specifies whether the ACE allows or denies access.
.PARAMETER ObjectType
Specifies the type of object to which the ACE applies.
.PARAMETER InheritedObjectType
Specifies the type of inherited object to which the ACE applies.
.PARAMETER InheritanceType
Specifies the inheritance type for the ACE.
.PARAMETER NTSecurityDescriptor
Specifies the NT security descriptor for the ACE.
.PARAMETER ActiveDirectoryAccessRule
Specifies the Active Directory access rule to be added.
.EXAMPLE
Add-ADACL -ADObject 'CN=TestUser,OU=Users,DC=contoso,DC=com' -Principal 'Contoso\HRAdmin' -AccessRule 'Read' -AccessControlType 'Allow' -ObjectType 'User' -InheritedObjectType 'Group' -InheritanceType 'All' -NTSecurityDescriptor $NTSecurityDescriptor
This example adds an ACE to the 'TestUser' object in the 'Users' OU, granting 'Read' access to the 'HRAdmin' security principal.
.EXAMPLE
Add-ADACL -ACL $ACL -Principal 'Contoso\FinanceAdmin' -AccessRule 'Write' -AccessControlType 'Allow' -ObjectType 'Group' -InheritedObjectType 'User' -InheritanceType 'None' -NTSecurityDescriptor $NTSecurityDescriptor
This example adds an ACE from the specified ACL to the 'FinanceAdmin' security principal, granting 'Write' access.
.NOTES
Ensure that the necessary permissions are in place to modify the security settings of the specified objects or principals.
#>
[cmdletBinding(SupportsShouldProcess, DefaultParameterSetName = 'ADObject')]
param(
[parameter(Mandatory, ParameterSetName = 'ActiveDirectoryAccessRule')]
[Parameter(Mandatory, ParameterSetName = 'ADObject')][alias('Identity')][string] $ADObject,
[Parameter(Mandatory, ParameterSetName = 'ACL')][Array] $ACL,
[Parameter(Mandatory, ParameterSetName = 'ACL')]
[Parameter(Mandatory, ParameterSetName = 'ADObject')]
[string] $Principal,
[Parameter(Mandatory, ParameterSetName = 'ACL')]
[Parameter(Mandatory, ParameterSetName = 'ADObject')]
[alias('ActiveDirectoryRights')][System.DirectoryServices.ActiveDirectoryRights] $AccessRule,
[Parameter(Mandatory, ParameterSetName = 'ACL')]
[Parameter(Mandatory, ParameterSetName = 'ADObject')]
[System.Security.AccessControl.AccessControlType] $AccessControlType,
[Parameter(ParameterSetName = 'ACL')]
[Parameter(ParameterSetName = 'ADObject')]
[alias('ObjectTypeName')][string] $ObjectType,
[Parameter(ParameterSetName = 'ACL')]
[Parameter(ParameterSetName = 'ADObject')]
[alias('InheritedObjectTypeName')][string] $InheritedObjectType,
[Parameter(ParameterSetName = 'ACL')]
[Parameter(ParameterSetName = 'ADObject')]
[alias('ActiveDirectorySecurityInheritance')][nullable[System.DirectoryServices.ActiveDirectorySecurityInheritance]] $InheritanceType,
[parameter(ParameterSetName = 'ADObject', Mandatory = $false)]
[parameter(ParameterSetName = 'ACL', Mandatory = $false)]
[parameter(ParameterSetName = 'ActiveDirectoryAccessRule', Mandatory = $false)]
[alias('ActiveDirectorySecurity')][System.DirectoryServices.ActiveDirectorySecurity] $NTSecurityDescriptor,
[parameter(ParameterSetName = 'ActiveDirectoryAccessRule', Mandatory = $true)]
[System.DirectoryServices.ActiveDirectoryAccessRule] $ActiveDirectoryAccessRule
)
if (-not $Script:ForestDetails) {
Write-Verbose "Add-ADACL - Gathering Forest Details"
$Script:ForestDetails = Get-WinADForestDetails
}
if ($PSBoundParameters.ContainsKey('ActiveDirectoryAccessRule')) {
if (-not $ntSecurityDescriptor) {
$ntSecurityDescriptor = Get-PrivateACL -ADObject $ADObject
}
if (-not $NTSecurityDescriptor) {
Write-Warning -Message "Add-ADACL - No NTSecurityDescriptor provided and ADObject not found"
return
}
$addPrivateACLSplat = @{
ActiveDirectoryAccessRule = $ActiveDirectoryAccessRule
ADObject = $ADObject
ntSecurityDescriptor = $ntSecurityDescriptor
WhatIf = $WhatIfPreference
}
Add-PrivateACL @addPrivateACLSplat
} elseif ($PSBoundParameters.ContainsKey('NTSecurityDescriptor')) {
$addPrivateACLSplat = @{
ntSecurityDescriptor = $ntSecurityDescriptor
ADObject = $ADObject
Principal = $Principal
WhatIf = $WhatIfPreference
AccessRule = $AccessRule
AccessControlType = $AccessControlType
ObjectType = $ObjectType
InheritedObjectType = $InheritedObjectType
InheritanceType = if ($InheritanceType) {
$InheritanceType
} else {
$null
}
}
Add-PrivateACL @addPrivateACLSplat
} elseif ($PSBoundParameters.ContainsKey('ADObject')) {
foreach ($Object in $ADObject) {
$MYACL = Get-ADACL -ADObject $Object -Verbose -NotInherited -Bundle
$addPrivateACLSplat = @{
ACL = $MYACL
ADObject = $Object
Principal = $Principal
WhatIf = $WhatIfPreference
AccessRule = $AccessRule
AccessControlType = $AccessControlType
ObjectType = $ObjectType
InheritedObjectType = $InheritedObjectType
InheritanceType = if ($InheritanceType) {
$InheritanceType
} else {
$null
}
NTSecurityDescriptor = $MYACL.ACL
}
Add-PrivateACL @addPrivateACLSplat
}
} elseif ($PSBoundParameters.ContainsKey('ACL')) {
foreach ($SubACL in $ACL) {
$addPrivateACLSplat = @{
ACL = $SubACL
Principal = $Principal
WhatIf = $WhatIfPreference
AccessRule = $AccessRule
AccessControlType = $AccessControlType
ObjectType = $ObjectType
InheritedObjectType = $InheritedObjectType
InheritanceType = if ($InheritanceType) {
$InheritanceType
} else {
$null
}
NTSecurityDescriptor = $SubACL.ACL
}
Add-PrivateACL @addPrivateACLSplat
}
}
}
function Compare-PingCastleReport {
<#
.SYNOPSIS
Compares two PingCastle reports and outputs the differences.
.DESCRIPTION
This script takes two PingCastle XML reports as input and compares them to identify any changes or differences in the security posture between the two reports.
It can highlight improvements, regressions, or unchanged aspects of the security assessment.
.PARAMETER FilePathBefore
The file path to the PingCastle report that represents the earlier state of the security assessment.
.PARAMETER FilePathAfter
The file path to the PingCastle report that represents the later state of the security assessment.
.PARAMETER Status
Specifies whether to filter the output based on the status of the findings.
Possible values are "Points", "Rationale", "Points&Rationale", "Same", "New", "Removed", "All".
If not specified, all changes will be shown.
.PARAMETER Advanced
A switch parameter that, when used, provides a more detailed comparison of the reports, including minor changes that might not be significant in a high-level overview.
.EXAMPLE
Compare-PingCastleReport -FilePathBefore "report_before.xml" -FilePathAfter "report_after.xml"
This example compares two PingCastle reports and outputs the differences between them.
.EXAMPLE
Compare-PingCastleReport -FilePathBefore "report_before.xml" -FilePathAfter "report_after.xml" -Status Improved
This example shows only the improvements in the security posture between two PingCastle reports.
.NOTES
This script requires that both input files are in the XML format generated by PingCastle. Ensure that the reports are from the same domain for a meaningful comparison.
#>
[CmdletBinding()]
param(
[string] $FilePathBefore,
[string] $FilePathAfter,
[ValidateSet("Points", "Rationale", "Points&Rationale", "Same", "New", "Removed", "All")]
[string[]] $Status,
[switch] $Advanced
)
$PingCastleOutput1 = Get-PingCastleReport -FilePath $FilePathBefore
$PingCastleOutput2 = Get-PingCastleReport -FilePath $FilePathAfter
if (-not $PingCastleOutput1 -or -not $PingCastleOutput2) {
Write-Warning -Message "Compare-PingCastleReport - One of the reports is missing. Cannot compare. "
return
}
if ($PingCastleOutput1.DomainName -ne $PingCastleOutput2.DomainName) {
Write-Warning -Message "Compare-PingCastleReport - Domains are different. Cannot compare. "
return
}
$Summary = @(
# find differences
foreach ($RiskID in $PingCastleOutput1.RisksIds.Keys) {
$Risk1 = $PingCastleOutput1.RisksIds[$RiskID]
$Risk2 = $PingCastleOutput2.RisksIds[$RiskID]
if ($Risk1.Points -ne $Risk2.Points -or $Risk1.Rationale -ne $Risk2.Rationale) {
[PSCustomObject] @{
DomainName = $PingCastleOutput1.DomainName
RiskId = $RiskID
Category = $Risk2.Category
DateDifference = ($PingCastleOutput2.DateScan - $PingCastleOutput1.DateScan).Days
Status = if ($Risk1.Points -ne $Risk2.Points -and $Risk1.Rationale -ne $Risk2.Rationale) {
"Points&Rationale"
} elseif ($Risk1.Points -ne $Risk2.Points) {
"Points"
} else {
"Rationale"
}
PointsBefore = $Risk1.Points
PointsAfter = $Risk2.Points
PointsDiff = $Risk2.Points - $Risk1.Points
RationaleBefore = $Risk1.Rationale
RationaleAfter = $Risk2.Rationale
}
} else {
[PSCustomObject] @{
DomainName = $PingCastleOutput1.DomainName
RiskId = $RiskID
Category = $Risk1.Category
DateDifference = ($PingCastleOutput2.DateScan - $PingCastleOutput1.DateScan).Days
Status = "Same"
PointsBefore = $Risk1.Points
PointsAfter = $Risk2.Points
PointsDiff = 0
RationaleBefore = $Risk1.rationale
RationaleAfter = $Risk2.Rationale
}
}
}
# find if there are any new risks
foreach ($RiskID in $PingCastleOutput2.RisksIds.Keys) {
$Risk1 = $PingCastleOutput1.RisksIds[$RiskID]
$Risk2 = $PingCastleOutput2.RisksIds[$RiskID]
if (-not $Risk1) {
[PSCustomObject] @{
DomainName = $PingCastleOutput1.DomainName
RiskId = $RiskID
Category = $Risk2.Category
DateDifference = ($PingCastleOutput2.DateScan - $PingCastleOutput1.DateScan).Days
Status = "New"
PointsBefore = 0
PointsAfter = $Risk2.Points
PointsDiff = $Risk2.Points
RationaleBefore = ""
RationaleAfter = $Risk2.Rationale
}
}
}
# find if there are any removed risks
foreach ($RiskID in $PingCastleOutput1.RisksIds.Keys) {
$Risk1 = $PingCastleOutput1.RisksIds[$RiskID]
$Risk2 = $PingCastleOutput2.RisksIds[$RiskID]
if (-not $Risk2) {
[PSCustomObject] @{
DomainName = $PingCastleOutput1.DomainName
RiskId = $RiskID
Category = $Risk1.Category
DateDifference = ($PingCastleOutput2.DateScan - $PingCastleOutput1.DateScan).Days
Status = "Removed"
PointsBefore = $Risk1.Points
PointsAfter = 0
PointsDiff = 0 - $Risk1.Points
RationaleBefore = $Risk1.Rationale
RationaleAfter = ""
}
}
}
)
if ($null -eq $Status -or $Status -contains "All") {
$SummaryOutput = $Summary | Sort-Object -Property Category, RiskId
} else {
$SummaryOutput = foreach ($Item in $Summary) {
if ($Status -contains $Item.Status) {
$Item
}
}
}
# Summary per category
$SummaryPerCategory = @(
foreach ($Category in $PingCastleOutput1.Categories.Keys) {
$Category1 = $PingCastleOutput1.Categories[$Category]
$Category2 = $PingCastleOutput2.Categories[$Category]
$Points1 = $Category1 | Measure-Object -Sum Points
$Points2 = $Category2 | Measure-Object -Sum Points
$NewRisks = [System.Collections.Generic.List[object]]::new()
$RemovedRisks = [System.Collections.Generic.List[object]]::new()
$SameRisks = [System.Collections.Generic.List[object]]::new()
$ChangedRisks = [System.Collections.Generic.List[object]]::new()
# Lets find "New" and "Removed" risks
foreach ($Risk in $SummaryOutput) {
if ($Risk.Category -eq $Category) {
if ($Risk.Status -eq "New") {
$NewRisks.Add($Risk)
} elseif ($Risk.Status -eq "Removed") {
$RemovedRisks.Add($Risk)
} elseif ($Risk.Status -eq "Same") {
$SameRisks.Add($Risk)
} else {
$ChangedRisks.Add($Risk)
}
}
}
[PSCustomObject] @{
DomainName = $PingCastleOutput1.DomainName
Category = $Category
DateDifference = ($PingCastleOutput2.DateScan - $PingCastleOutput1.DateScan).Days
PointsBefore = $Points1.Sum
PointsAfter = $Points2.Sum
PointsDiff = $Points2.Sum - $Points1.Sum
NewRisks = $NewRisks
RemovedRisks = $RemovedRisks
ChangedRisks = $ChangedRisks
SameRisks = $SameRisks
}
}
)
if ($Advanced) {
[ordered] @{
Summary = $SummaryOutput
SummaryPerCategory = $SummaryPerCategory
}
} else {
$SummaryOutput
}
}
function Compare-WinADGlobalCatalogObjects {
<#
.SYNOPSIS
This function compares objects in the Global Catalog of an Active Directory forest.
.DESCRIPTION
The function iterates over each domain in the forest, and for each domain, it compares the objects in the domain with the objects in the Global Catalog.
It checks for missing objects and objects with wrong GUIDs. The results are returned in a summary object.
.PARAMETER Advanced
If this switch is provided, the function will return the full summary object.
If not, it will only return the missing objects and objects with wrong GUIDs.
.EXAMPLE
Compare-WinADGlobalCatalogObjects -Advanced
This will return the full summary object for all domains in the forest.
.EXAMPLE
Compare-WinADGlobalCatalogObjects
This will return only the missing objects and objects with wrong GUIDs for all domains in the forest.
.NOTES
This function requires the Get-WinADForestDetails and Compare-InternalMissingObject functions.
#>
[CmdletBinding()]
param(
[switch] $Advanced,
[string] $Forest,
[string[]] $IncludeDomains,
[string[]] $ExcludeDomains,
[int] $LimitPerDomain
)
$SummaryDomains = [ordered] @{}
$ForestInformation = Get-WinADForestDetails -PreferWritable -Forest $Forest
foreach ($Domain in $ForestInformation.Domains) {
if ($IncludeDomains -and $Domain -notin $IncludeDomains) {
continue
}
if ($ExcludeDomains -and $Domain -in $ExcludeDomains) {
continue
}
Write-Color -Text "Processing Domain: ", $Domain -Color Yellow, White
$QueryServer = $ForestInformation['QueryServers'][$Domain].HostName[0]
$SummaryDomains[$Domain] = Compare-InternalMissingObject -ForestInformation $ForestInformation -Server $QueryServer -SourceDomain $Domain -TargetDomain $ForestInformation.Domains -LimitPerDomain $LimitPerDomain
}
if ($Advanced) {
$SummaryDomains
} else {
foreach ($Domain in $SummaryDomains.Keys) {
foreach ($Server in $SummaryDomains[$Domain].Keys) {
if ($Server -notin 'Summary') {
if ($null -ne $SummaryDomains[$Domain][$Server].Missing.Count -gt 0) {
$SummaryDomains[$Domain][$Server].Missing
}
if ($Null -ne $SummaryDomains[$Domain][$Server].WrongGuid.Count -gt 0) {
$SummaryDomains[$Domain][$Server].WrongGuid
}
if ($Null -ne $SummaryDomains[$Domain][$Server].Ignored.Count -gt 0) {
$SummaryDomains[$Domain][$Server].Ignored
}
}
}
}
}
}
function Convert-ADSecurityDescriptor {
<#
.SYNOPSIS
Converts a security descriptor to a readable format.
.DESCRIPTION
This function converts a security descriptor to a readable format.
.PARAMETER DistinguishedName
Specifies the distinguished name of the object.
This is for display purposes only.
.PARAMETER SDDL
Specifies the security descriptor in Security Descriptor Definition Language (SDDL) format.
.PARAMETER Resolve
If specified, resolves the identity reference in the security descriptor.
.EXAMPLE
$DomainDN = (Get-ADDomain).DistinguishedName
$FindDN = "CN=Group-Policy-Container,CN=Schema,CN=Configuration,$DomainDN"
$ADObject = Get-ADObject -Identity $FindDN -Properties *
$SecurityDescriptor = Convert-ADSecurityDescriptor -SDDL $ADObject.defaultSecurityDescriptor -Resolve -DistinguishedName $FindDN
$SecurityDescriptor | Format-Table *
.NOTES
More information https://learn.microsoft.com/en-us/dotnet/api/system.security.accesscontrol.objectsecurity.setsecuritydescriptorsddlform?view=net-8.0
#>
[CmdletBinding()]
param(
[string] $DistinguishedName,
[Parameter(Mandatory)][string] $SDDL,
[switch] $Resolve
)
#$sd = [System.DirectoryServices.ActiveDirectorySecurity]::new()
#$sd.SetSecurityDescriptorSddlForm($Test.defaultSecurityDescriptor)
#$sd.GetSecurityDescriptorSddlForm([System.Security.AccessControl.AccessControlSections]::All)
Begin {
if (-not $Script:ForestGUIDs) {
Write-Verbose "Get-ADACL - Gathering Forest GUIDS"
$Script:ForestGUIDs = Get-WinADForestGUIDs
}
if (-not $Script:ForestDetails) {
Write-Verbose "Get-ADACL - Gathering Forest Details"
$Script:ForestDetails = Get-WinADForestDetails
}
if ($Principal -and $Resolve) {
$PrincipalRequested = Convert-Identity -Identity $Principal -Verbose:$false
}
}
Process {
$ACLs = [System.DirectoryServices.ActiveDirectorySecurity]::new()
$ACLs.SetSecurityDescriptorSddlForm($SDDL)
$AccessObjects = foreach ($ACL in $ACLs.Access) {
$SplatFilteredACL = @{
DistinguishedName = $DistinguishedName
ACL = $ACL
Resolve = $Resolve
Principal = $Principal
Inherited = $Inherited
NotInherited = $NotInherited
AccessControlType = $AccessControlType
IncludeObjectTypeName = $IncludeObjectTypeName
IncludeInheritedObjectTypeName = $IncludeInheritedObjectTypeName
ExcludeObjectTypeName = $ExcludeObjectTypeName
ExcludeInheritedObjectTypeName = $ExcludeInheritedObjectTypeName
IncludeActiveDirectoryRights = $IncludeActiveDirectoryRights
ExcludeActiveDirectoryRights = $ExcludeActiveDirectoryRights
IncludeActiveDirectorySecurityInheritance = $IncludeActiveDirectorySecurityInheritance
ExcludeActiveDirectorySecurityInheritance = $ExcludeActiveDirectorySecurityInheritance
PrincipalRequested = $PrincipalRequested
Bundle = $Bundle
}
Remove-EmptyValue -Hashtable $SplatFilteredACL
Get-FilteredACL @SplatFilteredACL
}
$AccessObjects
}
}
function Copy-ADOUSecurity {
<#
.SYNOPSIS
Copy AD security from one OU to another.
.DESCRIPTION
Copies the security for one OU to another with the ability to use a different target group with source group as reference.
.PARAMETER SourceOU
The reference OU.
.PARAMETER TargetOU
Target OU to apply security.
.PARAMETER SourceGroup
The reference group.
.PARAMETER TargetGroup
Target group to apply security
.PARAMETER Execute
Switch to execute - leaving this out will result in a dry run (whatif).
.EXAMPLE
Copy-ADOUSecurity -SourceOU "OU=Finance,DC=contoso,DC=com" -TargetOU "OU=Sales,DC=contoso,DC=com" -SourceGroup "FinanceAdmins" -TargetGroup "SalesAdmins"
#>
[CmdletBinding()]
param (
[Parameter(Mandatory)][string]$SourceOU,
[Parameter(Mandatory)][string]$TargetOU,
[Parameter(Mandatory)][string]$SourceGroup,
[Parameter(Mandatory)][string]$TargetGroup,
[System.Management.Automation.PSCredential]$Credential,
[switch]$Execute
)
process {
[string]$sDomain = (Get-ADDomain).NetBIOSName
[string]$sServer = (Get-ADDomainController -Writable -Discover).HostName
$sSourceOU = $SourceOU.Trim()
$sDestOU = $TargetOU.Trim()
$sSourceAccount = $SourceGroup.Trim()
$sDestAccount = $TargetGroup.Trim()
[ADSI]$oSourceOU = "LDAP://{0}/{1}" -f $sServer, $sSourceOU
[ADSI]$oTargetOU = "LDAP://{0}/{1}" -f $sServer, $sDestOU
if ($Credential) {
$oSourceOU.PSBase.Username = $Credential.Username
$oSourceOU.PSBase.Password = $Credential.GetNetworkCredential().Password
$oTargetOU.PSBase.Username = $Credential.Username
$oTargetOU.PSBase.Password = $Credential.GetNetworkCredential().Password
}
$oDestAccountNT = New-Object -TypeName System.Security.Principal.NTAccount -ArgumentList $sDomain, $sDestAccount
$oSourceOU.ObjectSecurity.Access | Where-Object { $_.IdentityReference -like "$sDomain\$sSourceAccount" } | ForEach-Object {
$ActiveDirectoryRights = $_.ActiveDirectoryRights
$AccessControlType = $_.AccessControlType
$InheritanceType = $_.InheritanceType
$InheritedObjectType = $_.InheritedObjectType
$ObjectType = $_.ObjectType
$oAce = New-Object System.DirectoryServices.ActiveDirectoryAccessRule ($oDestAccountNT, $ActiveDirectoryRights, $AccessControlType, $ObjectType, $InheritanceType, $InheritedObjectType)
$oTargetOU.ObjectSecurity.AddAccessRule($oAce)
}
$oSourceOU.ObjectSecurity.Access | Where-Object { $_.IdentityReference -like "$sDomain\$sSourceAccount" }
$oTargetOU.ObjectSecurity.Access | Where-Object { $_.IdentityReference -like "$sDomain\$sDestAccount" }
if ($Execute) {
try {
$oTargetOU.CommitChanges()
Write-Verbose -Message "Permissions commited"
} catch {
$ErrorMessage = $_.Exception.Message
Write-Warning -Message $ErrorMessage
}
} else {
Write-Warning -Message "Use the switch -Execute to commit changes"
}
}
}
function Disable-ADACLInheritance {
<#
.SYNOPSIS
Disables inheritance of access control entries (ACEs) from parent objects for one or more Active Directory objects or security principals.
.DESCRIPTION
The Disable-ADACLInheritance function disables inheritance of ACEs from parent objects for one or more Active Directory objects or security principals. This function can be used to prevent unwanted ACEs from being inherited by child objects.
.PARAMETER ADObject
Specifies one or more Active Directory objects or security principals to disable inheritance of ACEs from parent objects. This parameter is mandatory when the 'ADObject' parameter set is used.
.PARAMETER ACL
Specifies one or more access control lists (ACLs) to disable inheritance of ACEs from parent objects. This parameter is mandatory when the 'ACL' parameter set is used.
.PARAMETER RemoveInheritedAccessRules
Indicates whether to remove inherited ACEs from the object or principal. If this switch is specified, inherited ACEs are removed from the object or principal. If this switch is not specified, inherited ACEs are retained on the object or principal.
.EXAMPLE
Disable-ADACLInheritance -ADObject 'CN=TestOU,DC=contoso,DC=com'
This example disables inheritance of ACEs from the parent object for the 'TestOU' organizational unit in the 'contoso.com' domain.
.EXAMPLE
Disable-ADACLInheritance -ACL $ACL -RemoveInheritedAccessRules
This example disables inheritance of ACEs from parent objects for the ACL specified in the $ACL variable, and removes any inherited ACEs from the object or principal.
.NOTES
#>
[CmdletBinding(SupportsShouldProcess, DefaultParameterSetName = 'ADObject')]
param(
[parameter(ParameterSetName = 'ADObject', Mandatory)][alias('Identity')][Array] $ADObject,
[parameter(ParameterSetName = 'ACL', Mandatory)][Array] $ACL,
[switch] $RemoveInheritedAccessRules
)
if ($ACL) {
Set-ADACLInheritance -Inheritance 'Disabled' -ACL $ACL -RemoveInheritedAccessRules:$RemoveInheritedAccessRules.IsPresent
} else {
Set-ADACLInheritance -Inheritance 'Disabled' -ADObject $ADObject -RemoveInheritedAccessRules:$RemoveInheritedAccessRules.IsPresent
}
}
function Enable-ADACLInheritance {
<#
.SYNOPSIS
Enables inheritance of access control entries (ACEs) from parent objects for one or more Active Directory objects or security principals.
.DESCRIPTION
The Enable-ADACLInheritance function enables inheritance of ACEs from parent objects for one or more Active Directory objects or security principals.
This function can be used to ensure that child objects inherit ACEs from parent objects.
.PARAMETER ADObject
Specifies one or more Active Directory objects or security principals to enable inheritance of ACEs from parent objects.
.PARAMETER ACL
Specifies one or more access control lists (ACLs) to enable inheritance of ACEs from parent objects.
.EXAMPLE
Enable-ADACLInheritance -ADObject 'CN=TestOU,DC=contoso,DC=com'
.NOTES
General notes
#>
[CmdletBinding(SupportsShouldProcess, DefaultParameterSetName = 'ADObject')]
param(
[parameter(ParameterSetName = 'ADObject', Mandatory)][alias('Identity')][Array] $ADObject,
[parameter(ParameterSetName = 'ACL', Mandatory)][Array] $ACL
)
if ($ACL) {
Set-ADACLInheritance -Inheritance 'Enabled' -ACL $ACL
} else {
Set-ADACLInheritance -Inheritance 'Enabled' -ADObject $ADObject
}
}
function Export-ADACLObject {
<#
.SYNOPSIS
Exports the Access Control List (ACL) information for a specified Active Directory object.
.DESCRIPTION
This function exports the ACL information for a specified Active Directory object. It provides options to include or exclude specific principals and to bundle the ACL information.
.PARAMETER ADObject
Specifies the Active Directory object for which to export the ACL information.
.PARAMETER IncludePrincipal
Specifies the principal(s) to include in the exported ACL information.
.PARAMETER ExcludePrincipal
Specifies the principal(s) to exclude from the exported ACL information.
.PARAMETER Bundle
Indicates whether to bundle the ACL information for each object.
.PARAMETER OneLiner
Indicates whether to output the ACL information in a single line.
.EXAMPLE
Export-ADACLObject -ADObject 'CN=Users,DC=contoso,DC=com' -Bundle
Exports the ACL information for the 'Users' container in the 'contoso.com' Active Directory.
.NOTES
General notes
#>
[cmdletBinding()]
param(
[parameter(Mandatory)][alias('Identity')][string] $ADObject,
[alias('Principal')][string[]] $IncludePrincipal,
[string[]] $ExcludePrincipal,
[switch] $Bundle,
[switch] $OneLiner
)
$ACLOutput = Get-ADACL -ADObject $ADObject -Bundle
foreach ($ACL in $ACLOutput.ACLAccessRules) {
$ConvertedIdentity = Convert-Identity -Identity $ACL.Principal -Verbose:$false
if ($ConvertedIdentity.Error) {
Write-Warning -Message "Export-ADACLObject - Converting identity $($ACL.Principal) failed with $($ConvertedIdentity.Error). Be warned."
}
if ($IncludePrincipal) {
if ($ConvertedIdentity.Name -notin $IncludePrincipal) {
continue
}
}
if ($ExcludePrincipal) {
if ($ConvertedIdentity.Name -in $ExcludePrincipal) {
continue
}
}
if ($Bundle) {
[PSCustomObject] @{
Principal = $ACL.Principal
ActiveDirectoryAccessRule = $ACL.Bundle
Action = 'Copy'
}
} else {
New-ADACLObject -Principal $ACL.Principal -AccessControlType $ACL.AccessControlType -ObjectType $ACL.ObjectTypeName -InheritedObjectType $ACL.InheritedObjectTypeName -AccessRule $ACL.ActiveDirectoryRights -InheritanceType $ACL.InheritanceType -OneLiner:$OneLiner.IsPresent
}
}
}
function Find-WinADObjectDifference {
<#
.SYNOPSIS
Finds the differences in Active Directory objects between two sets of objects.
.DESCRIPTION
This function compares two sets of Active Directory objects and identifies the differences between them.
.PARAMETER Standard
Specifies the standard parameter set for comparing Active Directory objects.
.PARAMETER Identity
Specifies the identities of the Active Directory objects to compare.
.PARAMETER Forest
Specifies the forest to search for the Active Directory objects.
.PARAMETER ExcludeDomains
Specifies the domains to exclude from the comparison.
.PARAMETER IncludeDomains
Specifies the domains to include in the comparison.
.PARAMETER GlobalCatalog
Indicates whether to use the global catalog for the comparison.
.PARAMETER Properties
Specifies the properties to include in the comparison.
.PARAMETER AddProperties
Specifies additional properties to include in the comparison.
.EXAMPLE
Find-WinADObjectDifference -Identity 'CN=User1,OU=Users,DC=domain,DC=com', 'CN=User2,OU=Users,DC=domain,DC=com' -Forest 'domain.com' -IncludeDomains 'domain.com' -Properties 'Name', 'Description'
Compares 'User1' and 'User2' objects in the 'domain.com' forest, including only the 'Name' and 'Description' properties.
.NOTES
General notes
#>
[CmdletBinding(DefaultParameterSetName = 'Standard')]
param(
[Parameter(ParameterSetName = 'Standard', Mandatory)]
[Array] $Identity,
[Parameter(ParameterSetName = 'Standard')]
[alias('ForestName')][string] $Forest,
[Parameter(ParameterSetName = 'Standard')]
[string[]] $ExcludeDomains,
[Parameter(ParameterSetName = 'Standard')]
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[Parameter(ParameterSetName = 'Standard')]
[switch] $GlobalCatalog,
[string[]] $Properties,
[string[]] $AddProperties
# [ValidateSet(
# 'Summary',
# 'DetailsPerProperty',
# 'DetailsPerServer',
# 'DetailsSummary'
# )][string[]] $Modes
)
$ForestInformation = Get-WinADForestDetails -Extended
$Output = [ordered] @{
List = [System.Collections.Generic.List[Object]]::new()
ListDetails = [System.Collections.Generic.List[Object]]::new()
ListDetailsReversed = [System.Collections.Generic.List[Object]]::new()
ListSummary = [System.Collections.Generic.List[Object]]::new()
}
$ExcludeProperties = @(
#'MemberOf'
#'servicePrincipalName'
'WhenChanged'
'DistinguishedName'
'uSNChanged'
'uSNCreated'
)
if (-not $Properties) {
# $PropertiesUser = @(
# 'AccountExpirationDate'
# 'accountExpires'
# 'AccountLockoutTime'
# 'AccountNotDelegated'
# 'adminCount'
# 'AllowReversiblePasswordEncryption'
# 'CannotChangePassword'
# 'City'
# 'codePage'
# 'Company'
# 'Country'
# 'countryCode'
# 'Department'
# 'Description'
# 'DisplayName'
# 'DistinguishedName'
# 'Division'
# 'EmailAddress'
# 'EmployeeID'
# 'EmployeeNumber'
# 'Enabled'
# 'GivenName'
# 'HomeDirectory'
# 'HomedirRequired'
# 'Initials'
# 'instanceType'
# 'KerberosEncryptionType'
# 'LastLogonDate'
# 'mail'
# 'mailNickname'
# 'Manager'
# 'MemberOf'
# 'MobilePhone'
# 'Name'
# 'ObjectClass'
# 'Office'
# 'OfficePhone'
# 'Organization'
# 'OtherName'
# 'PasswordExpired'
# 'PasswordLastSet'
# 'PasswordNeverExpires'
# 'PasswordNotRequired'
# 'POBox'
# 'PostalCode'
# 'PrimaryGroup'
# 'primaryGroupID'
# 'PrincipalsAllowedToDelegateToAccount'
# 'ProfilePath'
# 'protocolSettings'
# 'proxyAddresses'
# 'pwdLastSet'
# 'SamAccountName'
# 'sAMAccountType'
# 'ScriptPath'
# 'sDRightsEffective'
# 'ServicePrincipalNames'
# 'showInAddressBook'
# 'SID'
# 'SIDHistory'
# 'SmartcardLogonRequired'
# 'State'
# 'StreetAddress'
# 'Surname'
# 'Title'
# 'TrustedForDelegation'
# 'TrustedToAuthForDelegation'
# 'UseDESKeyOnly'
# 'userAccountControl'
# 'UserPrincipalName'
# 'uSNChanged'
# 'uSNCreated'
# 'whenChanged'
# 'whenCreated'
# )
$Properties = @(
'company'
'department'
'Description'
'info'
'l'
for ($i = 1; $i -le 15; $i++) {
"extensionAttribute$i"
}
'manager'
#'memberOf'
'facsimileTelephoneNumber'
'givenName'
'homePhone'
'postalCode'
'pager'
'lastLogonTimestamp'
'UserAccountControl', 'DisplayName', 'mailNickname', 'mail', 'ipPhone'
'whenChanged'
'whenCreated'
)
}
if ($AddProperties) {
$Properties += $AddProperties
}
$Properties = $Properties | Sort-Object -Unique
if ($GlobalCatalog) {
[Array] $GCs = foreach ($DC in $ForestInformation.ForestDomainControllers) {
if ($DC.IsGlobalCatalog) {
$DC
}
}
} else {
$DomainFromIdentity = ConvertFrom-DistinguishedName -DistinguishedName $Identity[0] -ToDomainCN
[Array] $GCs = foreach ($DC in $ForestInformation.ForestDomainControllers) {
if ($DC.Domain -eq $DomainFromIdentity) {
$DC
}
}
}
$CountObject = 0
$CachedReversedObjects = [ordered] @{}
foreach ($I in $Identity) {
$PrimaryObject = $null
if (-not $I.DistinguishedName) {
$DN = $I
} else {
$DN = $I.DistinguishedName
}
#if ($Modes -contains 'DetailsSummary') {
$ADObjectDetailedDifferences = [ordered] @{
DistinguishedName = $DN
}
#}
#if ($Modes -contains 'Details') {
$ADObjectSummary = [ordered] @{
DistinguishedName = $DN
DifferentServers = [System.Collections.Generic.List[Object]]::new()
DifferentServersCount = 0
DifferentProperties = [System.Collections.Generic.List[Object]]::new()
SameServers = [System.Collections.Generic.List[Object]]::new()
SameServersCount = 0
SameProperties = [System.Collections.Generic.List[Object]]::new()
}
#}
$CachedReversedObjects[$DN] = [ordered] @{}
$ADObjectDetailsPerPropertyReversed = [ordered] @{
DistinguishedName = $DN
Property = 'Status'
}
$CachedReversedObjects[$DN]['Status'] = $ADObjectDetailsPerPropertyReversed
foreach ($Property in $Properties) {
$ADObjectDetailsPerPropertyReversed = [ordered] @{
DistinguishedName = $DN
Property = $Property
}
$CachedReversedObjects[$DN][$Property] = $ADObjectDetailsPerPropertyReversed
}
$CountObject++
$Count = 0
foreach ($GC in $GCs) {
$Count++
Write-Verbose -Message "Find-WinADObjectDifference - Processing object [Object: $CountObject / $($Identity.Count)][DC: $Count / $($GCs.Count)] $($GC.HostName) for $I"
# Query the specific object on each GC
if ($I -is [Microsoft.ActiveDirectory.Management.ADUser]) {
Try {
if ($GlobalCatalog) {
$ObjectInfo = Get-ADUser -Identity $DN -Server "$($GC.HostName):3268" -ErrorAction Stop -Properties $Properties
} else {
$ObjectInfo = Get-ADUser -Identity $DN -Server $GC.HostName -Properties $Properties -ErrorAction Stop
}
} catch {
$ObjectInfo = $null
Write-Warning "Find-WinADObjectDifference - Error: $($_.Exception.Message.Replace([System.Environment]::NewLine,''))"
$ErrorValue = $_.Exception.Message.Replace([System.Environment]::NewLine, '')
}
} elseif ($I -is [Microsoft.ActiveDirectory.Management.ADComputer]) {
Try {
if ($GlobalCatalog) {
$ObjectInfo = Get-ADComputer -Identity $DN -Server "$($GC.HostName):3268" -ErrorAction Stop -Properties $Properties
} else {
$ObjectInfo = Get-ADComputer -Identity $DN -Server $GC.HostName -Properties $Properties -ErrorAction Stop
}
} catch {
$ObjectInfo = $null
Write-Warning "Find-WinADObjectDifference - Error: $($_.Exception.Message.Replace([System.Environment]::NewLine,''))"
$ErrorValue = $_.Exception.Message.Replace([System.Environment]::NewLine, '')
}
} else {
if ($I -is [string] -or $I.DistinguishedName) {
Try {
if ($GlobalCatalog) {
$ObjectInfo = Get-ADObject -Identity $DN -Server "$($GC.HostName):3268" -ErrorAction Stop -Properties $Properties
} else {
$ObjectInfo = Get-ADObject -Identity $DN -Server $GC.HostName -Properties $Properties -ErrorAction Stop
}
} catch {
$ObjectInfo = $null
Write-Warning "Test-ADObject - Error: $($_.Exception.Message.Replace([System.Environment]::NewLine,''))"
$ErrorValue = $_.Exception.Message.Replace([System.Environment]::NewLine, '')
}
} else {
$ObjectInfo = $null
Write-Warning "Test-ADObject - Error: $($_.Exception.Message.Replace([System.Environment]::NewLine,''))"
$ErrorValue = $_.Exception.Message.Replace([System.Environment]::NewLine, '')
}
}
if ($ObjectInfo) {
if (-not $PrimaryObject) {
$PrimaryObject = $ObjectInfo
}
$ADObjectDetailsPerProperty = [ordered] @{
DistinguishedName = $DN
Server = $GC.HostName
Status = 'Exists'
}
#$CachedReversedObjects[$DN]['Status']['StatusComparison'] = $true
$CachedReversedObjects[$DN]['Status'][$GC.HostName] = 'Exists'
foreach ($Property in $Properties) {
#$CachedReversedObjects[$DN]['Status']['StatusComparison'] = $true
# Comparing WhenChanged is not needed, because it is special and will always be different
if ($Property -notin $ExcludeProperties) {
$PropertyNameSame = "$Property-Same"
$PropertyNameDiff = "$Property-Diff"
if (-not $ADObjectDetailedDifferences[$PropertyNameSame]) {
$ADObjectDetailedDifferences[$PropertyNameSame] = [System.Collections.Generic.List[Object]]::new()
}
if (-not $ADObjectDetailedDifferences[$PropertyNameDiff]) {
$ADObjectDetailedDifferences[$PropertyNameDiff] = [System.Collections.Generic.List[Object]]::new()
}
if ($Property -in 'MemberOf', 'servicePrincipalName') {
$PrimaryObjectMemberOf = $PrimaryObject.$Property | Sort-Object
$ObjectInfoMemberOf = $ObjectInfo.$Property | Sort-Object
if ($PrimaryObjectMemberOf -join ',' -eq $ObjectInfoMemberOf -join ',') {
$ADObjectDetailedDifferences[$PropertyNameSame].Add($GC.HostName)
if ($Property -notin $ADObjectSummary.SameProperties) {
$ADObjectSummary.SameProperties.Add($Property)
}
if ($GC.HostName -notin $ADObjectSummary.SameServers) {
$ADObjectSummary.SameServers.Add($GC.HostName)
}
} else {
$ADObjectDetailedDifferences[$PropertyNameDiff].Add($GC.HostName)
if ($Property -notin $ADObjectSummary.DifferentProperties) {
$ADObjectSummary.DifferentProperties.Add($Property)
}
if ($GC.HostName -notin $ADObjectSummary.DifferentServers) {
$ADObjectSummary.DifferentServers.Add($GC.HostName)
}
}
} elseif ($null -eq $($PrimaryObject.$Property) -and $null -eq ($ObjectInfo.$Property)) {
# Both are null, so it's the same
$ADObjectDetailedDifferences[$PropertyNameSame].Add($GC.HostName)
if ($Property -notin $ADObjectSummary.SameProperties) {
$ADObjectSummary.SameProperties.Add($Property)
}
if ($GC.HostName -notin $ADObjectSummary.SameServers) {
$ADObjectSummary.SameServers.Add($GC.HostName)
}
} elseif ($null -eq $PrimaryObject.$Property) {
# PrimaryObject is null, but ObjectInfo is not, so it's different
$ADObjectDetailedDifferences[$PropertyNameDiff].Add($GC.HostName)
if ($Property -notin $ADObjectSummary.DifferentProperties) {
$ADObjectSummary.DifferentProperties.Add($Property)
}
if ($GC.HostName -notin $ADObjectSummary.DifferentServers) {
$ADObjectSummary.DifferentServers.Add($GC.HostName)
}
# $CachedReversedObjects[$DN]['Status']['StatusComparison'] = $false
} elseif ($null -eq $ObjectInfo.$Property) {
# ObjectInfo is null, but PrimaryObject is not, so it's different
$ADObjectDetailedDifferences[$PropertyNameDiff].Add($GC.HostName)
if ($Property -notin $ADObjectSummary.DifferentProperties) {
$ADObjectSummary.DifferentProperties.Add($Property)
}
if ($GC.HostName -notin $ADObjectSummary.DifferentServers) {
$ADObjectSummary.DifferentServers.Add($GC.HostName)
}
# $CachedReversedObjects[$DN]['Status']['StatusComparison'] = $false
} else {
if ($ObjectInfo.$Property -ne $PrimaryObject.$Property) {
# Both are not null, and they are different
$ADObjectDetailedDifferences[$PropertyNameDiff].Add($GC.HostName)
if ($Property -notin $ADObjectSummary.DifferentProperties) {
$ADObjectSummary.DifferentProperties.Add($Property)
}
if ($GC.HostName -notin $ADObjectSummary.DifferentServers) {
$ADObjectSummary.DifferentServers.Add($GC.HostName)
}
# $CachedReversedObjects[$DN]['Status']['StatusComparison'] = $false
} else {
# Both are not null, and they are the same
$ADObjectDetailedDifferences[$PropertyNameSame].Add($GC.HostName)
if ($Property -notin $ADObjectSummary.SameProperties) {
$ADObjectSummary.SameProperties.Add($Property)
}
if ($GC.HostName -notin $ADObjectSummary.SameServers) {
$ADObjectSummary.SameServers.Add($GC.HostName)
}
}
}
}
$ADObjectDetailsPerProperty[$Property] = $ObjectInfo.$Property
$CachedReversedObjects[$DN][$Property][$GC.HostName] = $ObjectInfo.$Property
}
$Output.ListDetails.Add([PSCustomObject] $ADObjectDetailsPerProperty)
} else {
if (-not $PrimaryObject) {
$PrimaryObject = $ObjectInfo
}
$ADObjectDetailsPerProperty = [ordered] @{
DistinguishedName = $DN
Server = $GC.HostName
Status = $ErrorValue
}
$ADObjectSummary.DifferentServers.Add($GC.HostName)
$CachedReversedObjects[$DN]['Status'][$GC.HostName] = $ErrorValue
#$CachedReversedObjects[$DN]['Status']['StatusComparison'] = $false
foreach ($Property in $Properties) {
if ($Property -notin $ExcludeProperties) {
$ADObjectDetailsPerProperty[$Property] = $null
$CachedReversedObjects[$DN][$Property][$GC.HostName] = $ObjectInfo.$Property
if ($Property -notin $ADObjectSummary.DifferentProperties) {
$ADObjectSummary.DifferentProperties.Add($Property)
}
#$CachedReversedObjects[$DN][$Property]['StatusComparison'] = $false
}
}
$Output.ListDetails.Add([PSCustomObject] $ADObjectDetailsPerProperty)
}
}
$ADObjectSummary.DifferentServersCount = $ADObjectSummary.DifferentServers.Count
$ADObjectSummary.SameServersCount = $ADObjectSummary.SameServers.Count
$Output.List.Add([PSCustomObject] $ADObjectDetailedDifferences)
$Output.ListSummary.Add([PSCustomObject] $ADObjectSummary)
foreach ($Object in $CachedReversedObjects[$DN].Keys) {
$Output.ListDetailsReversed.Add([PSCustomObject] $CachedReversedObjects[$DN][$Object])
}
}
$Output
}
function Get-ADACL {
<#
.SYNOPSIS
Retrieves and filters access control list (ACL) information for Active Directory objects.
.DESCRIPTION
This function retrieves and filters access control list (ACL) information for specified Active Directory objects. It allows for detailed filtering based on various criteria such as principal, access control type, object type, inheritance type, and more.
.PARAMETER ADObject
Specifies the Active Directory object or objects to retrieve ACL information from.
.PARAMETER Extended
Indicates whether to retrieve extended ACL information.
.PARAMETER ResolveTypes
Indicates whether to resolve principal types for ACL filtering.
.PARAMETER Principal
Specifies the principal to filter ACL information for.
.PARAMETER Inherited
Indicates to include only inherited ACLs.
.PARAMETER NotInherited
Indicates to include only non-inherited ACLs.
.PARAMETER Bundle
Indicates whether to bundle ACL information for each object.
.PARAMETER AccessControlType
Specifies the access control type to filter ACL information for.
.PARAMETER IncludeObjectTypeName
Specifies the object types to include in ACL filtering.
.PARAMETER IncludeInheritedObjectTypeName
Specifies the inherited object types to include in ACL filtering.
.PARAMETER ExcludeObjectTypeName
Specifies the object types to exclude in ACL filtering.
.PARAMETER ExcludeInheritedObjectTypeName
Specifies the inherited object types to exclude in ACL filtering.
.PARAMETER IncludeActiveDirectoryRights
Specifies the Active Directory rights to include in ACL filtering.
.PARAMETER IncludeActiveDirectoryRightsExactMatch
Specifies the Active Directory rights to include in the filter as an exact match (all rights must be present).
.PARAMETER ExcludeActiveDirectoryRights
Specifies the Active Directory rights to exclude in ACL filtering.
.PARAMETER IncludeActiveDirectorySecurityInheritance
Specifies the inheritance types to include in ACL filtering.
.PARAMETER ExcludeActiveDirectorySecurityInheritance
Specifies the inheritance types to exclude in ACL filtering.
.PARAMETER ADRightsAsArray
Indicates to return Active Directory rights as an array.
.EXAMPLE
Get-ADACL -ADObject 'CN=Users,DC=contoso,DC=com' -ResolveTypes -Principal 'Domain Admins' -Bundle
Retrieves and bundles ACL information for the 'Domain Admins' principal in the 'Users' container.
.NOTES
General notes
#>
[cmdletbinding()]
param(
[Parameter(Mandatory, Position = 0, ValueFromPipeline, ValueFromPipelineByPropertyName)]
[alias('Identity')][Array] $ADObject,
[switch] $Extended,
[alias('ResolveTypes')][switch] $Resolve,
[string] $Principal,
[switch] $Inherited,
[switch] $NotInherited,
[switch] $Bundle,
[System.Security.AccessControl.AccessControlType] $AccessControlType,
[Alias('ObjectTypeName')][string[]] $IncludeObjectTypeName,
[Alias('InheritedObjectTypeName')][string[]] $IncludeInheritedObjectTypeName,
[string[]] $ExcludeObjectTypeName,
[string[]] $ExcludeInheritedObjectTypeName,
[Alias('ActiveDirectoryRights')][System.DirectoryServices.ActiveDirectoryRights[]] $IncludeActiveDirectoryRights,
[System.DirectoryServices.ActiveDirectoryRights[]] $IncludeActiveDirectoryRightsExactMatch,
[System.DirectoryServices.ActiveDirectoryRights[]] $ExcludeActiveDirectoryRights,
[Alias('InheritanceType', 'IncludeInheritanceType')][System.DirectoryServices.ActiveDirectorySecurityInheritance[]] $IncludeActiveDirectorySecurityInheritance,
[Alias('ExcludeInheritanceType')][System.DirectoryServices.ActiveDirectorySecurityInheritance[]] $ExcludeActiveDirectorySecurityInheritance,
[switch] $ADRightsAsArray
)
Begin {
if (-not $Script:ForestGUIDs) {
Write-Verbose "Get-ADACL - Gathering Forest GUIDS"
$Script:ForestGUIDs = Get-WinADForestGUIDs
}
if (-not $Script:ForestDetails) {
Write-Verbose "Get-ADACL - Gathering Forest Details"
$Script:ForestDetails = Get-WinADForestDetails
}
if ($Principal -and $Resolve) {
$PrincipalRequested = Convert-Identity -Identity $Principal -Verbose:$false
}
}
Process {
foreach ($Object in $ADObject) {
$ADObjectData = $null
if ($Object -is [Microsoft.ActiveDirectory.Management.ADOrganizationalUnit] -or $Object -is [Microsoft.ActiveDirectory.Management.ADEntity]) {
# if object already has proper security descriptor we don't need to do additional querying
if ($Object.ntSecurityDescriptor) {
$ADObjectData = $Object
}
[string] $DistinguishedName = $Object.DistinguishedName
[string] $CanonicalName = $Object.CanonicalName
if ($CanonicalName) {
$CanonicalName = $CanonicalName.TrimEnd('/')
}
[string] $ObjectClass = $Object.ObjectClass
} elseif ($Object -is [string]) {
[string] $DistinguishedName = $Object
[string] $CanonicalName = ''
[string] $ObjectClass = ''
} else {
if ($Object.ntSecurityDescriptor) {
$ADObjectData = $Object
[string] $DistinguishedName = $Object.DistinguishedName
[string] $CanonicalName = $Object.CanonicalName
if ($CanonicalName) {
$CanonicalName = $CanonicalName.TrimEnd('/')
}
[string] $ObjectClass = $Object.ObjectClass
} else {
Write-Warning "Get-ADACL - Object not recognized. Skipping..."
continue
}
}
if (-not $ADObjectData) {
$DomainName = ConvertFrom-DistinguishedName -ToDomainCN -DistinguishedName $DistinguishedName
$QueryServer = $Script:ForestDetails['QueryServers'][$DomainName].HostName[0]
try {
$ADObjectData = Get-ADObject -Identity $DistinguishedName -Properties ntSecurityDescriptor, CanonicalName -ErrorAction Stop -Server $QueryServer
# Since we already request an object we might as well use the data and overwrite it if people use the string
$ObjectClass = $ADObjectData.ObjectClass
$CanonicalName = $ADObjectData.CanonicalName
# Real ACL
$ACLs = $ADObjectData.ntSecurityDescriptor
} catch {
Write-Warning "Get-ADACL - Path $PathACL - Error: $($_.Exception.Message)"
continue
}
} else {
# Real ACL
$ACLs = $ADObjectData.ntSecurityDescriptor
}
$AccessObjects = foreach ($ACL in $ACLs.Access) {
$SplatFilteredACL = @{
ACL = $ACL
Resolve = $Resolve
Principal = $Principal
Inherited = $Inherited
NotInherited = $NotInherited
AccessControlType = $AccessControlType
IncludeObjectTypeName = $IncludeObjectTypeName
IncludeInheritedObjectTypeName = $IncludeInheritedObjectTypeName
ExcludeObjectTypeName = $ExcludeObjectTypeName
ExcludeInheritedObjectTypeName = $ExcludeInheritedObjectTypeName
IncludeActiveDirectoryRights = $IncludeActiveDirectoryRights
IncludeActiveDirectoryRightsExactMatch = $IncludeActiveDirectoryRightsExactMatch
ExcludeActiveDirectoryRights = $ExcludeActiveDirectoryRights
IncludeActiveDirectorySecurityInheritance = $IncludeActiveDirectorySecurityInheritance
ExcludeActiveDirectorySecurityInheritance = $ExcludeActiveDirectorySecurityInheritance
PrincipalRequested = $PrincipalRequested
DistinguishedName = $DistinguishedName
Bundle = $Bundle
}
Remove-EmptyValue -Hashtable $SplatFilteredACL
Get-FilteredACL @SplatFilteredACL
}
if ($Bundle) {
if ($Object.CanonicalName) {
$CanonicalName = $Object.CanonicalName
} else {
$CanonicalName = ConvertFrom-DistinguishedName -DistinguishedName $DistinguishedName -ToCanonicalName
}
[PSCustomObject] @{
DistinguishedName = $DistinguishedName
CanonicalName = $CanonicalName
ACL = $ACLs
ACLAccessRules = $AccessObjects
Path = $PathACL
}
} else {
$AccessObjects
}
}
}
End {
}
}
function Get-ADACLOwner {
<#
.SYNOPSIS
Gets owner from given Active Directory object
.DESCRIPTION
Gets owner from given Active Directory object
.PARAMETER ADObject
Active Directory object to get owner from
.PARAMETER Resolve
Resolves owner to provide more details about said owner
.PARAMETER IncludeACL
Include additional ACL information along with owner
.PARAMETER IncludeOwnerType
Include only specific Owner Type, by default all Owner Types are included
.PARAMETER ExcludeOwnerType
Exclude specific Owner Type, by default all Owner Types are included
.EXAMPLE
Get-ADACLOwner -ADObject 'CN=Policies,CN=System,DC=ad,DC=evotec,DC=xyz' -Resolve | Format-Table
.NOTES
General notes
#>
[cmdletBinding()]
param(
[Parameter(Mandatory, Position = 0, ValueFromPipeline, ValueFromPipelineByPropertyName)]
[alias('Identity')][Array] $ADObject,
[switch] $Resolve,
[alias('AddACL')][switch] $IncludeACL,
[validateSet('WellKnownAdministrative', 'Administrative', 'NotAdministrative', 'Unknown')][string[]] $IncludeOwnerType,
[validateSet('WellKnownAdministrative', 'Administrative', 'NotAdministrative', 'Unknown')][string[]] $ExcludeOwnerType
)
Begin {
if (-not $Script:ForestDetails) {
Write-Verbose "Get-ADACLOwner - Gathering Forest Details"
$Script:ForestDetails = Get-WinADForestDetails
}
}
Process {
foreach ($Object in $ADObject) {
$ADObjectData = $null
if ($Object -is [Microsoft.ActiveDirectory.Management.ADOrganizationalUnit] -or $Object -is [Microsoft.ActiveDirectory.Management.ADEntity]) {
# if object already has proper security descriptor we don't need to do additional querying
if ($Object.ntSecurityDescriptor) {
$ADObjectData = $Object
}
[string] $DistinguishedName = $Object.DistinguishedName
[string] $CanonicalName = $Object.CanonicalName
[string] $ObjectClass = $Object.ObjectClass
} elseif ($Object -is [string]) {
[string] $DistinguishedName = $Object
[string] $CanonicalName = ''
[string] $ObjectClass = ''
} else {
if ($Object.ntSecurityDescriptor) {
$ADObjectData = $Object
[string] $DistinguishedName = $Object.DistinguishedName
[string] $CanonicalName = $Object.CanonicalName
if ($CanonicalName) {
$CanonicalName = $CanonicalName.TrimEnd('/')
}
[string] $ObjectClass = $Object.ObjectClass
} else {
Write-Warning "Get-ADACLOwner - Object not recognized. Skipping..."
continue
}
}
try {
if (-not $ADObjectData) {
$DomainName = ConvertFrom-DistinguishedName -ToDomainCN -DistinguishedName $DistinguishedName
$QueryServer = $Script:ForestDetails['QueryServers'][$DomainName].HostName[0]
try {
$ADObjectData = Get-ADObject -Identity $DistinguishedName -Properties ntSecurityDescriptor, CanonicalName, ObjectClass -ErrorAction Stop -Server $QueryServer
# Since we already request an object we might as well use the data and overwrite it if people use the string
$ObjectClass = $ADObjectData.ObjectClass
$CanonicalName = $ADObjectData.CanonicalName
# Real ACL
$ACLs = $ADObjectData.ntSecurityDescriptor
} catch {
Write-Warning "Get-ADACLOwner - Path $PathACL - Error: $($_.Exception.Message)"
continue
}
} else {
# Real ACL
$ACLs = $ADObjectData.ntSecurityDescriptor
}
$Hash = [ordered] @{
DistinguishedName = $DistinguishedName
CanonicalName = $CanonicalName
ObjectClass = $ObjectClass
Owner = $ACLs.Owner
}
$ErrorMessage = ''
} catch {
$ACLs = $null
$Hash = [ordered] @{
DistinguishedName = $DistinguishedName
CanonicalName = $CanonicalName
ObjectClass = $ObjectClass
Owner = $null
}
$ErrorMessage = $_.Exception.Message
}
if ($IncludeACL) {
$Hash['ACLs'] = $ACLs
}
if ($Resolve) {
if ($null -eq $Hash.Owner) {
$Identity = $null
} else {
$Identity = Convert-Identity -Identity $Hash.Owner -Verbose:$false
}
if ($Identity) {
$Hash['OwnerName'] = $Identity.Name
$Hash['OwnerSid'] = $Identity.SID
$Hash['OwnerType'] = $Identity.Type
} else {
$Hash['OwnerName'] = ''
$Hash['OwnerSid'] = ''
$Hash['OwnerType'] = ''
}
if ($PSBoundParameters.ContainsKey('IncludeOwnerType')) {
if ($Hash['OwnerType'] -in $IncludeOwnerType) {
} else {
continue
}
}
if ($PSBoundParameters.ContainsKey('ExcludeOwnerType')) {
if ($Hash['OwnerType'] -in $ExcludeOwnerType) {
continue
}
}
}
$Hash['Error'] = $ErrorMessage
[PSCustomObject] $Hash
}
}
End {
}
}
function Get-DNSServerIP {
<#
.SYNOPSIS
Retrieves DNS server IP information for specified computers.
.DESCRIPTION
This function retrieves DNS server IP information for the specified computers. It checks if the DNS servers are in the approved list and if at least two DNS servers are configured.
.PARAMETER ComputerName
Specifies the names of the computers to retrieve DNS server information from.
.PARAMETER ApprovedList
Specifies the list of approved DNS server IP addresses.
.PARAMETER Credential
Specifies a credential object to use for accessing the computers.
.EXAMPLE
Get-DNSServerIP -ComputerName "Computer01" -ApprovedList "192.168.1.1", "192.168.1.2"
.NOTES
File: Get-DNSServerIP.ps1
Author: [Your Name]
Version: 1.0
Date: [Current Date]
#>
[alias('Get-WinDNSServerIP')]
param(
[string[]] $ComputerName,
[string[]] $ApprovedList,
[pscredential] $Credential
)
foreach ($Computer in $ComputerName) {
$Adapters = Get-CimData -Class Win32_NetworkAdapterConfiguration -ComputerName $Computer -ErrorAction Stop | Where-Object { $_.DHCPEnabled -ne 'True' -and $null -ne $_.DNSServerSearchOrder }
if ($Adapters) {
foreach ($Adapter in $Adapters) {
$AllApproved = $true
foreach ($DNS in $Adapter.DNSServerSearchOrder) {
if ($DNS -notin $ApprovedList) {
$AllApproved = $true
}
}
$AtLeastTwo = $Adapter.DNSServerSearchOrder.Count -ge 2
$Output = [ordered] @{
DNSHostName = $Adapter.DNSHostName
Status = $AllApproved -and $AtLeastTwo
Approved = $AllApproved
AtLeastTwo = $AtLeastTwo
Connected = $true
IPAddress = $Adapter.IPAddress -join ', '
DNSServerSearchOrder = $Adapter.DNSServerSearchOrder -join ', '
DefaultIPGateway = $Adapter.DefaultIPGateway -join ', '
IPSubnet = $Adapter.IPSubnet -join ', '
Description = $Adapter.Description
}
if (-not $ApprovedList) {
$Output.Remove('Approved')
$Output.Remove('Status')
}
[PSCustomObject] $Output
}
} else {
$Output = [ordered] @{
DNSHostName = $Computer
Status = $false
Approved = $false
AtLeastTwo = $false
Connected = $false
IPAddress = $null
DNSServerSearchOrder = $null
DefaultIPGateway = $null
IPSubnet = $null
Description = $ErrorMessage
}
if (-not $ApprovedList) {
$Output.Remove('Approved')
$Output.Remove('Status')
}
[PSCustomObject] $Output
}
}
}
function Get-PingCastleReport {
<#
.SYNOPSIS
Retrieves PingCastle report data from the specified file.
.DESCRIPTION
This function retrieves PingCastle report data from the specified file path.
.PARAMETER FilePath
Specifies the path to the PingCastle report file.
.EXAMPLE
Get-PingCastleReport -FilePath "C:\Reports\PingCastleReport.xml"
Retrieves PingCastle report data from the specified file.
.NOTES
General notes
#>
[CmdletBinding()]
param(
[string] $FilePath
)
if (-not (Test-Path $FilePath)) {
Write-Warning -Message "Get-PingCastle - File $FilePath does not exist. "
return
}
$XmlRiskRules = (Select-Xml -Path $FilePath -XPath "/HealthcheckData/RiskRules").node
$XmlDomainName = (Select-Xml -Path $FilePath -XPath "/HealthcheckData/DomainFQDN").node.InnerXML
$XmlScanDate = [datetime](Select-Xml -Path $FilePath -XPath "/HealthcheckData/GenerationDate").node.InnerXML
$XmlRisks = $XmlRiskRules.HealthcheckRiskRule | Select-Object Category, Points, Rationale, RiskId
$XmlRisksPoints = $XmlRisks | Measure-Object -Sum Points
$DataOutput = [ordered] @{
DomainName = $XmlDomainName
DateScan = $XmlScanDate
TotalPoints = $XmlRisksPoints.Sum
Risks = $XmlRisks
Categories = [ordered]@{}
RisksIds = [ordered]@{}
}
foreach ($Risk in $XmlRisks) {
$Category = $Risk.Category
if (-not $DataOutput.Categories[$Category]) {
$DataOutput.Categories[$Category] = [System.Collections.Generic.List[object]]::new()
}
$DataOutput.Categories[$Category].Add($Risk)
}
foreach ($Risk in $XmlRisks) {
$RiskId = $Risk.RiskId
$DataOutput.RisksIds[$RiskId] = $Risk
}
$DataOutput
}
function Get-WinADACLConfiguration {
<#
.SYNOPSIS
Gets permissions or owners from configuration partition
.DESCRIPTION
Gets permissions or owners from configuration partition for one or multiple types
.PARAMETER ObjectType
Gets permissions or owners from one or multiple types (and only that type). Possible choices are sites, subnets, interSiteTransport, siteLink, wellKnownSecurityPrincipals
.PARAMETER ContainerType
Gets permissions or owners from one or multiple types (including containers and anything below it). Possible choices are sites, subnets, interSiteTransport, siteLink, wellKnownSecurityPrincipals, services
.PARAMETER Owner
Queries for Owners, instead of permissions
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExtendedForestInformation
Ability to provide Forest Information from another command to speed up processing
.EXAMPLE
Get-WinADACLConfiguration -ObjectType 'interSiteTransport', 'siteLink', 'wellKnownSecurityPrincipals' | Format-Table
.EXAMPLE
Get-WinADACLConfiguration -ContainerType 'sites' -Owner | Format-Table
.NOTES
General notes
#>
[cmdletBinding(DefaultParameterSetName = 'ObjectType')]
param(
[parameter(ParameterSetName = 'ObjectType', Mandatory)][ValidateSet('site', 'subnet', 'interSiteTransport', 'siteLink', 'wellKnownSecurityPrincipal')][string[]] $ObjectType,
[parameter(ParameterSetName = 'FolderType', Mandatory)][ValidateSet('site', 'subnet', 'interSiteTransport', 'siteLink', 'wellKnownSecurityPrincipal', 'service')][string[]] $ContainerType,
[switch] $Owner,
[string] $Forest,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -ExtendedForestInformation $ExtendedForestInformation
$QueryServer = $ForestInformation.QueryServers[$($ForestInformation.Forest.Name)]['HostName'][0]
$ForestDN = ConvertTo-DistinguishedName -ToDomain -CanonicalName $ForestInformation.Forest.Name
if ($ObjectType) {
if ($ObjectType -contains 'site') {
$getADObjectSplat = @{
Server = $QueryServer
LDAPFilter = '(objectClass=site)'
SearchBase = "CN=Sites,CN=Configuration,$($($ForestDN))"
SearchScope = 'OneLevel'
Properties = 'Name', 'CanonicalName', 'DistinguishedName', 'WhenCreated', 'WhenChanged', 'ObjectClass', 'ProtectedFromAccidentalDeletion', 'siteobjectbl', 'gplink', 'Description'
}
Get-ADConfigurationPermission -ADObjectSplat $getADObjectSplat -ObjectType 'Site' -Owner:$Owner
}
if ($ObjectType -contains 'subnet') {
$getADObjectSplat = @{
Server = $QueryServer
LDAPFilter = '(objectClass=subnet)'
SearchBase = "CN=Subnets,CN=Sites,CN=Configuration,$($($ForestDN))"
SearchScope = 'OneLevel'
Properties = 'Name', 'distinguishedName', 'CanonicalName', 'WhenCreated', 'whenchanged', 'ProtectedFromAccidentalDeletion', 'siteObject', 'location', 'objectClass', 'Description'
}
Get-ADConfigurationPermission -ADObjectSplat $getADObjectSplat -ObjectType 'Subnet' -Owner:$Owner
}
if ($ObjectType -contains 'interSiteTransport') {
$getADObjectSplat = @{
Server = $QueryServer
LDAPFilter = '(objectClass=interSiteTransport)'
SearchBase = "CN=Inter-Site Transports,CN=Sites,CN=Configuration,$($($ForestDN))"
SearchScope = 'OneLevel'
Properties = 'Name', 'distinguishedName', 'CanonicalName', 'WhenCreated', 'whenchanged', 'ProtectedFromAccidentalDeletion', 'siteObject', 'location', 'objectClass', 'Description'
}
Get-ADConfigurationPermission -ADObjectSplat $getADObjectSplat -ObjectType 'InterSiteTransport' -Owner:$Owner
}
if ($ObjectType -contains 'siteLink') {
$getADObjectSplat = @{
Server = $QueryServer
LDAPFilter = '(objectClass=siteLink)'
SearchBase = "CN=Inter-Site Transports,CN=Sites,CN=Configuration,$($($ForestDN))"
SearchScope = 'OneLevel'
Properties = 'Name', 'distinguishedName', 'CanonicalName', 'WhenCreated', 'whenchanged', 'ProtectedFromAccidentalDeletion', 'siteObject', 'location', 'objectClass', 'Description'
}
Get-ADConfigurationPermission -ADObjectSplat $getADObjectSplat -ObjectType 'Site' -Owner:$Owner
}
if ($ObjectType -contains 'wellKnownSecurityPrincipal') {
$getADObjectSplat = @{
Server = $QueryServer
LDAPFilter = '(objectClass=foreignSecurityPrincipal)'
SearchBase = "CN=WellKnown Security Principals,CN=Configuration,$($($ForestDN))"
SearchScope = 'OneLevel'
Properties = 'Name', 'distinguishedName', 'CanonicalName', 'WhenCreated', 'whenchanged', 'ProtectedFromAccidentalDeletion', 'siteObject', 'location', 'objectClass', 'Description'
}
Get-ADConfigurationPermission -ADObjectSplat $getADObjectSplat -ObjectType 'WellKnownSecurityPrincipals' -Owner:$Owner
}
} else {
if ($ContainerType -contains 'site') {
$getADObjectSplat = @{
Server = $QueryServer
#LDAPFilter = '(objectClass=site)'
Filter = "*"
SearchBase = "CN=Sites,CN=Configuration,$($($ForestDN))"
#SearchScope = 'OneLevel'
Properties = 'Name', 'CanonicalName', 'DistinguishedName', 'WhenCreated', 'WhenChanged', 'ObjectClass', 'ProtectedFromAccidentalDeletion', 'siteobjectbl', 'gplink', 'Description'
}
Get-ADConfigurationPermission -ADObjectSplat $getADObjectSplat -ObjectType 'Site' -FilterOut -Owner:$Owner
}
if ($ContainerType -contains 'subnet') {
$getADObjectSplat = @{
Server = $QueryServer
#LDAPFilter = '(objectClass=subnet)'
Filter = "*"
SearchBase = "CN=Subnets,CN=Sites,CN=Configuration,$($($ForestDN))"
#SearchScope = 'OneLevel'
Properties = 'Name', 'distinguishedName', 'CanonicalName', 'WhenCreated', 'whenchanged', 'ProtectedFromAccidentalDeletion', 'siteObject', 'location', 'objectClass', 'Description'
}
Get-ADConfigurationPermission -ADObjectSplat $getADObjectSplat -ObjectType 'Subnet' -Owner:$Owner
}
if ($ContainerType -contains 'interSiteTransport') {
$getADObjectSplat = @{
Server = $QueryServer
#LDAPFilter = '(objectClass=interSiteTransport)'
Filter = '*'
SearchBase = "CN=Inter-Site Transports,CN=Sites,CN=Configuration,$($($ForestDN))"
#SearchScope = 'OneLevel'
Properties = 'Name', 'distinguishedName', 'CanonicalName', 'WhenCreated', 'whenchanged', 'ProtectedFromAccidentalDeletion', 'siteObject', 'location', 'objectClass', 'Description'
}
Get-ADConfigurationPermission -ADObjectSplat $getADObjectSplat -ObjectType 'InterSiteTransport' -Owner:$Owner
}
if ($ContainerType -contains 'siteLink') {
$getADObjectSplat = @{
Server = $QueryServer
Filter = '*'
#LDAPFilter = '(objectClass=siteLink)'
SearchBase = "CN=Inter-Site Transports,CN=Sites,CN=Configuration,$($($ForestDN))"
#SearchScope = 'OneLevel'
Properties = 'Name', 'distinguishedName', 'CanonicalName', 'WhenCreated', 'whenchanged', 'ProtectedFromAccidentalDeletion', 'siteObject', 'location', 'objectClass', 'Description'
}
Get-ADConfigurationPermission -ADObjectSplat $getADObjectSplat -ObjectType 'Site' -Owner:$Owner
}
if ($ContainerType -contains 'service') {
$getADObjectSplat = @{
Server = $QueryServer
#LDAPFilter = '(objectClass=foreignSecurityPrincipal)'
Filter = '*'
SearchBase = "CN=Services,CN=Configuration,$($($ForestDN))"
#SearchScope = 'OneLevel'
Properties = 'Name', 'distinguishedName', 'CanonicalName', 'WhenCreated', 'whenchanged', 'ProtectedFromAccidentalDeletion', 'siteObject', 'location', 'objectClass', 'Description'
}
Get-ADConfigurationPermission -ADObjectSplat $getADObjectSplat -ObjectType 'service' -Owner:$Owner
}
if ($ContainerType -contains 'wellKnownSecurityPrincipal') {
$getADObjectSplat = @{
Server = $QueryServer
#LDAPFilter = '(objectClass=foreignSecurityPrincipal)'
Filter = '*'
SearchBase = "CN=WellKnown Security Principals,CN=Configuration,$($($ForestDN))"
#SearchScope = 'OneLevel'
Properties = 'Name', 'distinguishedName', 'CanonicalName', 'WhenCreated', 'whenchanged', 'ProtectedFromAccidentalDeletion', 'siteObject', 'location', 'objectClass', 'Description'
}
Get-ADConfigurationPermission -ADObjectSplat $getADObjectSplat -ObjectType 'WellKnownSecurityPrincipals' -Owner:$Owner
}
}
}
function Get-WinADACLForest {
<#
.SYNOPSIS
Gets permissions or owners from forest
.DESCRIPTION
Gets permissions or owners from forest
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExcludeDomains
Exclude domain from search, by default whole forest is scanned
.PARAMETER IncludeDomains
Include only specific domains, by default whole forest is scanned
.PARAMETER ExtendedForestInformation
Ability to provide Forest Information from another command to speed up processing
.PARAMETER Owner
Queries for Owners, instead of permissions
.PARAMETER IncludeOwnerType
Include only specific Owner Type, by default all Owner Types are included
.PARAMETER ExcludeOwnerType
Exclude specific Owner Type, by default all Owner Types are included
.PARAMETER Separate
Returns OrderedDictionary with each top level container being in separate key
.PARAMETER OutputFile
Saves output to Excel file. Requires PSWriteExcel module.
This was added to speed up processing and reduce memory usage.
When using this option, you can use PassThru option, to get objects as well.
.PARAMETER PassThru
Returns objects as well as saves to Excel file. Requires PSWriteExcel module.
.EXAMPLE
# With split per sheet
$FilePath = "$Env:USERPROFILE\Desktop\PermissionsOutputPerSheet.xlsx"
$Permissions = Get-WinADACLForest -Verbose -SplitWorkSheets
foreach ($Perm in $Permissions.Keys) {
$Permissions[$Perm] | ConvertTo-Excel -FilePath $FilePath -ExcelWorkSheetName $Perm -AutoFilter -AutoFit -FreezeTopRowFirstColumn
}
$Permissions | Format-Table *
.EXAMPLE
# With owners in one sheet
$FilePath = "$Env:USERPROFILE\Desktop\PermissionsOutput.xlsx"
$Permissions = Get-WinADACLForest -Verbose
$Permissions | ConvertTo-Excel -FilePath $FilePath -ExcelWorkSheetName 'Permissions' -AutoFilter -AutoFit -FreezeTopRowFirstColumn
$Permissions | Format-Table *
.EXAMPLE
# With split per sheet
$FilePath = "$Env:USERPROFILE\Desktop\OwnersOutput.xlsx"
$Owners = Get-WinADACLForest -Verbose -SplitWorkSheets -Owner
foreach ($Owner in $Owners.Keys) {
$Owners[$Owner] | ConvertTo-Excel -FilePath $FilePath -ExcelWorkSheetName $Owner -AutoFilter -AutoFit -FreezeTopRowFirstColumn
}
$Owners | Format-Table *
.EXAMPLE
# With owners in one sheet
$FilePath = "$Env:USERPROFILE\Desktop\OwnersOutput.xlsx"
$Owners = Get-WinADACLForest -Verbose -Owner
$Owners | ConvertTo-Excel -FilePath $FilePath -ExcelWorkSheetName 'AllOwners' -AutoFilter -AutoFit -FreezeTopRowFirstColumn
$Owners | Format-Table *
.NOTES
General notes
#>
[cmdletBinding()]
param(
[string] $Forest,
[alias('Domain')][string[]] $IncludeDomains,
[string[]] $ExcludeDomains,
[System.Collections.IDictionary] $ExtendedForestInformation,
[string[]] $SearchBase,
[switch] $Owner,
[switch] $Separate,
[switch] $IncludeInherited,
[validateSet('WellKnownAdministrative', 'Administrative', 'NotAdministrative', 'Unknown')][string[]] $IncludeOwnerType,
[validateSet('WellKnownAdministrative', 'Administrative', 'NotAdministrative', 'Unknown')][string[]] $ExcludeOwnerType,
[string] $OutputFile,
[switch] $PassThru
)
if ($OutputFile) {
$CommandExists = Get-Command -Name 'ConvertTo-Excel' -ErrorAction SilentlyContinue
if (-not $CommandExists) {
Write-Warning -Message "ConvertTo-Excel command is missing. Please install PSWriteExcel module when using OutputFile option."
Write-Warning -Message "Install-Module -Name PSWriteExcel -Force -Verbose"
return
}
}
$ForestTime = Start-TimeLog
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation -Extended
$Output = [ordered]@{}
foreach ($Domain in $ForestInformation.Domains) {
if ($SearchBase) {
# Lets do quick removal when domain doesn't match so we don't use search base by accident
$Found = $false
foreach ($S in $SearchBase) {
$DN = $ForestInformation['DomainsExtended'][$Domain].DistinguishedName
$CurrentObjectDC = ConvertFrom-DistinguishedName -DistinguishedName $S -ToDC
if ($CurrentObjectDC -eq $DN) {
$Found = $true
break
}
}
if ($Found -eq $false) {
continue
}
}
Write-Verbose -Message "Get-WinADACLForest - [Start][Domain $Domain]"
$DomainTime = Start-TimeLog
$Output[$Domain] = [ordered] @{}
$Server = $ForestInformation.QueryServers[$Domain].HostName[0]
$DomainStructure = @(
if ($SearchBase) {
foreach ($S in $SearchBase) {
Get-ADObject -Filter "*" -Properties canonicalName, ntSecurityDescriptor -SearchScope Base -SearchBase $S -Server $Server
}
} else {
Get-ADObject -Filter "*" -Properties canonicalName, ntSecurityDescriptor -SearchScope Base -Server $Server
Get-ADObject -Filter "*" -Properties canonicalName, ntSecurityDescriptor -SearchScope OneLevel -Server $Server
}
)
$LdapFilter = "(|(ObjectClass=user)(ObjectClass=contact)(ObjectClass=computer)(ObjectClass=group)(objectClass=inetOrgPerson)(objectClass=foreignSecurityPrincipal)(objectClass=container)(objectClass=organizationalUnit)(objectclass=msDS-ManagedServiceAccount)(objectclass=msDS-GroupManagedServiceAccount))"
$DomainStructure = $DomainStructure | Sort-Object -Property canonicalName
foreach ($Structure in $DomainStructure) {
$Time = Start-TimeLog
$ObjectName = "[$Domain][$($Structure.CanonicalName)][$($Structure.ObjectClass)][$($Structure.DistinguishedName)]"
#$ObjectOutputName = "$($Structure.Name)_$($Structure.ObjectClass)".Replace(' ', '').ToLower()
$ObjectOutputName = "$($Structure.Name)".Replace(' ', '').ToLower()
Write-Verbose -Message "Get-WinADACLForest - [Start]$ObjectName"
if ($Structure.ObjectClass -eq 'organizationalUnit') {
#$Containers = Get-ADOrganizationalUnit -Filter '*' -Server $Server -SearchBase $Structure.DistinguishedName -Properties canonicalName
$Ignore = @()
$Containers = @(
Get-ADObject -LDAPFilter $LdapFilter -SearchBase $Structure.DistinguishedName -Properties canonicalName, ntSecurityDescriptor -Server $Server -SearchScope Subtree | ForEach-Object {
$Found = $false
foreach ($I in $Ignore) {
if ($_.DistinguishedName -like $I) {
$Found = $true
}
}
if (-not $Found) {
$_
}
}
) | Sort-Object canonicalName
} elseif ($Structure.ObjectClass -eq 'domainDNS') {
$Containers = $Structure
} elseif ($Structure.ObjectClass -eq 'container') {
$Ignore = @(
# lets ignore GPO, we deal with it in GPOZaurr
-join ('*CN=Policies,CN=System,', $ForestInformation['DomainsExtended'][$DOmain].DistinguishedName)
-join ('*,CN=System,', $ForestInformation['DomainsExtended'][$DOmain].DistinguishedName)
)
$Containers = Get-ADObject -LDAPFilter $LdapFilter -SearchBase $Structure.DistinguishedName -Properties canonicalName, ntSecurityDescriptor -Server $Server -SearchScope Subtree | ForEach-Object {
$Found = $false
foreach ($I in $Ignore) {
if ($_.DistinguishedName -like $I) {
$Found = $true
}
}
if (-not $Found) {
$_
}
} | Sort-Object canonicalName
} else {
$EndTime = Stop-TimeLog -Time $Time -Option OneLiner
Write-Verbose -Message "Get-WinADACLForest - [Skip ]$ObjectName[ObjectClass not requested]"
continue
}
if (-not $Containers) {
$EndTime = Stop-TimeLog -Time $Time -Option OneLiner
Write-Verbose -Message "Get-WinADACLForest - [End ]$ObjectName[$EndTime]"
continue
}
Write-Verbose -Message "Get-WinADACLForest - [Read ]$ObjectName[Objects to process: $($Containers.Count)]"
if ($Owner) {
$getADACLOwnerSplat = @{
ADObject = $Containers
Resolve = $true
ExcludeOwnerType = $ExcludeOwnerType
IncludeOwnerType = $IncludeOwnerType
}
Remove-EmptyValue -IDictionary $getADACLOwnerSplat
$MYACL = Get-ADACLOwner @getADACLOwnerSplat
} else {
if ($IncludeInherited) {
$MYACL = Get-ADACL -ADObject $Containers -ResolveTypes
} else {
$MYACL = Get-ADACL -ADObject $Containers -ResolveTypes -NotInherited
}
}
if ($OutputFile) {
$TimeExport = Start-TimeLog
$Extension = [io.path]::GetExtension($OutputFile)
$DirectoryPath = [io.path]::GetDirectoryName($OutputFile)
$FileName = [io.path]::GetFileNameWithoutExtension($OutputFile)
if ($ForestInformation.Domains.Count -gt 1) {
$FinalPath = [io.path]::Combine($DirectoryPath, "$FileName-$Domain$Extension")
} else {
$FinalPath = [io.path]::Combine($DirectoryPath, "$FileName$Extension")
}
Write-Verbose -Message "Get-WinADACLForest - [Save ]$ObjectName[OutputFile: $FinalPath]"
if ($Structure.ObjectClass -eq 'domainDns') {
$WorkSheetName = "$($Structure.CanonicalName)".Replace("/", "")
} else {
$WorkSheetName = "$($Structure.Name)"
}
$MYACL | ConvertTo-Excel -FilePath $FinalPath -ExcelWorkSheetName $WorkSheetName -AutoFilter -AutoFit -FreezeTopRowFirstColumn
$EndTimeExport = Stop-TimeLog -Time $TimeExport -Option OneLiner
Write-Verbose -Message "Get-WinADACLForest - [End ]$ObjectName[OutputFile: $FinalPath][$EndTimeExport]"
Write-Verbose -Message "Get-WinADACLForest - [Start]$ObjectName[Garbage Collection]"
[System.GC]::Collect()
Start-Sleep -Seconds 5
[System.GC]::Collect()
Write-Verbose -Message "Get-WinADACLForest - [End ]$ObjectName[Garbage Collection][Done]"
if ($PassThru) {
$MYACL
}
} elseif ($Separate) {
$Output[$Domain][$ObjectOutputName] = $MYACL
} else {
$MYACL
}
$EndTime = Stop-TimeLog -Time $Time -Option OneLiner
Write-Verbose -Message "Get-WinADACLForest - [End ]$ObjectName[$EndTime]"
}
$DomainEndTime = Stop-TimeLog -Time $DomainTime -Option OneLiner
Write-Verbose -Message "Get-WinADACLForest - [End ][Domain $Domain][$DomainEndTime]"
}
$ForestEndTime = Stop-TimeLog -Time $ForestTime -Option OneLiner
Write-Verbose -Message "Get-WinADACLForest - [End ][Forest][$ForestEndTime]"
if ($Separate) {
$Output
}
}
function Get-WinADBitlockerLapsSummary {
<#
.SYNOPSIS
Retrieves BitLocker and LAPS information for computers in Active Directory.
.DESCRIPTION
This function retrieves BitLocker and LAPS information for computers in Active Directory based on the specified parameters.
.PARAMETER Forest
Specifies the name of the forest to query for computer information.
.PARAMETER IncludeDomains
Specifies an array of domains to include in the query.
.PARAMETER ExcludeDomains
Specifies an array of domains to exclude from the query.
.PARAMETER Filter
Specifies the filter to apply when querying for computers.
.PARAMETER SearchBase
Specifies the search base for the query.
.PARAMETER SearchScope
Specifies the scope of the search (Base, OneLevel, SubTree, None).
.PARAMETER LapsOnly
Switch to retrieve only LAPS information.
.PARAMETER BitlockerOnly
Switch to retrieve only BitLocker information.
.PARAMETER ExtendedForestInformation
Specifies additional forest information to include in the query.
.EXAMPLE
Get-WinADBitlockerLapsSummary -Forest "contoso.com" -IncludeDomains "child1.contoso.com", "child2.contoso.com" -ExcludeDomains "test.contoso.com" -LapsOnly
Retrieves LAPS information for computers in the specified domains of the "contoso.com" forest, excluding "test.contoso.com".
.EXAMPLE
Get-WinADBitlockerLapsSummary -Forest "contoso.com" -IncludeDomains "child1.contoso.com", "child2.contoso.com" -ExcludeDomains "test.contoso.com" -BitlockerOnly
Retrieves BitLocker information for computers in the specified domains of the "contoso.com" forest, excluding "test.contoso.com".
.NOTES
General notes
#>
[CmdletBinding(DefaultParameterSetName = 'Default')]
param(
[Parameter(ParameterSetName = 'Default')]
[Parameter(ParameterSetName = 'LapsOnly')]
[Parameter(ParameterSetName = 'BitlockerOnly')]
[alias('ForestName')][string] $Forest,
[Parameter(ParameterSetName = 'Default')]
[Parameter(ParameterSetName = 'LapsOnly')]
[Parameter(ParameterSetName = 'BitlockerOnly')]
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[Parameter(ParameterSetName = 'Default')]
[Parameter(ParameterSetName = 'LapsOnly')]
[Parameter(ParameterSetName = 'BitlockerOnly')]
[string[]] $ExcludeDomains,
[Parameter(ParameterSetName = 'Default')]
[Parameter(ParameterSetName = 'LapsOnly')]
[Parameter(ParameterSetName = 'BitlockerOnly')]
[string] $Filter = '*',
[Parameter(ParameterSetName = 'Default')]
[Parameter(ParameterSetName = 'LapsOnly')]
[Parameter(ParameterSetName = 'BitlockerOnly')]
[string] $SearchBase,
[Parameter(ParameterSetName = 'Default')]
[Parameter(ParameterSetName = 'LapsOnly')]
[Parameter(ParameterSetName = 'BitlockerOnly')]
[ValidateSet('Base', 'OneLevel', 'SubTree', 'None')] [string] $SearchScope = 'None',
[Parameter(ParameterSetName = 'LapsOnly')][switch] $LapsOnly,
[Parameter(ParameterSetName = 'BitlockerOnly')][switch] $BitlockerOnly,
[Parameter(ParameterSetName = 'Default')]
[Parameter(ParameterSetName = 'LapsOnly')]
[Parameter(ParameterSetName = 'BitlockerOnly')]
[System.Collections.IDictionary] $ExtendedForestInformation
)
$Today = Get-Date
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
$ComputerProperties = Get-WinADForestSchemaProperties -Schema 'Computers' -Forest $Forest -ExtendedForestInformation $ForestInformation
$Properties = @(
'Name'
'OperatingSystem'
'OperatingSystemVersion'
'DistinguishedName'
'LastLogonDate'
'PasswordLastSet'
'PrimaryGroupID'
if ($ComputerProperties.Name -contains 'ms-Mcs-AdmPwd') {
$LapsAvailable = $true
'ms-Mcs-AdmPwd'
'ms-Mcs-AdmPwdExpirationTime'
} else {
$LapsAvailable = $false
}
if ($ComputerProperties.Name -contains 'msLAPS-Password') {
$WindowsLapsAvailable = $true
'msLAPS-PasswordExpirationTime'
'msLAPS-Password'
'msLAPS-EncryptedPassword'
'msLAPS-EncryptedPasswordHistory'
'msLAPS-EncryptedDSRMPassword'
'msLAPS-EncryptedDSRMPasswordHistory'
} else {
$WindowsLapsAvailable = $false
}
)
$CurrentDate = Get-Date
$FormattedComputers = foreach ($Domain in $ForestInformation.Domains) {
$QueryServer = $ForestInformation['QueryServers']["$Domain"].HostName[0]
$Parameters = @{ }
if ($SearchScope -ne 'None') {
$Parameters.SearchScope = $SearchScope
}
if ($SearchBase) {
# If SearchBase is defined we need to check it belongs to current domain
# if it does, great. If not we need to skip it
$DomainInformation = Get-ADDomain -Server $QueryServer
$DNExtract = ConvertFrom-DistinguishedName -DistinguishedName $SearchBase -ToDC
if ($DNExtract -eq $DomainInformation.DistinguishedName) {
$Parameters.SearchBase = $SearchBase
} else {
continue
}
}
try {
$Computers = Get-ADComputer -Filter $Filter -Properties $Properties -Server $QueryServer @Parameters -ErrorAction Stop
} catch {
Write-Warning "Get-WinADBitlockerLapsSummary - Error getting computers $($_.Exception.Message)"
}
foreach ($_ in $Computers) {
if ($LapsOnly -or -not $BitlockerOnly) {
if ($LapsAvailable) {
if ($_.'ms-Mcs-AdmPwdExpirationTime') {
$Laps = $true
$LapsExpirationDays = Convert-TimeToDays -StartTime ($CurrentDate) -EndTime (Convert-ToDateTime -Timestring ($_.'ms-Mcs-AdmPwdExpirationTime'))
$LapsExpirationTime = Convert-ToDateTime -Timestring ($_.'ms-Mcs-AdmPwdExpirationTime')
} else {
$Laps = $false
$LapsExpirationDays = $null
$LapsExpirationTime = $null
}
} else {
$Laps = $null
}
}
if ($WindowsLapsAvailable) {
if ($_.'msLAPS-PasswordExpirationTime') {
$WindowsLaps = $true
$WindowsLapsExpirationDays = Convert-TimeToDays -StartTime ($CurrentDate) -EndTime (Convert-ToDateTime -Timestring ($_.'msLAPS-PasswordExpirationTime'))
$WindowsLapsExpirationTime = Convert-ToDateTime -Timestring ($_.'msLAPS-PasswordExpirationTime')
$WindowsLapsHistoryCount = $_.'msLAPS-EncryptedPasswordHistory'.Count
} else {
$WindowsLaps = $false
$WindowsLapsExpirationDays = $null
$WindowsLapsExpirationTime = $null
$WindowsLapsHistoryCount = 0
}
} else {
$WindowsLaps = $null
$WindowsLapsExpirationDays = $null
$WindowsLapsExpirationTime = $null
$WindowsLapsHistoryCount = 0
}
if (-not $LapsOnly -or $BitlockerOnly) {
[Array] $Bitlockers = Get-ADObject -Server $QueryServer -Filter 'objectClass -eq "msFVE-RecoveryInformation"' -SearchBase $_.DistinguishedName -Properties 'WhenCreated', 'msFVE-RecoveryPassword' | Sort-Object -Descending
if ($Bitlockers) {
$Encrypted = $true
$EncryptedTime = $Bitlockers[0].WhenCreated
} else {
$Encrypted = $false
$EncryptedTime = $null
}
}
if ($null -ne $_.LastLogonDate) {
[int] $LastLogonDays = "$(-$($_.LastLogonDate - $Today).Days)"
} else {
$LastLogonDays = $null
}
if ($null -ne $_.PasswordLastSet) {
[int] $PasswordLastChangedDays = "$(-$($_.PasswordLastSet - $Today).Days)"
} else {
$PasswordLastChangedDays = $null
}
if ($LapsOnly) {
[PSCustomObject] @{
Name = $_.Name
Enabled = $_.Enabled
Domain = $Domain
DNSHostName = $_.DNSHostName
IsDC = if ($_.PrimaryGroupID -in 516, 521) {
$true
} else {
$false
}
Laps = $Laps
LapsExpirationDays = $LapsExpirationDays
LapsExpirationTime = $LapsExpirationTime
WindowsLaps = $WindowsLaps
WindowsLapsExpirationDays = $WindowsLapsExpirationDays
WindowsLapsExpirationTime = $WindowsLapsExpirationTime
WindowsLapsHistoryCount = $WindowsLapsHistoryCount
System = ConvertTo-OperatingSystem -OperatingSystem $_.OperatingSystem -OperatingSystemVersion $_.OperatingSystemVersion
LastLogonDate = $_.LastLogonDate
LastLogonDays = $LastLogonDays
PasswordLastSet = $_.PasswordLastSet
PasswordLastChangedDays = $PasswordLastChangedDays
OrganizationalUnit = ConvertFrom-DistinguishedName -DistinguishedName $_.DistinguishedName -ToOrganizationalUnit
DistinguishedName = $_.DistinguishedName
}
} elseif ($BitlockerOnly) {
[PSCustomObject] @{
Name = $_.Name
Enabled = $_.Enabled
Domain = $Domain
DNSHostName = $_.DNSHostName
IsDC = if ($_.PrimaryGroupID -in 516, 521) {
$true
} else {
$false
}
Encrypted = $Encrypted
EncryptedTime = $EncryptedTime
System = ConvertTo-OperatingSystem -OperatingSystem $_.OperatingSystem -OperatingSystemVersion $_.OperatingSystemVersion
LastLogonDate = $_.LastLogonDate
LastLogonDays = $LastLogonDays
PasswordLastSet = $_.PasswordLastSet
PasswordLastChangedDays = $PasswordLastChangedDays
OrganizationalUnit = ConvertFrom-DistinguishedName -DistinguishedName $_.DistinguishedName -ToOrganizationalUnit
DistinguishedName = $_.DistinguishedName
}
} else {
[PSCustomObject] @{
Name = $_.Name
Enabled = $_.Enabled
Domain = $Domain
DNSHostName = $_.DNSHostName
IsDC = if ($_.PrimaryGroupID -in 516, 521) {
$true
} else {
$false
}
Encrypted = $Encrypted
EncryptedTime = $EncryptedTime
Laps = $Laps
LapsExpirationDays = $LapsExpirationDays
LapsExpirationTime = $LapsExpirationTime
WindowsLaps = $WindowsLaps
WindowsLapsExpirationDays = $WindowsLapsExpirationDays
WindowsLapsExpirationTime = $WindowsLapsExpirationTime
WindowsLapsHistoryCount = $WindowsLapsHistoryCount
System = ConvertTo-OperatingSystem -OperatingSystem $_.OperatingSystem -OperatingSystemVersion $_.OperatingSystemVersion
LastLogonDate = $_.LastLogonDate
LastLogonDays = $LastLogonDays
PasswordLastSet = $_.PasswordLastSet
PasswordLastChangedDays = $PasswordLastChangedDays
OrganizationalUnit = ConvertFrom-DistinguishedName -DistinguishedName $_.DistinguishedName -ToOrganizationalUnit
DistinguishedName = $_.DistinguishedName
}
}
}
}
$FormattedComputers
}
function Get-WinADBrokenProtectedFromDeletion {
<#
.SYNOPSIS
Identifies Active Directory objects with inconsistent protection from accidental deletion settings.
.DESCRIPTION
This cmdlet scans Active Directory for objects where the ProtectedFromAccidentalDeletion flag doesn't match
the actual ACL settings. It helps identify objects that might be at risk of accidental deletion despite
appearing to be protected, or vice versa.
.PARAMETER Forest
The name of the forest to scan. If not specified, the current forest is used.
.PARAMETER ExcludeDomains
Array of domain names to exclude from scanning.
.PARAMETER IncludeDomains
Array of domain names to include in scanning. If not specified, all domains are scanned.
.PARAMETER ExtendedForestInformation
Dictionary containing cached forest information to improve performance.
.PARAMETER Type
Required. Specifies the types of objects to scan. Valid values are:
- Computer
- Group
- User
- ManagedServiceAccount
- GroupManagedServiceAccount
- Contact
- All
.PARAMETER Resolve
Switch to enable name resolution for Everyone permission.
This is only nessecary if you have non-english AD, as Everyone is not Everyone in all languages.
.PARAMETER ReturnBrokenOnly
Switch to return only objects with inconsistent protection settings.
.PARAMETER LimitProcessing
Limits the number of objects to process.
.EXAMPLE
Get-WinADBrokenProtectedFromDeletion -Type All
Scans all supported object types in the current forest for broken protection settings.
.EXAMPLE
Get-WinADBrokenProtectedFromDeletion -Type User,Computer -Forest "contoso.com" -ReturnBrokenOnly
Scans user and computer objects in the specified forest and returns only those with broken protection settings.
.NOTES
This cmdlet performs ACL checks against the Everyone group (S-1-1-0) to determine if delete permissions
are properly denied.
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[System.Collections.IDictionary] $ExtendedForestInformation,
[ValidateSet(
'Computer',
'Group',
'User',
'ManagedServiceAccount',
'GroupManagedServiceAccount',
'Contact',
'All'
)][Parameter(Mandatory)][string[]] $Type,
[switch] $Resolve,
[switch] $ReturnBrokenOnly,
[int] $LimitProcessing
)
# Available objectClasses
# builtinDomain, classStore, computer, contact, container, dfsConfiguration, dnsNode, dnsZone, domainDNS, domainPolicy, fileLinkTracking, foreignSecurityPrincipal, group, groupPolicyContainer, inetOrgPerson, infrastructureUpdate, ipsecFilter, ipsecISAKMPPolicy, ipsecNegotiationPolicy, ipsecNFA, ipsecPolicy, linkTrackObjectMoveTable, linkTrackVolumeTable, lostAndFound, msDFSR-Connection, msDFSR-Content, msDFSR-ContentSet, msDFSR-GlobalSettings, msDFSR-LocalSettings, msDFSR-Member, msDFSR-ReplicationGroup, msDFSR-Subscriber, msDFSR-Subscription, msDFSR-Topology, msDS-GroupManagedServiceAccount, msDS-ManagedServiceAccount, msDS-PasswordSettings, msDS-PasswordSettingsContainer, msDS-QuotaContainer, msExchActiveSyncDevice, msExchActiveSyncDevices, msExchSystemMailbox, msExchSystemObjectsContainer, msFVE-RecoveryInformation, msImaging-PSPs, msPrint-ConnectionPolicy, msTPM-InformationObjectsContainer, msWMI-Som, nTFRSSettings, packageRegistration, rIDManager, rIDSet, rpcContainer, samServer, secret, serviceConnectionPoint, trustedDomain, user
$Today = Get-Date
$Properties = @(
'ProtectedFromAccidentalDeletion'
'NTSecurityDescriptor'
'SamAccountName'
'objectSid'
'ObjectClass'
'whenChanged'
'whenCreated'
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
$CountGlobalBroken = 0
$CountDomain = 0
:fullBreak foreach ($Domain in $ForestInformation.Domains) {
$CountDomain++
Write-Verbose "Get-WinADBrokenProtectedFromDeletion - Processing $Domain [$CountDomain of $($ForestInformation.Domains.Count)]"
$Server = $ForestInformation.QueryServers[$Domain].HostName[0]
[Array] $Objects = @(
if ($Type -contains 'All') {
Get-ADObject -Filter { ObjectClass -eq 'user' -or ObjectClass -eq 'computer' -or ObjectClass -eq 'group' -or ObjectClass -eq 'contact' -or ObjectClass -eq 'msDS-GroupManagedServiceAccount' -or ObjectClass -eq 'msDS-ManagedServiceAccount' } -Properties $Properties -Server $Server
} else {
if ($Type -contains 'User') {
Get-ADObject -Filter { ObjectClass -eq 'user' } -Properties $Properties -Server $Server
}
if ($Type -contains 'Group') {
Get-ADObject -Filter { ObjectClass -eq 'group' } -Properties $Properties -Server $Server
}
if ($Type -contains 'Computer') {
Get-ADObject -Filter { ObjectClass -eq 'computer' } -Properties $Properties -Server $Server
}
if ($Type -contains 'contact') {
Get-ADObject -Filter { ObjectClass -eq 'contact' } -Properties $Properties -Server $Server
}
if ($Type -contains 'GroupManagedServiceAccount') {
Get-ADObject -Filter { ObjectClass -eq 'msDS-GroupManagedServiceAccount' } -Properties $Properties -Server $Server
}
if ($Type -contains 'ManagedServiceAccount') {
Get-ADObject -Filter { ObjectClass -eq 'msDS-ManagedServiceAccount' } -Properties $Properties -Server $Server
}
}
)
if ($Objects.Count -gt 0) {
Write-Verbose -Message "Get-WinADBrokenProtectedFromDeletion - Processing $($Objects.Count) objects in $Domain"
$ProcessedCount = 0
$LastReportedPercent = 0
foreach ($Object in $Objects) {
$ProcessedCount++
$CurrentPercent = [math]::Floor(($ProcessedCount / $Objects.Count) * 100)
# Report every 5%
if ($CurrentPercent - $LastReportedPercent -ge 5) {
Write-Verbose "Get-WinADBrokenProtectedFromDeletion - Processed $ProcessedCount of $($Objects.Count) objects ($CurrentPercent%)"
$LastReportedPercent = $CurrentPercent
}
if ($Resolve) {
# If we want to resolve because of non-english AD
$ACL = Get-ADACL -ADObject $Object -AccessControlType Deny -Resolve -Principal 'S-1-1-0' -IncludeActiveDirectoryRightsExactMatch 'DeleteTree', 'Delete'
} else {
$ACL = Get-ADACL -ADObject $Object -AccessControlType Deny -Principal 'Everyone' -IncludeActiveDirectoryRightsExactMatch 'DeleteTree', 'Delete'
}
if ($ACL) {
$ACLContainsDenyDeleteTree = $true
} else {
$ACLContainsDenyDeleteTree = $false
}
if ($ACLContainsDenyDeleteTree -eq $true -and $Object.ProtectedFromAccidentalDeletion -eq $false) {
$HasBrokenPermissions = $true
} else {
$HasBrokenPermissions = $false
}
if ($ReturnBrokenOnly -and $HasBrokenPermissions -eq $false) {
continue
}
if ($HasBrokenPermissions) {
$CountGlobalBroken++
}
[PSCustomObject] @{
Name = $Object.Name
SamAccountName = $Object.SamAccountName
Domain = $Domain
HasBrokenPermissions = $HasBrokenPermissions
ProtectedFromAccidentalDeletion = $Object.ProtectedFromAccidentalDeletion
ACLContainsDenyDeleteTree = $ACLContainsDenyDeleteTree
ObjectSID = $Object.objectSid
ObjectClass = $Object.ObjectClass
DistinguishedName = $Object.DistinguishedName
ParentContainer = ConvertFrom-DistinguishedName -ToOrganizationalUnit -DistinguishedName $Object.DistinguishedName
WhenChanged = $Object.whenChanged
WhenCreated = $Object.whenCreated
WhenCreatedDays = if ($Object.Whencreated) {
(($Today) - $Object.whenCreated).Days
} else {
$null
}
WhenChangedDays = if ($Object.WhenChanged) {
(($Today) - $Object.whenChanged).Days
} else {
$null
}
}
if ($ReturnBrokenOnly -and $LimitProcessing -and $CountGlobalBroken -ge $LimitProcessing) {
break fullBreak
}
}
}
}
}
function Get-WinADComputerACLLAPS {
<#
.SYNOPSIS
Gathers information from all computers whether they have ACL to write to LAPS properties or not
.DESCRIPTION
Gathers information from all computers whether they have ACL to write to LAPS properties or not
.PARAMETER ACLMissingOnly
Show only computers which do not have ability to write to LAPS properties
.EXAMPLE
Get-WinADComputerAclLAPS | Format-Table *
.EXAMPLE
Get-WinADComputerAclLAPS -ACLMissingOnly | Format-Table *
.NOTES
General notes
#>
[cmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[switch] $ACLMissingOnly,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
foreach ($Domain in $ForestInformation.Domains) {
$Computers = Get-ADComputer -Filter "*" -Properties PrimaryGroupID, LastLogonDate, PasswordLastSet, WhenChanged, OperatingSystem, servicePrincipalName -Server $ForestInformation.QueryServers[$Domain].HostName[0]
foreach ($Computer in $Computers) {
$ComputerLocation = ($Computer.DistinguishedName -split ',').Replace('OU=', '').Replace('CN=', '').Replace('DC=', '')
$Region = $ComputerLocation[-4]
$Country = $ComputerLocation[-5]
$ACLs = Get-ADACL -ADObject $Computer.DistinguishedName -Principal 'NT AUTHORITY\SELF'
$LAPS = $false
$LAPSExpirationTime = $false
$WindowsLAPS = $false
$WindowsLAPSExpirationTime = $false
$WindowsLAPSEncryptedPassword = $false
#$WindowsLAPSEncryptedPasswordHistory = $false
#$WindowsLAPSEncryptedDSRMPassword = $false
# $WindowsLAPSEncryptedDSRMPasswordHistory = $false
<#
msLAPS-PasswordExpirationTime
msLAPS-Password
msLAPS-EncryptedPassword
msLAPS-EncryptedPasswordHistory
msLAPS-EncryptedDSRMPassword
msLAPS-EncryptedDSRMPasswordHistory
#>
foreach ($ACL in $ACLs) {
if ($ACL.ObjectTypeName -eq 'ms-Mcs-AdmPwd') {
# LAPS
if ($ACL.AccessControlType -eq 'Allow' -and $ACL.ActiveDirectoryRights -like '*WriteProperty*') {
$LAPS = $true
}
} elseif ($ACL.ObjectTypeName -eq 'ms-Mcs-AdmPwdExpirationTime') {
# LAPS
if ($ACL.AccessControlType -eq 'Allow' -and $ACL.ActiveDirectoryRights -like '*WriteProperty*') {
$LAPSExpirationTime = $true
}
} elseif ($ACL.ObjectTypeName -eq 'ms-LAPS-Password') {
# Windows LAPS
if ($ACL.AccessControlType -eq 'Allow' -and $ACL.ActiveDirectoryRights -like '*WriteProperty*') {
$WindowsLAPS = $true
}
} elseif ($ACL.ObjectTypeName -eq 'ms-LAPS-PasswordExpirationTime') {
# Windows LAPS
if ($ACL.AccessControlType -eq 'Allow' -and $ACL.ActiveDirectoryRights -like '*WriteProperty*') {
$WindowsLAPSExpirationTime = $true
}
} elseif ($ACL.ObjectTypeName -eq 'ms-LAPS-Encrypted-Password-Attributes') {
if ($ACL.AccessControlType -eq 'Allow' -and $ACL.ActiveDirectoryRights -like '*WriteProperty*') {
$WindowsLAPSEncryptedPassword = $true
}
}
# elseif ($ACL.ObjectTypeName -eq 'ms-LAPS-EncryptedPasswordHistory') {
# if ($ACL.AccessControlType -eq 'Allow' -and $ACL.ActiveDirectoryRights -like '*WriteProperty*') {
# $WindowsLAPSEncryptedPasswordHistory = $true
# }
# } elseif ($ACL.ObjectTypeName -eq 'ms-LAPS-EncryptedDSRMPassword') {
# if ($ACL.AccessControlType -eq 'Allow' -and $ACL.ActiveDirectoryRights -like '*WriteProperty*') {
# $WindowsLAPSEncryptedDSRMPassword = $true
# }
# } elseif ($ACL.ObjectTypeName -eq 'ms-LAPS-EncryptedDSRMPasswordHistory') {
# if ($ACL.AccessControlType -eq 'Allow' -and $ACL.ActiveDirectoryRights -like '*WriteProperty*') {
# $WindowsLAPSEncryptedDSRMPasswordHistory = $true
# }
# }
}
if ($ACLMissingOnly -and $LAPS -eq $true) {
continue
}
[PSCustomObject] @{
Name = $Computer.Name
SamAccountName = $Computer.SamAccountName
DomainName = $Domain
Enabled = $Computer.Enabled
IsDC = if ($Computer.PrimaryGroupID -in 516, 521) {
$true
} else {
$false
}
WhenChanged = $Computer.WhenChanged
LapsACL = $LAPS
LapsExpirationACL = $LAPSExpirationTime
WindowsLAPSACL = $WindowsLAPS
WindowsLAPSExpirationACL = $WindowsLAPSExpirationTime
WindowsLAPSEncryptedPassword = $WindowsLAPSEncryptedPassword
#WindowsLAPSEncryptedPasswordHistory = $WindowsLAPSEncryptedPasswordHistory
#WindowsLAPSEncryptedDSRMPassword = $WindowsLAPSEncryptedDSRMPassword
#WindowsLAPSEncryptedDSRMPasswordHistory = $WindowsLAPSEncryptedDSRMPasswordHistory
OperatingSystem = $Computer.OperatingSystem
Level0 = $Region
Level1 = $Country
DistinguishedName = $Computer.DistinguishedName
LastLogonDate = $Computer.LastLogonDate
PasswordLastSet = $Computer.PasswordLastSet
ServicePrincipalName = $Computer.servicePrincipalName
}
}
}
}
function Get-WinADComputers {
<#
.SYNOPSIS
Retrieves information about computers in Active Directory.
.DESCRIPTION
This function retrieves information about computers in Active Directory based on the specified parameters.
.PARAMETER Forest
Specifies the name of the forest to query for computer information.
.PARAMETER ExcludeDomains
Specifies an array of domains to exclude from the query.
.PARAMETER IncludeDomains
Specifies an array of domains to include in the query.
.PARAMETER PerDomain
Indicates whether to retrieve information per domain.
.PARAMETER AddOwner
Indicates whether to include owner information for the computers.
#>
[cmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[switch] $PerDomain,
[switch] $AddOwner
)
$AllUsers = [ordered] @{}
$AllContacts = [ordered] @{}
$AllGroups = [ordered] @{}
$AllComputers = [ordered] @{}
$CacheUsersReport = [ordered] @{}
$Today = Get-Date
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
foreach ($Domain in $ForestInformation.Domains) {
$QueryServer = $ForestInformation['QueryServers']["$Domain"].HostName[0]
$Properties = @(
'DistinguishedName', 'mail', 'LastLogonDate', 'PasswordLastSet', 'DisplayName', 'Manager', 'Description',
'PasswordNeverExpires', 'PasswordNotRequired', 'PasswordExpired', 'UserPrincipalName', 'SamAccountName', 'CannotChangePassword',
'TrustedForDelegation', 'TrustedToAuthForDelegation', 'msExchMailboxGuid', 'msExchRemoteRecipientType', 'msExchRecipientTypeDetails',
'msExchRecipientDisplayType', 'pwdLastSet', "msDS-UserPasswordExpiryTimeComputed",
'WhenCreated', 'WhenChanged'
)
$AllUsers[$Domain] = Get-ADUser -Filter "*" -Properties $Properties -Server $QueryServer #$ForestInformation['QueryServers'][$Domain].HostName[0]
$AllContacts[$Domain] = Get-ADObject -Filter 'objectClass -eq "contact"' -Properties SamAccountName, Mail, Name, DistinguishedName, WhenChanged, Whencreated, DisplayName -Server $QueryServer
$Properties = @(
'SamAccountName', 'CanonicalName', 'Mail', 'Name', 'DistinguishedName', 'isCriticalSystemObject', 'ObjectSID'
)
$AllGroups[$Domain] = Get-ADGroup -Filter "*" -Properties $Properties -Server $QueryServer
$Properties = @(
'DistinguishedName', 'LastLogonDate', 'PasswordLastSet', 'Enabled', 'DnsHostName', 'PasswordNeverExpires', 'PasswordNotRequired',
'PasswordExpired', 'ManagedBy', 'OperatingSystemVersion', 'OperatingSystem' , 'TrustedForDelegation', 'WhenCreated', 'WhenChanged', 'PrimaryGroupID'
'nTSecurityDescriptor'
)
$AllComputers[$Domain] = Get-ADComputer -Filter "*" -Server $QueryServer -Properties $Properties
}
foreach ($Domain in $AllUsers.Keys) {
foreach ($U in $AllUsers[$Domain]) {
$CacheUsersReport[$U.DistinguishedName] = $U
}
}
foreach ($Domain in $AllContacts.Keys) {
foreach ($C in $AllContacts[$Domain]) {
$CacheUsersReport[$C.DistinguishedName] = $C
}
}
foreach ($Domain in $AllGroups.Keys) {
foreach ($G in $AllGroups[$Domain]) {
$CacheUsersReport[$G.DistinguishedName] = $G
}
}
$Output = [ordered] @{}
foreach ($Domain in $ForestInformation.Domains) {
$QueryServer = $ForestInformation['QueryServers']["$Domain"].HostName[0]
$Output[$Domain] = foreach ($Computer in $AllComputers[$Domain]) {
$ComputerLocation = ($Computer.DistinguishedName -split ',').Replace('OU=', '').Replace('CN=', '').Replace('DC=', '')
$Region = $ComputerLocation[-4]
$Country = $ComputerLocation[-5]
if ($Computer.ManagedBy) {
$Manager = $CacheUsersReport[$Computer.ManagedBy].Name
$ManagerSamAccountName = $CacheUsersReport[$Computer.ManagedBy].SamAccountName
$ManagerEmail = $CacheUsersReport[$Computer.ManagedBy].Mail
$ManagerEnabled = $CacheUsersReport[$Computer.ManagedBy].Enabled
$ManagerLastLogon = $CacheUsersReport[$Computer.ManagedBy].LastLogonDate
if ($ManagerLastLogon) {
$ManagerLastLogonDays = $( - $($ManagerLastLogon - $Today).Days)
} else {
$ManagerLastLogonDays = $null
}
$ManagerStatus = if ($ManagerEnabled -eq $true) {
'Enabled'
} elseif ($ManagerEnabled -eq $false) {
'Disabled'
} else {
'Not available'
}
} else {
$ManagerStatus = 'Not available'
$Manager = $null
$ManagerSamAccountName = $null
$ManagerEmail = $null
$ManagerEnabled = $null
$ManagerLastLogon = $null
$ManagerLastLogonDays = $null
}
if ($null -ne $Computer.LastLogonDate) {
$LastLogonDays = "$(-$($Computer.LastLogonDate - $Today).Days)"
} else {
$LastLogonDays = $null
}
if ($null -ne $Computer.PasswordLastSet) {
$PasswordLastChangedDays = "$(-$($Computer.PasswordLastSet - $Today).Days)"
} else {
$PasswordLastChangedDays = $null
}
if ($AddOwner) {
$Owner = Get-ADACLOwner -ADObject $Computer -Verbose -Resolve
[PSCustomObject] @{
Name = $Computer.Name
SamAccountName = $Computer.SamAccountName
Domain = $Domain
IsDC = if ($Computer.PrimaryGroupID -in 516, 521) {
$true
} else {
$false
}
WhenChanged = $Computer.WhenChanged
Enabled = $Computer.Enabled
LastLogonDays = $LastLogonDays
PasswordLastDays = $PasswordLastChangedDays
Level0 = $Region
Level1 = $Country
OperatingSystem = $Computer.OperatingSystem
#OperatingSystemVersion = $Computer.OperatingSystemVersion
OperatingSystemName = ConvertTo-OperatingSystem -OperatingSystem $Computer.OperatingSystem -OperatingSystemVersion $Computer.OperatingSystemVersion
DistinguishedName = $Computer.DistinguishedName
LastLogonDate = $Computer.LastLogonDate
PasswordLastSet = $Computer.PasswordLastSet
PasswordNeverExpires = $Computer.PasswordNeverExpires
PasswordNotRequired = $Computer.PasswordNotRequired
PasswordExpired = $Computer.PasswordExpired
ManagerStatus = $ManagerStatus
Manager = $Manager
ManagerSamAccountName = $ManagerSamAccountName
ManagerEmail = $ManagerEmail
ManagerLastLogonDays = $ManagerLastLogonDays
OwnerName = $Owner.OwnerName
OwnerSID = $Owner.OwnerSID
OwnerType = $Owner.OwnerType
ManagerDN = $Computer.ManagedBy
Description = $Computer.Description
TrustedForDelegation = $Computer.TrustedForDelegation
}
} else {
$Owner = $null
[PSCustomObject] @{
Name = $Computer.Name
SamAccountName = $Computer.SamAccountName
Domain = $Domain
IsDC = if ($Computer.PrimaryGroupID -in 516, 521) {
$true
} else {
$false
}
WhenChanged = $Computer.WhenChanged
Enabled = $Computer.Enabled
LastLogonDays = $LastLogonDays
PasswordLastDays = $PasswordLastChangedDays
Level0 = $Region
Level1 = $Country
OperatingSystem = $Computer.OperatingSystem
#OperatingSystemVersion = $Computer.OperatingSystemVersion
OperatingSystemName = ConvertTo-OperatingSystem -OperatingSystem $Computer.OperatingSystem -OperatingSystemVersion $Computer.OperatingSystemVersion
DistinguishedName = $Computer.DistinguishedName
LastLogonDate = $Computer.LastLogonDate
PasswordLastSet = $Computer.PasswordLastSet
PasswordNeverExpires = $Computer.PasswordNeverExpires
PasswordNotRequired = $Computer.PasswordNotRequired
PasswordExpired = $Computer.PasswordExpired
ManagerStatus = $ManagerStatus
Manager = $Manager
ManagerSamAccountName = $ManagerSamAccountName
ManagerEmail = $ManagerEmail
ManagerLastLogonDays = $ManagerLastLogonDays
ManagerDN = $Computer.ManagedBy
Description = $Computer.Description
TrustedForDelegation = $Computer.TrustedForDelegation
}
}
}
}
if ($PerDomain) {
$Output
} else {
foreach ($O in $Output.Keys) {
$Output[$O]
}
}
}
function Get-WinADDelegatedAccounts {
<#
.SYNOPSIS
Retrieves delegated accounts information from Active Directory.
.DESCRIPTION
This function retrieves delegated accounts information from Active Directory based on the specified parameters.
.PARAMETER Forest
Specifies the name of the forest to retrieve delegated accounts information from.
.PARAMETER ExcludeDomains
Specifies an array of domains to exclude from the search.
.PARAMETER ExcludeDomainControllers
Specifies an array of domain controllers to exclude from the search.
.PARAMETER IncludeDomains
Specifies an array of domains to include in the search.
.PARAMETER IncludeDomainControllers
Specifies an array of domain controllers to include in the search.
.PARAMETER SkipRODC
Indicates whether to skip Read-Only Domain Controllers (RODC) during the search.
.PARAMETER ExtendedForestInformation
Specifies additional forest information to include in the search.
.NOTES
File Name : Get-WinADDelegatedAccounts.ps1
Author : Your Name
Prerequisite : This function requires the Active Directory module.
.EXAMPLE
Get-WinADDelegatedAccounts -Forest "contoso.com" -IncludeDomains "child1.contoso.com", "child2.contoso.com" -ExcludeDomains "test.contoso.com" -ExtendedForestInformation $ExtendedInfo
Retrieves delegated accounts information from the "contoso.com" forest, including child domains "child1.contoso.com" and "child2.contoso.com", excluding the "test.contoso.com" domain, and using extended forest information.
#>
[CmdletBinding()]
Param (
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers', 'ComputerName')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation -Extended
foreach ($Domain in $ForestInformation.Domains) {
$SERVER_TRUST_ACCOUNT = 0x2000
$TRUSTED_FOR_DELEGATION = 0x80000
$TRUSTED_TO_AUTH_FOR_DELEGATION = 0x1000000
$PARTIAL_SECRETS_ACCOUNT = 0x4000000
$bitmask = $TRUSTED_FOR_DELEGATION -bor $TRUSTED_TO_AUTH_FOR_DELEGATION -bor $PARTIAL_SECRETS_ACCOUNT
$filter = @"
(&
(servicePrincipalname=*)
(|
(msDS-AllowedToActOnBehalfOfOtherIdentity=*)
(msDS-AllowedToDelegateTo=*)
(UserAccountControl:1.2.840.113556.1.4.804:=$bitmask)
)
(|
(objectcategory=computer)
(objectcategory=person)
(objectcategory=msDS-GroupManagedServiceAccount)
(objectcategory=msDS-ManagedServiceAccount)
)
)
"@ -replace "[\s\n]", ''
$PropertyList = @(
'Enabled'
"servicePrincipalname",
"useraccountcontrol",
"samaccountname",
"msDS-AllowedToDelegateTo",
"msDS-AllowedToActOnBehalfOfOtherIdentity"
'IsCriticalSystemObject'
'LastLogon'
'PwdLastSet'
'WhenChanged'
'WhenCreated'
)
try {
$Accounts = Get-ADObject -LDAPFilter $filter -SearchBase $ForestInformation.DomainsExtended[$Domain].DistinguishedName -SearchScope Subtree -Properties $propertylist -Server $ForestInformation.QueryServers[$Domain].HostName[0]
} catch {
$Accounts = $null
Write-Warning -Message "Get-WinADDelegatedAccounts - Failed to get information: $($_.Exception.Message)"
}
foreach ($Account in $Accounts) {
$UAC = Convert-UserAccountControl -UserAccountControl $Account.useraccountcontrol
$IsDC = ($Account.useraccountcontrol -band $SERVER_TRUST_ACCOUNT) -ne 0
$FullDelegation = ($Account.useraccountcontrol -band $TRUSTED_FOR_DELEGATION) -ne 0
$ConstrainedDelegation = ($Account.'msDS-AllowedToDelegateTo').count -gt 0
$IsRODC = ($Account.useraccountcontrol -band $PARTIAL_SECRETS_ACCOUNT) -ne 0
$ResourceDelegation = $null -ne $Account.'msDS-AllowedToActOnBehalfOfOtherIdentity'
$PasswordLastSet = [datetime]::FromFileTimeUtc($Account.pwdLastSet)
$LastLogonDate = [datetime]::FromFileTimeUtc($Account.LastLogon)
[PSCustomobject] @{
DomainName = $Domain
SamAccountName = $Account.samaccountname
Enabled = $UAC -notcontains 'ACCOUNTDISABLE'
ObjectClass = $Account.objectclass
IsDC = $IsDC
IsRODC = $IsRODC
FullDelegation = $FullDelegation
ConstrainedDelegation = $ConstrainedDelegation
ResourceDelegation = $ResourceDelegation
LastLogonDate = $LastLogonDate
PasswordLastSet = $PasswordLastSet
UserAccountControl = $UAC
WhenCreated = $Account.WhenCreated
WhenChanged = $Account.WhenChanged
IsCriticalSystemObject = $Account.IsCriticalSystemObject
AllowedToDelagateTo = $Account.'msDS-AllowedToDelegateTo'
AllowedToActOnBehalfOfOtherIdentity = $Account.'msDS-AllowedToActOnBehalfOfOtherIdentity'
}
}
}
}
function Get-WinADDFSHealth {
<#
.SYNOPSIS
Retrieves health information for Active Directory Federation Services (AD FS).
.DESCRIPTION
This function retrieves health information for AD FS based on specified parameters.
.PARAMETER Forest
Specifies the name of the forest to retrieve information from.
.PARAMETER ExcludeDomains
Specifies an array of domains to exclude from the health check.
.PARAMETER ExcludeDomainControllers
Specifies an array of domain controllers to exclude from the health check.
.PARAMETER IncludeDomains
Specifies an array of domains to include in the health check.
.PARAMETER IncludeDomainControllers
Specifies an array of domain controllers to include in the health check.
.PARAMETER SkipRODC
Indicates whether to skip read-only domain controllers in the health check.
.PARAMETER EventDays
Specifies the number of days to look back for events. Default is 1 day.
.PARAMETER SkipGPO
Indicates whether to skip checking Group Policy Objects (GPOs).
.PARAMETER SkipAutodetection
Indicates whether to skip automatic detection of domain controllers.
.PARAMETER ExtendedForestInformation
Specifies additional forest information to include in the health check.
.EXAMPLE
Get-WinADDFSHealth -Forest "contoso.com" -IncludeDomains "contoso.com" -SkipGPO
Retrieves health information for the "contoso.com" forest, including only the "contoso.com" domain and skipping GPO checks.
#>
[cmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[int] $EventDays = 1,
[switch] $SkipGPO,
[switch] $SkipAutodetection,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$Today = (Get-Date)
$Yesterday = (Get-Date -Hour 0 -Second 0 -Minute 0 -Millisecond 0).AddDays(-$EventDays)
if (-not $SkipAutodetection) {
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation -Extended
} else {
if (-not $IncludeDomains) {
Write-Warning "Get-WinADDFSHealth - You need to specify domain when using SkipAutodetection."
return
}
# This is for case when Get-ADDomainController -Filter "*" is broken
$ForestInformation = @{
Domains = $IncludeDomains
DomainDomainControllers = @{}
}
foreach ($Domain in $IncludeDomains) {
$ForestInformation['DomainDomainControllers'][$Domain] = [System.Collections.Generic.List[Object]]::new()
foreach ($DC in $IncludeDomainControllers) {
try {
$DCInformation = Get-ADDomainController -Identity $DC -Server $Domain -ErrorAction Stop
Add-Member -InputObject $DCInformation -MemberType NoteProperty -Value $DCInformation.ComputerObjectDN -Name 'DistinguishedName' -Force
$ForestInformation['DomainDomainControllers'][$Domain].Add($DCInformation)
} catch {
Write-Warning "Get-WinADDFSHealth - Can't get DC details. Skipping with error: $($_.Exception.Message)"
continue
}
}
}
}
[Array] $Table = foreach ($Domain in $ForestInformation.Domains) {
Write-Verbose "Get-WinADDFSHealth - Processing $Domain"
[Array] $DomainControllersFull = $ForestInformation['DomainDomainControllers']["$Domain"]
if ($DomainControllersFull.Count -eq 0) {
continue
}
if (-not $SkipAutodetection) {
$QueryServer = $ForestInformation['QueryServers']["$Domain"].HostName[0]
} else {
$QueryServer = $DomainControllersFull[0].HostName
}
if (-not $SkipGPO) {
try {
#[Array]$GPOs = @(Get-GPO -All -Domain $Domain -Server $QueryServer)
$SystemsContainer = $ForestInformation['DomainsExtended'][$Domain].SystemsContainer
if ($SystemsContainer) {
$PoliciesSearchBase = -join ("CN=Policies,", $SystemsContainer)
}
[Array]$GPOs = Get-ADObject -ErrorAction Stop -SearchBase $PoliciesSearchBase -SearchScope OneLevel -Filter "*" -Server $QueryServer -Properties Name, gPCFileSysPath, DisplayName, DistinguishedName, Description, Created, Modified, ObjectClass, ObjectGUID
} catch {
$GPOs = $null
}
}
try {
$CentralRepository = Get-ChildItem -Path "\\$Domain\SYSVOL\$Domain\policies\PolicyDefinitions" -ErrorAction Stop
$CentralRepositoryDomain = if ($CentralRepository) {
$true
} else {
$false
}
} catch {
$CentralRepositoryDomain = $false
}
foreach ($DC in $DomainControllersFull) {
Write-Verbose "Get-WinADDFSHealth - Processing $($DC.HostName) for $Domain"
$DCName = $DC.Name
$Hostname = $DC.Hostname
$DN = $DC.DistinguishedName
$LocalSettings = "CN=DFSR-LocalSettings,$DN"
$Subscriber = "CN=Domain System Volume,$LocalSettings"
$Subscription = "CN=SYSVOL Subscription,$Subscriber"
$ReplicationStatus = @{
'0' = 'Uninitialized'
'1' = 'Initialized'
'2' = 'Initial synchronization'
'3' = 'Auto recovery'
'4' = 'Normal'
'5' = 'In error state'
'6' = 'Disabled'
'7' = 'Unknown'
}
$DomainSummary = [ordered] @{
"DomainController" = $DCName
"Domain" = $Domain
"Status" = $false
"ReplicationState" = 'Unknown'
"IsPDC" = $DC.IsPDC
'GroupPolicyOutput' = $null -ne $GPOs # This shows whether output was on Get-GPO
"GroupPolicyCount" = if ($GPOs) {
$GPOs.Count
} else {
0
};
"SYSVOLCount" = 0
'CentralRepository' = $CentralRepositoryDomain
'CentralRepositoryDC' = $false
'IdenticalCount' = $false
"Availability" = $false
"MemberReference" = $false
"DFSErrors" = 0
"DFSEvents" = $null
"DFSLocalSetting" = $false
"DomainSystemVolume" = $false
"SYSVOLSubscription" = $false
"StopReplicationOnAutoRecovery" = $false
"DFSReplicatedFolderInfo" = $null
}
if ($SkipGPO) {
$DomainSummary.Remove('GroupPolicyOutput')
$DomainSummary.Remove('GroupPolicyCount')
$DomainSummary.Remove('SYSVOLCount')
}
<#
PS C:\Windows\system32> Get-CimData -NameSpace "root\microsoftdfs" -Class 'dfsrreplicatedfolderinfo' -ComputerName ad | Where-Object { $_.ReplicationGroupname -eq 'Domain System Volume' }
CurrentConflictSizeInMb : 0
CurrentStageSizeInMb : 1
LastConflictCleanupTime : 2020-03-22 23:54:17
LastErrorCode : 0
LastErrorMessageId : 0
LastTombstoneCleanupTime : 2020-03-22 23:54:17
MemberGuid : 9650D20E-0D00-43AC-AC1F-4D11EDC17E27
MemberName : AD
ReplicatedFolderGuid : 5FFB282C-A802-4700-89A5-B59B7A0EF671
ReplicatedFolderName : SYSVOL Share
ReplicationGroupGuid : C2E87E8F-18CC-41A4-8072-A1B9A4F2ACF6
ReplicationGroupName : Domain System Volume
State : 4
PSComputerName : AD
#>
<# NameSpace "root\microsoftdfs" Class 'dfsrreplicatedfolderinfo'
CurrentConflictSizeInMb : 0
CurrentStageSizeInMb : 0
LastConflictCleanupTime : 13.09.2019 07:59:38
LastErrorCode : 0
LastErrorMessageId : 0
LastTombstoneCleanupTime : 13.09.2019 07:59:38
MemberGuid : A8930B63-1405-4E0B-AE43-840DAAC64DCE
MemberName : AD1
ReplicatedFolderGuid : 58836C0B-1AB9-49A9-BE64-57689A5A6350
ReplicatedFolderName : SYSVOL Share
ReplicationGroupGuid : 7DA3CD45-CF61-4D95-AB46-6DC859DD689B
ReplicationGroupName : Domain System Volume
State : 2
PSComputerName : AD1
#>
$WarningVar = $null
$DFSReplicatedFolderInfoAll = Get-CimData -NameSpace "root\microsoftdfs" -Class 'dfsrreplicatedfolderinfo' -ComputerName $Hostname -WarningAction SilentlyContinue -WarningVariable WarningVar -Verbose:$false
$DFSReplicatedFolderInfo = $DFSReplicatedFolderInfoAll | Where-Object { $_.ReplicationGroupName -eq 'Domain System Volume' }
if ($WarningVar) {
$DomainSummary['ReplicationState'] = 'Unknown'
#$DomainSummary['ReplicationState'] = $WarningVar -join ', '
} else {
$DomainSummary['ReplicationState'] = $ReplicationStatus["$($DFSReplicatedFolderInfo.State)"]
}
try {
$CentralRepositoryDC = Get-ChildItem -Path "\\$Hostname\SYSVOL\$Domain\policies\PolicyDefinitions" -ErrorAction Stop
$DomainSummary['CentralRepositoryDC'] = if ($CentralRepositoryDC) {
$true
} else {
$false
}
} catch {
$DomainSummary['CentralRepositoryDC'] = $false
}
try {
$MemberReference = (Get-ADObject -Identity $Subscriber -Properties msDFSR-MemberReference -Server $QueryServer -ErrorAction Stop).'msDFSR-MemberReference' -like "CN=$DCName,*"
$DomainSummary['MemberReference'] = if ($MemberReference) {
$true
} else {
$false
}
} catch {
$DomainSummary['MemberReference'] = $false
}
try {
$DFSLocalSetting = Get-ADObject -Identity $LocalSettings -Server $QueryServer -ErrorAction Stop
$DomainSummary['DFSLocalSetting'] = if ($DFSLocalSetting) {
$true
} else {
$false
}
} catch {
$DomainSummary['DFSLocalSetting'] = $false
}
try {
$DomainSystemVolume = Get-ADObject -Identity $Subscriber -Server $QueryServer -ErrorAction Stop
$DomainSummary['DomainSystemVolume'] = if ($DomainSystemVolume) {
$true
} else {
$false
}
} catch {
$DomainSummary['DomainSystemVolume'] = $false
}
try {
$SysVolSubscription = Get-ADObject -Identity $Subscription -Server $QueryServer -ErrorAction Stop
$DomainSummary['SYSVOLSubscription'] = if ($SysVolSubscription) {
$true
} else {
$false
}
} catch {
$DomainSummary['SYSVOLSubscription'] = $false
}
if (-not $SkipGPO) {
try {
[Array] $SYSVOL = Get-ChildItem -Path "\\$Hostname\SYSVOL\$Domain\Policies" -Exclude "PolicyDefinitions*" -ErrorAction Stop
$DomainSummary['SysvolCount'] = $SYSVOL.Count
} catch {
$DomainSummary['SysvolCount'] = 0
}
}
if (Test-Connection $Hostname -ErrorAction SilentlyContinue) {
$DomainSummary['Availability'] = $true
} else {
$DomainSummary['Availability'] = $false
}
try {
[Array] $Events = Get-Events -LogName "DFS Replication" -Level Error -ComputerName $Hostname -DateFrom $Yesterday -DateTo $Today
$DomainSummary['DFSErrors'] = $Events.Count
$DomainSummary['DFSEvents'] = $Events
} catch {
$DomainSummary['DFSErrors'] = $null
}
$DomainSummary['IdenticalCount'] = $DomainSummary['GroupPolicyCount'] -eq $DomainSummary['SYSVOLCount']
try {
$Registry = Get-PSRegistry -RegistryPath "HKLM\SYSTEM\CurrentControlSet\Services\DFSR\Parameters" -ComputerName $Hostname -ErrorAction Stop
} catch {
#$ErrorMessage = $_.Exception.Message
$Registry = $null
}
if ($null -ne $Registry.StopReplicationOnAutoRecovery) {
$DomainSummary['StopReplicationOnAutoRecovery'] = [bool] $Registry.StopReplicationOnAutoRecovery
} else {
$DomainSummary['StopReplicationOnAutoRecovery'] = $null
# $DomainSummary['StopReplicationOnAutoRecovery'] = $ErrorMessage
}
$DomainSummary['DFSReplicatedFolderInfo'] = $DFSReplicatedFolderInfoAll
$All = @(
if (-not $SkipGPO) {
$DomainSummary['GroupPolicyOutput']
}
$DomainSummary['SYSVOLSubscription']
$DomainSummary['ReplicationState'] -eq 'Normal'
$DomainSummary['DomainSystemVolume']
$DomainSummary['DFSLocalSetting']
$DomainSummary['MemberReference']
$DomainSummary['Availability']
$DomainSummary['IdenticalCount']
$DomainSummary['DFSErrors'] -eq 0
)
$DomainSummary['Status'] = $All -notcontains $false
[PSCustomObject] $DomainSummary
}
}
$Table
}
function Get-WinADDFSTopology {
<#
.SYNOPSIS
This command gets the DFS topology for a forest, listing it's current members
.DESCRIPTION
This command gets the DFS topology for a forest, listing it's current members.
It can be used to find broken DFS members, which then can be removed using Remove-WinADDFSTopology
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExcludeDomains
Exclude domain from search, by default whole forest is scanned
.PARAMETER IncludeDomains
Include only specific domains, by default whole forest is scanned
.PARAMETER Type
Type of objects to return (MissingAtLeastOne, MissingAll, All)
.EXAMPLE
Get-WinADDFSTopology | ft -AutoSize
.NOTES
General notes
#>
[cmdletbinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[ValidateSet('MissingAtLeastOne', 'MissingAll', 'All')][string] $Type = 'All'
)
Write-Verbose -Message "Get-WinADDFSTopology - Getting forest information"
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains
$Properties = @(
'Name', 'msDFSR-ComputerReference', 'msDFSR-MemberReferenceBL',
'ProtectedFromAccidentalDeletion', 'serverReference',
'WhenChanged', 'WhenCreated',
'DistinguishedName'
)
foreach ($Domain in $ForestInformation.Domains) {
Write-Verbose -Message "Get-WinADDFSTopology - Getting topology for $Domain"
$DomainDN = ConvertTo-DistinguishedName -CanonicalName $Domain -ToDomain
$QueryServer = $ForestInformation['QueryServers'][$Domain].HostName[0]
$ObjectsInOu = Get-ADObject -LDAPFilter "(ObjectClass=msDFSR-Member)" -Properties $Properties -SearchBase "CN=Topology,CN=Domain System Volume,CN=DFSR-GlobalSettings,CN=System,$DomainDN" -Server $QueryServer
#$Data = $ObjectsInOu | Select-Object -Property Name, msDFSR-ComputerReference, msDFSR-MemberReferenceBL, ProtectedFromAccidentalDeletion, serverReference, WhenChanged, WhenCreated, DistinguishedName
foreach ($Object in $ObjectsInOu) {
if ($null -eq $Object.'msDFSR-ComputerReference' -and ($null -eq $Object.'msDFSR-MemberReferenceBL' -or $Object.'msDFSR-MemberReferenceBL'.Count -eq 0) -and $null -eq $Object.serverReference) {
$Status = 'MissingAll'
} elseif ($null -eq $Object.serverReference) {
$Status = 'MissingAtLeastOne'
} elseif ($null -eq $Object.'msDFSR-ComputerReference') {
$Status = 'MissingAtLeastOne'
} elseif ($null -eq $Object.'msDFSR-MemberReferenceBL' -or $Object.'msDFSR-MemberReferenceBL'.Count -eq 0) {
$Status = 'MissingAtLeastOne'
} else {
$Status = 'OK'
}
$DataObject = [PSCustomObject] @{
'Name' = $Object.Name
'Status' = $Status
'Domain' = $Domain
'msDFSR-ComputerReference' = $Object.'msDFSR-ComputerReference'
'msDFSR-MemberReferenceBL' = $Object.'msDFSR-MemberReferenceBL'
'ServerReference' = $Object.serverReference
'ProtectedFromAccidentalDeletion' = $Object.ProtectedFromAccidentalDeletion
'WhenChanged' = $Object.WhenChanged
'WhenCreated' = $Object.WhenCreated
'DistinguishedName' = $Object.DistinguishedName
'QueryServer' = $QueryServer
}
if ($Type -eq 'MissingAll') {
if ($Status -eq 'MissingAll') {
$DataObject
}
} elseif ($Type -eq 'MissingAtLeastOne') {
if ($Status -in 'MissingAll', 'MissingAtLeastOne') {
$DataObject
}
} else {
$DataObject
}
}
}
}
function Get-WinADDHCP {
<#
.SYNOPSIS
Retrieves DHCP information from Active Directory forest domain controllers.
.DESCRIPTION
This function retrieves DHCP information from Active Directory forest domain controllers. It collects DHCP server details such as DNS name, IP address, whether it is a domain controller, read-only domain controller, global catalog, and the associated IPv4 and IPv6 addresses.
.PARAMETER None
No parameters are required for this function.
.EXAMPLE
Get-WinADDHCP
Retrieves DHCP information from all Active Directory forest domain controllers.
.NOTES
This function requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory DHCP servers.
#>
[cmdletBinding()]
param(
)
$ForestDomainControllers = Get-WinADForestControllers
try {
$DHCPs = Get-DhcpServerInDC -Verbose
} catch {
Write-Warning -Message "Get-WinADDHCP - Couldn't get DHCP data from AD: $($_.Exception.Message)"
return
}
$CacheDHCP = @{}
$CacheAD = [ordered] @{}
foreach ($DHCP in $DHCPs) {
$CacheDHCP[$DHCP.DNSName] = $DHCP
}
foreach ($DC in $ForestDomainControllers) {
$CacheAD[$DC.HostName] = $DC
}
foreach ($DHCP in $DHCPs) {
$DHCPObject = [ordered] @{
DNSName = $DHCP.DNSName
IPAddress = $DHCP.IPAddress
}
if ($CacheAD[$DHCP.DNSName]) {
$DHCPObject['IsDC'] = $true
$DHCPObject['IsRODC'] = $CacheAD[$DHCP.DNSName].IsReadOnly
$DHCPObject['IsGlobalCatalog'] = $CacheAD[$DHCP.DNSName].IsGlobalCatalog
$DHCPObject['DCIPv4'] = $CacheAD[$DHCP.DNSName].IPV4Address
$DHCPObject['DCIPv6'] = $CacheAD[$DHCP.DNSName].IPV6Address
} else {
$DHCPObject['IsDC'] = $false
$DHCPObject['IsRODC'] = $false
$DHCPObject['IsGlobalCatalog'] = $false
$DHCPObject['DCIPv4'] = $null
$DHCPObject['DCIPv6'] = $null
}
$DNS = Resolve-DnsName -Name $DHCP.DNSName -ErrorAction SilentlyContinue
if ($DNS) {
$DHCPObject['IsInDNS'] = $true
$DHCPObject['DNSType'] = $DNS.Type
} else {
$DHCPObject['IsInDNS'] = $false
$DHCPObject['DNSType'] = $null
}
[PSCustomObject] $DHCPObject
}
}
function Get-WinADDiagnostics {
<#
.SYNOPSIS
Retrieves diagnostic information for Active Directory.
.DESCRIPTION
This function retrieves diagnostic information for Active Directory based on specified parameters.
.PARAMETER Forest
Specifies the target forest to retrieve diagnostic information from. By default, the current forest is used.
.PARAMETER ExcludeDomains
Specifies the domains to exclude from the search. By default, the entire forest is scanned.
.PARAMETER IncludeDomains
Specifies the specific domains to include in the search. By default, the entire forest is scanned.
.PARAMETER ExcludeDomainControllers
Specifies the domain controllers to exclude. By default, no exclusions are applied unless the VerifyDomainControllers switch is enabled.
.PARAMETER IncludeDomainControllers
Specifies the domain controllers to include. By default, all domain controllers are included unless the VerifyDomainControllers switch is enabled.
.PARAMETER SkipRODC
Skips Read-Only Domain Controllers. By default, all domain controllers are included.
.PARAMETER ExtendedForestInformation
Allows providing Forest Information from another command to speed up processing.
.EXAMPLE
Get-WinADDiagnostics -Forest "example.com" -IncludeDomains "domain1", "domain2" -ExcludeDomains "domain3" -SkipRODC
.NOTES
This function is designed to provide diagnostic information for troubleshooting Active Directory issues.
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers', 'ComputerName')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[System.Collections.IDictionary] $ExtendedForestInformation
)
<# Levels
0 (None): Only critical events and error events are logged at this level. This is the default setting for all entries, and it should be modified only if a problem occurs that you want to investigate.
1 (Minimal): Very high-level events are recorded in the event log at this setting. Events may include one message for each major task that is performed by the service. Use this setting to start an investigation when you do not know the location of the problem.
2 (Basic)
3 (Extensive): This level records more detailed information than the lower levels, such as steps that are performed to complete a task. Use this setting when you have narrowed the problem to a service or a group of categories.
4 (Verbose)
5 (Internal): This level logs all events, including debug strings and configuration changes. A complete log of the service is recorded. Use this setting when you have traced the problem to a particular category of a small set of categories.
#>
$LevelsDictionary = @{
'0' = 'None'
'1' = 'Minimal'
'2' = 'Basic'
'3' = 'Extensive'
'4' = 'Verbose'
'5' = 'Internal'
'' = 'Unknown'
}
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
[Array] $Computers = $ForestInformation.ForestDomainControllers.HostName
foreach ($Computer in $Computers) {
try {
$Output = Get-PSRegistry -RegistryPath 'HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics' -ComputerName $Computer -Verbose:$false -ErrorAction Stop
} catch {
$ErrorMessage1 = $_.Exception.Message
$Output = $null
}
try {
$Output1 = Get-PSRegistry -RegistryPath 'HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters' -ComputerName $Computer -Verbose:$false -ErrorAction Stop
if ($Output1.DbFlag -eq 545325055) {
$Netlogon = $true
} else {
$Netlogon = $false
}
} catch {
$ErrorMessage2 = $_.Exception.Message
$Netlogon = 'Unknown'
}
if (-not $ErrorMessage1 -and -not $ErrorMessage2) {
$Comment = 'OK'
[PSCustomObject] @{
'ComputerName' = $Computer
'Knowledge Consistency Checker (KCC)' = $LevelsDictionary["$($Output.'1 Knowledge Consistency Checker')"]
'Security Events' = $LevelsDictionary["$($Output.'2 Security Events')"]
'ExDS Interface Events' = $LevelsDictionary["$($Output.'3 ExDS Interface Events')"]
'MAPI Interface Events' = $LevelsDictionary["$($Output.'4 MAPI Interface Events')"]
'Replication Events' = $LevelsDictionary["$($Output.'5 Replication Events')"]
'Garbage Collection' = $LevelsDictionary["$($Output.'6 Garbage Collection')"]
'Internal Configuration' = $LevelsDictionary["$($Output.'7 Internal Configuration')"]
'Directory Access' = $LevelsDictionary["$($Output.'8 Directory Access')"]
'Internal Processing' = $LevelsDictionary["$($Output.'9 Internal Processing')"]
'Performance Counters' = $LevelsDictionary["$($Output.'10 Performance Counters')"]
'Initialization / Termination' = $LevelsDictionary["$($Output.'11 Initialization/Termination')"]
'Service Control' = $LevelsDictionary["$($Output.'12 Service Control')"]
'Name Resolution' = $LevelsDictionary["$($Output.'13 Name Resolution')"]
'Backup' = $LevelsDictionary["$($Output.'14 Backup')"]
'Field Engineering' = $LevelsDictionary["$($Output.'15 Field Engineering')"]
'LDAP Interface Events' = $LevelsDictionary["$($Output.'16 LDAP Interface Events')"]
'Setup' = $LevelsDictionary["$($Output.'17 Setup')"]
'Global Catalog' = $LevelsDictionary["$($Output.'18 Global Catalog')"]
'Inter-site Messaging' = $LevelsDictionary["$($Output.'19 Inter-site Messaging')"]
'Group Caching' = $LevelsDictionary["$($Output.'20 Group Caching')"]
'Linked-Value Replication' = $LevelsDictionary["$($Output.'21 Linked-Value Replication')"]
'DS RPC Client' = $LevelsDictionary["$($Output.'22 DS RPC Client')"]
'DS RPC Server' = $LevelsDictionary["$($Output.'23 DS RPC Server')"]
'DS Schema' = $LevelsDictionary["$($Output.'24 DS Schema')"]
'Transformation Engine' = $LevelsDictionary["$($Output.'25 Transformation Engine')"]
'Claims-Based Access Control' = $LevelsDictionary["$($Output.'26 Claims-Based Access Control')"]
'Netlogon' = $Netlogon
'Comment' = $Comment
}
} else {
$Comment = $ErrorMessage1 + ' ' + $ErrorMessage2
[PSCustomObject] @{
'ComputerName' = $Computer
'Knowledge Consistency Checker (KCC)' = $LevelsDictionary["$($Output.'1 Knowledge Consistency Checker')"]
'Security Events' = $LevelsDictionary["$($Output.'2 Security Events')"]
'ExDS Interface Events' = $LevelsDictionary["$($Output.'3 ExDS Interface Events')"]
'MAPI Interface Events' = $LevelsDictionary["$($Output.'4 MAPI Interface Events')"]
'Replication Events' = $LevelsDictionary["$($Output.'5 Replication Events')"]
'Garbage Collection' = $LevelsDictionary["$($Output.'6 Garbage Collection')"]
'Internal Configuration' = $LevelsDictionary["$($Output.'7 Internal Configuration')"]
'Directory Access' = $LevelsDictionary["$($Output.'8 Directory Access')"]
'Internal Processing' = $LevelsDictionary["$($Output.'9 Internal Processing')"]
'Performance Counters' = $LevelsDictionary["$($Output.'10 Performance Counters')"]
'Initialization / Termination' = $LevelsDictionary["$($Output.'11 Initialization/Termination')"]
'Service Control' = $LevelsDictionary["$($Output.'12 Service Control')"]
'Name Resolution' = $LevelsDictionary["$($Output.'13 Name Resolution')"]
'Backup' = $LevelsDictionary["$($Output.'14 Backup')"]
'Field Engineering' = $LevelsDictionary["$($Output.'15 Field Engineering')"]
'LDAP Interface Events' = $LevelsDictionary["$($Output.'16 LDAP Interface Events')"]
'Setup' = $LevelsDictionary["$($Output.'17 Setup')"]
'Global Catalog' = $LevelsDictionary["$($Output.'18 Global Catalog')"]
'Inter-site Messaging' = $LevelsDictionary["$($Output.'19 Inter-site Messaging')"]
'Group Caching' = $LevelsDictionary["$($Output.'20 Group Caching')"]
'Linked-Value Replication' = $LevelsDictionary["$($Output.'21 Linked-Value Replication')"]
'DS RPC Client' = $LevelsDictionary["$($Output.'22 DS RPC Client')"]
'DS RPC Server' = $LevelsDictionary["$($Output.'23 DS RPC Server')"]
'DS Schema' = $LevelsDictionary["$($Output.'24 DS Schema')"]
'Transformation Engine' = $LevelsDictionary["$($Output.'25 Transformation Engine')"]
'Claims-Based Access Control' = $LevelsDictionary["$($Output.'26 Claims-Based Access Control')"]
'Netlogon' = $Netlogon
'Comment' = $Comment
}
}
}
}
function Get-WinADDnsInformation {
<#
.SYNOPSIS
Retrieves DNS information for specified forest and domains.
.DESCRIPTION
This function retrieves DNS information for the specified forest and domains. It gathers various DNS server details such as cache, client subnets, diagnostics, directory partitions, DS settings, EDNS, forwarders, global name zones, global query block lists, recursion settings, recursion scopes, response rate limiting, root hints, scavenging details, server settings, virtualization instance, and more.
.PARAMETER Forest
Specifies the name of the forest to retrieve DNS information from.
.PARAMETER ExcludeDomains
Specifies an array of domains to exclude from retrieving DNS information.
.PARAMETER ExcludeDomainControllers
Specifies an array of domain controllers to exclude from retrieving DNS information.
.PARAMETER IncludeDomains
Specifies an array of domains to include for retrieving DNS information.
.PARAMETER IncludeDomainControllers
Specifies an array of domain controllers to include for retrieving DNS information.
.PARAMETER Splitter
Specifies the delimiter to use for joining IP addresses.
.PARAMETER ExtendedForestInformation
Provides additional extended forest information to speed up processing.
.EXAMPLE
Get-WinADDnsInformation -Forest "example.com" -IncludeDomains "domain1.com", "domain2.com" -Splitter ", " -ExtendedForestInformation $ExtendedForestInformation
Retrieves DNS information for the "example.com" forest, including "domain1.com" and "domain2.com" domains, using ", " as the splitter for IP addresses, and with extended forest information.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory DNS servers.
#>
[CmdLetBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers', 'ComputerName')][string[]] $IncludeDomainControllers,
[string] $Splitter,
[System.Collections.IDictionary] $ExtendedForestInformation
)
if ($null -eq $TypesRequired) {
#Write-Verbose 'Get-WinADDomainInformation - TypesRequired is null. Getting all.'
#$TypesRequired = Get-Types -Types ([PSWinDocumentation.ActiveDirectory])
} # Gets all types
# This queries AD ones for Forest/Domain/DomainControllers, passing this value to commands can help speed up discovery
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
$DNSServers = @{ }
foreach ($Computer in $ForestInformation.ForestDomainControllers.HostName) {
#try {
# $DNSServer = Get-DNSServer -ComputerName $Computer
#} catch {
#
#}
$Data = [ordered] @{ }
$Data.ServerCache = Get-WinDnsServerCache -ComputerName $Computer
$Data.ServerClientSubnets = Get-DnsServerClientSubnet -ComputerName $Computer # TODO
$Data.ServerDiagnostics = Get-WinDnsServerDiagnostics -ComputerName $Computer
$Data.ServerDirectoryPartition = Get-WinDnsServerDirectoryPartition -ComputerName $Computer -Splitter $Splitter
$Data.ServerDsSetting = Get-WinDnsServerDsSetting -ComputerName $Computer
$Data.ServerEdns = Get-WinDnsServerEDns -ComputerName $Computer
$Data.ServerForwarder = Get-WinADDnsServerForwarder -ComputerName $Computer -ExtendedForestInformation $ForestInformation -Formatted -Splitter $Splitter
$Data.ServerGlobalNameZone = Get-WinDnsServerGlobalNameZone -ComputerName $Computer
$Data.ServerGlobalQueryBlockList = Get-WinDnsServerGlobalQueryBlockList -ComputerName $Computer -Splitter $Splitter
# $Data.ServerPolicies = $DNSServer.ServerPolicies
$Data.ServerRecursion = Get-WinDnsServerRecursion -ComputerName $Computer
$Data.ServerRecursionScopes = Get-WinDnsServerRecursionScope -ComputerName $Computer
$Data.ServerResponseRateLimiting = Get-WinDnsServerResponseRateLimiting -ComputerName $Computer
$Data.ServerResponseRateLimitingExceptionlists = Get-DnsServerResponseRateLimitingExceptionlist -ComputerName $Computer # TODO
$Data.ServerRootHint = Get-WinDnsRootHint -ComputerName $Computer
$Data.ServerScavenging = Get-WinADDnsServerScavenging -ComputerName $Computer
$Data.ServerSetting = Get-WinDnsServerSettings -ComputerName $Computer
# $Data.ServerZone = Get-DnsServerZone -ComputerName $Computer # problem
# $Data.ServerZoneAging = Get-DnsServerZoneAging -ComputerName $Computer # problem
# $Data.ServerZoneScope = Get-DnsServerZoneScope -ComputerName $Computer # problem
# $Data.ServerDnsSecZoneSetting = Get-DnsServerDnsSecZoneSetting -ComputerName $Computer # problem
$Data.VirtualizedServer = $DNSServer.VirtualizedServer
$Data.VirtualizationInstance = Get-WinDnsServerVirtualizationInstance -ComputerName $Computer
$DNSServers.$Computer = $Data
}
return $DNSServers
}
function Get-WinADDnsIPAddresses {
<#
.SYNOPSIS
Gets all the DNS records from all the zones within a forest sorted by IPAddress
.DESCRIPTION
Gets all the DNS records from all the zones within a forest sorted by IPAddress
.PARAMETER IncludeZone
Limit the output of DNS records to specific zones
.PARAMETER ExcludeZone
Limit the output of dNS records to only zones not in the exclude list
.PARAMETER IncludeDetails
Adds additional information such as creation time, changed time
.PARAMETER Prettify
Converts arrays into strings connected with comma
.PARAMETER IncludeDNSRecords
Include full DNS records just in case one would like to further process them
.PARAMETER AsHashtable
Outputs the results as a hashtable instead of an array
.EXAMPLE
Get-WinADDnsIPAddresses | Format-Table *
.EXAMPLE
Get-WinADDnsIPAddresses -Prettify | Format-Table *
.EXAMPLE
Get-WinADDnsIPAddresses -Prettify -IncludeDetails -IncludeDNSRecords | Format-Table *
.NOTES
General notes
#>
[alias('Get-WinDnsIPAddresses')]
[cmdletbinding()]
param(
[string[]] $IncludeZone,
[string[]] $ExcludeZone,
[switch] $IncludeDetails,
[switch] $Prettify,
[switch] $IncludeDNSRecords,
[switch] $AsHashtable
)
$DNSRecordsCached = [ordered] @{}
$DNSRecordsPerZone = [ordered] @{}
$ADRecordsPerZone = [ordered] @{}
try {
$oRootDSE = Get-ADRootDSE -ErrorAction Stop
} catch {
Write-Warning -Message "Get-WinADDnsIPAddresses - Could not get the root DSE. Make sure you're logged in to machine with Active Directory RSAT tools installed, and there's connecitivity to the domain. Error: $($_.Exception.Message)"
return
}
$ADServer = ($oRootDSE.dnsHostName)
$Exclusions = 'DomainDnsZones', 'ForestDnsZones', '@'
$DNS = Get-DnsServerZone -ComputerName $ADServer
[Array] $ZonesToProcess = foreach ($Zone in $DNS) {
if ($Zone.ZoneType -eq 'Primary' -and $Zone.IsDsIntegrated -eq $true -and $Zone.IsReverseLookupZone -eq $false) {
if ($Zone.ZoneName -notlike "*_*" -and $Zone.ZoneName -ne 'TrustAnchors') {
if ($IncludeZone -and $IncludeZone -notcontains $Zone.ZoneName) {
continue
}
if ($ExcludeZone -and $ExcludeZone -contains $Zone.ZoneName) {
continue
}
$Zone
}
}
}
foreach ($Zone in $ZonesToProcess) {
Write-Verbose -Message "Get-WinADDnsIPAddresses - Processing zone for DNS records: $($Zone.ZoneName)"
$DNSRecordsPerZone[$Zone.ZoneName] = Get-DnsServerResourceRecord -ComputerName $ADServer -ZoneName $Zone.ZoneName -RRType A
}
if ($IncludeDetails) {
$Filter = "(Name -notlike '@' -and Name -notlike '_*' -and ObjectClass -eq 'dnsNode' -and Name -ne 'ForestDnsZone' -and Name -ne 'DomainDnsZone' )"
#$Filter = { (Name -notlike "@" -and Name -notlike "_*" -and ObjectClass -eq 'dnsNode' -and Name -ne 'ForestDnsZone' -and Name -ne 'DomainDnsZone' ) }
foreach ($Zone in $ZonesToProcess) {
$ADRecordsPerZone[$Zone.ZoneName] = [ordered]@{}
Write-Verbose -Message "Get-WinADDnsIPAddresses - Processing zone for AD records: $($Zone.ZoneName)"
$TempObjects = @(
if ($Zone.ReplicationScope -eq 'Domain') {
try {
Get-ADObject -Server $ADServer -Filter $Filter -SearchBase ("DC=$($Zone.ZoneName),CN=MicrosoftDNS,DC=DomainDnsZones," + $oRootDSE.defaultNamingContext) -Properties CanonicalName, whenChanged, whenCreated, DistinguishedName, ProtectedFromAccidentalDeletion, dNSTombstoned
} catch {
Write-Warning -Message "Get-WinADDnsIPAddresses - Error getting AD records for DomainDnsZones zone: $($Zone.ZoneName). Error: $($_.Exception.Message)"
}
} elseif ($Zone.ReplicationScope -eq 'Forest') {
try {
Get-ADObject -Server $ADServer -Filter $Filter -SearchBase ("DC=$($Zone.ZoneName),CN=MicrosoftDNS,DC=ForestDnsZones," + $oRootDSE.defaultNamingContext) -Properties CanonicalName, whenChanged, whenCreated, DistinguishedName, ProtectedFromAccidentalDeletion, dNSTombstoned
} catch {
Write-Warning -Message "Get-WinADDnsIPAddresses - Error getting AD records for ForestDnsZones zone: $($Zone.ZoneName). Error: $($_.Exception.Message)"
}
} else {
Write-Warning -Message "Get-WinADDnsIPAddresses - Unknown replication scope: $($Zone.ReplicationScope)"
}
)
foreach ($DNSObject in $TempObjects) {
$ADRecordsPerZone[$Zone.ZoneName][$DNSObject.Name] = $DNSObject
}
}
}
foreach ($Zone in $DNSRecordsPerZone.PSBase.Keys) {
foreach ($Record in $DNSRecordsPerZone[$Zone]) {
if ($Record.HostName -in $Exclusions) {
continue
}
if (-not $DNSRecordsCached[$Record.RecordData.IPv4Address]) {
$DNSRecordsCached[$Record.RecordData.IPv4Address] = [ordered] @{
IPAddress = $Record.RecordData.IPv4Address
DnsNames = [System.Collections.Generic.List[Object]]::new()
Timestamps = [System.Collections.Generic.List[Object]]::new()
Types = [System.Collections.Generic.List[Object]]::new()
Count = 0
}
if ($ADRecordsPerZone.Keys.Count -gt 0) {
$DNSRecordsCached[$Record.RecordData.IPv4Address].WhenCreated = $ADRecordsPerZone[$Zone][$Record.HostName].whenCreated
$DNSRecordsCached[$Record.RecordData.IPv4Address].WhenChanged = $ADRecordsPerZone[$Zone][$Record.HostName].whenChanged
}
if ($IncludeDNSRecords) {
$DNSRecordsCached[$Record.RecordData.IPv4Address].List = [System.Collections.Generic.List[Object]]::new()
}
}
$DNSRecordsCached[$Record.RecordData.IPv4Address].DnsNames.Add($Record.HostName + "." + $Zone)
if ($IncludeDNSRecords) {
$DNSRecordsCached[$Record.RecordData.IPv4Address].List.Add($Record)
}
if ($null -ne $Record.TimeStamp) {
$DNSRecordsCached[$Record.RecordData.IPv4Address].Timestamps.Add($Record.TimeStamp)
} else {
$DNSRecordsCached[$Record.RecordData.IPv4Address].Timestamps.Add("Not available")
}
if ($Null -ne $Record.Timestamp) {
$DNSRecordsCached[$Record.RecordData.IPv4Address].Types.Add('Dynamic')
} else {
$DNSRecordsCached[$Record.RecordData.IPv4Address].Types.Add('Static')
}
$DNSRecordsCached[$Record.RecordData.IPv4Address] = [PSCustomObject] $DNSRecordsCached[$Record.RecordData.IPv4Address]
}
}
foreach ($DNS in $DNSRecordsCached.PSBase.Keys) {
$DNSRecordsCached[$DNS].Count = $DNSRecordsCached[$DNS].DnsNames.Count
if ($Prettify) {
$DNSRecordsCached[$DNS].DnsNames = $DNSRecordsCached[$DNS].DnsNames -join ", "
$DNSRecordsCached[$DNS].Timestamps = $DNSRecordsCached[$DNS].Timestamps -join ", "
$DNSRecordsCached[$DNS].Types = $DNSRecordsCached[$DNS].Types -join ", "
}
}
if ($AsHashtable) {
$DNSRecordsCached
} else {
$DNSRecordsCached.Values
}
}
function Get-WinADDnsRecords {
<#
.SYNOPSIS
Gets all the DNS records from all the zones within a forest
.DESCRIPTION
Gets all the DNS records from all the zones within a forest
.PARAMETER IncludeZone
Limit the output of DNS records to specific zones
.PARAMETER ExcludeZone
Limit the output of dNS records to only zones not in the exclude list
.PARAMETER IncludeDetails
Adds additional information such as creation time, changed time
.PARAMETER Prettify
Converts arrays into strings connected with comma
.PARAMETER IncludeDNSRecords
Include full DNS records just in case one would like to further process them
.PARAMETER AsHashtable
Outputs the results as a hashtable instead of an array
.EXAMPLE
Get-WinDNSRecords -Prettify -IncludeDetails | Format-Table
.EXAMPLE
$Output = Get-WinDNSRecords -Prettify -IncludeDetails -Verbose
$Output.Count
$Output | Sort-Object -Property Count -Descending | Select-Object -First 30 | Format-Table
.NOTES
General notes
#>
[alias('Get-WinDNSRecords')]
[cmdletbinding()]
param(
[string[]] $IncludeZone,
[string[]] $ExcludeZone,
[switch] $IncludeDetails,
[switch] $Prettify,
[switch] $IncludeDNSRecords,
[switch] $AsHashtable
)
$DNSRecordsCached = [ordered] @{}
$DNSRecordsPerZone = [ordered] @{}
$ADRecordsPerZone = [ordered] @{}
$ADRecordsPerZoneByDns = [ordered] @{}
try {
$oRootDSE = Get-ADRootDSE -ErrorAction Stop
} catch {
Write-Warning -Message "Get-WinDNSRecords - Could not get the root DSE. Make sure you're logged in to machine with Active Directory RSAT tools installed, and there's connecitivity to the domain. Error: $($_.Exception.Message)"
return
}
$ADServer = ($oRootDSE.dnsHostName)
$Exclusions = 'DomainDnsZones', 'ForestDnsZones', '@'
$DNS = Get-DnsServerZone -ComputerName $ADServer
[Array] $ZonesToProcess = foreach ($Zone in $DNS) {
if ($Zone.ZoneType -eq 'Primary' -and $Zone.IsDsIntegrated -eq $true -and $Zone.IsReverseLookupZone -eq $false) {
if ($Zone.ZoneName -notlike "*_*" -and $Zone.ZoneName -ne 'TrustAnchors') {
if ($IncludeZone -and $IncludeZone -notcontains $Zone.ZoneName) {
continue
}
if ($ExcludeZone -and $ExcludeZone -contains $Zone.ZoneName) {
continue
}
$Zone
}
}
}
foreach ($Zone in $ZonesToProcess) {
Write-Verbose -Message "Get-WinDNSRecords - Processing zone for DNS records: $($Zone.ZoneName)"
$DNSRecordsPerZone[$Zone.ZoneName] = Get-DnsServerResourceRecord -ComputerName $ADServer -ZoneName $Zone.ZoneName -RRType A
$ADRecordsPerZoneByDns[$Zone.ZoneName] = [ordered] @{}
foreach ($Record in $DNSRecordsPerZone[$Zone.ZoneName]) {
if (-not $ADRecordsPerZoneByDns[$Zone.ZoneName][$Record.HostName]) {
$ADRecordsPerZoneByDns[$Zone.ZoneName][$Record.HostName] = [System.Collections.Generic.List[Object]]::new()
}
$ADRecordsPerZoneByDns[$Zone.ZoneName][$Record.HostName].Add($Record)
}
}
if ($IncludeDetails) {
#$Filter = { (Name -notlike "@" -and Name -notlike "_*" -and ObjectClass -eq 'dnsNode' -and Name -ne 'ForestDnsZone' -and Name -ne 'DomainDnsZone' ) }
$Filter = "(Name -notlike '@' -and Name -notlike '_*' -and ObjectClass -eq 'dnsNode' -and Name -ne 'ForestDnsZone' -and Name -ne 'DomainDnsZone' )"
foreach ($Zone in $ZonesToProcess) {
$ADRecordsPerZone[$Zone.ZoneName] = [ordered]@{}
Write-Verbose -Message "Get-WinDNSRecords - Processing zone for AD records: $($Zone.ZoneName)"
$TempObjects = @(
if ($Zone.ReplicationScope -eq 'Domain') {
try {
$getADObjectSplat = @{
Server = $ADServer
Filter = $Filter
SearchBase = ("DC=$($Zone.ZoneName),CN=MicrosoftDNS,DC=DomainDnsZones," + $oRootDSE.defaultNamingContext)
Properties = 'CanonicalName', 'whenChanged', 'whenCreated', 'DistinguishedName', 'ProtectedFromAccidentalDeletion', 'dNSTombstoned', 'nTSecurityDescriptor'
}
Get-ADObject @getADObjectSplat
} catch {
Write-Warning -Message "Get-WinDNSRecords - Error getting AD records for DomainDnsZones zone: $($Zone.ZoneName). Error: $($_.Exception.Message)"
}
} elseif ($Zone.ReplicationScope -eq 'Forest') {
try {
$getADObjectSplat = @{
Server = $ADServer
Filter = $Filter
SearchBase = ("DC=$($Zone.ZoneName),CN=MicrosoftDNS,DC=ForestDnsZones," + $oRootDSE.defaultNamingContext)
Properties = 'CanonicalName', 'whenChanged', 'whenCreated', 'DistinguishedName', 'ProtectedFromAccidentalDeletion', 'dNSTombstoned', 'nTSecurityDescriptor'
}
Get-ADObject @getADObjectSplat
} catch {
Write-Warning -Message "Get-WinDNSRecords - Error getting AD records for ForestDnsZones zone: $($Zone.ZoneName). Error: $($_.Exception.Message)"
}
} else {
Write-Warning -Message "Get-WinDNSRecords - Unknown replication scope: $($Zone.ReplicationScope)"
}
)
foreach ($DNSObject in $TempObjects) {
$ADRecordsPerZone[$Zone.ZoneName][$DNSObject.Name] = $DNSObject
}
}
}
# PSBase is required because of "Keys" DNS name
foreach ($Zone in $ADRecordsPerZone.PSBase.Keys) {
foreach ($RecordName in [string[]] $ADRecordsPerZone[$Zone].PSBase.Keys) {
$ADDNSRecord = $ADRecordsPerZone[$Zone][$RecordName]
[Array] $ListRecords = $ADRecordsPerZoneByDns[$Zone][$RecordName]
if ($ADDNSRecord.Name -in $Exclusions) {
continue
}
if (-not $DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"]) {
$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"] = [ordered] @{
'HostName' = $ADDNSRecord.Name
'Zone' = $Zone
'Status' = if ($ADDNSRecord.dNSTombstoned -eq $true) {
'Tombstoned'
} else {
'Active'
}
Owner = $ADDNSRecord.ntsecuritydescriptor.owner
RecordIP = [System.Collections.Generic.List[Object]]::new()
Types = [System.Collections.Generic.List[Object]]::new()
Timestamps = [System.Collections.Generic.List[Object]]::new()
Count = 0
}
#if ($ADRecordsPerZone.Keys.Count -gt 0) {
#$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"].dNSTombstoned = $ADRecordsPerZone[$Zone][$ADDNSRecord.Name].dNSTombstoned
$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"].WhenCreated = $ADRecordsPerZone[$Zone][$ADDNSRecord.Name].whenCreated
$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"].WhenChanged = $ADRecordsPerZone[$Zone][$ADDNSRecord.Name].whenChanged
#}
if ($IncludeDNSRecords) {
$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"].List = [System.Collections.Generic.List[Object]]::new()
}
}
if ($ListRecords.Count -gt 0) {
foreach ($Record in $ListRecords) {
if ($IncludeDNSRecords) {
$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"].List.Add($Record)
}
if ($null -ne $Record.TimeStamp) {
$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"].Timestamps.Add($Record.TimeStamp)
} else {
$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"].Timestamps.Add("Not available")
}
$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"].RecordIP.Add($Record.RecordData.IPv4Address)
if ($Null -ne $Record.Timestamp) {
$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"].Types.Add('Dynamic')
} else {
$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"].Types.Add('Static')
}
}
} else {
$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"].RecordIP.Add('Not available')
$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"].Types.Add('Not available')
$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"].Timestamps.Add('Not available')
}
$DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"] = [PSCustomObject] $DNSRecordsCached["$($ADDNSRecord.Name).$($Zone)"]
}
}
foreach ($DNS in $DNSRecordsCached.PSBase.Keys) {
$DNSRecordsCached[$DNS].Count = $DNSRecordsCached[$DNS].RecordIP.Count
if ($Prettify) {
$DNSRecordsCached[$DNS].Types = $DNSRecordsCached[$DNS].Types -join ", "
$DNSRecordsCached[$DNS].RecordIP = $DNSRecordsCached[$DNS].RecordIP -join ", "
$DNSRecordsCached[$DNS].Timestamps = $DNSRecordsCached[$DNS].Timestamps -join ", "
}
}
if ($AsHashtable) {
$DNSRecordsCached
} else {
$DNSRecordsCached.Values
}
}
function Get-WinADDnsServerForwarder {
<#
.SYNOPSIS
Retrieves DNS server forwarder information from Active Directory forest domain controllers.
.DESCRIPTION
The Get-WinADDnsServerForwarder function retrieves DNS server forwarder information from Active Directory forest domain controllers. It gathers information such as IP addresses, reordering status, timeout, root hint usage, forwarders count, host name, and domain name.
.PARAMETER Forest
Specifies the name of the forest to retrieve DNS server forwarder information from.
.PARAMETER ExcludeDomains
Specifies an array of domains to exclude from retrieving DNS server forwarder information.
.PARAMETER ExcludeDomainControllers
Specifies an array of domain controllers to exclude from retrieving DNS server forwarder information.
.PARAMETER IncludeDomains
Specifies an array of domains to include for retrieving DNS server forwarder information.
.PARAMETER IncludeDomainControllers
Specifies an array of domain controllers to include for retrieving DNS server forwarder information.
.PARAMETER Formatted
Indicates whether the output should be formatted.
.PARAMETER Splitter
Specifies the delimiter to use for joining IP addresses.
.PARAMETER ExtendedForestInformation
Specifies additional information to include in the forest details.
.EXAMPLE
Get-WinADDnsServerForwarder -Forest "example.com" -IncludeDomains "example.com" -Formatted
Retrieves DNS server forwarder information for the "example.com" forest and includes only the "example.com" domain in a formatted output.
.NOTES
File: Get-WinADDnsServerForwarder.ps1
Author: [Author Name]
Date: [Date]
Version: [Version]
#>
[CmdLetBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers', 'ComputerName')][string[]] $IncludeDomainControllers,
[switch] $Formatted,
[string] $Splitter = ', ',
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
foreach ($Computer in $ForestInformation.ForestDomainControllers) {
try {
$DnsServerForwarder = Get-DnsServerForwarder -ComputerName $Computer.HostName -ErrorAction Stop
} catch {
$ErrorMessage = $_.Exception.Message -replace "`n", " " -replace "`r", " "
Write-Warning "Get-WinDnsServerForwarder - Error $ErrorMessage"
continue
}
foreach ($_ in $DnsServerForwarder) {
if ($Formatted) {
[PSCustomObject] @{
IPAddress = $_.IPAddress.IPAddressToString -join $Splitter
ReorderedIPAddress = $_.ReorderedIPAddress.IPAddressToString -join $Splitter
EnableReordering = $_.EnableReordering
Timeout = $_.Timeout
UseRootHint = $_.UseRootHint
ForwardersCount = ($_.IPAddress.IPAddressToString).Count
GatheredFrom = $Computer.HostName
GatheredDomain = $Computer.Domain
}
} else {
[PSCustomObject] @{
IPAddress = $_.IPAddress.IPAddressToString
ReorderedIPAddress = $_.ReorderedIPAddress.IPAddressToString
EnableReordering = $_.EnableReordering
Timeout = $_.Timeout
UseRootHint = $_.UseRootHint
ForwardersCount = ($_.IPAddress.IPAddressToString).Count
GatheredFrom = $Computer.HostName
GatheredDomain = $Computer.Domain
}
}
}
}
}
function Get-WinADDnsServerScavenging {
<#
.SYNOPSIS
Retrieves DNS server scavenging details for specified forest and domains.
.DESCRIPTION
This function retrieves DNS server scavenging details for the specified forest and domains. It gathers information about DNS server scavenging settings for each domain controller in the forest.
.PARAMETER Forest
Specifies the name of the forest to retrieve DNS server scavenging details for.
.PARAMETER ExcludeDomains
Specifies an array of domains to exclude from DNS server scavenging details retrieval.
.PARAMETER ExcludeDomainControllers
Specifies an array of domain controllers to exclude from DNS server scavenging details retrieval.
.PARAMETER IncludeDomains
Specifies an array of domains to include in DNS server scavenging details retrieval.
.PARAMETER IncludeDomainControllers
Specifies an array of domain controllers to include in DNS server scavenging details retrieval.
.PARAMETER SkipRODC
Indicates whether to skip Read-Only Domain Controllers (RODC) when retrieving DNS server scavenging details.
.PARAMETER GPOs
Specifies an array of Group Policy Objects (GPOs) related to DNS server scavenging.
.PARAMETER ExtendedForestInformation
Specifies additional extended forest information to include in the output.
.EXAMPLE
Get-WinADDnsServerScavenging -Forest "example.com" -IncludeDomains "domain1.com", "domain2.com" -ExcludeDomainControllers "dc1.domain1.com" -SkipRODC
Retrieves DNS server scavenging details for the "example.com" forest, including "domain1.com" and "domain2.com" domains, excluding the "dc1.domain1.com" domain controller, and skipping RODCs.
#>
[CmdLetBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers', 'ComputerName')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[Array] $GPOs,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
foreach ($Computer in $ForestInformation.ForestDomainControllers) {
try {
$DnsServerScavenging = Get-DnsServerScavenging -ComputerName $Computer.HostName -ErrorAction Stop
} catch {
[PSCustomObject] @{
NoRefreshInterval = $null
RefreshInterval = $null
ScavengingInterval = $null
ScavengingState = $null
LastScavengeTime = $null
GatheredFrom = $Computer.HostName
GatheredDomain = $Computer.Domain
}
continue
}
foreach ($_ in $DnsServerScavenging) {
[PSCustomObject] @{
NoRefreshInterval = $_.NoRefreshInterval
RefreshInterval = $_.RefreshInterval
ScavengingInterval = $_.ScavengingInterval
ScavengingState = $_.ScavengingState
LastScavengeTime = $_.LastScavengeTime
GatheredFrom = $Computer.HostName
GatheredDomain = $Computer.Domain
}
}
}
}
function Get-ADWinDnsServerZones {
<#
.SYNOPSIS
Retrieves detailed information about DNS zones from Active Directory DNS servers.
.DESCRIPTION
This function retrieves detailed information about DNS zones from Active Directory DNS servers. It queries the DNS servers to gather information such as zone name, type, dynamic update settings, replication scope, and other zone-related details.
.PARAMETER Forest
Specifies the target forest to retrieve DNS zone information from.
.PARAMETER ExcludeDomains
Specifies the domains to exclude from the search.
.PARAMETER ExcludeDomainControllers
Specifies the domain controllers to exclude from the search.
.PARAMETER IncludeDomains
Specifies the domains to include in the search.
.PARAMETER IncludeDomainControllers
Specifies the domain controllers to include in the search.
.PARAMETER SkipRODC
Skips Read-Only Domain Controllers when querying for information.
.PARAMETER ExtendedForestInformation
Provides forest information from another command to speed up processing.
.PARAMETER ReverseLookupZone
Indicates whether to retrieve reverse lookup zones.
.PARAMETER PrimaryZone
Indicates whether to retrieve primary zones.
.PARAMETER Forwarder
Indicates whether to retrieve forwarder zones.
.PARAMETER ZoneName
Specifies the name of the zone to retrieve information for.
.EXAMPLE
Get-ADWinDnsServerZones -Forest "example.com" -IncludeDomains "domain1.com", "domain2.com" -PrimaryZone -ZoneName "example.com" | Format-Table
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory DNS servers.
#>
[alias('Get-WinDnsServerZones')]
[CmdLetBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[System.Collections.IDictionary] $ExtendedForestInformation,
[switch] $ReverseLookupZone,
[switch] $PrimaryZone,
[switch] $Forwarder,
[string] $ZoneName
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
foreach ($Domain in $ForestInformation.Domains) {
foreach ($Computer in $ForestInformation['DomainDomainControllers'][$Domain]) {
$getDnsServerZoneSplat = @{
ComputerName = $Computer.HostName
Name = $ZoneName
}
Remove-EmptyValue -Hashtable $getDnsServerZoneSplat
$Zones = Get-DnsServerZone @getDnsServerZoneSplat -ErrorAction SilentlyContinue
foreach ($_ in $Zones) {
if ($ZoneName) {
if ($ZoneName -ne $_.ZoneName) {
continue
}
}
if ($_.ZoneType -eq 'Primary') {
$ZoneAging = Get-DnsServerZoneAging -Name $_.ZoneName -ComputerName $Computer.HostName
$AgingEnabled = $ZoneAging.AgingEnabled
$AvailForScavengeTime = $ZoneAging.AvailForScavengeTime
$RefreshInterval = $ZoneAging.RefreshInterval
$NoRefreshInterval = $ZoneAging.NoRefreshInterval
$ScavengeServers = $ZoneAging.ScavengeServers
} else {
$AgingEnabled = $null
$AvailForScavengeTime = $null
$RefreshInterval = $null
$NoRefreshInterval = $null
$ScavengeServers = $null
}
if ($Forwarder) {
if ($_.ZoneType -ne 'Forwarder') {
continue
}
} elseif ($ReverseLookupZone -and $PrimaryZone) {
if ($_.IsReverseLookupZone -ne $true -or $_.ZoneType -ne 'Primary') {
continue
}
} elseif ($ReverseLookupZone) {
if ($_.IsReverseLookupZone -ne $true) {
continue
}
} elseif ($PrimaryZone) {
if ($_.ZoneType -ne 'Primary' -or $_.IsReverseLookupZone -ne $false ) {
continue
}
}
[PSCustomObject] @{
'ZoneName' = $_.'ZoneName'
'ZoneType' = $_.'ZoneType'
'IsPDC' = $Computer.IsPDC
'AgingEnabled' = $AgingEnabled
'AvailForScavengeTime' = $AvailForScavengeTime
'RefreshInterval' = $RefreshInterval
'NoRefreshInterval' = $NoRefreshInterval
'ScavengeServers' = $ScavengeServers
'MasterServers' = $_.MasterServers
'NotifyServers' = $_.'NotifyServers'
'SecondaryServers' = $_.'SecondaryServers'
'AllowedDcForNsRecordsAutoCreation' = $_.'AllowedDcForNsRecordsAutoCreation'
'DistinguishedName' = $_.'DistinguishedName'
'IsAutoCreated' = $_.'IsAutoCreated'
'IsDsIntegrated' = $_.'IsDsIntegrated'
'IsPaused' = $_.'IsPaused'
'IsReadOnly' = $_.'IsReadOnly'
'IsReverseLookupZone' = $_.'IsReverseLookupZone'
'IsShutdown' = $_.'IsShutdown'
'DirectoryPartitionName' = $_.'DirectoryPartitionName'
'DynamicUpdate' = $_.'DynamicUpdate'
'IgnorePolicies' = $_.'IgnorePolicies'
'IsSigned' = $_.'IsSigned'
'IsWinsEnabled' = $_.'IsWinsEnabled'
'Notify' = $_.'Notify'
'ReplicationScope' = $_.'ReplicationScope'
'SecureSecondaries' = $_.'SecureSecondaries'
'ZoneFile' = $_.'ZoneFile'
'GatheredFrom' = $Computer.HostName
'GatheredDomain' = $Domain
}
}
}
}
}
function Get-WinADDNSZones {
<#
.SYNOPSIS
Retrieves DNS zone information from the Active Directory DNS server.
.DESCRIPTION
This function retrieves detailed information about DNS zones from the Active Directory DNS server.
It queries the DNS server to gather information such as zone name, type, dynamic update settings, replication scope, and other zone-related details.
.PARAMETER None
This cmdlet does not require any parameters.
.EXAMPLE
Get-WinDNSZones
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory DNS server.
#>
[alias('Get-WinDNSZones')]
[CmdletBinding()]
param(
)
try {
$oRootDSE = Get-ADRootDSE -ErrorAction Stop
} catch {
Write-Warning -Message "Get-WinDNSZones - Could not get the root DSE. Make sure you're logged in to machine with Active Directory RSAT tools installed, and there's connecitivity to the domain. Error: $($_.Exception.Message)"
return
}
$ADServer = ($oRootDSE.dnsHostName)
$DNS = Get-DnsServerZone -ComputerName $ADServer
foreach ($Zone in $DNS) {
[PSCustomObject] @{
ZoneName = $Zone.ZoneName #: _msdcs.ad.evotec.xyz
ZoneType = $Zone.ZoneType #: Primary
DynamicUpdate = $Zone.DynamicUpdate #: Secure
ReplicationScope = $Zone.ReplicationScope #: Forest
DirectoryPartitionName = $Zone.DirectoryPartitionName #: ForestDnsZones.ad.evotec.xyz
#:
IsAutoCreated = $Zone.IsAutoCreated #: False
IsDsIntegrated = $Zone.IsDsIntegrated #: True
IsReadOnly = $Zone.IsReadOnly #: False
IsReverseLookupZone = $Zone.IsReverseLookupZone #: False
IsSigned = $Zone.IsSigned #: False
IsPaused = $Zone.IsPaused #: False
IsShutdown = $Zone.IsShutdown #: False
IsWinsEnabled = $Zone.IsWinsEnabled #: False
Notify = $Zone.Notify #: NotifyServers
NotifyServers = $Zone.NotifyServers #:
SecureSecondaries = $Zone.SecureSecondaries #: NoTransfer
SecondaryServers = $Zone.SecondaryServers #:
LastZoneTransferAttempt = $Zone.LastZoneTransferAttempt #:
LastSuccessfulZoneTransfer = $Zone.LastSuccessfulZoneTransfer #:
LastZoneTransferResult = $Zone.LastZoneTransferResult #:
LastSuccessfulSOACheck = $Zone.LastSuccessfulSOACheck #:
MasterServers = $Zone.MasterServers #:
LocalMasters = $Zone.LocalMasters #:
UseRecursion = $Zone.UseRecursion #:
ForwarderTimeout = $Zone.ForwarderTimeout #:
AllowedDcForNsRecordsAutoCreation = $Zone.AllowedDcForNsRecordsAutoCreation #:
DistinguishedName = $Zone.DistinguishedName #: DC=_msdcs.ad.evotec.xyz,cn=MicrosoftDNS,DC=ForestDnsZones,DC=ad,DC=evotec,DC=xyz
ZoneFile = $Zone.ZoneFile
}
}
}
function Get-WinADDomain {
<#
.SYNOPSIS
Retrieves information about a specified Active Directory domain.
.DESCRIPTION
This function retrieves detailed information about the specified Active Directory domain.
It queries the domain to gather information such as domain controllers, domain name, and other domain-related details.
.PARAMETER Domain
Specifies the target domain to retrieve information from.
.EXAMPLE
Get-WinADDomain -Domain "example.com"
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory domain.
#>
[cmdletBinding()]
param(
[string] $Domain
)
try {
if ($Domain) {
$Type = [System.DirectoryServices.ActiveDirectory.DirectoryContextType]::Domain
$Context = [System.DirectoryServices.ActiveDirectory.DirectoryContext]::new($Type, $Domain)
$DomainInformation = [System.DirectoryServices.ActiveDirectory.Domain]::GetDomain($Context)
} else {
$DomainInformation = [System.DirectoryServices.ActiveDirectory.Domain]::GetComputerDomain()
}
} catch {
Write-Warning "Get-WinADDomain - Can't get $Domain information, error: $($_.Exception.Message.Replace([System.Environment]::NewLine,''))"
}
$DomainInformation
}
function Get-WinADDomainControllerGenerationId {
<#
.SYNOPSIS
Provides information about the msDS-GenerationId of domain controllers
.DESCRIPTION
Provides information about the msDS-GenerationId of domain controllers
.PARAMETER Forest
Forest name to use for resolving. If not given it will use current forest.
.PARAMETER ExcludeDomains
Exclude specific domains from test
.PARAMETER ExcludeDomainControllers
Exclude specific domain controllers from test
.PARAMETER IncludeDomains
Include specific domains in test
.PARAMETER IncludeDomainControllers
Include specific domain controllers in test
.PARAMETER SkipRODC
Skip Read Only Domain Controllers when querying for information
.PARAMETER ExtendedForestInformation
Ability to provide Forest Information from another command to speed up processing
.EXAMPLE
$Output = Get-WinADDomainControllerGenerationId -IncludeDomainControllers 'dc1.ad.evotec.pl'
$Output | Format-Table
.NOTES
For virtual machine snapshot resuming detection. This attribute represents the VM Generation ID.
#>
[CmdletBinding()]
param(
[Parameter(ParameterSetName = 'Forest')][alias('ForestName')][string] $Forest,
[Parameter(ParameterSetName = 'Forest')][string[]] $ExcludeDomains,
[Parameter(ParameterSetName = 'Forest')][string[]] $ExcludeDomainControllers,
[Parameter(ParameterSetName = 'Forest')][alias('Domain', 'Domains')][string[]] $IncludeDomains,
[Parameter(ParameterSetName = 'Forest')][alias('DomainControllers')][string[]] $IncludeDomainControllers,
[Parameter(ParameterSetName = 'Forest')][switch] $SkipRODC,
[Parameter(ParameterSetName = 'Forest')][System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestDetails = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation -SkipRODC:$SkipRODC.IsPresent -IncludeDomainControllers $IncludeDomainControllers -ExcludeDomainControllers $ExcludeDomainControllers
foreach ($Domain in $ForestDetails.Domains) {
foreach ($D in $ForestDetails.DomainDomainControllers[$Domain]) {
Write-Verbose -Message "Get-MSDSGenerationID - Executing Get-ADObject $D.ComputerObjectDN -Server $D.HostName -Properties Name, SamAccountName, 'msDS-GenerationId'"
try {
$Data = Get-ADObject $D.DistinguishedName -Server $D.HostName -Properties Name, SamAccountName, 'msDS-GenerationId' -ErrorAction Stop
$ErrorProvided = $null
} catch {
$ErrorProvided = $_.Exception.Message
$Data = $null
}
if ($Data) {
$GenerationID = $Data.'msDS-GenerationId'
} else {
$GenerationID = $null
}
if ($GenerationID) {
$TranslatedGenerationID = ($GenerationID | ForEach-Object { $_.ToString("X2") }) -join ''
#$TranslatedGenerationIDAlternative = [System.Convert]::ToHexString($GenerationID)
} else {
#$TranslatedGenerationIDAlternative = $null
$TranslatedGenerationID = $null
}
[PSCustomObject] @{
HostName = $D.HostName
Domain = $Domain
Name = $D.Name
SamAccountName = $Data.SamAccountName
'msDS-GenerationId' = $TranslatedGenerationID
#'msDS-GenerationId' = $TranslatedGenerationIDAlternative
Error = $ErrorProvided
}
}
}
}
function Get-WinADDomainControllerNetLogonSettings {
<#
.SYNOPSIS
Gathers information about NetLogon settings on a Domain Controller
.DESCRIPTION
Gathers information about NetLogon settings on a Domain Controller
.PARAMETER DomainController
Specifies the Domain Controller to retrieve information from
.PARAMETER All
Retrieves all information from registry as is without any processing
.EXAMPLE
Get-WinADDomainControllerNetLogonSettings -DomainController 'AD1'
.EXAMPLE
Get-WinADDomainControllerNetLogonSettings -DomainController 'AD1' -All
.NOTES
Useful links:
- https://www.oreilly.com/library/view/active-directory-cookbook/0596004648/ch11s20.html
- https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.NetLogon::Netlogon_AutoSiteCoverage
- https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.NetLogon::Netlogon_SiteCoverage
- https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.NetLogon::Netlogon_GcSiteCoverage
#>
[CmdletBinding()]
param(
[Parameter(Mandatory)][Alias('ComputerName')][string] $DomainController,
[switch] $All
)
$RegistryNetLogon = Get-PSRegistry -RegistryPath "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters" -ComputerName $DomainController
if ($All) {
$RegistryNetLogon
} else {
$GCSiteCoverage = $RegistryNetLogon.'GCSiteCoverage'
if ($GCSiteCoverage) {
$GCSiteCoverage = $GCSiteCoverage -split ','
} else {
$GCSiteCoverage = @()
}
$SiteCoverage = $RegistryNetLogon.'SiteCoverage'
if ($SiteCoverage) {
$SiteCoverage = $SiteCoverage -split ','
} else {
$SiteCoverage = @()
}
[PSCustomObject] @{
'DomainController' = $RegistryNetLogon.'PSComputerName'
'DynamicSiteName' = $RegistryNetLogon.'DynamicSiteName'
'SiteCoverage' = $SiteCoverage
'GCSiteCoverage' = $GCSiteCoverage
'RequireSignOrSeal' = $RegistryNetLogon.'RequireSignOrSeal'
'RequireSeal' = $RegistryNetLogon.'RequireSeal'
'Error' = $RegistryNetLogon.'PSError'
'ErrorMessage' = $RegistryNetLogon.'PSErrorMessage'
}
}
}
function Get-WinADDomainControllerNTDSSettings {
<#
.SYNOPSIS
Gathers information about NTDS settings on a Domain Controller
.DESCRIPTION
Gathers information about NTDS settings on a Domain Controller
.PARAMETER DomainController
Specifies the Domain Controller to retrieve information from
.PARAMETER All
Retrieves all information from registry as is without any processing
.EXAMPLE
Get-WinADDomainControllerNTDSSettings -DomainController 'AD1'
.EXAMPLE
Get-WinADDomainControllerNTDSSettings -DomainController 'AD1' -All
.NOTES
General notes
#>
[CmdletBinding()]
param(
[Parameter(Mandatory)][Alias('ComputerName')][string] $DomainController,
[switch] $All
)
$RegistryNTDS = Get-PSRegistry -RegistryPath "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters" -ComputerName $DomainController
if ($All) {
$RegistryNTDS
} else {
[PSCustomObject] @{
'DomainController' = $RegistryNTDS.'PSComputerName'
'Error' = $RegistryNTDS.'PSError'
'System Schema Version' = $RegistryNTDS.'System Schema Version' #: 87
'Root Domain' = $RegistryNTDS.'Root Domain' #: DC = ad, DC = evotec, DC = xyz
'Configuration NC' = $RegistryNTDS.'Configuration NC' #: CN = Configuration, DC = ad, DC = evotec, DC = xyz
'Machine DN Name' = $RegistryNTDS.'Machine DN Name' #: CN = NTDS Settings, CN = AD1, CN = Servers, CN = Default-First-Site-Name, CN = Sites, CN = Configuration, DC = ad, DC = evotec, DC = xyz
'DsaOptions' = $RegistryNTDS.'DsaOptions' #: 1
'IsClone' = $RegistryNTDS.'IsClone' #: 0
'ServiceDll' = $RegistryNTDS.'ServiceDll' #: % systemroot % \system32\ntdsa.dll
'DSA Working Directory' = $RegistryNTDS.'DSA Working Directory' #: C:\Windows\NTDS
'DSA Database file' = $RegistryNTDS.'DSA Database file' #: C:\Windows\NTDS\ntds.dit
'Database backup path' = $RegistryNTDS.'Database backup path' #: C:\Windows\NTDS\dsadata.bak
'Database log files path' = $RegistryNTDS.'Database log files path' #: C:\Windows\NTDS
'Hierarchy Table Recalculation interval (minutes)' = $RegistryNTDS.'Hierarchy Table Recalculation interval (minutes)' #: 720
'Database logging / recovery' = $RegistryNTDS.'Database logging / recovery' # : ON
'DS Drive Mappings' = $RegistryNTDS.'DS Drive Mappings' #: c:\=\\?\Volume { 2014dd39-5b27-44a6-be88-1d650346016d }\
'DSA Database Epoch' = $RegistryNTDS.'DSA Database Epoch' #: 24290
'Strict Replication Consistency' = $RegistryNTDS.'Strict Replication Consistency' #: 1
'Schema Version' = $RegistryNTDS.'Schema Version' #: 88
'ldapserverintegrity' = $RegistryNTDS.'ldapserverintegrity' #: 1
'Global Catalog Promotion Complete' = $RegistryNTDS.'Global Catalog Promotion Complete' #: 1
'DSA Previous Restore Count' = $RegistryNTDS.'DSA Previous Restore Count' #: 4
'ErrorMessage' = $RegistryNTDS.'PSErrorMessage'
}
}
}
function Get-WinADDomainControllerOption {
<#
.SYNOPSIS
Command to get the options of a domain controller
.DESCRIPTION
Command to get the options of a domain controller that uses the repadmin command
Provides information about:
- DISABLE_OUTBOUND_REPL: Disables outbound replication.
- DISABLE_INBOUND_REPL: Disables inbound replication.
- DISABLE_NTDSCONN_XLATE: Disables the translation of NTDSConnection objects.
- DISABLE_SPN_REGISTRATION: Disables Service Principal Name (SPN) registration.
- IS_GC: Sets or unsets the Global Catalog (GC) for the domain controller.
.PARAMETER DomainController
The domain controller to get the options from
.EXAMPLE
Get-WinADDomainControllerOption -DomainController 'AD1', 'AD2','AD3' | Format-Table *
.NOTES
General notes
#>
[CmdletBinding()]
param(
[parameter(Mandatory)][string[]] $DomainController
)
foreach ($DC in $DomainController) {
# Execute the repadmin command and capture the output
Write-Verbose -Message "Get-WinADDomainControllerOption - Executing repadmin /options $DC"
$AvailableOptions = $null
$repadminOutput = & repadmin /options $DC
if ($repadminOutput[0].StartsWith("Repadmin can't connect to a", $true, [System.Globalization.CultureInfo]::InvariantCulture)) {
Write-Warning -Message "Get-WinADDomainControllerOption - Unable to connect to [$DC]. Error: $($_.Exception.Message)"
} else {
$AvailableOptions = $repadminOutput[0].Replace("Current DSA Options: ", "")
}
if ($AvailableOptions) {
$Options = $AvailableOptions -split " "
} else {
$Options = @()
}
$Output = [ordered] @{
Name = $DC
Status = if ($AvailableOptions) {
$true
} else {
$false
}
Options = foreach ($O in $Options) {
$Value = $O.Trim()
if ($Value) {
$Value
}
}
}
if ($Output.Options -contains 'IS_GC') {
$Output['IsGlobalCatalog'] = $true
} else {
$Output['IsGlobalCatalog'] = $false
}
if ($Output.Options -contains 'IS_RODC') {
$Output['IsReadOnlyDomainController'] = $true
} else {
$Output['IsReadOnlyDomainController'] = $false
}
if ($Output.Options -contains 'DISABLE_OUTBOUND_REPL') {
$Output['DisabledOutboundReplication'] = $true
} else {
$Output['DisabledOutboundReplication'] = $false
}
if ($Output.Options -contains 'DISABLE_INBOUND_REPL') {
$Output['DisabledInboundReplication'] = $true
} else {
$Output['DisabledInboundReplication'] = $false
}
if ($Output.Options -contains 'DISABLE_NTDSCONN_XLATE') {
$Output['DisabledNTDSConnectionTranslation'] = $true
} else {
$Output['DisabledNTDSConnectionTranslation'] = $false
}
if ($Output.Options -contains 'DISABLE_SPN_REGISTRATION') {
$Output['DisabledSPNRegistration'] = $true
} else {
$Output['DisabledSPNRegistration'] = $false
}
[PSCustomObject] $Output
}
}
Function Get-WinADDuplicateObject {
<#
.SYNOPSIS
Get duplicate objects in Active Directory (CNF: and CNF:0ACNF:)
.DESCRIPTION
Get duplicate objects in Active Directory (CNF: and CNF:0ACNF:)
CNF stands for "Conflict". CNF objects are created when there is a naming conflict in the Active Directory.
This usually happens during the replication process when two objects are created with the same name in different parts of the replication topology,
and then a replication attempt is made. Active Directory resolves this by renaming one of the objects with a CNF prefix and a GUID.
The object with the CNF name is usually the loser in the conflict resolution process.
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExcludeDomains
Exclude domain from search, by default whole forest is scanned
.PARAMETER IncludeDomains
Include only specific domains, by default whole forest is scanned
.PARAMETER ExtendedForestInformation
Ability to provide Forest Information from another command to speed up processing
.PARAMETER PartialMatchDistinguishedName
Limit results to specific DistinguishedName
.PARAMETER IncludeObjectClass
Limit results to specific ObjectClass
.PARAMETER ExcludeObjectClass
Exclude specific ObjectClass
.PARAMETER Extended
Provide extended information about the object
.PARAMETER NoPostProcessing
Do not post process the object, return as is from the AD
.EXAMPLE
Get-WinADDuplicateObject -Verbose | Format-Table
.NOTES
General notes
#>
[alias('Get-WinADForestObjectsConflict')]
[CmdletBinding()]
Param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[System.Collections.IDictionary] $ExtendedForestInformation,
[string] $PartialMatchDistinguishedName,
[string[]] $IncludeObjectClass,
[string[]] $ExcludeObjectClass,
[switch] $Extended,
[switch] $NoPostProcessing
)
# Based on https://gallery.technet.microsoft.com/scriptcenter/Get-ADForestConflictObjects-4667fa37
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation -Extended
foreach ($Domain in $ForestInformation.Domains) {
$DomainInformation = $ForestInformation.DomainsExtended[$Domain]
Write-Verbose -Message "Get-WinADDuplicateObject - Processing $($Domain)"
$Partitions = @(
if ($Domain -eq $ForestInformation.Forest) {
"CN=Configuration,$($ForestInformation['DomainsExtended'][$Domain].DistinguishedName)"
if ($DomainInformation.SubordinateReferences -contains "DC=ForestDnsZones,$($ForestInformation['DomainsExtended'][$Domain].DistinguishedName)") {
"DC=ForestDnsZones,$($ForestInformation['DomainsExtended'][$Domain].DistinguishedName)"
} else {
Write-Warning -Message "Get-WinADDuplicateObject - ForestDnsZones not found for domain '$Domain'. Skipping"
}
}
# Domain Name
$ForestInformation['DomainsExtended'][$Domain].DistinguishedName
# DNS Name
if ($DomainInformation.SubordinateReferences -contains "DC=DomainDnsZones,$($ForestInformation['DomainsExtended'][$Domain].DistinguishedName)") {
"DC=DomainDnsZones,$($ForestInformation['DomainsExtended'][$Domain].DistinguishedName)"
} else {
Write-Warning -Message "Get-WinADDuplicateObject - DomainDnsZones not found for domain '$Domain'. Skipping"
}
)
$DC = $ForestInformation['QueryServers']["$Domain"].HostName[0]
#Get conflict objects
foreach ($Partition in $Partitions) {
Write-Verbose -Message "Get-WinADDuplicateObject - Processing $($Domain) - $($Partition)"
$getADObjectSplat = @{
#Filter = "*"
LDAPFilter = "(|(cn=*\0ACNF:*)(ou=*CNF:*))"
Properties = 'DistinguishedName', 'ObjectClass', 'DisplayName', 'SamAccountName', 'Name', 'ObjectCategory', 'WhenCreated', 'WhenChanged', 'ProtectedFromAccidentalDeletion', 'ObjectGUID'
Server = $DC
SearchScope = 'Subtree'
}
try {
$Objects = Get-ADObject @getADObjectSplat -SearchBase $Partition -ErrorAction Stop
} catch {
Write-Warning -Message "Get-WinADDuplicateObject - Getting objects from domain '$Domain' / partition: '$Partition' failed. Error: $($Object.Exception.Message)"
continue
}
foreach ($Object in $Objects) {
# Lets allow users to filter on it
if ($ExcludeObjectClass) {
if ($ExcludeObjectClass -contains $Object.ObjectClass) {
continue
}
}
if ($IncludeObjectClass) {
if ($IncludeObjectClass -notcontains $Object.ObjectClass) {
continue
}
}
if ($PartialMatchDistinguishedName) {
if ($Object.DistinguishedName -notlike $PartialMatchDistinguishedName) {
continue
}
}
if ($NoPostProcessing) {
$Object
continue
}
$DomainName = ConvertFrom-DistinguishedName -DistinguishedName $Object.DistinguishedName -ToDomainCN
# Lets create separate objects for different purpoeses
$ConflictObject = [ordered] @{
ConflictDN = $Object.DistinguishedName
ConflictWhenChanged = $Object.WhenChanged
DomainName = $DomainName
ObjectClass = $Object.ObjectClass
}
$LiveObjectData = [ordered] @{
LiveDn = "N/A"
LiveWhenChanged = "N/A"
}
$RestData = [ordered] @{
DisplayName = $Object.DisplayName
Name = $Object.Name.Replace("`n", ' ')
SamAccountName = $Object.SamAccountName
ObjectCategory = $Object.ObjectCategory
WhenCreated = $Object.WhenCreated
WhenChanged = $Object.WhenChanged
ProtectedFromAccidentalDeletion = $Object.ProtectedFromAccidentalDeletion
ObjectGUID = $Object.ObjectGUID.Guid
# Server used to query the object
Server = $DC
# Partition used to query the object
SearchBase = $Partition
}
if ($Extended) {
$LiveObject = $null
$ConflictObject = $ConflictObject + $LiveObjectData + $RestData
#See if we are dealing with a 'cn' conflict object
if (Select-String -SimpleMatch "\0ACNF:" -InputObject $ConflictObject.ConflictDn) {
#Split the conflict object DN so we can remove the conflict notation
$SplitConfDN = $ConflictObject.ConflictDn -split "0ACNF:"
#Remove the conflict notation from the DN and try to get the live AD object
try {
$LiveObject = Get-ADObject -Identity "$($SplitConfDN[0].TrimEnd("\"))$($SplitConfDN[1].Substring(36))" -Properties WhenChanged -Server $DC -ErrorAction Stop
} catch {
}
if ($LiveObject) {
$ConflictObject.LiveDN = $LiveObject.DistinguishedName
$ConflictObject.LiveWhenChanged = $LiveObject.WhenChanged
}
} else {
#Split the conflict object DN so we can remove the conflict notation for OUs
$SplitConfDN = $ConflictObject.ConflictDn -split "CNF:"
#Remove the conflict notation from the DN and try to get the live AD object
try {
$LiveObject = Get-ADObject -Identity "$($SplitConfDN[0])$($SplitConfDN[1].Substring(36))" -Properties WhenChanged -Server $DC -ErrorAction Stop
} catch {
}
if ($LiveObject) {
$ConflictObject.LiveDN = $LiveObject.DistinguishedName
$ConflictObject.LiveWhenChanged = $LiveObject.WhenChanged
}
}
} else {
$ConflictObject = $ConflictObject + $RestData
}
[PSCustomObject] $ConflictObject
}
}
}
}
function Get-WinADDuplicateSPN {
<#
.SYNOPSIS
Detects and lists duplicate Service Principal Names (SPNs) in the Active Directory Domain.
.DESCRIPTION
Detects and lists duplicate Service Principal Names (SPNs) in the Active Directory Domain.
.PARAMETER All
Returns all duplicate and non-duplicate SPNs. Default is to only return duplicate SPNs.
.PARAMETER Exclude
Provides ability to exclude specific SPNs from the duplicate detection. By default it excludes kadmin/changepw as with multiple forests it will happen for sure.
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExcludeDomains
Exclude domain from search, by default whole forest is scanned
.PARAMETER IncludeDomains
Include only specific domains, by default whole forest is scanned
.PARAMETER ExtendedForestInformation
Ability to provide Forest Information from another command to speed up processing
.EXAMPLE
Get-WinADDuplicateSPN | Format-Table
.EXAMPLE
Get-WinADDuplicateSPN -All | Format-Table
.NOTES
General notes
#>
[CmdletBinding()]
param(
[switch] $All,
[string[]] $Exclude,
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[Parameter(ParameterSetName = 'Forest')][System.Collections.IDictionary] $ExtendedForestInformation
)
$Excluded = @(
'kadmin/changepw'
foreach ($Item in $Exclude) {
$iTEM
}
)
$SPNCache = [ordered] @{}
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
foreach ($Domain in $ForestInformation.Domains) {
Write-Verbose -Message "Get-WinADDuplicateSPN - Processing $Domain"
$Objects = (Get-ADObject -LDAPFilter "ServicePrincipalName=*" -Properties ServicePrincipalName -Server $ForestInformation['QueryServers'][$domain]['HostName'][0])
Write-Verbose -Message "Get-WinADDuplicateSPN - Found $($Objects.Count) objects. Processing..."
foreach ($Object in $Objects) {
foreach ($SPN in $Object.ServicePrincipalName) {
if (-not $SPNCache[$SPN]) {
$SPNCache[$SPN] = [PSCustomObject] @{
Name = $SPN
Duplicate = $false
Count = 0
Excluded = $false
List = [System.Collections.Generic.List[Object]]::new()
}
}
if ($SPN -in $Excluded) {
$SPNCache[$SPN].Excluded = $true
}
$SPNCache[$SPN].List.Add($Object)
$SPNCache[$SPN].Count++
}
}
}
Write-Verbose -Message "Get-WinADDuplicateSPN - Finalizing output. Processing..."
foreach ($SPN in $SPNCache.Values) {
if ($SPN.Count -gt 1 -and $SPN.Excluded -ne $true) {
$SPN.Duplicate = $true
}
if ($All) {
$SPN
} else {
if ($SPN.Duplicate) {
$SPN
}
}
}
}
function Get-WinADForest {
<#
.SYNOPSIS
Retrieves information about a specified Active Directory forest.
.DESCRIPTION
This function retrieves detailed information about the specified Active Directory forest.
It queries the forest to gather information such as domain controllers, sites, and other forest-related details.
.PARAMETER Forest
Specifies the target forest to retrieve information from.
.EXAMPLE
Get-WinADForest -Forest "example.com"
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory forest.
#>
[cmdletBinding()]
param(
[string] $Forest
)
try {
if ($Forest) {
$Type = [System.DirectoryServices.ActiveDirectory.DirectoryContextType]::Forest
$Context = [System.DirectoryServices.ActiveDirectory.DirectoryContext]::new($Type, $Forest)
$ForestInformation = [System.DirectoryServices.ActiveDirectory.Forest]::GetForest($Context)
} else {
$ForestInformation = ([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest())
}
} catch {
Write-Warning "Get-WinADForest - Can't get $Forest information, error: $($_.Exception.Message.Replace([System.Environment]::NewLine,''))"
}
$ForestInformation
}
function Get-WinADForestControllerInformation {
<#
.SYNOPSIS
Retrieves information about domain controllers in a specified Active Directory forest.
.DESCRIPTION
This function retrieves detailed information about domain controllers within the specified Active Directory forest.
It queries the forest for domain controller properties such as PrimaryGroupID, OperatingSystem, LastLogonDate, etc.
.PARAMETER Forest
Specifies the target forest to retrieve domain controller information from.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the search.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the search.
.PARAMETER ExtendedForestInformation
Specifies additional information about the forest for retrieving domain controller details.
.EXAMPLE
Get-WinADForestControllerInformation -Forest "example.com" -IncludeDomains @("example.com") -ExcludeDomains @("test.com")
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory forest.
#>
[cmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$Today = Get-Date
$ForestInformation = Get-WinADForestDetails -Extended -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation -Verbose:$false
foreach ($Domain in $ForestInformation.Domains) {
$QueryServer = $ForestInformation['QueryServers'][$Domain]['HostName'][0]
$Properties = @(
'PrimaryGroupID'
'PrimaryGroup'
'Enabled'
'ManagedBy'
'OperatingSystem'
'OperatingSystemVersion'
'PasswordLastSet'
'PasswordExpired'
'PasswordNeverExpires'
'PasswordNotRequired'
'TrustedForDelegation'
'UseDESKeyOnly'
'TrustedToAuthForDelegation'
'WhenCreated'
'WhenChanged'
'LastLogonDate'
'IPv4Address'
'IPv6Address'
)
$Filter = 'Name -ne "AzureADKerberos" -and DNSHostName -like "*"'
$DCs = Get-ADComputer -Server $QueryServer -SearchBase $ForestInformation['DomainsExtended'][$Domain].DomainControllersContainer -Filter $Filter -Properties $Properties
$Count = 0
foreach ($DC in $DCs) {
$Count++
Write-Verbose -Message "Get-WinADForestControllerInformation - Processing [$($Domain)]($Count/$($DCs.Count)) $($DC.DNSHostName)"
$Owner = Get-ADACLOwner -ADObject $DC.DistinguishedName -Resolve
if ($null -ne $DC.LastLogonDate) {
[int] $LastLogonDays = "$(-$($DC.LastLogonDate - $Today).Days)"
} else {
$LastLogonDays = $null
}
if ($null -ne $DC.PasswordLastSet) {
[int] $PasswordLastChangedDays = "$(-$($DC.PasswordLastSet - $Today).Days)"
} else {
$PasswordLastChangedDays = $null
}
$Options = Get-WinADDomainControllerOption -DomainController $DC.DNSHostName
if ($Options.Options -contains 'DISABLE_OUTBOUND_REPL') {
$DisabledOutboundReplication = $true
} else {
$DisabledOutboundReplication = $false
}
if ($Options.Options -contains 'DISABLE_INBOUND_REPL') {
$DisabledInboundReplication = $true
} else {
$DisabledInboundReplication = $false
}
if ($Options.Options -contains "IS_GC") {
$IsGlobalCatalog = $true
} else {
$IsGlobalCatalog = $false
}
if ($Options.Options -contains 'IS_RODC') {
$IsReadOnlyDomainController = $true
} else {
$IsReadOnlyDomainController = $false
}
$Roles = [ordered] @{}
$Roles['SchemaMaster'] = $ForestInformation.Forest.SchemaMaster
$Roles['DomainNamingMaster'] = $ForestInformation.Forest.DomainNamingMaster
$Roles['InfrastructureMaster'] = $ForestInformation.DomainsExtended[$Domain].InfrastructureMaster
$Roles['RIDMaster'] = $ForestInformation.DomainsExtended[$Domain].RIDMaster
$Roles['PDCEmulator'] = $ForestInformation.DomainsExtended[$Domain].PDCEmulator
$DNS = Resolve-DnsName -DnsOnly -Name $DC.DNSHostName -ErrorAction SilentlyContinue -QuickTimeout -Verbose:$false
if ($DNS) {
$ResolvedIP4 = ($DNS | Where-Object { $_.Section -eq 'Answer' -and $_.Type -eq 'A' }).IPAddress
$ResolvedIP6 = ($DNS | Where-Object { $_.Section -eq 'Answer' -and $_.Type -eq 'AAAA' }).IPAddress
$DNSStatus = $true
} else {
$ResolvedIP4 = $null
$ResolvedIP6 = $null
$DNSStatus = $false
}
[PSCustomObject] @{
DNSHostName = $DC.DNSHostName
DomainName = $Domain
Enabled = $DC.Enabled
DNSStatus = $DNSStatus
IsGC = $IsGlobalCatalog
IsRODC = $IsReadOnlyDomainController
IPAddressStatusV4 = if ($ResolvedIP4 -eq $DC.IPv4Address) {
$true
} else {
$false
}
IPAddressStatusV6 = if ($ResolvedIP6 -eq $DC.IPv6Address) {
$true
} else {
$false
}
IPAddressHasOneIpV4 = $ResolvedIP4 -isnot [Array]
IPAddressHasOneipV6 = $ResolvedIP6 -isnot [Array]
ManagerNotSet = $Null -eq $ManagedBy
OwnerType = $Owner.OwnerType
PasswordLastChangedDays = $PasswordLastChangedDays
LastLogonDays = $LastLogonDays
Owner = $Owner.OwnerName
OwnerSid = $Owner.OwnerSid
ManagedBy = $DC.ManagedBy
DNSResolvedIPv4 = $ResolvedIP4
DNSResolvedIPv6 = $ResolvedIP6
IPv4Address = $DC.IPv4Address
IPv6Address = $DC.IPv6Address
LastLogonDate = $DC.LastLogonDate
OperatingSystem = $DC.OperatingSystem
OperatingSystemVersion = $DC.OperatingSystemVersion
PasswordExpired = $DC.PasswordExpired
PasswordLastSet = $DC.PasswordLastSet
PasswordNeverExpires = $DC.PasswordNeverExpires
PasswordNotRequired = $DC.PasswordNotRequired
TrustedForDelegation = $DC.TrustedForDelegation
TrustedToAuthForDelegation = $DC.TrustedToAuthForDelegation
DisabledOutboundReplication = $DisabledOutboundReplication
DisabledInboundReplication = $DisabledInboundReplication
Options = $Options.Options -join ', '
UseDESKeyOnly = $DC.UseDESKeyOnly
SchemaMaster = if ($Roles['SchemaMaster'] -eq $DC.DNSHostName) {
$true
} else {
$false
}
DomainNamingMaster = if ($Roles['DomainNamingMaster'] -eq $DC.DNSHostName) {
$true
} else {
$false
}
InfrastructureMaster = if ($Roles['InfrastructureMaster'] -eq $DC.DNSHostName) {
$true
} else {
$false
}
RIDMaster = if ($Roles['RIDMaster'] -eq $DC.DNSHostName) {
$true
} else {
$false
}
PDCEmulator = if ($Roles['PDCEmulator'] -eq $DC.DNSHostName) {
$true
} else {
$false
}
WhenCreated = $DC.WhenCreated
WhenChanged = $DC.WhenChanged
DistinguishedName = $DC.DistinguishedName
}
}
}
}
function Get-WinADForestOptionalFeatures {
<#
.SYNOPSIS
Retrieves optional features information for a specified Active Directory forest.
.DESCRIPTION
Retrieves detailed information about optional features within the specified Active Directory forest.
.PARAMETER Forest
Specifies the target forest to retrieve optional features information from.
.PARAMETER ComputerProperties
Specifies an array of computer properties to check for specific features.
.PARAMETER ExtendedForestInformation
Specifies additional information about the forest for retrieving optional features.
.EXAMPLE
Get-WinADForestOptionalFeatures -Forest "example.com" -ComputerProperties @("ms-Mcs-AdmPwd", "msLAPS-Password")
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory forest.
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[Array] $ComputerProperties,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -ExtendedForestInformation $ExtendedForestInformation
if (-not $ComputerProperties) {
$ComputerProperties = Get-WinADForestSchemaProperties -Schema 'Computers' -Forest $Forest -ExtendedForestInformation $ForestInformation
}
$QueryServer = $ForestInformation['QueryServers']["Forest"].HostName[0]
$LapsProperties = 'ms-Mcs-AdmPwd'
$WindowsLapsProperties = 'msLAPS-Password'
$OptionalFeatures = $(Get-ADOptionalFeature -Filter "*" -Server $QueryServer)
$Optional = [ordered]@{
'Recycle Bin Enabled' = $false
'Privileged Access Management Feature Enabled' = $false
'LAPS Enabled' = ($ComputerProperties.Name -contains $LapsProperties)
'Windows LAPS Enabled' = ($ComputerProperties.Name -contains $WindowsLapsProperties)
}
foreach ($Feature in $OptionalFeatures) {
if ($Feature.Name -eq 'Recycle Bin Feature') {
$Optional.'Recycle Bin Enabled' = $Feature.EnabledScopes.Count -gt 0
}
if ($Feature.Name -eq 'Privileged Access Management Feature') {
$Optional.'Privileged Access Management Feature Enabled' = $Feature.EnabledScopes.Count -gt 0
}
}
$Optional
}
function Get-WinADForestReplication {
<#
.SYNOPSIS
Retrieves replication information for a specified Active Directory forest.
.DESCRIPTION
Retrieves detailed information about replication within the specified Active Directory forest.
.PARAMETER Forest
Specifies the target forest to retrieve replication information from.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the replication search.
.PARAMETER ExcludeDomainControllers
Specifies an array of domain controllers to exclude from the replication search.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the replication search.
.PARAMETER IncludeDomainControllers
Specifies an array of domain controllers to include in the replication search.
.PARAMETER SkipRODC
Indicates whether to skip read-only domain controllers during replication.
.PARAMETER Extended
Indicates whether to include extended replication information.
.PARAMETER ExtendedForestInformation
Specifies additional information about the forest for replication.
.EXAMPLE
Get-WinADForestReplication -Forest "example.com" -IncludeDomains @("example.com") -ExcludeDomains @("test.com") -IncludeDomainControllers @("DC1") -ExcludeDomainControllers @("DC2") -SkipRODC -Extended -ExtendedForestInformation $ExtendedForestInfo
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory forest.
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[switch] $Extended,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ProcessErrors = [System.Collections.Generic.List[PSCustomObject]]::new()
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
$Replication = foreach ($DC in $ForestInformation.ForestDomainControllers) {
try {
Get-ADReplicationPartnerMetadata -Target $DC.HostName -Partition * -ErrorAction Stop #-ErrorVariable +ProcessErrors
} catch {
Write-Warning -Message "Get-WinADForestReplication - Error on server $($_.Exception.ServerName): $($_.Exception.Message)"
$ProcessErrors.Add([PSCustomObject] @{ Server = $_.Exception.ServerName; StatusMessage = $_.Exception.Message })
}
}
foreach ($_ in $Replication) {
$ServerPartner = (Resolve-DnsName -Name $_.PartnerAddress -Verbose:$false -ErrorAction SilentlyContinue)
$ServerInitiating = (Resolve-DnsName -Name $_.Server -Verbose:$false -ErrorAction SilentlyContinue)
$ReplicationObject = [ordered] @{
Server = $_.Server
ServerIPV4 = $ServerInitiating.IP4Address
ServerPartner = $ServerPartner.NameHost
ServerPartnerIPV4 = $ServerPartner.IP4Address
LastReplicationAttempt = $_.LastReplicationAttempt
LastReplicationResult = $_.LastReplicationResult
LastReplicationSuccess = $_.LastReplicationSuccess
ConsecutiveReplicationFailures = $_.ConsecutiveReplicationFailures
LastChangeUsn = $_.LastChangeUsn
PartnerType = $_.PartnerType
Partition = $_.Partition
TwoWaySync = $_.TwoWaySync
ScheduledSync = $_.ScheduledSync
SyncOnStartup = $_.SyncOnStartup
CompressChanges = $_.CompressChanges
DisableScheduledSync = $_.DisableScheduledSync
IgnoreChangeNotifications = $_.IgnoreChangeNotifications
IntersiteTransport = $_.IntersiteTransport
IntersiteTransportGuid = $_.IntersiteTransportGuid
IntersiteTransportType = $_.IntersiteTransportType
UsnFilter = $_.UsnFilter
Writable = $_.Writable
Status = if ($_.LastReplicationResult -ne 0) {
$false
} else {
$true
}
StatusMessage = "Last successful replication time was $($_.LastReplicationSuccess), Consecutive Failures: $($_.ConsecutiveReplicationFailures)"
}
if ($Extended) {
$ReplicationObject.Partner = $_.Partner
$ReplicationObject.PartnerAddress = $_.PartnerAddress
$ReplicationObject.PartnerGuid = $_.PartnerGuid
$ReplicationObject.PartnerInvocationId = $_.PartnerInvocationId
$ReplicationObject.PartitionGuid = $_.PartitionGuid
}
[PSCustomObject] $ReplicationObject
}
foreach ($_ in $ProcessErrors) {
if ($null -ne $_.Server) {
$ServerInitiating = (Resolve-DnsName -Name $_.Server -Verbose:$false -ErrorAction SilentlyContinue)
} else {
$ServerInitiating = [PSCustomObject] @{ IP4Address = '127.0.0.1' }
}
$ReplicationObject = [ordered] @{
Server = $_.Server
ServerIPV4 = $ServerInitiating.IP4Address
ServerPartner = 'Unknown'
ServerPartnerIPV4 = '127.0.0.1'
LastReplicationAttempt = $null
LastReplicationResult = $null
LastReplicationSuccess = $null
ConsecutiveReplicationFailures = $null
LastChangeUsn = $null
PartnerType = $null
Partition = $null
TwoWaySync = $null
ScheduledSync = $null
SyncOnStartup = $null
CompressChanges = $null
DisableScheduledSync = $null
IgnoreChangeNotifications = $null
IntersiteTransport = $null
IntersiteTransportGuid = $null
IntersiteTransportType = $null
UsnFilter = $null
Writable = $null
Status = $false
StatusMessage = $_.StatusMessage
}
if ($Extended) {
$ReplicationObject.Partner = $null
$ReplicationObject.PartnerAddress = $null
$ReplicationObject.PartnerGuid = $null
$ReplicationObject.PartnerInvocationId = $null
$ReplicationObject.PartitionGuid = $null
}
[PSCustomObject] $ReplicationObject
}
}
function Get-WinADForestReplicationSummary {
<#
.SYNOPSIS
Function that retrieves the replication summary of the Active Directory forest.
.DESCRIPTION
This function retrieves the replication summary of the Active Directory forest.
It uses the repadmin command to retrieve the replication summary and then parses
the output to create a custom object with the following properties:
- Server: The server name.
- LargestDelta: The largest delta between replication cycles.
- Fails: The number of failed replication cycles.
- Total: The total number of replication cycles.
- PercentageError: The percentage of failed replication cycles.
- Type: The type of server (Source or Destination).
- ReplicationError: The replication error message.
.PARAMETER InputContent
Allow the user to pass the repadmin output as a string.
.PARAMETER FilePath
Allow the user to pass the path of a file containing the repadmin output.
.PARAMETER IncludeStatisticsVariable
Allow the user to pass the name of a variable to store the statistics.
.EXAMPLE
Get-WinADForestReplicationSummary | Format-Table
.EXAMPLE
Get-WinADForestReplicationSummary -FilePath C:\repadmin.txt | Format-Table
.EXAMPLE
Get-WinADForestReplicationSummary -InputContent $repadminOutput | Format-Table
.EXAMPLE
Get-WinADForestReplicationSummary -IncludeStatisticsVariable Statistics | Format-Table
$Statistics | Format-Table
.NOTES
General notes
#>
[CmdletBinding(DefaultParameterSetName = 'Default')]
param(
[Parameter(ParameterSetName = 'InputContent')][string] $InputContent,
[Parameter(ParameterSetName = 'FilePath')][string] $FilePath,
[string] $IncludeStatisticsVariable
)
if ($InputContent) {
$OutputRepadmin = $InputContent
} elseif ($FilePath) {
$OutputRepadmin = Get-Content -Path $FilePath -Raw
} else {
# Run repadmin and capture the output
$OutputRepadmin = repadmin /replsummary /bysrc /bydest | Out-String
}
# Split the output into sections
$sections = $OutputRepadmin -split "Source DSA|Destination DSA"
$lines = $sections[1] -split "`r`n"
[Array] $sourceData = foreach ($line in $lines) {
if ($line -match '^Experienced the following operational errors trying to retrieve replication information') {
break
}
if ($line -match '\S' -and $line -notmatch '^\s*largest') {
if ($line -match "^\s*(?<DSA>\S+)\s+(?<Rest>.*)$") {
#Write-Verbose -Message "Processing line: $line"
$DSA = $Matches.DSA
# $rest = $Matches.Rest -split "\s+", 4 # split into 4 parts: LargestDelta, Fails, Total, Percentage and the rest
$Rest = $Matches.Rest
if ($rest -match ">60 days") {
$RestSplitted = $Rest -split "\s+", 7
$LargestDelta = New-TimeSpan -Days 60
$Fails = $RestSplitted[2]
$Total = $RestSplitted[4]
$Percentage = $RestSplitted[5]
$ReplicationError = $RestSplitted[6]
$Type = "Source"
} else {
$RestSplitted = $Rest -split "\s+", 4 # split into 4 parts: LargestDelta, Fails, Total, Percentage and the rest
$LargestDelta = ConvertTo-TimeSpanFromRepadmin -timeString $RestSplitted[0]
$Fails = $RestSplitted[1]
$Continue = $RestSplitted[3]
$Continue = $Continue -split "\s{2,}"
$Total = $Continue[0]
$Percentage = $Continue[1]
$ReplicationError = $Continue[2]
if ($null -eq $ReplicationError) {
$ReplicationError = "None"
}
$Type = "Source"
}
[PSCustomObject]@{
Server = $DSA
LargestDelta = $LargestDelta
Fails = if ($null -ne $Fails) {
[int] $Fails.Replace("/", "").Trim()
} else {
$null
}
Total = [int] $Total
PercentageError = $Percentage
Type = $Type
ReplicationError = $ReplicationError
}
}
}
}
$lines = $sections[2] -split "`r`n"
[Array] $destinationData = foreach ($line in $lines) {
if ($line -match '^Experienced the following operational errors trying to retrieve replication information') {
break
}
if ($line -match '\S' -and $line -notmatch '^\s*largest') {
if ($line -match "^\s*(?<DSA>\S+)\s+(?<Rest>.*)$") {
# Write-Verbose -Message "Processing line: $line"
$DSA = $Matches.DSA
$Rest = $Matches.Rest
if ($rest -match ">60 days") {
$RestSplitted = $Rest -split "\s+", 7
$LargestDelta = New-TimeSpan -Days 60
$Fails = $RestSplitted[2]
$Total = $RestSplitted[4]
$Percentage = $RestSplitted[5]
$ReplicationError = $RestSplitted[6]
$Type = "Destination"
} else {
$RestSplitted = $Rest -split "\s+", 4 # split into 4 parts: LargestDelta, Fails, Total, Percentage and the rest
$LargestDelta = ConvertTo-TimeSpanFromRepadmin -timeString $RestSplitted[0]
$Fails = $RestSplitted[1]
$Continue = $RestSplitted[3]
$Continue = $Continue -split "\s{2,}"
$Total = $Continue[0]
$Percentage = $Continue[1]
$ReplicationError = $Continue[2]
if ($null -eq $ReplicationError) {
$ReplicationError = "None"
}
$Type = "Destination"
}
[PSCustomObject]@{
Server = $DSA
LargestDelta = $LargestDelta
Fails = if ($null -ne $Fails) {
[int] $Fails.Replace("/", "").Trim()
} else {
$null
}
Total = [int] $Total
PercentageError = $Percentage
Type = $Type
ReplicationError = $ReplicationError
}
}
}
}
[Array] $operationalErrors = foreach ($line in $lines) {
if ($line -match '^Experienced the following operational errors trying to retrieve replication information') {
$processingErrors = $true
continue
}
if ($processingErrors) {
if ($line -match "^\s*(?<ErrorCode>\d+)\s+-\s+(?<ServerName>.*)$") {
# Write-Verbose -Message "Processing error line: $line"
$ErrorCode = $Matches.ErrorCode
$ServerName = $Matches.ServerName
if ($ServerName -match "\.") {
$HostName = $ServerName.Split(".")[0]
} else {
$HostName = $ServerName
}
[PSCustomObject]@{
Server = $HostName
LargestDelta = $null
Fails = 1
Total = 1
PercentageError = 100
Type = "Unknown"
ReplicationError = "($ErrorCode) Error trying to retrieve replication information"
}
}
}
}
# Combine the data from both sections
$ReplicationSummary = $sourceData + $destinationData + $operationalErrors
$ReplicationSummary
if ($IncludeStatisticsVariable) {
$Statistics = [ordered] @{
"Good" = 0
"Failures" = 0
"Total" = 0
"DeltaOver1Hours" = 0
"DeltaOver3Hours" = 0
"DeltaOver6Hours" = 0
"DeltaOver12Hours" = 0
"DeltaOver24Hours" = 0
"UniqueErrors" = [System.Collections.Generic.List[string]]::new()
"UniqueWarnings" = [System.Collections.Generic.List[string]]::new()
}
foreach ($Replication in $ReplicationSummary) {
$Statistics.Total++
if ($Replication.LargestDelta -gt (New-TimeSpan -Hours 24)) {
$Statistics.DeltaOver24Hours++
} elseif ($Replication.LargestDelta -gt (New-TimeSpan -Hours 12)) {
$Statistics.DeltaOver12Hours++
} elseif ($Replication.LargestDelta -gt (New-TimeSpan -Hours 6)) {
$Statistics.DeltaOver6Hours++
} elseif ($Replication.LargestDelta -gt (New-TimeSpan -Hours 3)) {
$Statistics.DeltaOver3Hours++
} elseif ($Replication.LargestDelta -gt (New-TimeSpan -Hours 1)) {
$Statistics.DeltaOver1Hours++
}
if ($Replication.Fails -eq 0) {
$Statistics.Good++
} else {
$Statistics.Failures++
}
if ($Replication.ReplicationError -notin "None", "") {
if ($Replication.ReplicationError -like "*Operational errors trying to retrieve replication information*") {
if ($Replication.ReplicationError -notin $Statistics.UniqueWarnings) {
$Statistics.UniqueWarnings.Add($Replication.ReplicationError)
}
} elseif ($Replication.ReplicationError -like "*The remote procedure call was cancelled.*") {
if ($Replication.ReplicationError -notin $Statistics.UniqueWarnings) {
$Statistics.UniqueWarnings.Add($Replication.ReplicationError)
}
} elseif ($Replication.ReplicationError -like "*The RPC server is unavailable*") {
if ($Replication.ReplicationError -notin $Statistics.UniqueWarnings) {
$Statistics.UniqueWarnings.Add($Replication.ReplicationError)
}
} elseif ($Replication.ReplicationError -notin $Statistics.UniqueErrors) {
if ($Statistics.UniqueErrors -notcontains $Replication.ReplicationError) {
$Statistics.UniqueErrors.Add($Replication.ReplicationError)
}
}
}
}
Set-Variable -Scope Global -Name $IncludeStatisticsVariable -Value $Statistics
}
}
function Get-WinADForestRoles {
<#
.SYNOPSIS
Lists all the forest roles for the chosen forest. By default uses current forest.
.DESCRIPTION
Lists all the forest roles for the chosen forest. By default uses current forest.
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExcludeDomains
Exclude domain from search, by default whole forest is scanned
.PARAMETER IncludeDomains
Include only specific domains, by default whole forest is scanned
.PARAMETER ExcludeDomainControllers
Exclude specific domain controllers, by default there are no exclusions
.PARAMETER IncludeDomainControllers
Include only specific domain controllers, by default all domain controllers are included
.PARAMETER SkipRODC
Skip Read-Only Domain Controllers. By default all domain controllers are included.
.PARAMETER ExtendedForestInformation
Ability to provide Forest Information from another command to speed up processing
.PARAMETER Formatted
Returns objects in formatted way
.PARAMETER Splitter
Character to use as splitter/joiner in formatted output
.EXAMPLE
$Roles = Get-WinADForestRoles
$Roles | ft *
.NOTES
General notes
#>
[alias('Get-WinADRoles', 'Get-WinADDomainRoles')]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[switch] $Formatted,
[string] $Splitter = ', ',
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
$Roles = [ordered] @{
SchemaMaster = $null
DomainNamingMaster = $null
PDCEmulator = $null
RIDMaster = $null
InfrastructureMaster = $null
IsReadOnly = $null
IsGlobalCatalog = $null
}
foreach ($_ in $ForestInformation.ForestDomainControllers) {
if ($_.IsSchemaMaster -eq $true) {
$Roles['SchemaMaster'] = if ($null -ne $Roles['SchemaMaster']) {
@($Roles['SchemaMaster']) + $_.HostName
} else {
$_.HostName
}
}
if ($_.IsDomainNamingMaster -eq $true) {
$Roles['DomainNamingMaster'] = if ($null -ne $Roles['DomainNamingMaster']) {
@($Roles['DomainNamingMaster']) + $_.HostName
} else {
$_.HostName
}
}
if ($_.IsPDC -eq $true) {
$Roles['PDCEmulator'] = if ($null -ne $Roles['PDCEmulator']) {
@($Roles['PDCEmulator']) + $_.HostName
} else {
$_.HostName
}
}
if ($_.IsRIDMaster -eq $true) {
$Roles['RIDMaster'] = if ($null -ne $Roles['RIDMaster']) {
@($Roles['RIDMaster']) + $_.HostName
} else {
$_.HostName
}
}
if ($_.IsInfrastructureMaster -eq $true) {
$Roles['InfrastructureMaster'] = if ($null -ne $Roles['InfrastructureMaster']) {
@($Roles['InfrastructureMaster']) + $_.HostName
} else {
$_.HostName
}
}
if ($_.IsReadOnly -eq $true) {
$Roles['IsReadOnly'] = if ($null -ne $Roles['IsReadOnly']) {
@($Roles['IsReadOnly']) + $_.HostName
} else {
$_.HostName
}
}
if ($_.IsGlobalCatalog -eq $true) {
$Roles['IsGlobalCatalog'] = if ($null -ne $Roles['IsGlobalCatalog']) {
@($Roles['IsGlobalCatalog']) + $_.HostName
} else {
$_.HostName
}
}
}
if ($Formatted) {
foreach ($_ in ([string[]] $Roles.Keys)) {
$Roles[$_] = $Roles[$_] -join $Splitter
}
}
$Roles
}
function Get-WinADForestSchemaDetails {
<#
.SYNOPSIS
Gets detailed information about Active Directory forest schema including security permissions.
.DESCRIPTION
This function retrieves comprehensive information about the Active Directory forest schema, including:
- Schema master information
- Schema object details
- Schema attributes and their properties
- Security permissions (both current and default) for schema objects
- Permission differences from default settings
- Schema object owners
.PARAMETER None
This function does not accept any parameters.
.OUTPUTS
Returns a hashtable containing:
- SchemaMaster: The domain controller that holds the Schema Master FSMO role
- SchemaObject: Details of the Schema container object
- SchemaList: List of all schema objects and their attributes
- ForestInformation: General forest details
- SchemaDefaultPermissions: Default security permissions for schema objects
- SchemaPermissions: Current security permissions for schema objects
- SchemaSummaryDefaultPermissions: Summarized default permissions by principal
- SchemaSummaryPermissions: Summarized current permissions by principal
- SchemaOwners: Owners of schema objects
.EXAMPLE
$SchemaDetails = Get-WinADForestSchemaDetails
Gets all schema details and permissions for the current forest
.EXAMPLE
$SchemaDetails = Get-WinADForestSchemaDetails | Select-Object -ExpandProperty SchemaList
Gets just the list of schema objects and their attributes
.NOTES
Requires Active Directory PowerShell module
Requires Schema Admin permissions to view some details
Can be resource intensive in large environments
#>
[CmdletBinding()]
param(
)
$Output = [ordered] @{
SchemaMaster = $null
SchemaObject = $null
SchemaList = $null
ForestInformation = $null
SchemaDefaultPermissions = [ordered] @{}
SchemaPermissions = [ordered] @{}
SchemaSummaryDefaultPermissions = [ordered] @{}
SchemaSummaryPermissions = [ordered] @{}
SchemaOwners = [ordered] @{}
}
$Today = Get-Date
$Properties = @(
"Name"
"DistinguishedName"
"CanonicalName"
"adminDisplayName"
"lDAPDisplayName"
"Created"
"Modified"
"objectClass"
"ObjectGUID"
"ProtectedFromAccidentalDeletion"
"defaultSecurityDescriptor"
"NTSecurityDescriptor"
"attributeID"
"attributeSyntax"
"isSingleValued"
"adminDescription"
"omSyntax"
"searchFlags"
"systemOnly"
"showInAdvancedViewOnly"
"schemaIDGUID"
"attributeSecurityGUID"
"CN"
)
$ForestInformation = Get-WinADForestDetails -Extended
$ForestDN = $ForestInformation['DomainsExtended'][$ForestInformation['Forest'].RootDomain].DistinguishedName
$FindDN = "CN=Schema,CN=Configuration,$ForestDN"
$SchemaObject = Get-ADObject -Filter * -SearchBase $FindDN -Properties $Properties -ErrorAction SilentlyContinue
$Count = 0
$SchemaFilteredObject = $SchemaObject | ForEach-Object {
# Skip the first object as it is the schema object itself
if ($Count -eq 0) {
$Count++; return
}
# Convert GUIDs from byte arrays
$SchemaIdGuid = if ($_."schemaIDGUID") {
[System.Guid]::new($_."schemaIDGUID").ToString()
} else {
$null
} # ConvertFrom-ADSchemaGUID
$AttributeSecurityGuid = if ($_."attributeSecurityGUID") {
[System.Guid]::new($_."attributeSecurityGUID").ToString()
} else {
$null
} # ConvertFrom-ADSchemaGUID
$AttributeSecurityGuidBase64 = if ($_."attributeSecurityGUID") {
[Convert]::ToBase64String($_."attributeSecurityGUID")
} else {
$null
} # ConvertTo-Base64
[PSCustomObject] @{
"Name" = $_."Name"
"DistinguishedName" = $_."DistinguishedName"
"CanonicalName" = $_."CanonicalName"
"Created" = $_."Created"
"CreatedDaysAgo" = if ($_.Created) {
(New-TimeSpan -Start $_."Created" -End $Today).Days
} else {
$null
}
"Modified" = $_."Modified"
"ModifiedDaysAgo" = if ($_.Modified) {
(New-TimeSpan -Start $_."Modified" -End $Today).Days
} else {
$null
}
"objectClass" = $_."objectClass"
"ObjectGUID" = $_."ObjectGUID"
"ProtectedFromAccidentalDeletion" = $_."ProtectedFromAccidentalDeletion"
"defaultSecurityDescriptor" = $_."defaultSecurityDescriptor"
"NTSecurityDescriptor" = $_."NTSecurityDescriptor"
"CN" = $_."CN"
"attributeID" = $_."attributeID"
"attributeSyntax" = $_."attributeSyntax"
"isSingleValued" = $_."isSingleValued"
"adminDisplayName" = $_."adminDisplayName"
"lDAPDisplayName" = $_."lDAPDisplayName"
"adminDescription" = $_."adminDescription"
"omSyntax" = $_."omSyntax"
"searchFlags" = $_."searchFlags"
"systemOnly" = $_."systemOnly"
"showInAdvancedViewOnly" = $_."showInAdvancedViewOnly"
"attributeSecurityGUID" = $AttributeSecurityGuid
"attributeSecurityGUIDBase64" = $AttributeSecurityGuidBase64
"schemaIDGUID" = $SchemaIdGuid
}
}
$Output['SchemaObject'] = $SchemaObject[0]
$Output['SchemaList'] = $SchemaFilteredObject
$Output['SchemaMaster'] = $ForestInformation.Forest.SchemaMaster
$Output['ForestInformation'] = $ForestInformation.Forest
$Count = 0
foreach ($Object in $SchemaFilteredObject) {
$Count++
Write-Verbose "Get-WinADForestSchemaDetails - Processing [$Count/$($SchemaFilteredObject.Count)] $($Object.DistinguishedName)"
$Output.SchemaSummaryDefaultPermissions[$Object.Name] = [PSCustomObject] @{
Name = $Object.Name
CanonicalName = $Object.CanonicalName
AdminDisplayName = $Object.adminDisplayName
LdapDisplayName = $Object.lDAPDisplayName
'PermissionsAvailable' = $false
'Account Operators' = @()
'Administrators' = @()
'System' = @()
'Authenticated Users' = @()
'Domain Admins' = @()
'Enterprise Admins' = @()
'Enterprise Domain Controllers' = @()
'Schema Admins' = @()
'Creator Owner' = @()
'Cert Publishers' = @()
'Other' = @()
DistinguishedName = $Object.DistinguishedName
}
$Output.SchemaSummaryPermissions[$Object.Name] = [PSCustomObject] @{
Name = $Object.Name
CanonicalName = $Object.CanonicalName
AdminDisplayName = $Object.adminDisplayName
LdapDisplayName = $Object.lDAPDisplayName
'PermissionsChanged' = $null
'DefaultPermissionsAvailable' = $false
'Account Operators' = @()
'Administrators' = @()
'System' = @()
'Authenticated Users' = @()
'Domain Admins' = @()
'Enterprise Admins' = @()
'Enterprise Domain Controllers' = @()
'Schema Admins' = @()
'Creator Owner' = @()
'Cert Publishers' = @()
'Other' = @()
DistinguishedName = $Object.DistinguishedName
}
if ($Object.NTSecurityDescriptor) {
$SecurityDescriptor = Get-ADACL -ADObject $Object -Resolve
$Owner = Get-ADACLOwner -ADObject $Object.DistinguishedName -Resolve
$Output['SchemaOwners'][$Object.Name] = [PSCustomObject] @{
Name = $Object.Name
CanonicalName = $Object.CanonicalName
AdminDisplayName = $Object.adminDisplayName
LdapDisplayName = $Object.lDAPDisplayName
Owner = $Owner.Owner
OwnerType = $Owner.OwnerType
OwnerSID = $Owner.OwnerSID
Error = $Owner.Error
DistinguishedName = $Object.DistinguishedName
}
$Output['SchemaPermissions'][$Object.Name] = $SecurityDescriptor
foreach ($Permission in $SecurityDescriptor) {
if ($Permission.Principal -eq 'Account Operators') {
if ($Output.SchemaSummaryPermissions[$Object.Name].'Account Operators' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryPermissions[$Object.Name].'Account Operators' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'Administrators') {
if ($Output.SchemaSummaryPermissions[$Object.Name].'Administrators' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryPermissions[$Object.Name].'Administrators' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.PrincipalObjectSID -eq 'S-1-5-18') {
if ($Output.SchemaSummaryPermissions[$Object.Name].'System' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryPermissions[$Object.Name].'System' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'Authenticated Users') {
if ($Output.SchemaSummaryPermissions[$Object.Name].'Authenticated Users' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryPermissions[$Object.Name].'Authenticated Users' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'Domain Admins') {
if ($Output.SchemaSummaryPermissions[$Object.Name].'Domain Admins' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryPermissions[$Object.Name].'Domain Admins' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'CREATOR OWNER') {
if ($Output.SchemaSummaryPermissions[$Object.Name].'CREATOR OWNER' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryPermissions[$Object.Name].'CREATOR OWNER' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'Cert Publishers') {
if ($Output.SchemaSummaryPermissions[$Object.Name].'Cert Publishers' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryPermissions[$Object.Name].'Cert Publishers' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'Enterprise Admins') {
if ($Output.SchemaSummaryPermissions[$Object.Name].'Enterprise Admins' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryPermissions[$Object.Name].'Enterprise Admins' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'Enterprise Domain Controllers') {
if ($Output.SchemaSummaryPermissions[$Object.Name].'Enterprise Domain Controllers' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryPermissions[$Object.Name].'Enterprise Domain Controllers' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'Schema Admins') {
if ($Output.SchemaSummaryPermissions[$Object.Name].'Schema Admins' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryPermissions[$Object.Name].'Schema Admins' += $Permission.ActiveDirectoryRights
}
} else {
if ($Output.SchemaSummaryPermissions[$Object.Name].'Other' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryPermissions[$Object.Name].'Other' += $Permission.ActiveDirectoryRights
}
}
}
$SchemaAdminsList = $Output.SchemaSummaryPermissions[$Object.Name].'Schema Admins' -split ", "
$SchemaAdminsExpected = 'CreateChild', 'Self', 'WriteProperty', 'ExtendedRight', 'GenericRead', 'WriteDacl', 'WriteOwner'
$Compare = Compare-Object -ReferenceObject $SchemaAdminsList -DifferenceObject $SchemaAdminsExpected
$CompareResult = $Compare.SideIndicator -contains '=>' -or $Compare.SideIndicator -contains '<='
$CompareCount = $SchemaAdminsExpected.Count -eq $SchemaAdminsList.Count
if ($Output.SchemaSummaryPermissions[$Object.Name].'Account Operators'.Count -eq 0 -and
$Output.SchemaSummaryPermissions[$Object.Name].'Administrators'.Count -eq 0 -and
$Output.SchemaSummaryPermissions[$Object.Name].'System'.Count -gt 0 -and $Output.SchemaSummaryPermissions[$Object.Name].'System'[0] -eq 'GenericAll' -and
$Output.SchemaSummaryPermissions[$Object.Name].'Authenticated Users'.Count -gt 0 -and $Output.SchemaSummaryPermissions[$Object.Name].'Authenticated Users'[0] -eq 'GenericRead' -and
$Output.SchemaSummaryPermissions[$Object.Name].'Domain Admins'.Count -eq 0 -and
$Output.SchemaSummaryPermissions[$Object.Name].'Enterprise Admins'.Count -eq 0 -and
$CompareResult -eq $false -and $CompareCount -eq $true -and
$Output.SchemaSummaryPermissions[$Object.Name].'Creator Owner'.Count -eq 0 -and
$Output.SchemaSummaryPermissions[$Object.Name].'Cert Publishers'.Count -eq 0 -and
$Output.SchemaSummaryPermissions[$Object.Name].'Other'.Count -eq 0) {
$Output.SchemaSummaryPermissions[$Object.Name].'PermissionsChanged' = $false
} else {
$Output.SchemaSummaryPermissions[$Object.Name].'PermissionsChanged' = $true
}
}
if ($Object.defaultSecurityDescriptor -and $Object.defaultSecurityDescriptor -ne "D:S:") {
$Output.SchemaSummaryPermissions[$Object.Name].'DefaultPermissionsAvailable' = $true
$SecurityDescriptor = Convert-ADSecurityDescriptor -SDDL $Object.defaultSecurityDescriptor -Resolve -DistinguishedName $Object.DistinguishedName
$Output['SchemaDefaultPermissions'][$Object.Name] = $SecurityDescriptor
foreach ($Permission in $SecurityDescriptor) {
if ($Permission.Principal -eq 'Account Operators') {
if ($Output.SchemaSummaryDefaultPermissions[$Object.Name].'Account Operators' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryDefaultPermissions[$Object.Name].'Account Operators' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'Administrators') {
if ($Output.SchemaSummaryDefaultPermissions[$Object.Name].'Administrators' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryDefaultPermissions[$Object.Name].'Administrators' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.PrincipalObjectSID -eq 'S-1-5-18') {
if ($Output.SchemaSummaryDefaultPermissions[$Object.Name].'System' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryDefaultPermissions[$Object.Name].'System' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'Authenticated Users') {
if ($Output.SchemaSummaryDefaultPermissions[$Object.Name].'Authenticated Users' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryDefaultPermissions[$Object.Name].'Authenticated Users' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'Domain Admins') {
if ($Output.SchemaSummaryDefaultPermissions[$Object.Name].'Domain Admins' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryDefaultPermissions[$Object.Name].'Domain Admins' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'CREATOR OWNER') {
if ($Output.SchemaSummaryDefaultPermissions[$Object.Name].'CREATOR OWNER' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryDefaultPermissions[$Object.Name].'CREATOR OWNER' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'Cert Publishers') {
if ($Output.SchemaSummaryDefaultPermissions[$Object.Name].'Cert Publishers' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryDefaultPermissions[$Object.Name].'Cert Publishers' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'Enterprise Admins') {
if ($Output.SchemaSummaryDefaultPermissions[$Object.Name].'Enterprise Admins' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryDefaultPermissions[$Object.Name].'Enterprise Admins' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'Enterprise Domain Controllers') {
if ($Output.SchemaSummaryDefaultPermissions[$Object.Name].'Enterprise Domain Controllers' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryDefaultPermissions[$Object.Name].'Enterprise Domain Controllers' += $Permission.ActiveDirectoryRights
}
} elseif ($Permission.Principal -eq 'Schema Admins') {
if ($Output.SchemaSummaryDefaultPermissions[$Object.Name].'Schema Admins' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryDefaultPermissions[$Object.Name].'Schema Admins' += $Permission.ActiveDirectoryRights
}
} else {
if ($Output.SchemaSummaryDefaultPermissions[$Object.Name].'Other' -notcontains $Permission.ActiveDirectoryRights) {
$Output.SchemaSummaryDefaultPermissions[$Object.Name].'Other' += $Permission.ActiveDirectoryRights
}
}
$Output.SchemaSummaryDefaultPermissions[$Object.Name].'PermissionsAvailable' = $true
}
} else {
Write-Verbose "Get-WinADForestSchemaDetails - No defaultSecurityDescriptor found for $($Object.DistinguishedName)"
$Output['SchemaDefaultPermissions'][$Object.Name] = $null
}
}
$Output
}
function Get-WinADForestSchemaProperties {
<#
.SYNOPSIS
Retrieves schema properties for a specified Active Directory forest.
.DESCRIPTION
Retrieves detailed information about schema properties within the specified Active Directory forest.
.PARAMETER Forest
Specifies the target forest to retrieve schema properties from.
.PARAMETER Schema
Specifies the type of schema properties to retrieve. Valid values are 'Computers' and 'Users'.
.PARAMETER ExtendedForestInformation
Specifies additional information about the forest.
.EXAMPLE
Get-WinADForestSchemaProperties -Forest "example.com" -Schema @('Computers', 'Users')
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory forest.
#>
[cmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[validateSet('Computers', 'Users')][string[]] $Schema = @('Computers', 'Users'),
[System.Collections.IDictionary] $ExtendedForestInformation
)
<#
Name : dLMemRejectPermsBL
CommonName : ms-Exch-DL-Mem-Reject-Perms-BL
Oid : 1.2.840.113556.1.2.293
Syntax : DN
Description :
IsSingleValued : False
IsIndexed : False
IsIndexedOverContainer : False
IsInAnr : False
IsOnTombstonedObject : False
IsTupleIndexed : False
IsInGlobalCatalog : True
RangeLower :
RangeUpper :
IsDefunct : False
Link : dLMemRejectPerms
LinkId : 117
SchemaGuid : a8df73c3-c5ea-11d1-bbcb-0080c76670c0
#>
$ForestInformation = Get-WinADForestDetails -Forest $Forest -ExtendedForestInformation $ExtendedForestInformation
if ($Forest) {
$Type = [System.DirectoryServices.ActiveDirectory.DirectoryContextType]::Forest
$Context = [System.DirectoryServices.ActiveDirectory.DirectoryContext]::new($Type, $ForestInformation.Forest)
$CurrentSchema = [directoryservices.activedirectory.activedirectoryschema]::GetSchema($Context)
} else {
$CurrentSchema = [directoryservices.activedirectory.activedirectoryschema]::GetCurrentSchema()
}
if ($Schema -contains 'Computers') {
$CurrentSchema.FindClass("computer").mandatoryproperties | Select-Object -Property name, commonname, description, syntax , SchemaGuid
$CurrentSchema.FindClass("computer").optionalproperties | Select-Object -Property name, commonname, description, syntax, SchemaGuid
}
if ($Schema -contains 'Users') {
$CurrentSchema.FindClass("user").mandatoryproperties | Select-Object -Property name, commonname, description, syntax, SchemaGuid
$CurrentSchema.FindClass("user").optionalproperties | Select-Object -Property name, commonname, description, syntax, SchemaGuid
}
}
function Get-WinADForestSites {
<#
.SYNOPSIS
Retrieves site information for a specified Active Directory forest.
.DESCRIPTION
Retrieves detailed information about sites within the specified Active Directory forest.
.PARAMETER Forest
Specifies the target forest to retrieve site information from.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the search.
.PARAMETER ExcludeDomainControllers
Specifies an array of domain controllers to exclude from the search.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the search.
.PARAMETER IncludeDomainControllers
Specifies an array of domain controllers to include in the search.
.PARAMETER SkipRODC
Indicates whether to skip read-only domain controllers.
.PARAMETER Formatted
Indicates whether to format the output.
.PARAMETER Splitter
Specifies the delimiter to use for splitting values.
.PARAMETER ExtendedForestInformation
Specifies additional information about the forest.
.EXAMPLE
Get-WinADForestSites -Forest "example.com" -IncludeDomains @("example.com") -ExcludeDomains @("test.com") -IncludeDomainControllers @("DC1") -ExcludeDomainControllers @("DC2") -SkipRODC -Formatted -Splitter ","
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory forest.
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[switch] $Formatted,
[string] $Splitter,
[System.Collections.IDictionary] $ExtendedForestInformation
)
<#
'nTSecurityDescriptor' = $_.'nTSecurityDescriptor'
LastKnownParent = $_.LastKnownParent
instanceType = $_.InstanceType
InterSiteTopologyGenerator = $_.InterSiteTopologyGenerator
dSCorePropagationData = $_.dSCorePropagationData
ReplicationSchedule = $_.ReplicationSchedule.RawSchedule -join ','
msExchServerSiteBL = $_.msExchServerSiteBL -join ','
siteObjectBL = $_.siteObjectBL -join ','
systemFlags = $_.systemFlags
ObjectGUID = $_.ObjectGUID
ObjectCategory = $_.ObjectCategory
ObjectClass = $_.ObjectClass
ScheduleHashingEnabled = $_.ScheduleHashingEnabled
#>
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
$QueryServer = $ForestInformation.QueryServers[$($ForestInformation.Forest.Name)]['HostName'][0]
$Sites = Get-ADReplicationSite -Filter "*" -Properties * -Server $QueryServer
foreach ($Site in $Sites) {
[Array] $DCs = $ForestInformation.ForestDomainControllers | Where-Object { $_.Site -eq $Site.Name }
[Array] $Subnets = ConvertFrom-DistinguishedName -DistinguishedName $Site.'Subnets'
if ($Formatted) {
[PSCustomObject] @{
'Name' = $Site.Name
#'Display Name' = $Site.'DisplayName'
'Description' = $Site.'Description'
'CanonicalName' = $Site.'CanonicalName'
'Subnets Count' = $Subnets.Count
'Domain Controllers Count' = $DCs.Count
'Location' = $Site.'Location'
'ManagedBy' = $Site.'ManagedBy'
'Subnets' = if ($Splitter) {
$Subnets -join $Splitter
} else {
$Subnets
}
'Domain Controllers' = if ($Splitter) {
($DCs).HostName -join $Splitter
} else {
($DCs).HostName
}
'DistinguishedName' = $Site.'DistinguishedName'
'Protected From Accidental Deletion' = $Site.'ProtectedFromAccidentalDeletion'
'Redundant Server Topology Enabled' = $Site.'RedundantServerTopologyEnabled'
'Automatic Inter-Site Topology Generation Enabled' = $Site.'AutomaticInterSiteTopologyGenerationEnabled'
'Automatic Topology Generation Enabled' = $Site.'AutomaticTopologyGenerationEnabled'
'sDRightsEffective' = $Site.'sDRightsEffective'
'Topology Cleanup Enabled' = $Site.'TopologyCleanupEnabled'
'Topology Detect Stale Enabled' = $Site.'TopologyDetectStaleEnabled'
'Topology Minimum Hops Enabled' = $Site.'TopologyMinimumHopsEnabled'
'Universal Group Caching Enabled' = $Site.'UniversalGroupCachingEnabled'
'Universal Group Caching Refresh Site' = $Site.'UniversalGroupCachingRefreshSite'
'Windows Server 2000 Bridgehead Selection Method Enabled' = $Site.'WindowsServer2000BridgeheadSelectionMethodEnabled'
'Windows Server 2000 KCC ISTG Selection Behavior Enabled' = $Site.'WindowsServer2000KCCISTGSelectionBehaviorEnabled'
'Windows Server 2003 KCC Behavior Enabled' = $Site.'WindowsServer2003KCCBehaviorEnabled'
'Windows Server 2003 KCC Ignore Schedule Enabled' = $Site.'WindowsServer2003KCCIgnoreScheduleEnabled'
'Windows Server 2003 KCC SiteLink Bridging Enabled' = $Site.'WindowsServer2003KCCSiteLinkBridgingEnabled'
'Created' = $Site.Created
'Modified' = $Site.Modified
'Deleted' = $Site.Deleted
}
} else {
[PSCustomObject] @{
'Name' = $Site.Name
#'DisplayName' = $Site.'DisplayName'
'Description' = $Site.'Description'
'CanonicalName' = $Site.'CanonicalName'
'SubnetsCount' = $Subnets.Count
'DomainControllersCount' = $DCs.Count
'Subnets' = if ($Splitter) {
$Subnets -join $Splitter
} else {
$Subnets
}
'DomainControllers' = if ($Splitter) {
($DCs).HostName -join $Splitter
} else {
($DCs).HostName
}
'Location' = $Site.'Location'
'ManagedBy' = $Site.'ManagedBy'
'DistinguishedName' = $Site.'DistinguishedName'
'ProtectedFromAccidentalDeletion' = $Site.'ProtectedFromAccidentalDeletion'
'RedundantServerTopologyEnabled' = $Site.'RedundantServerTopologyEnabled'
'AutomaticInterSiteTopologyGenerationEnabled' = $Site.'AutomaticInterSiteTopologyGenerationEnabled'
'AutomaticTopologyGenerationEnabled' = $Site.'AutomaticTopologyGenerationEnabled'
'sDRightsEffective' = $Site.'sDRightsEffective'
'TopologyCleanupEnabled' = $Site.'TopologyCleanupEnabled'
'TopologyDetectStaleEnabled' = $Site.'TopologyDetectStaleEnabled'
'TopologyMinimumHopsEnabled' = $Site.'TopologyMinimumHopsEnabled'
'UniversalGroupCachingEnabled' = $Site.'UniversalGroupCachingEnabled'
'UniversalGroupCachingRefreshSite' = $Site.'UniversalGroupCachingRefreshSite'
'WindowsServer2000BridgeheadSelectionMethodEnabled' = $Site.'WindowsServer2000BridgeheadSelectionMethodEnabled'
'WindowsServer2000KCCISTGSelectionBehaviorEnabled' = $Site.'WindowsServer2000KCCISTGSelectionBehaviorEnabled'
'WindowsServer2003KCCBehaviorEnabled' = $Site.'WindowsServer2003KCCBehaviorEnabled'
'WindowsServer2003KCCIgnoreScheduleEnabled' = $Site.'WindowsServer2003KCCIgnoreScheduleEnabled'
'WindowsServer2003KCCSiteLinkBridgingEnabled' = $Site.'WindowsServer2003KCCSiteLinkBridgingEnabled'
'Created' = $Site.Created
'Modified' = $Site.Modified
'Deleted' = $Site.Deleted
}
}
}
}
function Get-WinADForestSubnet {
<#
.SYNOPSIS
Retrieves subnet information for a specified Active Directory forest.
.DESCRIPTION
Retrieves detailed information about subnets within the specified Active Directory forest.
.PARAMETER Forest
Specifies the target forest to retrieve subnet information from.
.PARAMETER ExtendedForestInformation
Specifies additional information about the forest.
.PARAMETER VerifyOverlap
Indicates whether to verify overlapping subnets.
.EXAMPLE
Get-WinADForestSubnet -Forest "example.com" -VerifyOverlap
This example retrieves subnet information for the "example.com" forest and verifies overlapping subnets.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory forest.
#>
[alias('Get-WinADSubnet')]
[cmdletBinding()]
param(
[string] $Forest,
[System.Collections.IDictionary] $ExtendedForestInformation,
[switch] $VerifyOverlap
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -ExtendedForestInformation $ExtendedForestInformation
$QueryServer = $ForestInformation.QueryServers[$($ForestInformation.Forest.Name)]['HostName'][0]
$ForestDN = ConvertTo-DistinguishedName -ToDomain -CanonicalName $ForestInformation.Forest.Name
$ADObjectSplat = @{
Server = $QueryServer
LDAPFilter = '(objectClass=subnet)'
SearchBase = "CN=Subnets,CN=Sites,CN=Configuration,$($($ForestDN))"
SearchScope = 'OneLevel'
Properties = 'Name', 'distinguishedName', 'CanonicalName', 'WhenCreated', 'whenchanged', 'ProtectedFromAccidentalDeletion', 'siteObject', 'location', 'objectClass', 'Description'
}
try {
$SubnetsList = Get-ADObject @ADObjectSplat -ErrorAction Stop
} catch {
Write-Warning "Get-WinADSites - LDAP Filter: $($ADObjectSplat.LDAPFilter), SearchBase: $($ADObjectSplat.SearchBase)), Error: $($_.Exception.Message)"
}
$Cache = @{}
if ($VerifyOverlap) {
$Subnets = Get-ADSubnet -Subnets $SubnetsList -AsHashTable
$OverlappingSubnets = Test-ADSubnet -Subnets $Subnets
foreach ($Subnet in $OverlappingSubnets) {
if (-not $Cache[$Subnet.Name]) {
$Cache[$Subnet.Name] = [System.Collections.Generic.List[string]]::new()
}
$Cache[$Subnet.Name].Add($Subnet.OverlappingSubnet)
}
foreach ($Subnet in $Subnets) {
if ($Subnet.Type -eq 'IPv4') {
# We only set it to false to IPV4, for IPV6 it will be null as we don't know
$Subnet['Overlap'] = $false
}
if ($Cache[$Subnet.Name]) {
$Subnet['Overlap'] = $true
$Subnet['OverLapList'] = $Cache[$Subnet.Name]
} else {
}
[PSCustomObject] $Subnet
}
} else {
Get-ADSubnet -Subnets $SubnetsList
}
}
function Get-WinADGroupMember {
<#
.SYNOPSIS
The Get-WinADGroupMember cmdlet gets the members of an Active Directory group. Members can be users, groups, and computers.
.DESCRIPTION
The Get-WinADGroupMember cmdlet gets the members of an Active Directory group. Members can be users, groups, and computers. The Identity parameter specifies the Active Directory group to access. You can identify a group by its distinguished name, GUID, security identifier, or Security Account Manager (SAM) account name. You can also specify the group by passing a group object through the pipeline. For example, you can use the Get-ADGroup cmdlet to get a group object and then pass the object through the pipeline to the Get-WinADGroupMember cmdlet.
.PARAMETER Identity
Specifies an Active Directory group object
.PARAMETER AddSelf
Adds details about initial group name to output. Works only with All switch
.PARAMETER SelfOnly
Returns only one object that's summary for the whole group. Works only with All switch
.PARAMETER AdditionalStatistics
Adds additional data to Self object (when AddSelf is used). This data is available always if SelfOnly is used. It includes count for NestingMax, NestingGroup, NestingGroupSecurity, NestingGroupDistribution. It allows for easy filtering where we expect security groups only when there are nested distribution groups.
.PARAMETER All
Adds details about groups, and their nesting. Without this parameter only unique users and computers are returned
.EXAMPLE
Get-WinADGroupMember -Identity 'EVOTECPL\Domain Admins' -All
.EXAMPLE
Get-WinADGroupMember -Group 'GDS-TestGroup9' -All -SelfOnly | Format-List *
.EXAMPLE
Get-WinADGroupMember -Group 'GDS-TestGroup9' | Format-Table *
.EXAMPLE
Get-WinADGroupMember -Group 'GDS-TestGroup9' -All -AddSelf | Format-Table *
.EXAMPLE
Get-WinADGroupMember -Group 'GDS-TestGroup9' -All -AddSelf -AdditionalStatistics | Format-Table *
.NOTES
General notes
#>
[cmdletBinding()]
param(
[alias('GroupName', 'Group')][Parameter(ValuefromPipeline, Mandatory)][Array] $Identity,
#[switch] $CountMembers,
[switch] $AddSelf,
[switch] $All,
[switch] $ClearCache,
[switch] $AdditionalStatistics,
[switch] $SelfOnly,
[Parameter(DontShow)][int] $Nesting = -1,
[Parameter(DontShow)][System.Collections.Generic.List[object]] $CollectedGroups,
[Parameter(DontShow)][System.Object] $Circular,
[Parameter(DontShow)][System.Collections.IDictionary] $InitialGroup,
[Parameter(DontShow)][switch] $Nested
)
Begin {
$Properties = 'GroupName', 'Name', 'SamAccountName', 'DisplayName', 'Enabled', 'Type', 'Nesting', 'CrossForest', 'ParentGroup', 'ParentGroupDomain', 'GroupDomainName', 'DistinguishedName', 'Sid'
if (-not $Script:WinADGroupMemberCache -or $ClearCache) {
$Script:WinADGroupMemberCache = @{}
$Forest = [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()
$Script:WinADForestCache = @{
Forest = $Forest
Domains = $Forest.Domains.Name
}
}
if ($Nesting -eq -1) {
$MembersCache = [ordered] @{}
}
}
Process {
[Array] $Output = foreach ($GroupName in $Identity) {
# lets initialize our variables
if (-not $Nested.IsPresent) {
$InitialGroup = [ordered] @{
GroupName = $GroupName
Name = $null
SamAccountName = $null
DomainName = $null
DisplayName = $null
Enabled = $null
GroupType = $null
GroupScope = $null
Type = 'group'
DirectMembers = 0
DirectGroups = 0
IndirectMembers = 0
TotalMembers = 0
Nesting = $Nesting
CircularDirect = $false
CircularIndirect = $false
CrossForest = $false
ParentGroup = ''
ParentGroupDomain = ''
ParentGroupDN = ''
GroupDomainName = $null
DistinguishedName = $null
Sid = $null
}
$CollectedGroups = [System.Collections.Generic.List[string]]::new()
$Nesting = -1
}
$Nesting++
# lets get our object
$ADGroupName = Get-WinADObject -Identity $GroupName -IncludeGroupMembership
if ($ADGroupName) {
# we add DomainName to hashtable so we can easily find which group we're dealing with
if (-not $Nested.IsPresent) {
$InitialGroup.GroupName = $ADGroupName.Name
$InitialGroup.DomainName = $ADGroupName.DomainName
if ($AddSelf -or $SelfOnly) {
# Since we want in final run add primary object to array we need to make sure we have it filled
$InitialGroup.Name = $ADGroupName.Name
$InitialGroup.SamAccountName = $ADGroupName.SamAccountName
$InitialGroup.DisplayName = $ADGroupName.DisplayName
$InitialGroup.GroupDomainName = $ADGroupName.DomainName
$InitialGroup.DistinguishedName = $ADGroupName.DistinguishedName
$InitialGroup.Sid = $ADGroupName.ObjectSID
$InitialGroup.GroupType = $ADGroupName.GroupType
$InitialGroup.GroupScope = $ADGroupName.GroupScope
}
}
# Lets cache our object
$Script:WinADGroupMemberCache[$ADGroupName.DistinguishedName] = $ADGroupName
if ($Circular -or $CollectedGroups -contains $ADGroupName.DistinguishedName) {
Write-Verbose -Message "Get-WinADGroupMember - Group '$($ADGroupName.DistinguishedName)' has $($ADGroupName.Members.Count) members"
[Array] $NestedMembers = foreach ($MyIdentity in $ADGroupName.Members) {
if ($MyIdentity) {
if ($Script:WinADGroupMemberCache[$MyIdentity]) {
$Script:WinADGroupMemberCache[$MyIdentity]
} else {
$ADObject = Get-WinADObject -Identity $MyIdentity -IncludeGroupMembership # -Properties SamAccountName, DisplayName, Enabled, userAccountControl, ObjectSID
$Script:WinADGroupMemberCache[$MyIdentity] = $ADObject
$Script:WinADGroupMemberCache[$MyIdentity]
}
} else {
Write-Verbose "Get-WinADGroupMember - Group '$($ADGroupName.DistinguishedName)' user skipped because it's null"
}
}
[Array] $NestedMembers = foreach ($Member in $NestedMembers) {
if ($CollectedGroups -notcontains $Member.DistinguishedName) {
$Member
}
}
$Circular = $null
} else {
Write-Verbose -Message "Get-WinADGroupMember - Group '$($ADGroupName.DistinguishedName)' has $($ADGroupName.Members.Count) members"
[Array] $NestedMembers = foreach ($MyIdentity in $ADGroupName.Members) {
if ($MyIdentity) {
if ($Script:WinADGroupMemberCache[$MyIdentity]) {
$Script:WinADGroupMemberCache[$MyIdentity]
} else {
$ADObject = Get-WinADObject -Identity $MyIdentity -IncludeGroupMembership
$Script:WinADGroupMemberCache[$MyIdentity] = $ADObject
$Script:WinADGroupMemberCache[$MyIdentity]
}
} else {
Write-Verbose "Get-WinADGroupMember - Group '$($ADGroupName.DistinguishedName)' user skipped because it's null"
}
}
}
# This tracks amount of members for our groups
if (-not $MembersCache[$ADGroupName.DistinguishedName]) {
$DirectMembers = $NestedMembers.Where( { $_.ObjectClass -ne 'group' }, 'split')
$MembersCache[$ADGroupName.DistinguishedName] = [ordered] @{
DirectMembers = ($DirectMembers[0])
DirectMembersCount = ($DirectMembers[0]).Count
DirectGroups = ($DirectMembers[1])
DirectGroupsCount = ($DirectMembers[1]).Count
IndirectMembers = [System.Collections.Generic.List[PSCustomObject]]::new()
IndirectMembersCount = $null
IndirectGroups = [System.Collections.Generic.List[PSCustomObject]]::new()
IndirectGroupsCount = $null
}
}
$DomainParentGroup = ConvertFrom-DistinguishedName -DistinguishedName $ADGroupName.DistinguishedName -ToDomainCN
foreach ($NestedMember in $NestedMembers) {
# for each member we either create new user or group, if group we will dive into nesting
$CreatedObject = [ordered] @{
GroupName = $InitialGroup.GroupName
Name = $NestedMember.name
SamAccountName = $NestedMember.SamAccountName
DomainName = $NestedMember.DomainName #ConvertFrom-DistinguishedName -DistinguishedName $NestedMember.DistinguishedName -ToDomainCN
DisplayName = $NestedMember.DisplayName
Enabled = $NestedMember.Enabled
GroupType = $NestedMember.GroupType
GroupScope = $NestedMember.GroupScope
Type = $NestedMember.ObjectClass
DirectMembers = 0
DirectGroups = 0
IndirectMembers = 0
TotalMembers = 0
Nesting = $Nesting
CircularDirect = $false
CircularIndirect = $false
CrossForest = $false
ParentGroup = $ADGroupName.name
ParentGroupDomain = $DomainParentGroup
ParentGroupDN = $ADGroupName.DistinguishedName
GroupDomainName = $InitialGroup.DomainName
DistinguishedName = $NestedMember.DistinguishedName
Sid = $NestedMember.ObjectSID
}
if ($NestedMember.DomainName -notin $Script:WinADForestCache['Domains']) {
$CreatedObject['CrossForest'] = $true
}
if ($NestedMember.ObjectClass -eq "group") {
if ($ADGroupName.memberof -contains $NestedMember.DistinguishedName) {
$Circular = $ADGroupName.DistinguishedName
$CreatedObject['CircularDirect'] = $true
}
$CollectedGroups.Add($ADGroupName.DistinguishedName)
if ($CollectedGroups -contains $NestedMember.DistinguishedName) {
$CreatedObject['CircularIndirect'] = $true
}
if ($All) {
[PSCustomObject] $CreatedObject
}
Write-Verbose "Get-WinADGroupMember - Going into $($NestedMember.DistinguishedName) (Nesting: $Nesting) (Circular:$Circular)"
$OutputFromGroup = Get-WinADGroupMember -GroupName $NestedMember -Nesting $Nesting -Circular $Circular -InitialGroup $InitialGroup -CollectedGroups $CollectedGroups -Nested -All:$All.IsPresent #-CountMembers:$CountMembers.IsPresent
if ($null -ne $OutputFromGroup) {
$OutputFromGroup
}
foreach ($Member in $OutputFromGroup) {
if ($Member.Type -eq 'group') {
$MembersCache[$ADGroupName.DistinguishedName]['IndirectGroups'].Add($Member)
} else {
$MembersCache[$ADGroupName.DistinguishedName]['IndirectMembers'].Add($Member)
}
}
} else {
[PSCustomObject] $CreatedObject
}
}
}
}
}
End {
if ($Nesting -eq 0) {
# If nesting is 0 this means we are ending our run
if (-not $All) {
# If not ALL it means User wants to receive only users. Basically Get-ADGroupMember -Recursive
$Output | Sort-Object -Unique -Property DistinguishedName | Select-Object -Property $Properties
} else {
# User requested ALL
if ($AddSelf -or $SelfOnly) {
# User also wants summary object added
if ($InitialGroup.DistinguishedName) {
$InitialGroup.DirectMembers = $MembersCache[$InitialGroup.DistinguishedName].DirectMembersCount
$InitialGroup.DirectGroups = $MembersCache[$InitialGroup.DistinguishedName].DirectGroupsCount
foreach ($Group in $MembersCache[$InitialGroup.DistinguishedName].DirectGroups) {
$InitialGroup.IndirectMembers = $MembersCache[$Group.DistinguishedName].DirectMembersCount + $InitialGroup.IndirectMembers
}
# To get total memebers for given group we need to add all members from all groups + direct members of a group
$AllMembersForGivenGroup = @(
# Scan all groups for members
foreach ($DirectGroup in $MembersCache[$InitialGroup.DistinguishedName].DirectGroups) {
$MembersCache[$DirectGroup.DistinguishedName].DirectMembers
}
# Scan all direct members of this group
$MembersCache[$InitialGroup.DistinguishedName].DirectMembers
# Scan all indirect members of this group
$MembersCache[$InitialGroup.DistinguishedName].IndirectMembers
)
}
$InitialGroup['TotalMembers'] = @($AllMembersForGivenGroup | Sort-Object -Unique -Property DistinguishedName).Count
if ($AdditionalStatistics -or $SelfOnly) {
$NestingMax = @($Output.Nesting | Sort-Object -Unique -Descending)[0]
$InitialGroup['NestingMax'] = if ($null -eq $NestingMax) {
0
} else {
$NestingMax
}
$NestingObjectTypes = $Output.Where( { $_.Type -eq 'group' }, 'split')
$NestingGroupTypes = $NestingObjectTypes[0].Where( { $_.GroupType -eq 'Security' }, 'split')
#$InitialGroup['NestingOther'] = ($NestingObjectTypes[1]).Count
$InitialGroup['NestingGroup'] = ($NestingObjectTypes[0]).Count
$InitialGroup['NestingGroupSecurity'] = ($NestingGroupTypes[0]).Count
$InitialGroup['NestingGroupDistribution'] = ($NestingGroupTypes[1]).Count
}
# Finally returning object we just built
[PSCustomObject] $InitialGroup
}
if (-not $SelfOnly) {
foreach ($Object in $Output) {
if ($Object.Type -eq 'group') {
# Object is a group, we add direct members, direct groups and other stuff
$Object.DirectMembers = $MembersCache[$Object.DistinguishedName].DirectMembersCount
$Object.DirectGroups = $MembersCache[$Object.DistinguishedName].DirectGroupsCount
foreach ($DirectGroup in $MembersCache[$Object.DistinguishedName].DirectGroups) {
$Object.IndirectMembers = $MembersCache[$DirectGroup.DistinguishedName].DirectMembersCount + $Object.IndirectMembers
}
# To get total memebers for given group we need to add all members from all groups + direct members of a group
$AllMembersForGivenGroup = @(
# Scan all groups for members
foreach ($DirectGroup in $MembersCache[$Object.DistinguishedName].DirectGroups) {
$MembersCache[$DirectGroup.DistinguishedName].DirectMembers
}
# Scan all direct members of this group
$MembersCache[$Object.DistinguishedName].DirectMembers
# Scan all indirect members of this group
$MembersCache[$Object.DistinguishedName].IndirectMembers
)
$Object.TotalMembers = @($AllMembersForGivenGroup | Sort-Object -Unique -Property DistinguishedName).Count
# Finally returning object we just built
$Object
} else {
# Object is not a group we push it as is
$Object
}
}
}
}
} else {
# this is nested call so we want to get whatever it gives us
$Output
}
}
}
function Get-WinADGroupMemberOf {
<#
.SYNOPSIS
Retrieves group membership information for Active Directory groups.
.DESCRIPTION
Retrieves detailed information about group membership for specified Active Directory groups.
.PARAMETER Identity
Specifies the group identities for which to retrieve membership information.
.PARAMETER AddSelf
Indicates whether to include the group itself in the membership results.
.PARAMETER ClearCache
Indicates whether to clear the group object cache before processing.
.EXAMPLE
Get-WinADGroupMemberOf -Identity "Group1", "Group2" -AddSelf
This example retrieves membership information for "Group1" and "Group2", including the groups themselves.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory forest.
#>
[CmdletBinding()]
param(
[parameter(Position = 0, Mandatory)][Array] $Identity,
[switch] $AddSelf,
[switch] $ClearCache,
[Parameter(DontShow)][int] $Nesting = -1,
[Parameter(DontShow)][System.Collections.Generic.List[object]] $CollectedGroups,
[Parameter(DontShow)][System.Object] $Circular,
[Parameter(DontShow)][System.Collections.IDictionary] $InitialObject,
[Parameter(DontShow)][switch] $Nested
)
Begin {
if (-not $Script:WinADGroupObjectCache -or $ClearCache) {
$Script:WinADGroupObjectCache = @{}
}
}
Process {
[Array] $Output = foreach ($MyObject in $Identity) {
$Object = Get-WinADObject -Identity $MyObject
Write-Verbose "Get-WinADGroupMemberOf - starting $($Object.Name)/$($Object.DomainName)"
if (-not $Nested.IsPresent) {
$InitialObject = [ordered] @{
ObjectName = $Object.Name
ObjectSamAccountName = $Object.SamAccountName
Name = $Object.Name
SamAccountName = $Object.SamAccountName
DomainName = $Object.DomainName
DisplayName = $Object.DisplayName
Enabled = $Object.Enabled
Type = $Object.ObjectClass
GroupType = $Object.GroupType
GroupScope = $Object.GroupScope
Nesting = $Nesting
CircularDirect = $false
CircularIndirect = $false
#CrossForest = $false
ParentGroup = ''
ParentGroupDomain = ''
ParentGroupDN = ''
ObjectDomainName = $Object.DomainName
DistinguishedName = $Object.Distinguishedname
Sid = $Object.ObjectSID
}
$CollectedGroups = [System.Collections.Generic.List[string]]::new()
$Nesting = -1
}
$Nesting++
if ($Object) {
# Lets cache our object
$Script:WinADGroupObjectCache[$Object.DistinguishedName] = $Object
if ($Circular -or $CollectedGroups -contains $Object.DistinguishedName) {
[Array] $NestedMembers = foreach ($MyIdentity in $Object.MemberOf) {
if ($Script:WinADGroupObjectCache[$MyIdentity]) {
$Script:WinADGroupObjectCache[$MyIdentity]
} else {
Write-Verbose "Get-WinADGroupMemberOf - Requesting more data on $MyIdentity (Circular: $true)"
$ADObject = Get-WinADObject -Identity $MyIdentity
$Script:WinADGroupObjectCache[$MyIdentity] = $ADObject
$Script:WinADGroupObjectCache[$MyIdentity]
}
}
[Array] $NestedMembers = foreach ($Member in $NestedMembers) {
if ($CollectedGroups -notcontains $Member.DistinguishedName) {
$Member
}
}
$Circular = $null
} else {
[Array] $NestedMembers = foreach ($MyIdentity in $Object.MemberOf) {
if ($Script:WinADGroupObjectCache[$MyIdentity]) {
$Script:WinADGroupObjectCache[$MyIdentity]
} else {
Write-Verbose "Get-WinADGroupMemberOf - Requesting more data on $MyIdentity (Circular: $false)"
$ADObject = Get-WinADObject -Identity $MyIdentity
$Script:WinADGroupObjectCache[$MyIdentity] = $ADObject
$Script:WinADGroupObjectCache[$MyIdentity]
}
}
}
foreach ($NestedMember in $NestedMembers) {
Write-Verbose "Get-WinADGroupMemberOf - processing $($InitialObject.ObjectName) nested member $($NestedMember.SamAccountName)"
#$DomainParentGroup = ConvertFrom-DistinguishedName -DistinguishedName $Object.DistinguishedName -ToDomainCN
$CreatedObject = [ordered] @{
ObjectName = $InitialObject.ObjectName
ObjectSamAccountName = $InitialObject.SamAccountName
Name = $NestedMember.name
SamAccountName = $NestedMember.SamAccountName
DomainName = $NestedMember.DomainName
DisplayName = $NestedMember.DisplayName
Enabled = $NestedMember.Enabled
Type = $NestedMember.ObjectClass
GroupType = $NestedMember.GroupType
GroupScope = $NestedMember.GroupScope
Nesting = $Nesting
CircularDirect = $false
CircularIndirect = $false
#CrossForest = $false
ParentGroup = $Object.name
ParentGroupDomain = $Object.DomainName
ParentGroupDN = $Object.DistinguishedName
ObjectDomainName = $InitialObject.DomainName
DistinguishedName = $NestedMember.DistinguishedName
Sid = $NestedMember.ObjectSID
}
#if ($NestedMember.DomainName -notin $Script:WinADForestCache['Domains']) {
# $CreatedObject['CrossForest'] = $true
#}
if ($NestedMember.ObjectClass -eq "group") {
if ($Object.members -contains $NestedMember.DistinguishedName) {
$Circular = $Object.DistinguishedName
$CreatedObject['CircularDirect'] = $true
}
$CollectedGroups.Add($Object.DistinguishedName)
if ($CollectedGroups -contains $NestedMember.DistinguishedName) {
$CreatedObject['CircularIndirect'] = $true
}
[PSCustomObject] $CreatedObject
Write-Verbose "Get-WinADGroupMemberOf - Going deeper with $($NestedMember.SamAccountName)"
try {
$OutputFromGroup = Get-WinADGroupMemberOf -Identity $NestedMember -Nesting $Nesting -Circular $Circular -InitialObject $InitialObject -CollectedGroups $CollectedGroups -Nested
} catch {
Write-Warning "Get-WinADGroupMemberOf - Going deeper with $($NestedMember.SamAccountName) failed $($_.Exception.Message)"
}
$OutputFromGroup
} else {
[PSCustomObject] $CreatedObject
}
}
}
}
}
End {
if ($Output.Count -gt 0) {
if ($Nesting -eq 0) {
if ($AddSelf) {
[PSCustomObject] $InitialObject
}
foreach ($MyObject in $Output) {
$MyObject
}
} else {
# this is nested call so we want to get whatever it gives us
$Output
}
}
}
}
function Get-WinADGroups {
<#
.SYNOPSIS
Retrieves Active Directory groups information for a specified forest.
.DESCRIPTION
Retrieves detailed information about Active Directory groups within the specified forest.
.PARAMETER Forest
Specifies the target forest to retrieve group information from.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the search.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the search.
.PARAMETER PerDomain
Indicates whether to retrieve group information per domain.
.PARAMETER AddOwner
Indicates whether to include group owner information in the retrieval.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory forest.
#>
[cmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[switch] $PerDomain,
[switch] $AddOwner
)
$AllUsers = [ordered] @{}
$AllContacts = [ordered] @{}
$AllGroups = [ordered] @{}
$CacheUsersReport = [ordered] @{}
$Today = Get-Date
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
foreach ($Domain in $ForestInformation.Domains) {
$QueryServer = $ForestInformation['QueryServers']["$Domain"].HostName[0]
$Properties = @(
'DistinguishedName', 'mail', 'LastLogonDate', 'PasswordLastSet', 'DisplayName', 'Manager', 'SamAccountName', 'ObjectSID'
#'Description',
#'PasswordNeverExpires', 'PasswordNotRequired', 'PasswordExpired', 'UserPrincipalName', 'SamAccountName', 'CannotChangePassword',
#'TrustedForDelegation', 'TrustedToAuthForDelegation', 'msExchMailboxGuid', 'msExchRemoteRecipientType', 'msExchRecipientTypeDetails',
# 'msExchRecipientDisplayType', 'pwdLastSet', "msDS-UserPasswordExpiryTimeComputed",
# 'WhenCreated', 'WhenChanged'
)
$AllUsers[$Domain] = Get-ADUser -Filter "*" -Properties $Properties -Server $QueryServer #$ForestInformation['QueryServers'][$Domain].HostName[0]
$AllContacts[$Domain] = Get-ADObject -Filter 'objectClass -eq "contact"' -Properties SamAccountName, Mail, Name, DistinguishedName, WhenChanged, Whencreated, DisplayName, ObjectSID -Server $QueryServer
$Properties = @(
'SamAccountName', 'msExchRecipientDisplayType', 'msExchRecipientTypeDetails', 'CanonicalName', 'Mail', 'Description', 'Name',
'GroupScope', 'GroupCategory', 'DistinguishedName', 'isCriticalSystemObject', 'adminCount', 'WhenChanged', 'Whencreated', 'DisplayName',
'ManagedBy', 'member', 'memberof', 'ProtectedFromAccidentalDeletion', 'nTSecurityDescriptor', 'groupType'
'SID', 'SIDHistory', 'proxyaddresses', 'ObjectSID'
)
$AllGroups[$Domain] = Get-ADGroup -Filter "*" -Properties $Properties -Server $QueryServer
}
foreach ($Domain in $AllUsers.Keys) {
foreach ($U in $AllUsers[$Domain]) {
$CacheUsersReport[$U.DistinguishedName] = $U
}
}
foreach ($Domain in $AllContacts.Keys) {
foreach ($C in $AllContacts[$Domain]) {
$CacheUsersReport[$C.DistinguishedName] = $C
}
}
foreach ($Domain in $AllGroups.Keys) {
foreach ($G in $AllGroups[$Domain]) {
$CacheUsersReport[$G.DistinguishedName] = $G
}
}
$Output = [ordered] @{}
foreach ($Domain in $ForestInformation.Domains) {
$Output[$Domain] = foreach ($Group in $AllGroups[$Domain]) {
$UserLocation = ($Group.DistinguishedName -split ',').Replace('OU=', '').Replace('CN=', '').Replace('DC=', '')
$Region = $UserLocation[-4]
$Country = $UserLocation[-5]
if ($Group.ManagedBy) {
$ManagerAll = $CacheUsersReport[$Group.ManagedBy]
$Manager = $CacheUsersReport[$Group.ManagedBy].Name
$ManagerSamAccountName = $CacheUsersReport[$Group.ManagedBy].SamAccountName
$ManagerEmail = $CacheUsersReport[$Group.ManagedBy].Mail
$ManagerEnabled = $CacheUsersReport[$Group.ManagedBy].Enabled
$ManagerLastLogon = $CacheUsersReport[$Group.ManagedBy].LastLogonDate
if ($ManagerLastLogon) {
$ManagerLastLogonDays = $( - $($ManagerLastLogon - $Today).Days)
} else {
$ManagerLastLogonDays = $null
}
$ManagerStatus = if ($ManagerEnabled -eq $true) {
'Enabled'
} elseif ($ManagerEnabled -eq $false) {
'Disabled'
} else {
'Not available'
}
} else {
$ManagerAll = $null
if ($Group.ObjectClass -eq 'user') {
$ManagerStatus = 'Missing'
} else {
$ManagerStatus = 'Not available'
}
$Manager = $null
$ManagerSamAccountName = $null
$ManagerEmail = $null
$ManagerEnabled = $null
$ManagerLastLogon = $null
$ManagerLastLogonDays = $null
}
$msExchRecipientTypeDetails = Convert-ExchangeRecipient -msExchRecipientTypeDetails $Group.msExchRecipientTypeDetails
$msExchRecipientDisplayType = Convert-ExchangeRecipient -msExchRecipientDisplayType $Group.msExchRecipientDisplayType
#$msExchRemoteRecipientType = Convert-ExchangeRecipient -msExchRemoteRecipientType $Group.msExchRemoteRecipientType
if ($ManagerAll.ObjectSID) {
$ACL = Get-ADACL -ADObject $Group -Resolve -Principal $ManagerAll.ObjectSID -IncludeObjectTypeName 'Self-Membership' -IncludeActiveDirectoryRights WriteProperty
} else {
$ACL = $null
}
# $GroupWriteback = $false
# # https://practical365.com/azure-ad-connect-group-writeback-deep-dive/
# if ($Group.msExchRecipientDisplayType -eq 17) {
# # M365 Security Group and M365 Mail-Enabled security Group
# $GroupWriteback = $true
# } else {
# # if ($Group.GroupType -eq -2147483640 -and $Group.GroupCategory -eq 'Security' -and $Group.GroupScope -eq 'Universal') {
# # $GroupWriteback = $true
# # } else {
# # $GroupWriteback = $false
# # }
# }
if ($AddOwner) {
$Owner = Get-ADACLOwner -ADObject $Group -Verbose -Resolve
[PSCustomObject] @{
Name = $Group.Name
#DisplayName = $Group.DisplayName
CanonicalName = $Group.CanonicalName
Domain = $Domain
SamAccountName = $Group.SamAccountName
MemberCount = if ($Group.member) {
$Group.member.Count
} else {
0
}
GroupScope = $Group.GroupScope
GroupCategory = $Group.GroupCategory
#GroupWriteBack = $GroupWriteBack
#ManagedBy = $Group.ManagedBy
msExchRecipientTypeDetails = $msExchRecipientTypeDetails
msExchRecipientDisplayType = $msExchRecipientDisplayType
#msExchRemoteRecipientType = $msExchRemoteRecipientType
Manager = $Manager
ManagerCanUpdateGroupMembership = if ($ACL) {
$true
} else {
$false
}
ManagerSamAccountName = $ManagerSamAccountName
ManagerEmail = $ManagerEmail
ManagerEnabled = $ManagerEnabled
ManagerLastLogon = $ManagerLastLogon
ManagerLastLogonDays = $ManagerLastLogonDays
ManagerStatus = $ManagerStatus
OwnerName = $Owner.OwnerName
OwnerSID = $Owner.OwnerSID
OwnerType = $Owner.OwnerType
WhenCreated = $Group.WhenCreated
WhenChanged = $Group.WhenChanged
ProtectedFromAccidentalDeletion = $Group.ProtectedFromAccidentalDeletion
ProxyAddresses = Convert-ExchangeEmail -Emails $Group.ProxyAddresses -RemoveDuplicates -RemovePrefix
Description = $Group.Description
DistinguishedName = $Group.DistinguishedName
Level0 = $Region
Level1 = $Country
ManagerDN = $Group.ManagedBy
}
} else {
[PSCustomObject] @{
Name = $Group.Name
#DisplayName = $Group.DisplayName
CanonicalName = $Group.CanonicalName
Domain = $Domain
SamAccountName = $Group.SamAccountName
MemberCount = if ($Group.member) {
$Group.member.Count
} else {
0
}
GroupScope = $Group.GroupScope
GroupCategory = $Group.GroupCategory
#GroupWriteBack = $GroupWriteBack
#ManagedBy = $Group.ManagedBy
msExchRecipientTypeDetails = $msExchRecipientTypeDetails
msExchRecipientDisplayType = $msExchRecipientDisplayType
#msExchRemoteRecipientType = $msExchRemoteRecipientType
Manager = $Manager
ManagerCanUpdateGroupMembership = if ($ACL) {
$true
} else {
$false
}
ManagerSamAccountName = $ManagerSamAccountName
ManagerEmail = $ManagerEmail
ManagerEnabled = $ManagerEnabled
ManagerLastLogon = $ManagerLastLogon
ManagerLastLogonDays = $ManagerLastLogonDays
ManagerStatus = $ManagerStatus
WhenCreated = $Group.WhenCreated
WhenChanged = $Group.WhenChanged
ProtectedFromAccidentalDeletion = $Group.ProtectedFromAccidentalDeletion
ProxyAddresses = Convert-ExchangeEmail -Emails $Group.ProxyAddresses -RemoveDuplicates -RemovePrefix
Description = $Group.Description
DistinguishedName = $Group.DistinguishedName
Level0 = $Region
Level1 = $Country
ManagerDN = $Group.ManagedBy
}
}
}
}
if ($PerDomain) {
$Output
} else {
$Output.Values
}
}
function Get-WinADKerberosAccount {
<#
.SYNOPSIS
Retrieves Kerberos account information for Active Directory.
.DESCRIPTION
Retrieves Kerberos account information for Active Directory based on specified parameters.
.PARAMETER Forest
Specifies the target forest to retrieve Kerberos account information from.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the search.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the search.
.PARAMETER IncludeCriticalAccounts
Indicates whether to include critical Kerberos accounts in the retrieval.
.EXAMPLE
Get-WinADKerberosAccount -Forest "example.com" -IncludeDomains "example.com" -IncludeCriticalAccounts
This example retrieves Kerberos account information for the "example.com" forest, including only the specified domains and critical accounts.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory forest.
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[switch] $IncludeCriticalAccounts
)
$Today = Get-Date
$Accounts = [ordered] @{
'CriticalAccounts' = [ordered] @{}
'Data' = [ordered] @{}
}
Write-Verbose -Message "Get-WinADKerberosAccount - Gathering information about forest"
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -PreferWritable
foreach ($Domain in $ForestInformation.Domains) {
$Accounts['Data']["$Domain"] = [ordered] @{}
}
$DomainCount = 0
$DomainCountTotal = $ForestInformation.Domains.Count
foreach ($Domain in $ForestInformation.Domains) {
$DomainCount++
$ProcessingText = "[Domain: $DomainCount/$DomainCountTotal]"
Write-Verbose -Message "Get-WinADKerberosAccount - $ProcessingText Processing domain $Domain"
$QueryServer = $ForestInformation['QueryServers']["$Domain"].HostName[0]
$Properties = @(
'Name', 'SamAccountName', 'msDS-KrbTgtLinkBl',
'Enabled',
'PasswordLastSet', 'WhenCreated', 'WhenChanged'
'AllowReversiblePasswordEncryption', 'BadLogonCount', 'AccountNotDelegated'
'SID', 'SIDHistory'
)
$PropertiesMembers = @(
'Name', 'SamAccountName'
'Enabled',
'PasswordLastSet', 'WhenCreated', 'WhenChanged'
'AllowReversiblePasswordEncryption', 'BadLogonCount', 'AccountNotDelegated'
'SID', 'SIDHistory'
)
$CountK = 0
try {
[Array] $KerberosPasswords = Get-ADUser -Filter "Name -like 'krbtgt*'" -Server $QueryServer -Properties $Properties -ErrorAction Stop
} catch {
Write-Warning -Message "Get-WinADKerberosAccount - $ProcessingText Processing domain $Domain - unable to get Kerberos accounts. Error: $($_.Exception.Message)"
continue
}
if ($IncludeCriticalAccounts) {
$Members = @(
try {
Get-ADGroupMember -Identity 'Domain Admins' -Server $QueryServer -Recursive -ErrorAction Stop
} catch {
Write-Warning -Message "Get-WinADKerberosAccount - $ProcessingText Processing domain $Domain - unable to get Domain Admins. Error: $($_.Exception.Message)"
}
try {
Get-ADGroupMember -Identity 'Enterprise Admins' -Server $QueryServer -Recursive -ErrorAction Stop
} catch {
Write-Warning -Message "Get-WinADKerberosAccount - $ProcessingText Processing domain $Domain - unable to get Enterprise Admins. Error: $($_.Exception.Message)"
}
) | Sort-Object -Unique -Property DistinguishedName
} else {
$Members = @()
}
$CriticalAccounts = foreach ($Member in $Members) {
Try {
$User = Get-ADUser -Identity $Member.DistinguishedName -Server $QueryServer -Properties $PropertiesMembers -ErrorAction Stop
} Catch {
Write-Warning -Message "Get-WinADKerberosAccount - $ProcessingText Processing domain $Domain - unable to get critical account $($Member.DistinguishedName). Error: $($_.Exception.Message)"
}
if ($User) {
if ($null -eq $User.WhenChanged) {
$WhenChangedDaysAgo = $null
} else {
$WhenChangedDaysAgo = ($Today) - $User.WhenChanged
}
if ($null -eq $User.PasswordLastSet) {
$PasswordLastSetAgo = $null
} else {
$PasswordLastSetAgo = ($Today) - $User.PasswordLastSet
}
[PSCustomObject] @{
'Name' = $User.Name
'SamAccountName' = $User.SamAccountName
'Enabled' = $User.Enabled
'PasswordLastSet' = $User.PasswordLastSet
'PasswordLastSetDays' = $PasswordLastSetAgo.Days
'WhenChangedDays' = $WhenChangedDaysAgo.Days
'WhenChanged' = $User.WhenChanged
'WhenCreated' = $User.WhenCreated
'AllowReversiblePasswordEncryption' = $User.AllowReversiblePasswordEncryption
'BadLogonCount' = $User.BadLogonCount
'AccountNotDelegated' = $User.AccountNotDelegated
'SID' = $User.SID
'SIDHistory' = $User.SIDHistory
}
}
}
foreach ($Account in $KerberosPasswords) {
$CountK++
$ProcessingText = "[Domain: $DomainCount/$DomainCountTotal / Account: $CountK/$($KerberosPasswords.Count)]"
Write-Verbose -Message "Get-WinADKerberosAccount - $ProcessingText Processing domain $Domain \ Kerberos account ($CountK/$($KerberosPasswords.Count)) $($Account.SamAccountName) \ DC"
#if ($Account.SamAccountName -like "*_*" -and -not $Account.'msDS-KrbTgtLinkBl') {
# Write-Warning -Message "Get-WinADKerberosAccount - Processing domain $Domain \ Kerberos account $($Account.SamAccountName) \ DC - Skipping"
# continue
#}
$CachedServers = [ordered] @{}
$CountDC = 0
$CountDCTotal = $ForestInformation.DomainDomainControllers[$Domain].Count
foreach ($DC in $ForestInformation.DomainDomainControllers[$Domain]) {
$CountDC++
$Server = $DC.HostName
$ProcessingText = "[Domain: $DomainCount/$DomainCountTotal / Account: $CountK/$($KerberosPasswords.Count), DC: $CountDC/$CountDCTotal]"
Write-Verbose -Message "Get-WinADKerberosAccount - $ProcessingText Processing domain $Domain \ Kerberos account $($Account.SamAccountName) \ DC Server $Server"
try {
$ServerData = Get-ADUser -Identity $Account.DistinguishedName -Server $Server -Properties 'msDS-KrbTgtLinkBl', 'PasswordLastSet', 'WhenCreated', 'WhenChanged' -ErrorAction Stop
} catch {
Write-Warning -Message "Get-WinADKerberosAccount - Processing domain $Domain $ProcessingText \ Kerberos account $($Account.SamAccountName) \ DC Server $Server - Error: $($_.Exception.Message)"
$CachedServers[$Server] = [PSCustomObject] @{
'Server' = $Server
'Name' = $Server
'PasswordLastSet' = $null
'PasswordLastSetDays' = $null
'WhenChangedDays' = $null
'WhenChanged' = $null
'WhenCreated' = $null
'msDS-KrbTgtLinkBl' = $ServerData.'msDS-KrbTgtLinkBl'
'Status' = $_.Exception.Message
}
}
if ($ServerData.Name) {
if ($null -eq $ServerData.WhenChanged) {
$WhenChangedDaysAgo = $null
} else {
$WhenChangedDaysAgo = ($Today) - $ServerData.WhenChanged
}
if ($null -eq $ServerData.PasswordLastSet) {
$PasswordLastSetAgo = $null
} else {
$PasswordLastSetAgo = ($Today) - $ServerData.PasswordLastSet
}
if ($Account.SamAccountName -like "*_*" -and $ServerData.'msDS-KrbTgtLinkBl') {
$Status = 'OK'
} elseif ($Account.SamAccountName -like "*_*" -and -not $ServerData.'msDS-KrbTgtLinkBl') {
$Status = 'Missing link, orphaned?'
} else {
$Status = 'OK'
}
$CachedServers[$Server] = [PSCustomObject] @{
'Server' = $Server
'Name' = $ServerData.Name
'PasswordLastSet' = $ServerData.'PasswordLastSet'
'PasswordLastSetDays' = $PasswordLastSetAgo.Days
'WhenChangedDays' = $WhenChangedDaysAgo.Days
'WhenChanged' = $ServerData.'WhenChanged'
'WhenCreated' = $ServerData.'WhenCreated'
'msDS-KrbTgtLinkBl' = $ServerData.'msDS-KrbTgtLinkBl'
'Status' = $Status
}
}
}
Write-Verbose -Message "Get-WinADKerberosAccount - Gathering information about forest for Global Catalogs"
$ForestInformationGC = Get-WinADForestDetails -Forest $Forest
$ProcessingText = "[Domain: $DomainCount/$DomainCountTotal / Account: $CountK/$($KerberosPasswords.Count)]"
Write-Verbose -Message "Get-WinADKerberosAccount - $ProcessingText Processing domain $Domain \ Kerberos account $($Account.SamAccountName) \ GC"
$GlobalCatalogs = [ordered] @{}
$GlobalCatalogCount = 0
$GlobalCatalogCountTotal = $ForestInformationGC.ForestDomainControllers.Count
foreach ($DC in $ForestInformationGC.ForestDomainControllers) {
$GlobalCatalogCount++
$Server = $DC.HostName
$ProcessingText = "[Domain: $DomainCount/$DomainCountTotal / Account: $CountK/$($KerberosPasswords.Count), GC: $GlobalCatalogCount/$GlobalCatalogCountTotal]"
Write-Verbose -Message "Get-WinADKerberosAccount - $ProcessingText Processing domain $Domain \ Kerberos account $($Account.SamAccountName) \ GC Server $Server"
if ($DC.IsGlobalCatalog ) {
try {
$ServerData = Get-ADUser -Identity $Account.DistinguishedName -Server "$($Server):3268" -Properties 'msDS-KrbTgtLinkBl', 'PasswordLastSet', 'WhenCreated', 'WhenChanged' -ErrorAction Stop
} catch {
Write-Warning -Message "Get-WinADKerberosAccount - Processing domain $Domain $ProcessingText \ Kerberos account $($Account.SamAccountName) \ GC Server $Server - Error: $($_.Exception.Message)"
$GlobalCatalogs[$Server] = [PSCustomObject] @{
'Server' = $Server
'Name' = $Server
'PasswordLastSet' = $null
'PasswordLastSetDays' = $null
'WhenChangedDays' = $null
'WhenChanged' = $null
'WhenCreated' = $null
'msDS-KrbTgtLinkBl' = $null
'Status' = $_.Exception.Message
}
}
if ($ServerData.Name) {
if ($null -eq $ServerData.WhenChanged) {
$WhenChangedDaysAgo = $null
} else {
$WhenChangedDaysAgo = ($Today) - $ServerData.WhenChanged
}
if ($null -eq $ServerData.PasswordLastSet) {
$PasswordLastSetAgo = $null
} else {
$PasswordLastSetAgo = ($Today) - $ServerData.PasswordLastSet
}
$GlobalCatalogs[$Server] = [PSCustomObject] @{
'Server' = $Server
'Name' = $ServerData.Name
'PasswordLastSet' = $ServerData.'PasswordLastSet'
'PasswordLastSetDays' = $PasswordLastSetAgo.Days
'WhenChangedDays' = $WhenChangedDaysAgo.Days
'WhenChanged' = $ServerData.'WhenChanged'
'WhenCreated' = $ServerData.'WhenCreated'
'msDS-KrbTgtLinkBl' = $ServerData.'msDS-KrbTgtLinkBl'
'Status' = 'OK'
}
}
}
}
if ($null -eq $Account.PasswordLastSet) {
$PasswordLastSetAgo = $null
} else {
$PasswordLastSetAgo = ($Today) - $Account.PasswordLastSet
}
if ($null -eq $Account.WhenChanged) {
$WhenChangedDaysAgo = $null
} else {
$WhenChangedDaysAgo = ($Today) - $Account.WhenChanged
}
$Accounts['Data']["$Domain"][$Account.SamAccountName] = @{
FullInformation = [PSCustomObject] @{
'Name' = $Account.Name
'SamAccountName' = $Account.SamAccountName
'Enabled' = $Account.Enabled
'PasswordLastSet' = $Account.PasswordLastSet
'PasswordLastSetDays' = $PasswordLastSetAgo.Days
'WhenChangedDays' = $WhenChangedDaysAgo.Days
'WhenChanged' = $Account.WhenChanged
'WhenCreated' = $Account.WhenCreated
'AllowReversiblePasswordEncryption' = $Account.AllowReversiblePasswordEncryption
'BadLogonCount' = $Account.BadLogonCount
'AccountNotDelegated' = $Account.AccountNotDelegated
'SID' = $Account.SID
'SIDHistory' = $Account.SIDHistory
}
DomainControllers = $CachedServers
GlobalCatalogs = $GlobalCatalogs
}
}
$Accounts['CriticalAccounts']["$Domain"] = $CriticalAccounts
}
$Accounts
}
function Get-WinADLastBackup {
<#
.SYNOPSIS
Gets Active directory forest or domain last backup time
.DESCRIPTION
Gets Active directory forest or domain last backup time
.PARAMETER Domain
Optionally you can pass Domains by hand
.EXAMPLE
$LastBackup = Get-WinADLastBackup
$LastBackup | Format-Table -AutoSize
.EXAMPLE
$LastBackup = Get-WinADLastBackup -Domain 'ad.evotec.pl'
$LastBackup | Format-Table -AutoSize
.NOTES
General notes
#>
[cmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$NameUsed = [System.Collections.Generic.List[string]]::new()
[DateTime] $CurrentDate = Get-Date
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
foreach ($Domain in $ForestInformation.Domains) {
$QueryServer = $ForestInformation['QueryServers']["$Domain"].HostName[0]
try {
[string[]]$Partitions = (Get-ADRootDSE -Server $QueryServer -ErrorAction Stop).namingContexts
[System.DirectoryServices.ActiveDirectory.DirectoryContextType] $contextType = [System.DirectoryServices.ActiveDirectory.DirectoryContextType]::Domain
[System.DirectoryServices.ActiveDirectory.DirectoryContext] $context = New-Object System.DirectoryServices.ActiveDirectory.DirectoryContext($contextType, $Domain)
[System.DirectoryServices.ActiveDirectory.DomainController] $domainController = [System.DirectoryServices.ActiveDirectory.DomainController]::FindOne($context)
} catch {
Write-Warning "Get-WinADLastBackup - Failed to gather partitions information for $Domain with error $($_.Exception.Message)"
}
$Output = ForEach ($Name in $Partitions) {
if ($NameUsed -contains $Name) {
continue
} else {
$NameUsed.Add($Name)
}
$domainControllerMetadata = $domainController.GetReplicationMetadata($Name)
$dsaSignature = $domainControllerMetadata.Item("dsaSignature")
try {
$LastBackup = [DateTime] $($dsaSignature.LastOriginatingChangeTime)
} catch {
$LastBackup = [DateTime]::MinValue
}
[PSCustomObject] @{
Domain = $Domain
NamingContext = $Name
LastBackup = $LastBackup
LastBackupDaysAgo = - (Convert-TimeToDays -StartTime ($CurrentDate) -EndTime ($LastBackup))
}
}
$Output
}
}
function Get-WinADLDAPBindingsSummary {
<#
.SYNOPSIS
Retrieves LDAP binding summary information for Active Directory.
.DESCRIPTION
Retrieves LDAP binding summary information for Active Directory based on specified parameters.
.PARAMETER Forest
Specifies the target forest to retrieve LDAP binding information from.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the search.
.PARAMETER ExcludeDomainControllers
Specifies an array of domain controllers to exclude from the search.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the search.
.PARAMETER IncludeDomainControllers
Specifies an array of domain controllers to include in the search.
.PARAMETER SkipRODC
Skips Read-Only Domain Controllers. By default, all domain controllers are included.
.PARAMETER Days
Specifies the number of days to consider for retrieving LDAP binding information. Default is 1 day.
.PARAMETER ExtendedForestInformation
A dictionary object that contains additional information about the forest. This parameter is optional and can be used to provide more context about the forest.
.EXAMPLE
Get-WinADLdapBindingsSummary -Forest "example.com" -IncludeDomains "example.com" -Days 7
This example retrieves LDAP binding summary information for the "example.com" forest, including only the specified domains and considering the last 7 days.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory forest.
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[int] $Days = 1,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
$Events = Get-Events -LogName 'Directory Service' -ID 2887 -Machine $ForestInformation.ForestDomainControllers.HostName -DateFrom ((Get-Date).Date.adddays(-$Days))
foreach ($Event in $Events) {
[PSCustomobject] @{
'Domain Controller' = $Event.Computer
'Date' = $Event.Date
'Number of simple binds performed without SSL/TLS' = $Event.'NoNameA0'
'Number of Negotiate/Kerberos/NTLM/Digest binds performed without signing' = $Event.'NoNameA1'
'GatheredFrom' = $Event.'GatheredFrom'
'GatheredLogName' = $Event.'GatheredLogName'
}
}
}
function Get-WinADLDAPSummary {
<#
.SYNOPSIS
Tests LDAP on all specified servers and provides a summary of the results.
.DESCRIPTION
The Get-WinADLDAPSummary function tests LDAP on all specified servers within a forest or domain.
It provides a summary of the results, including the status of the servers, certificate expiration details,
and any failed servers.
.PARAMETER Forest
The name of the forest to test.
.PARAMETER ExcludeDomains
An array of domains to exclude from the test.
.PARAMETER ExcludeDomainControllers
An array of domain controllers to exclude from the test.
.PARAMETER IncludeDomains
An array of domains to include in the test.
.PARAMETER IncludeDomainControllers
An array of domain controllers to include in the test.
.PARAMETER SkipRODC
A switch to skip read-only domain controllers.
.PARAMETER Identity
The identity to use for the test.
.PARAMETER RetryCount
The number of times to retry the test in case of failure. Default is 3.
.PARAMETER Extended
A switch to return extended output.
.OUTPUTS
If the Extended switch is specified, returns an ordered hashtable with detailed results.
Otherwise, returns a list of all tested servers.
.EXAMPLE
Get-WinADLDAPSummary -Forest "example.com" -IncludeDomains "domain1", "domain2" -SkipRODC
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
$Identity,
[int] $RetryCount = 3,
[switch] $Extended
)
Write-Color -Text '[i] ', "Testing LDAP on all servers" -Color Yellow, White, Yellow
$CachedServers = [ordered] @{}
$testLDAPSplat = @{
VerifyCertificate = $true
Identity = $Identity
RetryCount = $RetryCount
IncludeDomains = $IncludeDomains
ExcludeDomains = $ExcludeDomains
IncludeDomainControllers = $IncludeDomainControllers
ExcludeDomainControllers = $ExcludeDomainControllers
SkipRODC = $SkipRODC
Forest = $Forest
}
if ($Credential) {
$testLDAPSplat['Credential'] = $Credential
}
Remove-EmptyValue -Hashtable $testLDAPSplat
Test-LDAP @testLDAPSplat | ForEach-Object {
$Server = $_
Write-Color -Text "Testing LDAP on ", $Server.Computer -Color Yellow, White, Yellow
$CachedServers[$Server.Computer] = $Server
}
$AllServers = $CachedServers.Values
$Output = [ordered] @{
Status = $true
List = $AllServers
Count = $AllServers.Count
ServersExpiringMoreThan30Days = [System.Collections.Generic.List[string]]::new()
ServersExpiringIn30Days = [System.Collections.Generic.List[string]]::new()
ServersExpiringIn15Days = [System.Collections.Generic.List[string]]::new()
ServersExpiringIn7Days = [System.Collections.Generic.List[string]]::new()
ServersExpiringIn3DaysOrLess = [System.Collections.Generic.List[string]]::new()
ServersExpired = [System.Collections.Generic.List[string]]::new()
FailedServers = [System.Collections.Generic.List[PSCustomObject]]::new()
FailedServersCount = 0
GoodServers = [System.Collections.Generic.List[PSCustomObject]]::new()
GoodServersCount = 0
IncludeDomains = $IncludeDomains
ExcludeDomains = $ExcludeDomains
IncludeDomainControllers = $IncludeDomainControllers
ExcludeDomainControllers = $ExcludeDomainControllers
SkipRODC = $SkipRODC.IsPresent
Forest = $Forest
# ExternalServers = [ordered] @{
# List = $ExternalServersOutput
# Count = $ExternalServersOutput.Count
# ServersExpiringMoreThan30Days = [System.Collections.Generic.List[string]]::new()
# ServersExpiringIn30Days = [System.Collections.Generic.List[string]]::new()
# ServersExpiringIn15Days = [System.Collections.Generic.List[string]]::new()
# ServersExpiringIn7Days = [System.Collections.Generic.List[string]]::new()
# ServersExpiringIn3DaysOrLess = [System.Collections.Generic.List[string]]::new()
# ServersExpired = [System.Collections.Generic.List[string]]::new()
# FailedServers = [System.Collections.Generic.List[PSCustomObject]]::new()
# FailedServersCount = $null
# GoodServers = [System.Collections.Generic.List[PSCustomObject]]::new()
# GoodServersCount = $null
# }
}
foreach ($Server in $AllServers) {
if ($null -ne $Server.X509NotAfterDays) {
if ($Server.X509NotAfterDays -lt 0) {
$Output.ServersExpired.Add($Server.Computer)
} elseif ($Server.X509NotAfterDays -le 3) {
$Output.ServersExpiringIn3DaysOrLess.Add($Server.Computer)
} elseif ($Server.X509NotAfterDays -le 7) {
$Output.ServersExpiringIn7Days.Add($Server.Computer)
} elseif ($Server.X509NotAfterDays -le 15) {
$Output.ServersExpiringIn15Days.Add($Server.Computer)
} elseif ($Server.X509NotAfterDays -le 30) {
$Output.ServersExpiringIn30Days.Add($Server.Computer)
} else {
$Output.ServersExpiringMoreThan30Days.Add($Server.Computer)
}
}
if ($Server.StatusDate -eq 'Failed' -or $Server.StatusPorts -eq 'Failed' -or $Server.StatusIdentity -eq 'Failed') {
$Output.FailedServers.Add($Server)
$Output.Status = $false
} else {
$Output.GoodServers.Add($Server)
}
}
if ($Extended) {
$Output
} else {
$Output.List
}
}
function Get-WinADLMSettings {
<#
.SYNOPSIS
Retrieves and displays Active Directory LM settings for Windows Clients and Servers.
.DESCRIPTION
Retrieves and displays Active Directory LM settings for Windows Clients and Servers. By default, it scans all Domain Controllers in a forest.
.PARAMETER ForestName
Specifies the target forest to retrieve LM settings from.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the search.
.PARAMETER ExcludeDomainControllers
Specifies an array of domain controllers to exclude from the search.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the search.
.PARAMETER IncludeDomainControllers
Specifies an array of domain controllers to include in the search.
.PARAMETER SkipRODC
Skips Read-Only Domain Controllers. By default, all domain controllers are included.
.PARAMETER Days
Specifies the number of days to consider for retrieving LM settings.
.PARAMETER ExtendedForestInformation
A dictionary object that contains additional information about the forest. This parameter is optional and can be used to provide more context about the forest.
.EXAMPLE
Get-WinADLMSettings -ForestName "example.com" -IncludeDomains "example.com" -Days 7
This example retrieves LM settings for the "example.com" forest, including only the specified domains and considering the last 7 days.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory forest.
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers', 'DomainController')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[int] $Days = 1,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
foreach ($ComputerName in $ForestInformation.ForestDomainControllers.HostName) {
$LSA = Get-PSRegistry -RegistryPath 'HKLM\SYSTEM\CurrentControlSet\Control\Lsa' -ComputerName $ComputerName
<#
auditbasedirectories : 0
auditbaseobjects : 0
Bounds : {0, 48, 0, 0...}
crashonauditfail : 0
fullprivilegeauditing : {0}
LimitBlankPasswordUse : 1
NoLmHash : 1
disabledomaincreds : 0
everyoneincludesanonymous : 0
forceguest : 0
LsaCfgFlagsDefault : 0
LsaPid : 1232
ProductType : 4
restrictanonymous : 0
restrictanonymoussam : 1
SecureBoot : 1
ComputerName :
#>
if ($Lsa -and $Lsa.PSError -eq $false) {
if ($LSA.lmcompatibilitylevel) {
$LMCompatibilityLevel = $LSA.lmcompatibilitylevel
} else {
$LMCompatibilityLevel = 3
}
$LM = @{
0 = 'Server sends LM and NTLM response and never uses extended session security. Clients use LM and NTLM authentication, and never use extended session security. DCs accept LM, NTLM, and NTLM v2 authentication.'
1 = 'Servers use NTLM v2 session security if it is negotiated. Clients use LM and NTLM authentication and use extended session security if the server supports it. DCs accept LM, NTLM, and NTLM v2 authentication.'
2 = 'Server sends NTLM response only. Clients use only NTLM authentication and use extended session security if the server supports it. DCs accept LM, NTLM, and NTLM v2 authentication.'
3 = 'Server sends NTLM v2 response only. Clients use NTLM v2 authentication and use extended session security if the server supports it. DCs accept LM, NTLM, and NTLM v2 authentication.'
4 = 'DCs refuse LM responses. Clients use NTLM authentication and use extended session security if the server supports it. DCs refuse LM authentication but accept NTLM and NTLM v2 authentication.'
5 = 'DCs refuse LM and NTLM responses, and accept only NTLM v2. Clients use NTLM v2 authentication and use extended session security if the server supports it. DCs refuse NTLM and LM authentication, and accept only NTLM v2 authentication.'
}
[PSCustomObject] @{
ComputerName = $ComputerName
LSAProtectionCredentials = [bool] $LSA.RunAsPPL # https://docs.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection
Level = $LMCompatibilityLevel
LevelDescription = $LM[$LMCompatibilityLevel]
EveryoneIncludesAnonymous = [bool] $LSA.everyoneincludesanonymous
LimitBlankPasswordUse = [bool] $LSA.LimitBlankPasswordUse
NoLmHash = [bool] $LSA.NoLmHash
DisableDomainCreds = [bool] $LSA.disabledomaincreds # https://www.stigviewer.com/stig/windows_8/2014-01-07/finding/V-3376
ForceGuest = [bool] $LSA.forceguest
RestrictAnonymous = [bool] $LSA.restrictanonymous
RestrictAnonymousSAM = [bool] $LSA.restrictanonymoussam
SecureBoot = [bool] $LSA.SecureBoot
LsaCfgFlagsDefault = $LSA.LsaCfgFlagsDefault
LSAPid = $LSA.LSAPid
AuditBaseDirectories = [bool] $LSA.auditbasedirectories
AuditBaseObjects = [bool] $LSA.auditbaseobjects # https://www.stigviewer.com/stig/windows_server_2012_member_server/2014-01-07/finding/V-14228 | Should be false
CrashOnAuditFail = $LSA.CrashOnAuditFail # http://systemmanager.ru/win2k_regestry.en/46686.htm | Should be 0
}
} else {
[PSCustomObject] @{
ComputerName = $ComputerName
LSAProtectionCredentials = $null
Level = $null
LevelDescription = $null
EveryoneIncludesAnonymous = $null
LimitBlankPasswordUse = $null
NoLmHash = $null
DisableDomainCreds = $null
ForceGuest = $null
RestrictAnonymous = $null
RestrictAnonymousSAM = $null
SecureBoot = $null
LsaCfgFlagsDefault = $null
LSAPid = $null
AuditBaseDirectories = $null
AuditBaseObjects = $null
CrashOnAuditFail = $null
}
}
}
}
function Get-WinADObject {
<#
.SYNOPSIS
Gets Active Directory Object
.DESCRIPTION
Returns Active Directory Object (Computers, Groups, Users or ForeignSecurityPrincipal) using ADSI
.PARAMETER Identity
Identity of an object. It can be SamAccountName, SID, DistinguishedName or multiple other options
.PARAMETER DomainName
Choose domain name the objects resides in. This is optional for most objects
.PARAMETER Credential
Parameter description
.PARAMETER IncludeGroupMembership
Queries for group members when object is a group
.PARAMETER IncludeAllTypes
Allows functions to return all objects types and not only Computers, Groups, Users or ForeignSecurityPrincipal
.EXAMPLE
Get-WinADObject -Identity 'TEST\Domain Admins' -Verbose
Get-WinADObject -Identity 'EVOTEC\Domain Admins' -Verbose
Get-WinADObject -Identity 'Domain Admins' -DomainName 'DC=AD,DC=EVOTEC,DC=PL' -Verbose
Get-WinADObject -Identity 'Domain Admins' -DomainName 'ad.evotec.pl' -Verbose
Get-WinADObject -Identity 'CN=Domain Admins,CN=Users,DC=ad,DC=evotec,DC=pl'
Get-WinADObject -Identity 'CN=Domain Admins,CN=Users,DC=ad,DC=evotec,DC=xyz'
.NOTES
General notes
#>
[cmdletBinding()]
param(
[Parameter(Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName, Position = 0)][Array] $Identity,
[string] $DomainName,
[pscredential] $Credential,
[switch] $IncludeGroupMembership,
[switch] $IncludeAllTypes,
[switch] $AddType,
[switch] $Cache,
[string[]] $Properties
)
Begin {
if ($Cache -and -not $Script:CacheObjectsWinADObject) {
$Script:CacheObjectsWinADObject = @{}
}
# This is purely for calling group workaround
Add-Type -AssemblyName System.DirectoryServices.AccountManagement
$GroupTypes = @{
'2' = @{
Name = 'Distribution Group - Global' # distribution
Type = 'Distribution'
Scope = 'Global'
}
'4' = @{
Name = 'Distribution Group - Domain Local' # distribution
Type = 'Distribution'
Scope = 'Domain local'
}
'8' = @{
Name = 'Distribution Group - Universal'
Type = 'Distribution'
Scope = 'Universal'
}
'-2147483640' = @{
Name = 'Security Group - Universal'
Type = 'Security'
Scope = 'Universal'
}
'-2147483643' = @{
Name = 'Security Group - Builtin Local' # Builtin local Security Group
Type = 'Security'
Scope = 'Builtin local'
}
'-2147483644' = @{
Name = 'Security Group - Domain Local'
Type = 'Security'
Scope = 'Domain local'
}
'-2147483646' = @{
Name = 'Security Group - Global' # security
Type = 'Security'
Scope = 'Global'
}
}
}
process {
foreach ($Ident in $Identity) {
if (-not $Ident) {
Write-Warning -Message "Get-WinADObject - Identity is empty. Skipping"
continue
}
$ResolvedIdentity = $null
# If it's an object we need to make sure we pass only DN
if ($Ident.DistinguishedName) {
$Ident = $Ident.DistinguishedName
}
# we reset domain name to it's given value if at all
$TemporaryName = $Ident
$TemporaryDomainName = $DomainName
# Since we change $Ident below to different names we need to be sure we use original query for cache
if ($Cache -and $Script:CacheObjectsWinADObject[$TemporaryName]) {
Write-Verbose "Get-WinADObject - Requesting $TemporaryName from Cache"
$Script:CacheObjectsWinADObject[$TemporaryName]
continue
}
# if Domain Name is provided we don't check for anything as it's most likely already good Ident value
if (-not $TemporaryDomainName) {
$MatchRegex = [Regex]::Matches($Ident, "S-\d-\d+-(\d+-|){1,14}\d+")
if ($MatchRegex.Success) {
$ResolvedIdentity = ConvertFrom-SID -SID $MatchRegex.Value
$TemporaryDomainName = $ResolvedIdentity.DomainName
$Ident = $MatchRegex.Value
} elseif ($Ident -like '*\*') {
$ResolvedIdentity = Convert-Identity -Identity $Ident -Verbose:$false
if ($ResolvedIdentity.SID) {
$TemporaryDomainName = $ResolvedIdentity.DomainName
$Ident = $ResolvedIdentity.SID
} else {
$NetbiosConversion = ConvertFrom-NetbiosName -Identity $Ident
if ($NetbiosConversion.DomainName) {
$TemporaryDomainName = $NetbiosConversion.DomainName
$Ident = $NetbiosConversion.Name
}
}
} elseif ($Ident -like '*DC=*') {
$DNConversion = ConvertFrom-DistinguishedName -DistinguishedName $Ident -ToDomainCN
$TemporaryDomainName = $DNConversion
} elseif ($Ident -like '*@*') {
$CNConversion = $Ident -split '@', 2
$TemporaryDomainName = $CNConversion[1]
$Ident = $CNConversion[0]
} elseif ($Ident -like '*.*') {
$ResolvedIdentity = Convert-Identity -Identity $Ident -Verbose:$false
if ($ResolvedIdentity.SID) {
$TemporaryDomainName = $ResolvedIdentity.DomainName
$Ident = $ResolvedIdentity.SID
} else {
$CNConversion = $Ident -split '\.', 2
$Ident = $CNConversion[0]
$TemporaryDomainName = $CNConversion[1]
}
} else {
$ResolvedIdentity = Convert-Identity -Identity $Ident -Verbose:$false
if ($ResolvedIdentity.SID) {
$TemporaryDomainName = $ResolvedIdentity.DomainName
$Ident = $ResolvedIdentity.SID
} else {
$NetbiosConversion = ConvertFrom-NetbiosName -Identity $Ident
if ($NetbiosConversion.DomainName) {
$TemporaryDomainName = $NetbiosConversion.DomainName
$Ident = $NetbiosConversion.Name
}
}
}
}
# Building up ADSI call
$Search = [System.DirectoryServices.DirectorySearcher]::new()
#$Search.SizeLimit = $SizeLimit
if ($TemporaryDomainName) {
try {
$Context = [System.DirectoryServices.AccountManagement.PrincipalContext]::new('Domain', $TemporaryDomainName)
} catch {
Write-Warning "Get-WinADObject - Building context failed ($TemporaryDomainName), error: $($_.Exception.Message)"
}
} else {
try {
$Context = [System.DirectoryServices.AccountManagement.PrincipalContext]::new('Domain')
} catch {
Write-Warning "Get-WinADObject - Building context failed, error: $($_.Exception.Message)"
}
}
#Convert Identity Input String to HEX, if possible
Try {
$IdentityGUID = ""
([System.Guid]$Ident).ToByteArray() | ForEach-Object { $IdentityGUID += $("\{0:x2}" -f $_) }
} Catch {
$IdentityGUID = "null"
}
# Building search filter
$Search.filter = "(|(DistinguishedName=$Ident)(Name=$Ident)(SamAccountName=$Ident)(UserPrincipalName=$Ident)(objectGUID=$IdentityGUID)(objectSid=$Ident))"
if ($TemporaryDomainName) {
$Search.SearchRoot = "LDAP://$TemporaryDomainName"
}
if ($PSBoundParameters['Credential']) {
$Cred = [System.DirectoryServices.DirectoryEntry]::new("LDAP://$TemporaryDomainName", $($Credential.UserName), $($Credential.GetNetworkCredential().password))
$Search.SearchRoot = $Cred
}
Write-Verbose "Get-WinADObject - Requesting $Ident ($TemporaryDomainName)"
try {
$SearchResults = $($Search.FindAll())
} catch {
if ($PSBoundParameters.ErrorAction -eq 'Stop') {
throw "Get-WinADObject - Requesting $Ident ($TemporaryDomainName) failed. Error: $($_.Exception.Message.Replace([System.Environment]::NewLine,''))"
} else {
Write-Warning "Get-WinADObject - Requesting $Ident ($TemporaryDomainName) failed. Error: $($_.Exception.Message.Replace([System.Environment]::NewLine,''))"
continue
}
}
if ($SearchResults.Count -lt 1) {
if ($PSBoundParameters.ErrorAction -eq 'Stop') {
throw "Requesting $Ident ($TemporaryDomainName) failed with no results."
}
}
foreach ($Object in $SearchResults) {
$UAC = Convert-UserAccountControl -UserAccountControl ($Object.properties.useraccountcontrol -as [string])
$ObjectClass = ($Object.properties.objectclass -as [array])[-1]
if ($ObjectClass -notin 'group', 'contact', 'inetOrgPerson', 'computer', 'user', 'foreignSecurityPrincipal', 'msDS-ManagedServiceAccount', 'msDS-GroupManagedServiceAccount' -and (-not $IncludeAllTypes)) {
Write-Warning "Get-WinADObject - Unsupported object ($Ident) of type $ObjectClass. Only user,computer,group, foreignSecurityPrincipal, msDS-ManagedServiceAccount, msDS-GroupManagedServiceAccount are displayed by default. Use IncludeAllTypes switch to display all if nessecary."
continue
}
$Members = $Object.properties.member -as [array]
if ($ObjectClass -eq 'group') {
# we only do this additional step when requested. It's not nessecary for day to day use but can hurt performance real bad for normal use cases
# This was especially visible for group with 50k members and Get-WinADObjectMember which doesn't even require this data
if ($IncludeGroupMembership) {
# This is weird case but for some reason $Object.properties.member doesn't always return all values
# the workaround is to do additional query for group and assing it
$GroupMembers = [System.DirectoryServices.AccountManagement.GroupPrincipal]::FindByIdentity($Context, $Ident).Members
try {
$Members = [System.Collections.Generic.List[string]]::new()
foreach ($Member in $Object.properties.member) {
if ($Member) {
$Members.Add($Member)
}
}
foreach ($Member in $GroupMembers) {
if ($Member.DistinguishedName) {
if ($Member.DistinguishedName -notin $Members) {
$Members.Add($Member.DistinguishedName)
}
} elseif ($Member.DisplayName) {
$Members.Add($Member.DisplayName)
} else {
$Members.Add($Member.Sid)
}
}
} catch {
if ($PSBoundParameters.ErrorAction -eq 'Stop') {
throw
return
} else {
Write-Warning -Message "Error while parsing group members for $($Ident): $($_.Exception.Message)"
}
}
}
}
$ObjectDomainName = ConvertFrom-DistinguishedName -DistinguishedName ($Object.properties.distinguishedname -as [string]) -ToDomainCN
$DisplayName = $Object.properties.displayname -as [string]
$SamAccountName = $Object.properties.samaccountname -as [string]
$Name = $Object.properties.name -as [string]
if ($ObjectClass -eq 'foreignSecurityPrincipal' -and $DisplayName -eq '') {
# If object is foreignSecurityPrincipal (which shouldn't happen at this point) we need to set it to temporary name we
# used before. Usually this is to fix 'NT AUTHORITY\INTERACTIVE'
# I have no clue if there's better way to do it
$DisplayName = $ResolvedIdentity.Name
if ($DisplayName -like '*\*') {
$NetbiosWithName = $DisplayName -split '\\'
if ($NetbiosWithName.Count -eq 2) {
#$NetbiosName = $NetbiosWithName[0]
$NetbiosUser = $NetbiosWithName[1]
$Name = $NetbiosUser
$SamAccountName = $NetbiosUser
} else {
$Name = $DisplayName
}
} else {
$Name = $DisplayName
}
}
$GroupType = $Object.properties.grouptype -as [string]
if ($Object.Properties.objectsid) {
try {
$ObjectSID = [System.Security.Principal.SecurityIdentifier]::new($Object.Properties.objectsid[0], 0).Value
} catch {
Write-Warning "Get-WinADObject - Getting objectsid failed, error: $($_.Exception.Message)"
$ObjectSID = $null
}
} else {
$ObjectSID = $null
}
$ReturnObject = [ordered] @{
DisplayName = $DisplayName
Name = $Name
SamAccountName = $SamAccountName
ObjectClass = $ObjectClass
Enabled = if ($ObjectClass -in 'group', 'contact') {
$null
} else {
$UAC -notcontains 'ACCOUNTDISABLE'
}
PasswordNeverExpire = if ($ObjectClass -in 'group', 'contact') {
$null
} else {
$UAC -contains 'DONT_EXPIRE_PASSWORD'
}
DomainName = $ObjectDomainName
Distinguishedname = $Object.properties.distinguishedname -as [string]
#Adspath = $Object.properties.adspath -as [string]
WhenCreated = $Object.properties.whencreated -as [string]
WhenChanged = $Object.properties.whenchanged -as [string]
#Deleted = $Object.properties.isDeleted -as [string]
#Recycled = $Object.properties.isRecycled -as [string]
UserPrincipalName = $Object.properties.userprincipalname -as [string]
ObjectSID = $ObjectSID
MemberOf = $Object.properties.memberof -as [array]
Members = $Members
DirectReports = $Object.Properties.directreports
GroupScopedType = $GroupTypes[$GroupType].Name
GroupScope = $GroupTypes[$GroupType].Scope
GroupType = $GroupTypes[$GroupType].Type
#Administrative = if ($Object.properties.admincount -eq '1') { $true } else { $false }
#Type = $ResolvedIdentity.Type
Description = $Object.properties.description -as [string]
}
if ($Properties -contains 'LastLogonDate') {
$LastLogon = [int64] $Object.properties.lastlogontimestamp[0]
if ($LastLogon -ne 9223372036854775807) {
$ReturnObject['LastLogonDate'] = [datetime]::FromFileTimeUtc($LastLogon)
} else {
$ReturnObject['LastLogonDate'] = $null
}
}
if ($Properties -contains 'PasswordLastSet') {
$PasswordLastSet = [int64] $Object.properties.pwdlastset[0]
if ($PasswordLastSet -ne 9223372036854775807) {
$ReturnObject['PasswordLastSet'] = [datetime]::FromFileTimeUtc($PasswordLastSet)
} else {
$ReturnObject['PasswordLastSet'] = $null
}
}
if ($Properties -contains 'AccountExpirationDate') {
$ExpirationDate = [int64] $Object.properties.accountexpires[0]
if ($ExpirationDate -ne 9223372036854775807) {
$ReturnObject['AccountExpirationDate'] = [datetime]::FromFileTimeUtc($ExpirationDate)
} else {
$ReturnObject['AccountExpirationDate'] = $null
}
}
if ($AddType) {
if (-not $ResolvedIdentity) {
# This is purely to get special types
$ResolvedIdentity = ConvertFrom-SID -SID $ReturnObject['ObjectSID']
}
$ReturnObject['Type'] = $ResolvedIdentity.Type
}
if ($ReturnObject['Type'] -eq 'WellKnownAdministrative') {
if (-not $TemporaryDomainName) {
# This is so BUILTIN\Administrators would not report domain name that's always related to current one, while it could be someone expects it to be from different forest
# this is to mainly address issues with Get-ADACL IdentityReference returning data that's hard to manage otherwise
$ReturnObject['DomainName'] = ''
}
}
<#
$LastLogon = $Object.properties.lastlogon -as [string]
if ($LastLogon) {
$LastLogonDate = [datetime]::FromFileTime($LastLogon)
} else {
$LastLogonDate = $null
}
$AccountExpires = $Object.Properties.accountexpires -as [string]
$AccountExpiresDate = ConvertTo-Date -accountExpires $AccountExpires
$PasswordLastSet = $Object.Properties.pwdlastset -as [string]
if ($PasswordLastSet) {
$PasswordLastSetDate = [datetime]::FromFileTime($PasswordLastSet)
} else {
$PasswordLastSetDate = $null
}
$BadPasswordTime = $Object.Properties.badpasswordtime -as [string]
if ($BadPasswordTime) {
$BadPasswordDate = [datetime]::FromFileTime($BadPasswordTime)
} else {
$BadPasswordDate = $null
}
$ReturnObject['LastLogonDate'] = $LastLogonDate
$ReturnObject['PasswordLastSet'] = $PasswordLastSetDate
$ReturnObject['BadPasswordTime'] = $BadPasswordDate
$ReturnObject['AccountExpiresDate'] = $AccountExpiresDate
#>
if ($Cache) {
$Script:CacheObjectsWinADObject[$TemporaryName] = [PSCustomObject] $ReturnObject
$Script:CacheObjectsWinADObject[$TemporaryName]
} else {
[PSCustomObject] $ReturnObject
}
}
}
}
}
function Get-WinADPasswordPolicy {
<#
.SYNOPSIS
Get password policies from Active Directory include fine grained password policies
.DESCRIPTION
Get password policies from Active Directory include fine grained password policies
Please keep in mind that reading fine grained password policies requires extended rights
It's not available to standard users
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExcludeDomains
Exclude domain from search, by default whole forest is scanned
.PARAMETER IncludeDomains
Include only specific domains, by default whole forest is scanned
.PARAMETER NoSorting
Do not sort output by Precedence
.PARAMETER ReturnHashtable
Return hashtable instead of array. Useful for internal processing such as Get-WinADUsers
.EXAMPLE
Get-WinADPasswordPolicy | Format-Table
.NOTES
General notes
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[switch] $NoSorting,
[parameter(DontShow)][switch] $ReturnHashtable
)
$FineGrainedPolicy = [ordered] @{}
$ForestInformation = Get-WinADForestDetails -Extended -Forest $Forest -ExcludeDomains $ExcludeDomains -IncludeDomains $IncludeDomains
$AllPasswordPolicies = foreach ($Domain in $ForestInformation.Domains) {
$Policies = @(
Get-ADDefaultDomainPasswordPolicy -Server $ForestInformation['QueryServers'][$Domain].Hostname[0]
Get-ADFineGrainedPasswordPolicy -Filter "*" -Server $ForestInformation['QueryServers'][$Domain].Hostname[0]
)
foreach ($Policy in $Policies) {
$FineGrainedPolicy[$Policy.DistinguishedName] = [PSCustomObject] @{
Name = if ($Policy.ObjectClass -contains 'domainDNS') {
'Default'
} else {
$Policy.Name
}
DomainName = $Domain
Type = if ($Policy.ObjectClass -contains 'domainDNS') {
'Default Password Policy'
} else {
'Fine Grained Password Policy'
}
Precedence = if ($Policy.Precedence) {
$Policy.Precedence
} else {
99999
}
MinPasswordLength = $Policy.MinPasswordLength
MaxPasswordAge = $Policy.MaxPasswordAge
MinPasswordAge = $Policy.MinPasswordAge
PasswordHistoryCount = $Policy.PasswordHistoryCount
ComplexityEnabled = $Policy.ComplexityEnabled
ReversibleEncryptionEnabled = $Policy.ReversibleEncryptionEnabled
LockoutDuration = $Policy.LockoutDuration
LockoutObservationWindow = $Policy.LockoutObservationWindow
LockoutThreshold = $Policy.LockoutThreshold
AppliesTo = $Policy.AppliesTo
AppliesToCount = if ($Policy.AppliesTo) {
$Policy.AppliesTo.Count
} else {
0
}
AppliesToName = if ($Policy.AppliesTo) {
foreach ($DN in $Policy.AppliesTo) {
ConvertFrom-DistinguishedName -DistinguishedName $DN -ToLastName
}
} else {
$null
}
DistinguishedName = $Policy.DistinguishedName
}
if ($Policy.ObjectClass -contains 'domainDNS') {
$FineGrainedPolicy[$Domain] = $FineGrainedPolicy[$Policy.DistinguishedName]
$FineGrainedPolicy[$Domain]
} else {
$FineGrainedPolicy[$Policy.DistinguishedName] = $FineGrainedPolicy[$Policy.DistinguishedName]
$FineGrainedPolicy[$Policy.DistinguishedName]
}
}
}
if ($ReturnHashtable) {
$FineGrainedPolicy
} else {
if (-not $NoSorting) {
$AllPasswordPolicies | Sort-Object -Property Precedence
} else {
$AllPasswordPolicies
}
}
}
Function Get-WinADPrivilegedObjects {
<#
.SYNOPSIS
Retrieves privileged objects within an Active Directory forest.
.DESCRIPTION
This cmdlet retrieves and displays privileged objects within an Active Directory forest. It can be used to identify objects with administrative privileges, including their properties such as when they were changed, created, their admin count, and whether they are critical system objects. The cmdlet also provides information about the associated domain and the date of the last originating change for the admin count.
.PARAMETER Forest
Specifies the target forest to retrieve privileged objects from. This parameter is required.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the search.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the search.
.PARAMETER LegitimateOnly
If specified, only objects with legitimate admin counts are returned.
.PARAMETER OrphanedOnly
If specified, only orphaned objects (not critical system objects and not members of critical groups) are returned.
.PARAMETER SummaryOnly
A switch parameter that controls the level of detail in the output. If set, the output includes a summary of the privileged objects. If not set, the output includes detailed information.
.PARAMETER DoNotShowCriticalSystemObjects
If specified, critical system objects are excluded from the results.
.PARAMETER Formatted
A switch parameter that controls the formatting of the output. If set, the output is formatted for better readability.
.PARAMETER Splitter
Specifies the character to use as a delimiter when joining multiple data elements together in the output.
.PARAMETER ExtendedForestInformation
A dictionary object that contains additional information about the forest. This parameter is optional and can be used to provide more context about the forest.
.EXAMPLE
Get-WinADPrivilegedObjects -Forest "example.com" -IncludeDomains "example.com" -LegitimateOnly -Formatted
This example retrieves only the privileged objects with legitimate admin counts within the "example.com" forest and formats the output for better readability.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires appropriate permissions to query the Active Directory forest.
#>
[alias('Get-WinADPriviligedObjects')]
[cmdletbinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[switch] $LegitimateOnly,
[switch] $OrphanedOnly,
#[switch] $Unique,
[switch] $SummaryOnly,
[switch] $DoNotShowCriticalSystemObjects,
[alias('Display')][switch] $Formatted,
[string] $Splitter = [System.Environment]::NewLine,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
$Domains = $ForestInformation.Domains
$UsersWithAdminCount = foreach ($Domain in $Domains) {
$QueryServer = $ForestInformation['QueryServers']["$Domain"].HostName[0]
if ($DoNotShowCriticalSystemObjects) {
$Objects = Get-ADObject -Filter 'admincount -eq 1 -and iscriticalsystemobject -notlike "*"' -Server $QueryServer -Properties whenchanged, whencreated, admincount, isCriticalSystemObject, samaccountname, "msDS-ReplAttributeMetaData"
} else {
$Objects = Get-ADObject -Filter 'admincount -eq 1' -Server $QueryServer -Properties whenchanged, whencreated, admincount, isCriticalSystemObject, samaccountname, "msDS-ReplAttributeMetaData"
}
foreach ($_ in $Objects) {
[PSCustomObject] @{
Domain = $Domain
distinguishedname = $_.distinguishedname
whenchanged = $_.whenchanged
whencreated = $_.whencreated
admincount = $_.admincount
SamAccountName = $_.SamAccountName
objectclass = $_.objectclass
isCriticalSystemObject = if ($_.isCriticalSystemObject) {
$true
} else {
$false
}
adminCountDate = ($_.'msDS-ReplAttributeMetaData' | ForEach-Object { ([XML]$_.Replace("`0", "")).DS_REPL_ATTR_META_DATA | Where-Object { $_.pszAttributeName -eq "admincount" } }).ftimeLastOriginatingChange | Get-Date -Format MM/dd/yyyy
}
}
}
$CriticalGroups = foreach ($Domain in $Domains) {
$QueryServer = $ForestInformation['QueryServers']["$Domain"].HostName[0]
Get-ADGroup -Filter 'admincount -eq 1 -and iscriticalsystemobject -eq $true' -Server $QueryServer #| Select-Object @{name = 'Domain'; expression = { $domain } }, distinguishedname
}
$CacheCritical = [ordered] @{}
foreach ($Group in $CriticalGroups) {
[Array] $Members = Get-WinADGroupMember -Identity $Group.distinguishedname -Verbose:$false -All
Write-Verbose -Message "Processing $($Group.DistinguishedName) with $($Members.Count) members"
foreach ($Member in $Members) {
if ($null -ne $Member -and $Member.DistinguishedName) {
if (-not $CacheCritical[$Member.DistinguishedName]) {
$CacheCritical[$Member.DistinguishedName] = [System.Collections.Generic.List[string]]::new()
}
if ($Group.DistinguishedName -notin $CacheCritical[$Member.DistinguishedName]) {
$CacheCritical[$Member.DistinguishedName].Add($Group.DistinguishedName)
}
}
}
}
$AdminCountAll = foreach ($object in $UsersWithAdminCount) {
$DistinguishedName = $object.distinguishedname
[Array] $IsMemberGroups = foreach ($Group in $CriticalGroups) {
$CacheCritical[$DistinguishedName] -contains $Group.DistinguishedName
}
$IsMember = $IsMemberGroups -contains $true
$GroupDomains = $CacheCritical[$DistinguishedName]
$IsOrphaned = -not $Object.isCriticalSystemObject -and -not $IsMember
if ($Formatted) {
$GroupDomains = $GroupDomains -join $Splitter
$User = [PSCustomObject] @{
DistinguishedName = $Object.DistinguishedName
Domain = $Object.domain
IsOrphaned = $IsOrphaned
IsMember = $IsMember
IsCriticalSystemObject = $Object.isCriticalSystemObject
Admincount = $Object.admincount
AdminCountDate = $Object.adminCountDate
WhenCreated = $Object.whencreated
ObjectClass = $Object.objectclass
GroupDomain = $GroupDomains
}
} else {
$User = [PSCustomObject] @{
'DistinguishedName' = $Object.DistinguishedName
'Domain' = $Object.domain
'IsOrphaned' = $IsOrphaned
'IsMember' = $IsMember
'IsCriticalSystemObject' = $Object.isCriticalSystemObject
'AdminCount' = $Object.admincount
'AdminCountDate' = $Object.adminCountDate
'WhenCreated' = $Object.whencreated
'ObjectClass' = $Object.objectclass
'GroupDomain' = $GroupDomains
}
}
$User
}
$Output = @(
if ($OrphanedOnly) {
$AdminCountAll | Where-Object { $_.IsOrphaned }
} elseif ($LegitimateOnly) {
$AdminCountAll | Where-Object { $_.IsOrphaned -eq $false }
} else {
$AdminCountAll
}
)
if ($SummaryOnly) {
$Output | Group-Object ObjectClass | Select-Object -Property Name, Count
} else {
$Output
}
}
function Get-WinADProtocol {
<#
.SYNOPSIS
Gets current SCHANNEL settings for Windows Clients and Servers.
.DESCRIPTION
Gets current SCHANNEL settings for Windows Clients and Servers. By default scans all Domain Controllers in a forest
.PARAMETER ComputerName
Provides ability to query specific servers or computers.
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExcludeDomains
Exclude domain from search, by default whole forest is scanned
.PARAMETER IncludeDomains
Include only specific domains, by default whole forest is scanned
.PARAMETER ExcludeDomainControllers
Exclude specific domain controllers, by default there are no exclusions
.PARAMETER IncludeDomainControllers
Include only specific domain controllers, by default all domain controllers are included
.PARAMETER SkipRODC
Skip Read-Only Domain Controllers. By default all domain controllers are included.
.PARAMETER ExtendedForestInformation
Ability to provide Forest Information from another command to speed up processing
.EXAMPLE
An example
.NOTES
Based on:
- https://stackoverflow.com/questions/51405489/what-is-the-difference-between-the-disabledbydefault-and-enabled-ssl-tls-registr
- https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/manage-ssl-protocols-in-ad-fs
- https://docs.microsoft.com/en-us/windows-server/security/tls/tls-registry-settings
- https://docs.microsoft.com/en-us/security/engineering/solving-tls1-problem
- https://docs.microsoft.com/en-us/windows/win32/secauthn/protocols-in-tls-ssl--schannel-ssp-
#>
[CmdletBinding()]
param(
[alias('Server')][string[]] $ComputerName,
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('DomainControllers')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$Computers = @(
if ($ComputerName) {
foreach ($Computer in $ComputerName) {
[PSCustomObject] @{
HostName = $Computer
Domain = 'Not provided'
}
}
} else {
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
foreach ($DC in $ForestInformation.ForestDomainControllers) {
[PSCustomObject] @{
HostName = $DC.HostName
Domain = $DC.Domain
}
}
}
)
foreach ($DC in $Computers) {
#$Connectivity = Get-PSRegistry -ComputerName $DC.HostName -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL'
$Version = Get-PSRegistry -ComputerName $DC.HostName -RegistryPath 'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion'
if ($Version.PSConnection -eq $true) {
$WindowsVersion = ConvertTo-OperatingSystem -OperatingSystem $Version.ProductName -OperatingSystemVersion $Version.CurrentBuildNumber
# According to this https://github.com/MicrosoftDocs/windowsserverdocs/issues/2783 SCHANNEL service requires direct enablement
$ProtocolDefaults = Get-ProtocolDefaults -WindowsVersion $WindowsVersion
$Client = Get-PSRegistry -ComputerName $DC.HostName -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client'
$Server = Get-PSRegistry -ComputerName $DC.HostName -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server'
$Client30 = Get-PSRegistry -ComputerName $DC.HostName -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Client'
$Server30 = Get-PSRegistry -ComputerName $DC.HostName -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server'
$ClientTLS10 = Get-PSRegistry -ComputerName $DC.HostName -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client'
$ServerTLS10 = Get-PSRegistry -ComputerName $DC.HostName -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server'
$ClientTLS11 = Get-PSRegistry -ComputerName $DC.HostName -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Client'
$ServerTLS11 = Get-PSRegistry -ComputerName $DC.HostName -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server'
$ClientTLS12 = Get-PSRegistry -ComputerName $DC.HostName -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client'
$ServerTLS12 = Get-PSRegistry -ComputerName $DC.HostName -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server'
#$ClientTLS13 = Get-PSRegistry -ComputerName $DC.HostName -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Client'
#$ServerTLS13 = Get-PSRegistry -ComputerName $DC.HostName -RegistryPath 'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Server'
[PSCustomObject] @{
ComputerName = $DC.HostName
DomainName = $DC.Domain
Version = $WindowsVersion
SSL_2_Client = Get-ProtocolStatus -RegistryEntry $Client -WindowsVersion $WindowsVersion -ProtocolDefaults $ProtocolDefaults -Protocol 'SSL2Client'
SSL_2_Server = Get-ProtocolStatus -RegistryEntry $Server -WindowsVersion $WindowsVersion -ProtocolDefaults $ProtocolDefaults -Protocol 'SSL2Server'
SSL_3_Client = Get-ProtocolStatus -RegistryEntry $Client30 -WindowsVersion $WindowsVersion -ProtocolDefaults $ProtocolDefaults -Protocol 'SSL3Client'
SSL_3_Server = Get-ProtocolStatus -RegistryEntry $Server30 -WindowsVersion $WindowsVersion -ProtocolDefaults $ProtocolDefaults -Protocol 'SSL3Server'
TLS_10_Client = Get-ProtocolStatus -RegistryEntry $ClientTLS10 -WindowsVersion $WindowsVersion -ProtocolDefaults $ProtocolDefaults -Protocol 'TLS10Client'
TLS_10_Server = Get-ProtocolStatus -RegistryEntry $ServerTLS10 -WindowsVersion $WindowsVersion -ProtocolDefaults $ProtocolDefaults -Protocol 'TLS10Server'
TLS_11_Client = Get-ProtocolStatus -RegistryEntry $ClientTLS11 -WindowsVersion $WindowsVersion -ProtocolDefaults $ProtocolDefaults -Protocol 'TLS11Client'
TLS_11_Server = Get-ProtocolStatus -RegistryEntry $ServerTLS11 -WindowsVersion $WindowsVersion -ProtocolDefaults $ProtocolDefaults -Protocol 'TLS11Server'
TLS_12_Client = Get-ProtocolStatus -RegistryEntry $ClientTLS12 -WindowsVersion $WindowsVersion -ProtocolDefaults $ProtocolDefaults -Protocol 'TLS12Client'
TLS_12_Server = Get-ProtocolStatus -RegistryEntry $ServerTLS12 -WindowsVersion $WindowsVersion -ProtocolDefaults $ProtocolDefaults -Protocol 'TLS12Server'
TLS_13_Client = Get-ProtocolStatus -RegistryEntry $ClientTLS13 -WindowsVersion $WindowsVersion -ProtocolDefaults $ProtocolDefaults -Protocol 'TLS13Client'
TLS_13_Server = Get-ProtocolStatus -RegistryEntry $ServerTLS13 -WindowsVersion $WindowsVersion -ProtocolDefaults $ProtocolDefaults -Protocol 'TLS13Server'
}
} else {
[PSCustomObject] @{
ComputerName = $DC.HostName
DomainName = $DC.Domain
Version = 'Unknown'
SSL_2_Client = 'No connection'
SSL_2_Server = 'No connection'
SSL_3_Client = 'No connection'
SSL_3_Server = 'No connection'
TLS_10_Client = 'No connection'
TLS_10_Server = 'No connection'
TLS_11_Client = 'No connection'
TLS_11_Server = 'No connection'
TLS_12_Client = 'No connection'
TLS_12_Server = 'No connection'
#TLS_13_Client = Get-ProtocolStatus -RegistryEntry $ClientTLS13
#TLS_13_Server = Get-ProtocolStatus -RegistryEntry $ServerTLS13
}
}
}
}
function Get-WinADProxyAddresses {
<#
.SYNOPSIS
Retrieves and organizes proxy addresses for an Active Directory user.
.DESCRIPTION
This function retrieves and organizes the proxy addresses associated with an Active Directory user. It categorizes the addresses into primary, secondary, SIP, X500, and other types based on their prefixes. It also provides options to remove prefixes, convert data to lowercase, and format the output for display purposes.
.PARAMETER ADUser
Specifies the Active Directory user object for which to retrieve proxy addresses.
.PARAMETER RemovePrefix
Indicates whether to remove the prefix (e.g., SMTP:, smtp:) from the proxy addresses.
.PARAMETER ToLower
Specifies whether to convert all returned data to lowercase.
.PARAMETER Formatted
Indicates whether the data should be formatted for display purposes rather than for working with objects.
.PARAMETER Splitter
Specifies the character used to join multiple data elements together, such as an array of aliases.
.EXAMPLE
$ADUsers = Get-ADUser -Filter "*" -Properties ProxyAddresses
foreach ($User in $ADUsers) {
Get-WinADProxyAddresses -ADUser $User
}
.EXAMPLE
$ADUsers = Get-ADUser -Filter "*" -Properties ProxyAddresses
foreach ($User in $ADUsers) {
Get-WinADProxyAddresses -ADUser $User -RemovePrefix
}
.NOTES
This function requires the Active Directory module to be available. It provides a structured view of proxy addresses for an AD user.
#>
[CmdletBinding()]
param(
[Object] $ADUser,
[switch] $RemovePrefix,
[switch] $ToLower,
[switch] $Formatted,
[alias('Joiner')][string] $Splitter = ','
)
$Summary = [PSCustomObject] @{
EmailAddress = $ADUser.EmailAddress
Primary = [System.Collections.Generic.List[string]]::new()
Secondary = [System.Collections.Generic.List[string]]::new()
Sip = [System.Collections.Generic.List[string]]::new()
x500 = [System.Collections.Generic.List[string]]::new()
Other = [System.Collections.Generic.List[string]]::new()
Broken = [System.Collections.Generic.List[string]]::new()
# MailNickname = $ADUser.mailNickName
}
foreach ($Proxy in $ADUser.ProxyAddresses) {
if ($Proxy -like '*,*') {
# Most likely someone added proxy address with comma instead of each email address separatly
$Summary.Broken.Add($Proxy)
} elseif ($Proxy.StartsWith('SMTP:')) {
if ($RemovePrefix) {
$Proxy = $Proxy -replace 'SMTP:', ''
}
if ($ToLower) {
$Proxy = $Proxy.ToLower()
}
$Summary.Primary.Add($Proxy)
} elseif ($Proxy.StartsWith('smtp:') -or $Proxy -notlike "*:*") {
if ($RemovePrefix) {
$Proxy = $Proxy -replace 'smtp:', ''
}
if ($ToLower) {
$Proxy = $Proxy.ToLower()
}
$Summary.Secondary.Add($Proxy)
} elseif ($Proxy.StartsWith('x500')) {
if ($RemovePrefix) {
$Proxy = $Proxy #-replace 'SMTP:', ''
}
if ($ToLower) {
$Proxy = $Proxy.ToLower()
}
$Summary.x500.Add($Proxy)
} elseif ($Proxy.StartsWith('sip:')) {
if ($RemovePrefix) {
$Proxy = $Proxy #-replace 'SMTP:', ''
}
if ($ToLower) {
$Proxy = $Proxy.ToLower()
}
$Summary.Sip.Add($Proxy)
} else {
if ($RemovePrefix) {
$Proxy = $Proxy #-replace 'SMTP:', ''
}
if ($ToLower) {
$Proxy = $Proxy.ToLower()
}
$Summary.Other.Add($Proxy)
}
}
if ($Formatted) {
$Summary.Primary = $Summary.Primary -join $Splitter
$Summary.Secondary = $Summary.Secondary -join $Splitter
$Summary.Sip = $Summary.Sip -join $Splitter
$Summary.x500 = $Summary.x500 -join $Splitter
$Summary.Other = $Summary.Other -join $Splitter
}
$Summary
}
function Get-WinADServiceAccount {
<#
.SYNOPSIS
Retrieves detailed information about service accounts across domains in a forest.
.DESCRIPTION
This cmdlet queries Active Directory for service accounts across specified domains within a forest. It provides detailed information about each account, including its properties, last logon date, password last set date, and other security-related attributes.
.PARAMETER Forest
Specifies the name of the forest to query. This parameter is required.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the query.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the query. If not specified, all domains in the forest are queried.
.PARAMETER PerDomain
If specified, the cmdlet returns a hash table with domain names as keys and arrays of service account objects as values. Otherwise, it returns a flat array of service account objects.
.EXAMPLE
Get-WinADServiceAccount -Forest "example.local" -IncludeDomains "example.local", "child.example.local"
This example queries the "example.local" forest, including only the "example.local" and "child.example.local" domains.
.EXAMPLE
Get-WinADServiceAccount -Forest "example.local" -ExcludeDomains "child.example.local"
This example queries the "example.local" forest, excluding the "child.example.local" domain.
.EXAMPLE
Get-WinADServiceAccount -Forest "example.local" -PerDomain
This example queries the "example.local" forest and returns the results per domain.
#>
[cmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[switch] $PerDomain
)
$Today = Get-Date
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
$Output = [ordered] @{}
foreach ($Domain in $ForestInformation.Domains) {
$QueryServer = $ForestInformation['QueryServers']["$Domain"].HostName[0]
$Properties = @(
'Name', 'ObjectClass', 'PasswordLastSet', 'PasswordNeverExpires', 'PasswordNotRequired', 'UserPrincipalName', 'SamAccountName', 'LastLogonDate' #,'PrimaryGroup', 'PrimaryGroupID',
'AccountExpirationDate', 'AccountNotDelegated',
#'AllowReversiblePasswordEncryption', 'CannotChangePassword',
'CanonicalName', 'WhenCreated', 'WhenChanged', 'DistinguishedName', 'Enabled', 'Description'
'msDS-HostServiceAccountBL', 'msDS-SupportedEncryptionTypes', 'msDS-User-Account-Control-Computed', 'TrustedForDelegation', 'TrustedToAuthForDelegation'
'msDS-AuthenticatedAtDC', 'msDS-AllowedToActOnBehalfOfOtherIdentity', 'msDS-AllowedToDelegateTo', 'PrincipalsAllowedToRetrieveManagedPassword', 'PrincipalsAllowedToDelegateToAccount'
'msDS-ManagedPasswordInterval', 'msDS-GroupMSAMembership', 'ManagedPasswordIntervalInDays', 'msDS-RevealedDSAs', 'servicePrincipalName'
#'msDS-ManagedPasswordId', 'msDS-ManagedPasswordPreviousId'
)
$Accounts = Get-ADServiceAccount -Filter "*" -Server $QueryServer -Properties $Properties
$Output[$Domain] = foreach ($Account in $Accounts) {
#$Account
if ($null -ne $Account.LastLogonDate) {
[int] $LastLogonDays = "$(-$($Account.LastLogonDate - $Today).Days)"
} else {
$LastLogonDays = $null
}
if ($null -ne $Account.PasswordLastSet) {
[int] $PasswordLastChangedDays = "$(-$($Account.PasswordLastSet - $Today).Days)"
} else {
$PasswordLastChangedDays = $null
}
[PSCUstomObject] @{
Name = $Account.Name
Enabled = $Account.Enabled # : True # : WO_SVC_Delete$
ObjectClass = $Account.ObjectClass # : msDS-ManagedServiceAccount
CanonicalName = $Account.CanonicalName # : ad.evotec.xyz/Managed Service Accounts/WO_SVC_Delete
DomainName = ConvertFrom-DistinguishedName -ToDomainCN -DistinguishedName $Account.DistinguishedName
Description = $Account.Description
PasswordLastChangedDays = $PasswordLastChangedDays
LastLogonDays = $LastLogonDays
'ManagedPasswordIntervalInDays' = $Account.'ManagedPasswordIntervalInDays'
'msDS-AllowedToDelegateTo' = $Account.'msDS-AllowedToDelegateTo' # : {CN=EVOWIN,OU=Computers,OU=Devices,OU=Production,DC=ad,DC=evotec,DC=xyz}
'msDS-HostServiceAccountBL' = $Account.'msDS-HostServiceAccountBL' # : {CN=EVOWIN,OU=Computers,OU=Devices,OU=Production,DC=ad,DC=evotec,DC=xyz}
'msDS-AuthenticatedAtDC' = $Account.'msDS-AuthenticatedAtDC'
'msDS-AllowedToActOnBehalfOfOtherIdentity' = $Account.'msDS-AllowedToActOnBehalfOfOtherIdentity'
'PrincipalsAllowedToRetrieveManagedPassword' = $Account.'PrincipalsAllowedToRetrieveManagedPassword'
'PrincipalsAllowedToDelegateToAccount' = $Account.'PrincipalsAllowedToDelegateToAccount'
#'msDS-ManagedPasswordId' = $Account.'msDS-ManagedPasswordId'
'msDS-GroupMSAMembershipAccess' = $Account.'msDS-GroupMSAMembership'.Access.IdentityReference.Value
'msDS-GroupMSAMembershipOwner' = $Account.'msDS-GroupMSAMembership'.Owner
#'msDS-ManagedPasswordPreviousId' = $Account.'msDS-ManagedPasswordPreviousId'
'msDS-RevealedDSAs' = $Account.'msDS-RevealedDSAs'
'servicePrincipalName' = $Account.servicePrincipalName
AccountNotDelegated = $Account.AccountNotDelegated # : False
TrustedForDelegation = $Account.TrustedForDelegation # : False
TrustedToAuthForDelegation = $Account.TrustedToAuthForDelegation # : False
AccountExpirationDate = $Account.AccountExpirationDate
#AllowReversiblePasswordEncryption = $Account.AllowReversiblePasswordEncryption # : False
#CannotChangePassword = $Account.CannotChangePassword # : False
#'msDS-SupportedEncryptionTypes' = $Account.'msDS-SupportedEncryptionTypes' # : 28
msDSSupportedEncryptionTypes = Get-ADEncryptionTypes -Value $Account.'msds-supportedencryptiontypes'
# 'msDS-User-Account-Control-Computed' = $Account.'msDS-User-Account-Control-Computed' # : 0
#ObjectGUID = $Account.ObjectGUID # : 573ff95e-c1f8-45e2-9b64-662fb9cb0615
PasswordNeverExpires = $Account.PasswordNeverExpires # : False
PasswordNotRequired = $Account.PasswordNotRequired # : False
#PrimaryGroup = $Account.PrimaryGroup # : CN=Domain Computers,CN=Users,DC=ad,DC=evotec,DC=xyz
#PrimaryGroupID = $Account.PrimaryGroupID # : 515
#SID = $Account.SID # : S-1-5-21-853615985-2870445339-3163598659-4607
#UserPrincipalName = $Account.UserPrincipalName # :
LastLogonDate = $Account.LastLogonDate # :
PasswordLastSet = $Account.PasswordLastSet # : 15.04.2021 22:47:40
WhenChanged = $Account.WhenChanged # : 15.04.2021 22:47:40
WhenCreated = $Account.WhenCreated # : 15.04.2021 22:47:40
SamAccountName = $Account.SamAccountName
DistinguishedName = $Account.DistinguishedName # : CN=WO_SVC_Delete,CN=Managed Service Accounts,DC=ad,DC=evotec,DC=xyz
'msDS-GroupMSAMembership' = $Account.'msDS-GroupMSAMembership'
# 'msDS-ManagedPasswordInterval' = $Account.'msDS-ManagedPasswordInterval'
}
}
}
if ($PerDomain) {
$Output
} else {
$Output.Values
}
}
function Get-WinADSharePermission {
<#
.SYNOPSIS
Retrieves the permissions for a specified Windows Active Directory share or shares based on type.
.DESCRIPTION
This cmdlet retrieves the permissions for a specified Windows Active Directory share or shares based on type. It can target a specific path or retrieve permissions for shares of a specified type across multiple domains in a forest. The cmdlet can also filter the results to include or exclude specific domains and provide additional forest information.
.PARAMETER Path
Specifies the path to the share for which to retrieve permissions. This parameter is mandatory when using the 'Path' parameter set.
.PARAMETER ShareType
Specifies the type of share for which to retrieve permissions. This parameter is mandatory when using the 'ShareType' parameter set. Valid values are 'NetLogon' and 'SYSVOL'.
.PARAMETER Owner
Specifies that the cmdlet should only return the owner of the share instead of the full permissions.
.PARAMETER Name
Specifies the name of the share for which to retrieve permissions. This parameter is not currently used.
.PARAMETER Forest
Specifies the name of the forest to target for share permissions retrieval. This parameter is used in conjunction with the 'ShareType' parameter.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the share permissions retrieval.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the share permissions retrieval.
.PARAMETER ExtendedForestInformation
Specifies additional information about the forest to use for share permissions retrieval.
.EXAMPLE
Get-WinADSharePermission -Path "\\domain\share"
Retrieves the permissions for the specified share path.
.EXAMPLE
Get-WinADSharePermission -ShareType NetLogon -Forest MyForest
Retrieves the permissions for all NetLogon shares across the specified forest.
.EXAMPLE
Get-WinADSharePermission -ShareType SYSVOL -IncludeDomains MyDomain1, MyDomain2
Retrieves the permissions for all SYSVOL shares in the specified domains.
.NOTES
This cmdlet requires the 'Get-WinADForestDetails', 'Get-FileOwner', and 'Get-FilePermission' cmdlets to function.
#>
[cmdletBinding(DefaultParameterSetName = 'Path')]
param(
[Parameter(ParameterSetName = 'Path', Mandatory)][string] $Path,
[Parameter(ParameterSetName = 'ShareType', Mandatory)][validateset('NetLogon', 'SYSVOL')][string[]] $ShareType,
[switch] $Owner,
[string[]] $Name,
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[System.Collections.IDictionary] $ExtendedForestInformation
)
if ($ShareType) {
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
foreach ($Domain in $ForestInformation.Domains) {
$Path = -join ("\\", $Domain, "\$ShareType")
@(Get-Item -Path $Path -Force) + @(Get-ChildItem -Path $Path -Recurse:$true -Force -ErrorAction SilentlyContinue -ErrorVariable Err) | ForEach-Object -Process {
if ($Owner) {
$Output = Get-FileOwner -JustPath -Path $_ -Resolve -AsHashTable
$Output['Attributes'] = $_.Attributes
[PSCustomObject] $Output
} else {
$Output = Get-FilePermission -Path $_ -ResolveTypes -Extended -AsHashTable
foreach ($O in $Output) {
$O['Attributes'] = $_.Attributes
[PSCustomObject] $O
}
}
}
}
} else {
if ($Path -and (Test-Path -Path $Path)) {
@(Get-Item -Path $Path -Force) + @(Get-ChildItem -Path $Path -Recurse:$true -Force -ErrorAction SilentlyContinue -ErrorVariable Err) | ForEach-Object -Process {
if ($Owner) {
$Output = Get-FileOwner -JustPath -Path $_ -Resolve -AsHashTable -Verbose
$Output['Attributes'] = $_.Attributes
[PSCustomObject] $Output
} else {
$Output = Get-FilePermission -Path $_ -ResolveTypes -Extended -AsHashTable
foreach ($O in $Output) {
$O['Attributes'] = $_.Attributes
[PSCustomObject] $O
}
}
}
}
}
foreach ($e in $err) {
Write-Warning "Get-WinADSharePermission - $($e.Exception.Message) ($($e.CategoryInfo.Reason))"
}
}
function Get-WinADSiteConnections {
<#
.SYNOPSIS
Retrieves site connections within an Active Directory forest.
.DESCRIPTION
This cmdlet retrieves and displays site connections within an Active Directory forest. It can be used to identify the connections between sites, including their properties such as options, server names, and site names. The cmdlet can also format the output to include or exclude specific details.
.PARAMETER Forest
Specifies the target forest to retrieve site connections from. If not specified, the current forest is used.
.PARAMETER Splitter
Specifies the character to use as a delimiter when joining multiple options into a single string. If not specified, options are returned as an array.
.PARAMETER Formatted
A switch parameter that controls the level of detail in the output. If set, the output includes all available site connection properties in a formatted manner. If not set, the output is more concise.
.PARAMETER ExtendedForestInformation
A dictionary object that contains additional information about the forest. This parameter is optional and can be used to provide more context about the forest.
.EXAMPLE
Get-WinADSiteConnections -Forest "example.com" -Formatted
This example retrieves all site connections within the "example.com" forest, displaying detailed information in a formatted manner.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires access to the target forest.
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[alias('Joiner')][string] $Splitter,
[switch] $Formatted,
[System.Collections.IDictionary] $ExtendedForestInformation
)
[Flags()]
enum ConnectionOption {
None
IsGenerated
TwoWaySync
OverrideNotifyDefault = 4
UseNotify = 8
DisableIntersiteCompression = 16
UserOwnedSchedule = 32
RodcTopology = 64
}
$ForestInformation = Get-WinADForestDetails -Forest $Forest -ExtendedForestInformation $ExtendedForestInformation
$QueryServer = $ForestInformation['QueryServers'][$($ForestInformation.Forest.Name)]['HostName'][0]
$NamingContext = (Get-ADRootDSE -Server $QueryServer).configurationNamingContext
$Connections = Get-ADObject -SearchBase $NamingContext -LDAPFilter "(objectCategory=ntDSConnection)" -Properties * -Server $QueryServer
$FormmatedConnections = foreach ($_ in $Connections) {
if ($null -eq $_.Options) {
$Options = 'None'
} else {
$Options = ([ConnectionOption] $_.Options) -split ', '
}
if ($Formatted) {
$Dictionary = [PSCustomObject] @{
<# Regex extracts AD1 and AD2
CN=d1695d10-8d24-41db-bb0f-2963e2c7dfcd,CN=NTDS Settings,CN=AD1,CN=Servers,CN=KATOWICE-1,CN=Sites,CN=Configuration,DC=ad,DC=evotec,DC=xyz
CN=NTDS Settings,CN=AD2,CN=Servers,CN=KATOWICE-1,CN=Sites,CN=Configuration,DC=ad,DC=evotec,DC=xyz
#>
'CN' = $_.CN
'Description' = $_.Description
'Display Name' = $_.DisplayName
'Enabled Connection' = $_.enabledConnection
'Server From' = if ($_.fromServer -match '(?<=CN=NTDS Settings,CN=)(.*)(?=,CN=Servers,)') {
$Matches[0]
} else {
$_.fromServer
}
'Server To' = if ($_.DistinguishedName -match '(?<=CN=NTDS Settings,CN=)(.*)(?=,CN=Servers,)') {
$Matches[0]
} else {
$_.fromServer
}
<# Regex extracts KATOWICE-1
CN=d1695d10-8d24-41db-bb0f-2963e2c7dfcd,CN=NTDS Settings,CN=AD1,CN=Servers,CN=KATOWICE-1,CN=Sites,CN=Configuration,DC=ad,DC=evotec,DC=xyz
CN=NTDS Settings,CN=AD2,CN=Servers,CN=KATOWICE-1,CN=Sites,CN=Configuration,DC=ad,DC=evotec,DC=xyz
#>
'Site From' = if ($_.fromServer -match '(?<=,CN=Servers,CN=)(.*)(?=,CN=Sites,CN=Configuration)') {
$Matches[0]
} else {
$_.fromServer
}
'Site To' = if ($_.DistinguishedName -match '(?<=,CN=Servers,CN=)(.*)(?=,CN=Sites,CN=Configuration)') {
$Matches[0]
} else {
$_.fromServer
}
'Options' = if ($Splitter -ne '') {
$Options -Join $Splitter
} else {
$Options
}
#'Options' = $_.Options
'When Created' = $_.WhenCreated
'When Changed' = $_.WhenChanged
'Is Deleted' = $_.IsDeleted
}
} else {
$Dictionary = [PSCustomObject] @{
<# Regex extracts AD1 and AD2
CN=d1695d10-8d24-41db-bb0f-2963e2c7dfcd,CN=NTDS Settings,CN=AD1,CN=Servers,CN=KATOWICE-1,CN=Sites,CN=Configuration,DC=ad,DC=evotec,DC=xyz
CN=NTDS Settings,CN=AD2,CN=Servers,CN=KATOWICE-1,CN=Sites,CN=Configuration,DC=ad,DC=evotec,DC=xyz
#>
CN = $_.CN
Description = $_.Description
DisplayName = $_.DisplayName
EnabledConnection = $_.enabledConnection
ServerFrom = if ($_.fromServer -match '(?<=CN=NTDS Settings,CN=)(.*)(?=,CN=Servers,)') {
$Matches[0]
} else {
$_.fromServer
}
ServerTo = if ($_.DistinguishedName -match '(?<=CN=NTDS Settings,CN=)(.*)(?=,CN=Servers,)') {
$Matches[0]
} else {
$_.fromServer
}
<# Regex extracts KATOWICE-1
CN=d1695d10-8d24-41db-bb0f-2963e2c7dfcd,CN=NTDS Settings,CN=AD1,CN=Servers,CN=KATOWICE-1,CN=Sites,CN=Configuration,DC=ad,DC=evotec,DC=xyz
CN=NTDS Settings,CN=AD2,CN=Servers,CN=KATOWICE-1,CN=Sites,CN=Configuration,DC=ad,DC=evotec,DC=xyz
#>
SiteFrom = if ($_.fromServer -match '(?<=,CN=Servers,CN=)(.*)(?=,CN=Sites,CN=Configuration)') {
$Matches[0]
} else {
$_.fromServer
}
SiteTo = if ($_.DistinguishedName -match '(?<=,CN=Servers,CN=)(.*)(?=,CN=Sites,CN=Configuration)') {
$Matches[0]
} else {
$_.fromServer
}
Options = if ($Splitter -ne '') {
$Options -Join $Splitter
} else {
$Options
}
#Options = $_.Options
WhenCreated = $_.WhenCreated
WhenChanged = $_.WhenChanged
IsDeleted = $_.IsDeleted
}
}
$Dictionary
}
$FormmatedConnections
}
function Get-WinADSiteCoverage {
<#
.SYNOPSIS
Provides information about custom configuration for Site Coverage of Domain Controllers
.DESCRIPTION
Provides information about custom configuration for Site Coverage of Domain Controllers
It requires Domain Admin rights to execute, as it checks registry settings on Domain Controllers
It will check what Site Coverage is set on Domain Controllers and for both Site Coverage and GC Site Coverage.
It will check if the Site exists in AD Sites and Services
.PARAMETER Forest
Specifies the target forest to retrieve site information from.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the search.
.PARAMETER ExcludeDomainControllers
Specifies an array of domain controllers to exclude from the search.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the search.
.PARAMETER IncludeDomainControllers
Specifies an array of domain controllers to include in the search.
.PARAMETER SkipRODC
Indicates whether to skip read-only domain controllers.
.PARAMETER ExtendedForestInformation
A dictionary object that contains additional information about the forest. This parameter is optional and can be used to provide more context about the forest.
.EXAMPLE
Get-WinADSiteCoverage -Forest "example.com"
.NOTES
General notes
#>
[CmdletBinding()]
param(
[string] $Forest,
[alias('Domain')][string[]] $IncludeDomains,
[string[]] $ExcludeDomains,
[alias('DomainControllers')][string[]] $IncludeDomainControllers,
[string[]] $ExcludeDomainControllers,
[switch] $SkipRODC,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
$AllSitesCache = [ordered] @{}
try {
$AllSites = Get-ADReplicationSite -Filter * -ErrorAction Stop -Server $ForestInformation.QueryServers['Forest'].HostName[0]
foreach ($Site in $AllSites) {
$AllSitesCache[$Site.Name] = $Site
}
} catch {
Write-Warning -Message "Get-WinADSiteCoverage - We couldn't get all sites. Make sure you have RSAT installed and you have permissions to read AD Sites and Services. Error: $($_.Exception.Message)"
return
}
$Count = 0
foreach ($Domain in $ForestInformation.Domains) {
$Count++
$CountDC = 0
foreach ($DC in $ForestInformation.DomainDomainControllers[$Domain]) {
$CountDC++
$DCSettings = Get-WinADDomainControllerNetLogonSettings -DomainController $DC.HostName
[Array] $WrongSiteCoverage = foreach ($Site in $DCSettings.SiteCoverage) {
if (-not $AllSitesCache[$Site]) {
$Site
}
}
[Array] $WrongGCSiteCoverage = foreach ($Site in $DCSettings.GCSiteCoverage) {
if (-not $AllSitesCache[$Site]) {
$Site
}
}
Write-Verbose -Message "Get-WinADSiteCoverage - Processing Domain $Domain [$Count/$($ForestInformation.Domains.Count)] - DC $($DC.HostName) [$CountDC/$($ForestInformation.DomainDomainControllers[$Domain].Count)]"
$Data = [PSCustomObject] @{
'Domain' = $Domain
'DomainController' = $DC.HostName
'Error' = $DCSettings.Error
'HasIssues' = $null
'DynamicSiteName' = $DCSettings.DynamicSiteName
'SiteCoverageCount' = $DCSettings.SiteCoverage.Count
'GCSiteCoverageCount' = $DCSettings.GCSiteCoverage.Count
'SiteCoverage' = $DCSettings.SiteCoverage
'GCSiteCoverage' = $DCSettings.GCSiteCoverage
'NonExistingSiteCoverage' = $WrongSiteCoverage
'NonExistingGCSiteCoverage' = $WrongGCSiteCoverage
'NonExistingSiteCoverageCount' = $WrongSiteCoverage.Count
'NonExistingGCSiteCoverageCount' = $WrongGCSiteCoverage.Count
'ErrorMessage' = $DCSettings.ErrorMessage
}
# If there are no non-existing sites, we are good
if ($Data.NonExistingSiteCoverageCount -eq 0 -and $Data.NonExistingGCSiteCoverageCount -eq 0 -and $false -eq $Data.Error) {
$Data.HasIssues = $false
} else {
$Data.HasIssues = $true
}
$Data
}
}
}
function Get-WinADSiteLinks {
<#
.SYNOPSIS
Retrieves site links within an Active Directory forest.
.DESCRIPTION
This cmdlet retrieves and displays site links within an Active Directory forest. It can be used to identify the site links between sites, including their properties such as cost, replication frequency, and options. The cmdlet can also format the output to include or exclude specific details.
.PARAMETER Forest
Specifies the target forest to retrieve site links from. If not specified, the current forest is used.
.PARAMETER Splitter
Specifies the character to use as a delimiter when joining multiple options into a single string. If not specified, options are returned as an array.
.PARAMETER Formatted
A switch parameter that controls the level of detail in the output. If set, the output includes all available site link properties in a formatted manner. If not set, the output is more concise.
.PARAMETER ExtendedForestInformation
A dictionary object that contains additional information about the forest. This parameter is optional and can be used to provide more context about the forest.
.EXAMPLE
Get-WinADSiteLinks -Forest "example.com" -Formatted
This example retrieves all site links within the "example.com" forest, displaying detailed information in a formatted manner.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires access to the target forest.
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[alias('Joiner')][string] $Splitter,
[string] $Formatted,
[System.Collections.IDictionary] $ExtendedForestInformation
)
[Flags()]
enum SiteLinksOptions {
None = 0
UseNotify = 1
TwoWaySync = 2
DisableCompression = 4
}
$ForestInformation = Get-WinADForestDetails -Forest $Forest -ExtendedForestInformation $ExtendedForestInformation
$QueryServer = $ForestInformation.QueryServers[$($ForestInformation.Forest.Name)]['HostName'][0]
$NamingContext = (Get-ADRootDSE -Server $QueryServer).configurationNamingContext
$SiteLinks = Get-ADObject -LDAPFilter "(objectCategory=sitelink)" -SearchBase $NamingContext -Properties * -Server $QueryServer
foreach ($_ in $SiteLinks) {
if ($null -eq $_.Options) {
$Options = 'None'
} else {
$Options = ([SiteLinksOptions] $_.Options) -split ', '
}
if ($Formatted) {
[PSCustomObject] @{
Name = $_.CN
Cost = $_.Cost
'Replication Frequency In Minutes' = $_.ReplInterval
Options = if ($Splitter -ne '') {
$Options -Join $Splitter
} else {
$Options
}
#ReplInterval : 15
Created = $_.WhenCreated
Modified = $_.WhenChanged
#Deleted :
#InterSiteTransportProtocol : IP
'Protected From Accidental Deletion' = $_.ProtectedFromAccidentalDeletion
}
} else {
[PSCustomObject] @{
Name = $_.CN
Cost = $_.Cost
ReplicationFrequencyInMinutes = $_.ReplInterval
Options = if ($Splitter -ne '') {
$Options -Join $Splitter
} else {
$Options
}
#ReplInterval : 15
Created = $_.WhenCreated
Modified = $_.WhenChanged
#Deleted :
#InterSiteTransportProtocol : IP
ProtectedFromAccidentalDeletion = $_.ProtectedFromAccidentalDeletion
}
}
}
}
Function Get-WinADSiteOptions {
<#
.SYNOPSIS
This function retrieves the site options for each Active Directory site.
.DESCRIPTION
The Get-WinADSiteOptions function retrieves the site options for each Active Directory site.
It uses the nTDSSiteSettingsFlags enumeration to decode the site options.
.PARAMETER None
This function does not accept any parameters.
.EXAMPLE
Get-WinADSiteOptions
#>
[CmdletBinding()]
Param(
)
[Flags()]
enum nTDSSiteSettingsFlags {
NTDSSETTINGS_OPT_IS_AUTO_TOPOLOGY_DISABLED = 0x1
NTDSSETTINGS_OPT_IS_TOPL_CLEANUP_DISABLED = 0x2
NTDSSETTINGS_OPT_IS_TOPL_MIN_HOPS_DISABLED = 0x4
NTDSSETTINGS_OPT_IS_TOPL_DETECT_STALE_DISABLED = 0x8
NTDSSETTINGS_OPT_IS_INTER_SITE_AUTO_TOPOLOGY_DISABLED = 0x10
NTDSSETTINGS_OPT_IS_GROUP_CACHING_ENABLED = 0x20
NTDSSETTINGS_OPT_FORCE_KCC_WHISTLER_BEHAVIOR = 0x40
NTDSSETTINGS_OPT_FORCE_KCC_W2K_ELECTION = 0x80
NTDSSETTINGS_OPT_IS_RAND_BH_SELECTION_DISABLED = 0x100
NTDSSETTINGS_OPT_IS_SCHEDULE_HASHING_ENABLED = 0x200
NTDSSETTINGS_OPT_IS_REDUNDANT_SERVER_TOPOLOGY_ENABLED = 0x400
NTDSSETTINGS_OPT_W2K3_IGNORE_SCHEDULES = 0x800
NTDSSETTINGS_OPT_W2K3_BRIDGES_REQUIRED = 0x1000
}
$RootDSE = Get-ADRootDSE
$Sites = Get-ADObject -Filter 'objectClass -eq "site"' -SearchBase $RootDSE.ConfigurationNamingContext
foreach ($Site In $Sites) {
$SiteSettings = Get-ADObject "CN=NTDS Site Settings,$($Site.DistinguishedName)" -Properties Options
If (-not $SiteSettings.PSObject.Properties.Match('Options').Count -OR $SiteSettings.Options -EQ 0) {
[PSCustomObject]@{
SiteName = $Site.Name
DistinguishedName = $Site.DistinguishedName
SiteOptions = '(none)'
}
} Else {
[PSCustomObject]@{
SiteName = $Site.Name;
DistinguishedName = $Site.DistinguishedName;
Options = $SiteSettings.Options
SiteOptions = [nTDSSiteSettingsFlags] $SiteSettings.Options
}
}
}
}
function Get-WinADTombstoneLifetime {
<#
.SYNOPSIS
Retrieves the tombstone lifetime for a specified Active Directory forest.
.DESCRIPTION
This function retrieves the tombstone lifetime for a specified Active Directory forest. If the tombstone lifetime is not explicitly set, it defaults to 60 days. The recommended value is 720 days, and the minimum value is 180 days.
.PARAMETER Forest
Specifies the name of the Active Directory forest to retrieve the tombstone lifetime for. If not specified, the current forest is used.
.PARAMETER ExtendedForestInformation
Specifies additional information about the forest to aid in the retrieval process.
.EXAMPLE
Get-WinADTombstoneLifetime -Forest "example.com"
This example retrieves the tombstone lifetime for the "example.com" forest.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires access to the target forest.
#>
[Alias('Get-WinADForestTombstoneLifetime')]
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -ExtendedForestInformation $ExtendedForestInformation
# Check tombstone lifetime (if blank value is 60)
# Recommended value 720
# Minimum value 180
$QueryServer = $ForestInformation.QueryServers[$($ForestInformation.Forest.Name)]['HostName'][0]
$RootDSE = Get-ADRootDSE -Server $QueryServer
$Output = (Get-ADObject -Server $QueryServer -Identity "CN=Directory Service,CN=Windows NT,CN=Services,$(($RootDSE).configurationNamingContext)" -Properties tombstoneLifetime)
if ($null -eq $Output -or $null -eq $Output.tombstoneLifetime) {
[PSCustomObject] @{
TombstoneLifeTime = 60
}
} else {
[PSCustomObject] @{
TombstoneLifeTime = $Output.tombstoneLifetime
}
}
}
function Get-WinADTrust {
<#
.SYNOPSIS
Retrieves trust relationships within an Active Directory forest.
.DESCRIPTION
This cmdlet retrieves and displays trust relationships within an Active Directory forest. It can be used to identify the trust relationships between domains and forests, including the type of trust, direction, and other properties. The cmdlet can also recursively explore trust relationships across multiple forests.
.PARAMETER Forest
Specifies the target forest to retrieve trust relationships from. If not specified, the current forest is used.
.PARAMETER Recursive
Indicates that the cmdlet should recursively explore trust relationships across multiple forests.
.PARAMETER Nesting
This parameter is used internally to track the nesting level of recursive calls. It should not be used directly.
.PARAMETER UniqueTrusts
This parameter is used internally to keep track of unique trust relationships encountered during recursive exploration. It should not be used directly.
.EXAMPLE
Get-WinADTrust -Recursive
This example retrieves all trust relationships within the current forest and recursively explores trust relationships across multiple forests.
.NOTES
This cmdlet is designed to provide detailed information about trust relationships within an Active Directory environment. It can be used for auditing, troubleshooting, and planning purposes.
#>
[alias('Get-WinADTrusts')]
[cmdletBinding()]
param(
[string] $Forest,
[switch] $Recursive,
[Parameter(DontShow)][int] $Nesting = -1,
[Parameter(DontShow)][System.Collections.IDictionary] $UniqueTrusts
)
Begin {
if ($Nesting -eq -1) {
$UniqueTrusts = [ordered]@{}
}
}
Process {
$Nesting++
$ForestInformation = Get-WinADForest -Forest $Forest
[Array] $Trusts = @(
try {
$TrustRelationship = $ForestInformation.GetAllTrustRelationships()
foreach ($Trust in $TrustRelationship) {
[ordered] @{
Type = 'Forest'
Details = $Trust
ExecuteObject = $ForestInformation
}
}
} catch {
Write-Warning "Get-WinADForest - Can't process trusts for $Forest, error: $($_.Exception.Message.Replace([System.Environment]::NewLine,''))"
}
foreach ($Domain in $ForestInformation.Domains) {
$DomainInformation = Get-WinADDomain -Domain $Domain.Name
try {
$TrustRelationship = $DomainInformation.GetAllTrustRelationships()
foreach ($Trust in $TrustRelationship) {
[ordered] @{
Type = 'Domain'
Details = $Trust
ExecuteObject = $DomainInformation
}
}
} catch {
Write-Warning "Get-WinADForest - Can't process trusts for $Domain, error: $($_.Exception.Message.Replace([System.Environment]::NewLine,''))"
}
}
)
[Array] $Output = foreach ($Trust in $Trusts) {
Write-Verbose "Get-WinADTrust - From: $($Trust.Details.SourceName) To: $($Trust.Details.TargetName) Nesting: $Nesting"
$UniqueID1 = -join ($Trust.Details.SourceName, $Trust.Details.TargetName)
$UniqueID2 = -join ($Trust.Details.TargetName, $Trust.Details.SourceName)
if (-not $UniqueTrusts[$UniqueID1]) {
$UniqueTrusts[$UniqueID1] = $true
} else {
Write-Verbose "Get-WinADTrust - Trust already on the list (From: $($Trust.Details.SourceName) To: $($Trust.Details.TargetName) Nesting: $Nesting)"
continue
}
if (-not $UniqueTrusts[$UniqueID2]) {
$UniqueTrusts[$UniqueID2] = $true
} else {
Write-Verbose "Get-WinADTrust - Trust already on the list (Reverse) (From: $($Trust.Details.TargetName) To: $($Trust.Details.SourceName) Nesting: $Nesting"
continue
}
$TrustObject = Get-WinADTrustObject -Domain $Trust.ExecuteObject.Name -AsHashTable
# https://github.com/vletoux/pingcastle/issues/9
if ($TrustObject[$Trust.Details.TargetName].TrustAttributes -contains "Enable TGT DELEGATION") {
$TGTDelegation = $true
} elseif ($TrustObject[$Trust.Details.TargetName].TrustAttributes -contains "No TGT DELEGATION") {
$TGTDelegation = $false
} else {
# Assuming all patches are installed (past July 2019)
$TGTDelegation = $false
}
$TrustStatus = Test-DomainTrust -Domain $Trust.Details.SourceName -TrustedDomain $Trust.Details.TargetName
$GroupExists = Get-WinADObject -Identity 'S-1-5-32-544' -DomainName $Trust.Details.TargetName
[PsCustomObject] @{
'TrustSource' = $Trust.Details.SourceName #$Domain
'TrustTarget' = $Trust.Details.TargetName #$Trust.Target
'TrustDirection' = $Trust.Details.TrustDirection.ToString() #$Trust.Direction.ToString()
'TrustBase' = $Trust.Type
'TrustType' = $Trust.Details.TrustType.ToString()
'TrustTypeAD' = $TrustObject[$Trust.Details.TargetName].TrustType
'CreatedDaysAgo' = ((Get-Date) - $TrustObject[$Trust.Details.TargetName].WhenCreated).Days
'ModifiedDaysAgo' = ((Get-Date) - $TrustObject[$Trust.Details.TargetName].WhenChanged).Days
'NetBiosName' = if ($Trust.Details.TrustedDomainInformation.NetBiosName) {
$Trust.Details.TrustedDomainInformation.NetBiosName
} else {
$TrustObject[$Trust.Details.TargetName].TrustPartnerNetBios
}
'DomainSID' = if ($Trust.Details.TrustedDomainInformation.DomainSid) {
$Trust.Details.TrustedDomainInformation.DomainSid
} else {
$TrustObject[$Trust.Details.TargetName].ObjectSID
}
'Status' = if ($null -ne $Trust.Details.TrustedDomainInformation.Status) {
$Trust.Details.TrustedDomainInformation.Status.ToString()
} else {
'Internal'
}
'Level' = $Nesting
'SuffixesIncluded' = (($Trust.Details.TopLevelNames | Where-Object { $_.Status -eq 'Enabled' }).Name) -join ', '
'SuffixesExcluded' = $Trust.Details.ExcludedTopLevelNames.Name
'TrustAttributes' = $TrustObject[$Trust.Details.TargetName].TrustAttributes -join ', '
'TrustStatus' = $TrustStatus.TrustStatus
'QueryStatus' = if ($GroupExists) {
'OK'
} else {
'NOT OK'
}
'ForestTransitive' = $TrustObject[$Trust.Details.TargetName].TrustAttributes -contains "Forest Transitive"
'SelectiveAuthentication' = $TrustObject[$Trust.Details.TargetName].TrustAttributes -contains "Cross Organization"
#'SIDFilteringForestAware' = $null
'SIDFilteringQuarantined' = $TrustObject[$Trust.Details.TargetName].TrustAttributes -contains "Quarantined Domain"
'DisallowTransitivity' = $TrustObject[$Trust.Details.TargetName].TrustAttributes -contains "Non Transitive"
'IntraForest' = $TrustObject[$Trust.Details.TargetName].TrustAttributes -contains "Within Forest"
#'IsTreeParent' = $null #$Trust.IsTreeParent
#'IsTreeRoot' = $Trust.Details.TrustType.ToString() -eq 'TreeRoot'
'IsTGTDelegationEnabled' = $TGTDelegation
#'TrustedPolicy' = $null #$Trust.TrustedPolicy
#'TrustingPolicy' = $null #$Trust.TrustingPolicy
'UplevelOnly' = $TrustObject[$Trust.Details.TargetName].TrustAttributes -contains "UpLevel Only"
'UsesAESKeys' = $TrustObject[$Trust.Details.TargetName].msDSSupportedEncryptionTypes -contains "AES128-CTS-HMAC-SHA1-96" -or $TrustObject[$Trust.Details.TargetName].msDSSupportedEncryptionTypes -contains 'AES256-CTS-HMAC-SHA1-96'
'UsesRC4Encryption' = $TrustObject[$Trust.Details.TargetName].TrustAttributes -contains "Uses RC4 Encryption"
'EncryptionTypes' = $TrustObject[$Trust.Details.TargetName].msDSSupportedEncryptionTypes -join ', '
'TrustSourceDC' = $TrustStatus.TrustSourceDC
'TrustTargetDC' = $TrustStatus.TrustTargetDC
'ObjectGUID' = $TrustObject[$Trust.Details.TargetName].ObjectGuid
#'ObjectSID' = $TrustObject[$Trust.Details.TargetName].ObjectSID
'Created' = $TrustObject[$Trust.Details.TargetName].WhenCreated
'Modified' = $TrustObject[$Trust.Details.TargetName].WhenChanged
'TrustDirectionText' = $TrustObject[$Trust.Details.TargetName].TrustDirectionText
'TrustTypeText' = $TrustObject[$Trust.Details.TargetName].TrustTypeText
'AdditionalInformation' = [ordered] @{
'msDSSupportedEncryptionTypes' = $TrustObject[$Trust.Details.TargetName].msDSSupportedEncryptionTypes
'msDSTrustForestTrustInfo' = $TrustObject[$Trust.Details.TargetName].msDSTrustForestTrustInfo
'SuffixesInclude' = $Trust.Details.TopLevelNames
'SuffixesExclude' = $Trust.Details.ExcludedTopLevelNames
'TrustObject' = $TrustObject
'GroupExists' = $GroupExists
}
}
}
if ($Output -and $Output.Count -gt 0) {
$Output
}
if ($Recursive) {
foreach ($Trust in $Output) {
if ($Trust.TrustType -notin 'TreeRoot', 'ParentChild') {
Get-WinADTrust -Forest $Trust.TrustTarget -Recursive -Nesting $Nesting -UniqueTrusts $UniqueTrusts
}
}
}
}
}
function Get-WinADTrustLegacy {
<#
.SYNOPSIS
Retrieves trust relationships within a specified Active Directory forest, including legacy trusts.
.DESCRIPTION
This cmdlet is designed to gather detailed information about trust relationships within an Active Directory forest. It can target a specific forest, include or exclude specific domains, and display the results in a detailed or concise format. Additionally, it can filter out duplicate trusts and provide extended forest information.
.PARAMETER Forest
Specifies the target forest to query. If not provided, the current forest is used by default.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the search. This parameter is optional and can be used to narrow down the search scope.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the search. This parameter is optional and can be used to limit the search scope to specific domains.
.PARAMETER Display
A switch parameter that controls the level of detail in the output. If set, the output includes all available trust properties. If not set, the output is more concise.
.PARAMETER ExtendedForestInformation
A dictionary object that contains additional information about the forest. This parameter is optional and can be used to provide more context about the forest.
.PARAMETER Unique
A switch parameter that filters out duplicate trusts based on the source and target domains. If set, only unique trusts are returned.
.EXAMPLE
Get-WinADTrustLegacy -Display -Unique
This example retrieves all trust relationships within the current forest, displaying detailed information and filtering out duplicate trusts.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported. It also requires access to the target forest and domains.
#>
[CmdletBinding()]
param(
[string] $Forest,
[alias('Domain')][string[]] $IncludeDomains,
[string[]] $ExcludeDomains,
[switch] $Display,
[System.Collections.IDictionary] $ExtendedForestInformation,
[switch] $Unique
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
$UniqueTrusts = [ordered]@{}
foreach ($Domain in $ForestInformation.Domains) {
$QueryServer = $ForestInformation['QueryServers']["$Domain"].HostName[0]
$Trusts = Get-ADTrust -Server $QueryServer -Filter "*" -Properties *
$DomainPDC = $ForestInformation['DomainDomainControllers'][$Domain] | Where-Object { $_.IsPDC -eq $true }
$PropertiesTrustWMI = @(
'FlatName',
'SID',
'TrustAttributes',
'TrustDirection',
'TrustedDCName',
'TrustedDomain',
'TrustIsOk',
'TrustStatus',
'TrustStatusString', # TrustIsOk/TrustStatus are covered by this
'TrustType'
)
$TrustStatatuses = Get-CimInstance -ClassName Microsoft_DomainTrustStatus -Namespace root\MicrosoftActiveDirectory -ComputerName $DomainPDC.HostName -ErrorAction SilentlyContinue -Verbose:$false -Property $PropertiesTrustWMI
$ReturnData = foreach ($Trust in $Trusts) {
if ($Unique) {
$UniqueID1 = -join ($Domain, $Trust.trustPartner)
$UniqueID2 = -join ($Trust.trustPartner, $Domain)
if (-not $UniqueTrusts[$UniqueID1]) {
$UniqueTrusts[$UniqueID1] = $true
} else {
continue
}
if (-not $UniqueTrusts[$UniqueID2]) {
$UniqueTrusts[$UniqueID2] = $true
} else {
continue
}
}
$TrustWMI = $TrustStatatuses | & { process {
if ($_.TrustedDomain -eq $Trust.Target ) {
$_
}
} }
if ($Display) {
[PsCustomObject] @{
'Trust Source' = $Domain
'Trust Target' = $Trust.Target
'Trust Direction' = $Trust.Direction.ToString()
'Trust Attributes' = if ($Trust.TrustAttributes -is [int]) {
(Get-ADTrustAttributes -Value $Trust.TrustAttributes) -join '; '
} else {
'Error - needs fixing'
}
'Trust Status' = if ($null -ne $TrustWMI) {
$TrustWMI.TrustStatusString
} else {
'N/A'
}
'Forest Transitive' = $Trust.ForestTransitive
'Selective Authentication' = $Trust.SelectiveAuthentication
'SID Filtering Forest Aware' = $Trust.SIDFilteringForestAware
'SID Filtering Quarantined' = $Trust.SIDFilteringQuarantined
'Disallow Transivity' = $Trust.DisallowTransivity
'Intra Forest' = $Trust.IntraForest
'Is Tree Parent' = $Trust.IsTreeParent
'Is Tree Root' = $Trust.IsTreeRoot
'TGTDelegation' = $Trust.TGTDelegation
'TrustedPolicy' = $Trust.TrustedPolicy
'TrustingPolicy' = $Trust.TrustingPolicy
'TrustType' = $Trust.TrustType.ToString()
'UplevelOnly' = $Trust.UplevelOnly
'UsesAESKeys' = $Trust.UsesAESKeys
'UsesRC4Encryption' = $Trust.UsesRC4Encryption
'Trust Source DC' = if ($null -ne $TrustWMI) {
$TrustWMI.PSComputerName
} else {
''
}
'Trust Target DC' = if ($null -ne $TrustWMI) {
$TrustWMI.TrustedDCName.Replace('\\', '')
} else {
''
}
'Trust Source DN' = $Trust.Source
'ObjectGUID' = $Trust.ObjectGUID
'Created' = $Trust.Created
'Modified' = $Trust.Modified
'Deleted' = $Trust.Deleted
'SID' = $Trust.securityIdentifier
'TrustOK' = if ($null -ne $TrustWMI) {
$TrustWMI.TrustIsOK
} else {
$false
}
'TrustStatus' = if ($null -ne $TrustWMI) {
$TrustWMI.TrustStatus
} else {
-1
}
}
} else {
[PsCustomObject] @{
'TrustSource' = $Domain
'TrustTarget' = $Trust.Target
'TrustDirection' = $Trust.Direction.ToString()
'TrustAttributes' = if ($Trust.TrustAttributes -is [int]) {
Get-ADTrustAttributes -Value $Trust.TrustAttributes
} else {
'Error - needs fixing'
}
'TrustStatus' = if ($null -ne $TrustWMI) {
$TrustWMI.TrustStatusString
} else {
'N/A'
}
'ForestTransitive' = $Trust.ForestTransitive
'SelectiveAuthentication' = $Trust.SelectiveAuthentication
'SIDFiltering Forest Aware' = $Trust.SIDFilteringForestAware
'SIDFiltering Quarantined' = $Trust.SIDFilteringQuarantined
'DisallowTransivity' = $Trust.DisallowTransivity
'IntraForest' = $Trust.IntraForest
'IsTreeParent' = $Trust.IsTreeParent
'IsTreeRoot' = $Trust.IsTreeRoot
'TGTDelegation' = $Trust.TGTDelegation
'TrustedPolicy' = $Trust.TrustedPolicy
'TrustingPolicy' = $Trust.TrustingPolicy
'TrustType' = $Trust.TrustType.ToString()
'UplevelOnly' = $Trust.UplevelOnly
'UsesAESKeys' = $Trust.UsesAESKeys
'UsesRC4Encryption' = $Trust.UsesRC4Encryption
'TrustSourceDC' = if ($null -ne $TrustWMI) {
$TrustWMI.PSComputerName
} else {
''
}
'TrustTargetDC' = if ($null -ne $TrustWMI) {
$TrustWMI.TrustedDCName.Replace('\\', '')
} else {
''
}
'TrustSourceDN' = $Trust.Source
'ObjectGUID' = $Trust.ObjectGUID
'Created' = $Trust.Created
'Modified' = $Trust.Modified
'Deleted' = $Trust.Deleted
'SID' = $Trust.securityIdentifier
'TrustOK' = if ($null -ne $TrustWMI) {
$TrustWMI.TrustIsOK
} else {
$false
}
'TrustStatusInt' = if ($null -ne $TrustWMI) {
$TrustWMI.TrustStatus
} else {
-1
}
}
}
}
$ReturnData
}
}
function Get-WinADUserPrincipalName {
<#
.SYNOPSIS
Modifies the UserPrincipalName of a user object based on specified parameters.
.DESCRIPTION
This function takes a user object and a domain name as input. It can modify the UserPrincipalName of the user object based on the following options:
- Replace the domain part of the UserPrincipalName with the specified domain name.
- Construct a new UserPrincipalName in the format GivenName.Surname@DomainName.
- Remove Latin characters from the UserPrincipalName.
- Convert the UserPrincipalName to lowercase.
.PARAMETER User
The user object whose UserPrincipalName is to be modified.
.PARAMETER DomainName
The domain name to be used for replacing the domain part of the UserPrincipalName or constructing a new UserPrincipalName.
.PARAMETER ReplaceDomain
Switch to replace the domain part of the UserPrincipalName with the specified domain name.
.PARAMETER NameSurname
Switch to construct a new UserPrincipalName in the format GivenName.Surname@DomainName.
.PARAMETER FixLatinChars
Switch to remove Latin characters from the UserPrincipalName.
.PARAMETER ToLower
Switch to convert the UserPrincipalName to lowercase.
.EXAMPLE
Get-WinADUserPrincipalName -User $userObject -DomainName "example.com" -ReplaceDomain
Replaces the domain part of the UserPrincipalName with "example.com".
.EXAMPLE
Get-WinADUserPrincipalName -User $userObject -DomainName "example.com" -NameSurname
Constructs a new UserPrincipalName in the format [email protected].
.EXAMPLE
Get-WinADUserPrincipalName -User $userObject -DomainName "example.com" -FixLatinChars
Removes Latin characters from the UserPrincipalName.
.EXAMPLE
Get-WinADUserPrincipalName -User $userObject -DomainName "example.com" -ToLower
Converts the UserPrincipalName to lowercase.
#>
[cmdletbinding()]
param(
[Parameter(Mandatory = $true)][Object] $User,
[Parameter(Mandatory = $true)][string] $DomainName,
[switch] $ReplaceDomain,
[switch] $NameSurname,
[switch] $FixLatinChars,
[switch] $ToLower
)
if ($User.UserPrincipalName) {
$NewUserName = $User.UserPrincipalName
if ($ReplaceDomain) {
$NewUserName = ($User.UserPrincipalName -split '@')[0]
$NewUserName = -join ($NewUserName, '@', $DomainName)
}
if ($NameSurname) {
if ($User.GivenName -and $User.Surname) {
$NewUsername = -join ($User.GivenName, '.', $User.Surname, '@', $DomainName)
} else {
Write-Warning "Get-WinADUserPrincipalName - UserPrincipalName couldn't be changed to GivenName.SurName@$DomainName"
}
}
if ($FixLatinChars) {
$NewUsername = Remove-StringLatinCharacters -String $NewUsername
}
if ($ToLower) {
$NewUsername = $NewUserName.ToLower()
}
if ($NewUserName -eq $User.UserPrincipalName) {
Write-Warning "Get-WinADUserPrincipalName - UserPrincipalName didn't change. Stays as $NewUserName"
}
$NewUsername
}
}
function Get-WinADUsers {
<#
.SYNOPSIS
Get-WinADUsers is a function that retrieves all users from Active Directory.
It can be used to retrieve users from a single domain or from all domains in the forest.
.DESCRIPTION
Get-WinADUsers is a function that retrieves all users from Active Directory.
It can be used to retrieve users from a single domain or from all domains in the forest.
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExcludeDomains
Exclude domain from search, by default whole forest is scanned
.PARAMETER IncludeDomains
Include only specific domains, by default whole forest is scanned
.PARAMETER PerDomain
Return results per domain
.PARAMETER AddOwner
Add Owner information to the output
.EXAMPLE
An example
.NOTES
General notes
#>
[cmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[switch] $PerDomain,
[switch] $AddOwner
)
$AllUsers = [ordered] @{}
$AllContacts = [ordered] @{}
$AllGroups = [ordered] @{}
$CacheUsersReport = [ordered] @{}
$Today = Get-Date
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
$ErrorCount = 0
foreach ($Domain in $ForestInformation.Domains) {
$QueryServer = $ForestInformation['QueryServers']["$Domain"].HostName[0]
$Properties = @(
'DistinguishedName', 'mail', 'LastLogonDate', 'PasswordLastSet', 'DisplayName', 'Manager', 'Description',
'PasswordNeverExpires', 'PasswordNotRequired', 'PasswordExpired', 'UserPrincipalName', 'SamAccountName', 'CannotChangePassword',
'TrustedForDelegation', 'TrustedToAuthForDelegation', 'msExchMailboxGuid', 'msExchRemoteRecipientType', 'msExchRecipientTypeDetails',
'msExchRecipientDisplayType', 'pwdLastSet', "msDS-UserPasswordExpiryTimeComputed",
'WhenCreated', 'WhenChanged'
'nTSecurityDescriptor',
'Country', 'Title', 'Department'
'msds-resultantpso'
)
try {
$AllUsers[$Domain] = Get-ADUser -Filter "*" -Properties $Properties -Server $QueryServer #$ForestInformation['QueryServers'][$Domain].HostName[0]
} catch {
$ErrorCount++
Write-Warning -Message "Get-WinADUsers - Failed to get users from $Domain using $($QueryServer). Error: $($_.Exception.Message)"
}
try {
$AllContacts[$Domain] = Get-ADObject -Filter 'objectClass -eq "contact"' -Properties SamAccountName, Mail, Name, DistinguishedName, WhenChanged, Whencreated, DisplayName -Server $QueryServer
} catch {
$ErrorCount++
Write-Warning -Message "Get-WinADUsers - Failed to get contacts from $Domain using $($QueryServer). Error: $($_.Exception.Message)"
}
$Properties = @(
'SamAccountName', 'CanonicalName', 'Mail', 'Name', 'DistinguishedName', 'isCriticalSystemObject', 'ObjectSID'
)
try {
$AllGroups[$Domain] = Get-ADGroup -Filter "*" -Properties $Properties -Server $QueryServer
} catch {
$ErrorCount++
Write-Warning -Message "Get-WinADUsers - Failed to get groups from $Domain using $($QueryServer). Error: $($_.Exception.Message)"
}
}
if ($ErrorCount -gt 0) {
Write-Warning -Message "Get-WinADUsers - Failed to get data from domains. Found $ErrorCount errors. Please check the error messages above."
return
}
foreach ($Domain in $AllUsers.Keys) {
foreach ($U in $AllUsers[$Domain]) {
$CacheUsersReport[$U.DistinguishedName] = $U
}
}
foreach ($Domain in $AllContacts.Keys) {
foreach ($C in $AllContacts[$Domain]) {
$CacheUsersReport[$C.DistinguishedName] = $C
}
}
foreach ($Domain in $AllGroups.Keys) {
foreach ($G in $AllGroups[$Domain]) {
$CacheUsersReport[$G.DistinguishedName] = $G
}
}
$PasswordPolicies = Get-WinADPasswordPolicy -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ReturnHashtable
$Output = [ordered] @{}
foreach ($Domain in $ForestInformation.Domains) {
$Output[$Domain] = foreach ($User in $AllUsers[$Domain]) {
$UserLocation = ($User.DistinguishedName -split ',').Replace('OU=', '').Replace('CN=', '').Replace('DC=', '')
$Region = $UserLocation[-4]
$Country = $UserLocation[-5]
if ($User.LastLogonDate) {
$LastLogonDays = $( - $($User.LastLogonDate - $Today).Days)
} else {
$LastLogonDays = $null
}
if ($User.PasswordLastSet) {
$PasswordLastDays = $( - $($User.PasswordLastSet - $Today).Days)
} else {
$PasswordLastDays = $null
}
if ($User.Manager) {
$Manager = $CacheUsersReport[$User.Manager].Name
$ManagerSamAccountName = $CacheUsersReport[$User.Manager].SamAccountName
$ManagerEmail = $CacheUsersReport[$User.Manager].Mail
$ManagerEnabled = $CacheUsersReport[$User.Manager].Enabled
$ManagerLastLogon = $CacheUsersReport[$User.Manager].LastLogonDate
if ($ManagerLastLogon) {
$ManagerLastLogonDays = $( - $($ManagerLastLogon - $Today).Days)
} else {
$ManagerLastLogonDays = $null
}
$ManagerStatus = if ($ManagerEnabled -eq $true) {
'Enabled'
} elseif ($ManagerEnabled -eq $false) {
'Disabled'
} else {
'Not available'
}
} else {
if ($User.ObjectClass -eq 'user') {
$ManagerStatus = 'Missing'
} else {
$ManagerStatus = 'Not available'
}
$Manager = $null
$ManagerSamAccountName = $null
$ManagerEmail = $null
$ManagerEnabled = $null
$ManagerLastLogon = $null
$ManagerLastLogonDays = $null
}
if ($User."msDS-UserPasswordExpiryTimeComputed" -ne 9223372036854775807) {
# This is standard situation where users password is expiring as needed
try {
$DateExpiry = ([datetime]::FromFileTime($User."msDS-UserPasswordExpiryTimeComputed"))
} catch {
$DateExpiry = $User."msDS-UserPasswordExpiryTimeComputed"
}
try {
$DaysToExpire = (New-TimeSpan -Start (Get-Date) -End ([datetime]::FromFileTime($User."msDS-UserPasswordExpiryTimeComputed"))).Days
} catch {
$DaysToExpire = $null
}
$PasswordNeverExpires = $User.PasswordNeverExpires
} else {
# This is non-standard situation. This basically means most likely Fine Grained Group Policy is in action where it makes PasswordNeverExpires $true
# Since FGP policies are a bit special they do not tick the PasswordNeverExpires box, but at the same time value for "msDS-UserPasswordExpiryTimeComputed" is set to 9223372036854775807
$PasswordNeverExpires = $true
}
if ($PasswordNeverExpires -or $null -eq $User.PasswordLastSet) {
$DateExpiry = $null
$DaysToExpire = $null
}
if ($User.'msExchMailboxGuid') {
$HasMailbox = $true
} else {
$HasMailbox = $false
}
$msExchRecipientTypeDetails = Convert-ExchangeRecipient -msExchRecipientTypeDetails $User.msExchRecipientTypeDetails
$msExchRecipientDisplayType = Convert-ExchangeRecipient -msExchRecipientDisplayType $User.msExchRecipientDisplayType
$msExchRemoteRecipientType = Convert-ExchangeRecipient -msExchRemoteRecipientType $User.msExchRemoteRecipientType
if ($User.'msds-resultantpso') {
# $PasswordPolicy = 'FineGrained'
if ($PasswordPolicies[$User.'msds-resultantpso']) {
$PasswordPolicyName = $PasswordPolicies[$User.'msds-resultantpso'].Name
$PasswordPolicyLength = $PasswordPolicies[$User.'msds-resultantpso'].MinPasswordLength
} else {
$PasswordPolicyName = ConvertFrom-DistinguishedName -DistinguishedName $User.'msds-resultantpso'
$PasswordPolicyLength = 'No permission'
}
} else {
# $PasswordPolicy = 'Default'
$PasswordPolicyName = 'Default Password Policy'
$PasswordPolicyLength = $PasswordPolicies[$Domain].MinPasswordLength
}
if ($AddOwner) {
$Owner = Get-ADACLOwner -ADObject $User -Verbose -Resolve
[PSCustomObject] @{
Name = $User.Name
SamAccountName = $User.SamAccountName
Domain = $Domain
WhenChanged = $User.WhenChanged
Enabled = $User.Enabled
ObjectClass = $User.ObjectClass
#IsMissing = if ($Group) { $false } else { $true }
HasMailbox = $HasMailbox
MustChangePasswordAtLogon = if ($User.pwdLastSet -eq 0 -and $User.PasswordExpired -eq $true) {
$true
} else {
$false
}
#PasswordPolicy = $PasswordPolicy
PasswordPolicyName = $PasswordPolicyName
PasswordPolicyMinLength = $PasswordPolicyLength
PasswordNeverExpires = $PasswordNeverExpires
PasswordNotRequired = $User.PasswordNotRequired
LastLogonDays = $LastLogonDays
PasswordLastDays = $PasswordLastDays
DaysToExpire = $DaysToExpire
ManagerStatus = $ManagerStatus
Manager = $Manager
ManagerSamAccountName = $ManagerSamAccountName
ManagerEmail = $ManagerEmail
ManagerLastLogonDays = $ManagerLastLogonDays
OwnerName = $Owner.OwnerName
OwnerSID = $Owner.OwnerSID
OwnerType = $Owner.OwnerType
Level0 = $Region
Level1 = $Country
Title = $User.'Title'
Department = $User.'Department'
Country = Convert-CountryCodeToCountry -CountryCode $User.Country
DistinguishedName = $User.DistinguishedName
LastLogonDate = $User.LastLogonDate
PasswordLastSet = $User.PasswordLastSet
PasswordExpiresOn = $DateExpiry
PasswordExpired = $User.PasswordExpired
CannotChangePassword = $User.CannotChangePassword
TrustedForDelegation = $User.TrustedForDelegation
ManagerDN = $User.Manager
ManagerLastLogon = $ManagerLastLogon
Group = $Group
Description = $User.Description
UserPrincipalName = $User.UserPrincipalName
RecipientTypeDetails = $msExchRecipientTypeDetails
RecipientDisplayType = $msExchRecipientDisplayType
RemoteRecipientType = $msExchRemoteRecipientType
WhenCreated = $User.WhenCreated
}
} else {
[PSCustomObject] @{
Name = $User.Name
SamAccountName = $User.SamAccountName
Domain = $Domain
WhenChanged = $User.WhenChanged
Enabled = $User.Enabled
ObjectClass = $User.ObjectClass
#IsMissing = if ($Group) { $false } else { $true }
HasMailbox = $HasMailbox
MustChangePasswordAtLogon = if ($User.pwdLastSet -eq 0 -and $User.PasswordExpired -eq $true) {
$true
} else {
$false
}
#PasswordPolicy = $PasswordPolicy
PasswordPolicyName = $PasswordPolicyName
PasswordPolicyMinLength = $PasswordPolicyLength
PasswordNeverExpires = $PasswordNeverExpires
PasswordNotRequired = $User.PasswordNotRequired
LastLogonDays = $LastLogonDays
PasswordLastDays = $PasswordLastDays
DaysToExpire = $DaysToExpire
ManagerStatus = $ManagerStatus
Manager = $Manager
ManagerSamAccountName = $ManagerSamAccountName
ManagerEmail = $ManagerEmail
ManagerLastLogonDays = $ManagerLastLogonDays
Level0 = $Region
Level1 = $Country
Title = $User.'Title'
Department = $User.'Department'
Country = Convert-CountryCodeToCountry -CountryCode $User.Country
DistinguishedName = $User.DistinguishedName
LastLogonDate = $User.LastLogonDate
PasswordLastSet = $User.PasswordLastSet
PasswordExpiresOn = $DateExpiry
PasswordExpired = $User.PasswordExpired
CannotChangePassword = $User.CannotChangePassword
TrustedForDelegation = $User.TrustedForDelegation
ManagerDN = $User.Manager
ManagerLastLogon = $ManagerLastLogon
Group = $Group
Description = $User.Description
UserPrincipalName = $User.UserPrincipalName
RecipientTypeDetails = $msExchRecipientTypeDetails
RecipientDisplayType = $msExchRecipientDisplayType
RemoteRecipientType = $msExchRemoteRecipientType
WhenCreated = $User.WhenCreated
}
}
}
}
if ($PerDomain) {
$Output
} else {
$Output.Values
}
}
function Get-WinADUsersForeignSecurityPrincipalList {
<#
.SYNOPSIS
Retrieves a list of foreign security principals from the specified Active Directory forest or domains.
.DESCRIPTION
This cmdlet retrieves a list of foreign security principals from the specified Active Directory forest or domains. It supports the option to include or exclude specific domains and translates the security identifiers to NTAccount format for easier identification.
.PARAMETER Forest
Specifies the name of the Active Directory forest to retrieve foreign security principals from. If not specified, the current forest is used.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the retrieval process. If not specified, all domains in the forest are included.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the retrieval process.
.PARAMETER ExtendedForestInformation
Specifies additional information about the forest to aid in the retrieval process.
.EXAMPLE
Get-WinADUsersForeignSecurityPrincipalList -Forest "example.com" -IncludeDomains "example.com", "subdomain.example.com"
This example retrieves the list of foreign security principals from the "example.com" and "subdomain.example.com" domains in the "example.com" forest.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported.
#>
[CmdletBinding()]
[alias('Get-WinADUsersFP')]
param(
[alias('ForestName')][string] $Forest,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[string[]] $ExcludeDomains,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
foreach ($Domain in $ForestInformation.Domains) {
$QueryServer = $ForestInformation['QueryServers']["$Domain"].HostName[0]
$ForeignSecurityPrincipalList = Get-ADObject -Filter "ObjectClass -eq 'ForeignSecurityPrincipal'" -Properties * -Server $QueryServer
foreach ($FSP in $ForeignSecurityPrincipalList) {
Try {
$Translated = (([System.Security.Principal.SecurityIdentifier]::new($FSP.objectSid)).Translate([System.Security.Principal.NTAccount])).Value
} Catch {
$Translated = $null
}
Add-Member -InputObject $FSP -Name 'TranslatedName' -Value $Translated -MemberType NoteProperty -Force
}
$ForeignSecurityPrincipalList
}
}
function Get-WinADWellKnownFolders {
<#
.SYNOPSIS
Retrieves well-known folders for each domain in a forest.
.DESCRIPTION
This cmdlet retrieves the well-known folders for each domain in a specified forest. It supports the option to include or exclude specific domains and returns the results as a custom object or a hashtable.
.PARAMETER Forest
Specifies the name of the forest to retrieve well-known folders from.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the retrieval process. If not specified, all domains in the forest will be included.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the retrieval process.
.PARAMETER ExtendedForestInformation
Specifies additional information about the forest to aid in the retrieval process.
.PARAMETER AsCustomObject
If specified, the cmdlet returns the results as a custom object. Otherwise, it returns a hashtable.
.EXAMPLE
Get-WinADWellKnownFolders -Forest "example.com" -IncludeDomains "example.com", "subdomain.example.com"
This example retrieves the well-known folders for the "example.com" and "subdomain.example.com" domains in the "example.com" forest.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported.
#>
[cmdletBinding()]
param(
[string] $Forest,
[alias('Domain')][string[]] $IncludeDomains,
[string[]] $ExcludeDomains,
[System.Collections.IDictionary] $ExtendedForestInformation,
[switch] $AsCustomObject
)
$ForestInformation = Get-WinADForestDetails -Extended -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
foreach ($Domain in $ForestInformation.Domains) {
$DomainInformation = Get-ADDomain -Server $Domain
$WellKnownFolders = $DomainInformation | Select-Object -Property UsersContainer, ComputersContainer, DomainControllersContainer, DeletedObjectsContainer, SystemsContainer, LostAndFoundContainer, QuotasContainer, ForeignSecurityPrincipalsContainer
$CurrentWellKnownFolders = [ordered] @{ }
foreach ($_ in $WellKnownFolders.PSObject.Properties.Name) {
$CurrentWellKnownFolders[$_] = $DomainInformation.$_
}
<#
$DomainDistinguishedName = $DomainInformation.DistinguishedName
$DefaultWellKnownFolders = [ordered] @{
UsersContainer = "CN=Users,$DomainDistinguishedName"
ComputersContainer = "CN=Computers,$DomainDistinguishedName"
DomainControllersContainer = "OU=Domain Controllers,$DomainDistinguishedName"
DeletedObjectsContainer = "CN=Deleted Objects,$DomainDistinguishedName"
SystemsContainer = "CN=System,$DomainDistinguishedName"
LostAndFoundContainer = "CN=LostAndFound,$DomainDistinguishedName"
QuotasContainer = "CN=NTDS Quotas,$DomainDistinguishedName"
ForeignSecurityPrincipalsContainer = "CN=ForeignSecurityPrincipals,$DomainDistinguishedName"
}
#>
#Compare-MultipleObjects -Object @($DefaultWellKnownFolders, $CurrentWellKnownFolders) -SkipProperties
if ($AsHashtable) {
$CurrentWellKnownFolders
} else {
[PSCustomObject] $CurrentWellKnownFolders
}
}
}
#Get-WinADWellKnownFolders -IncludeDomains 'ad.evotec.xyz'
function Invoke-ADEssentials {
<#
.SYNOPSIS
This command invokes ADEssentials to perform essential Active Directory operations and generates reports.
.DESCRIPTION
This command runs ADEssentials to perform essential Active Directory operations and generates reports. It supports the option to include specific domains for the operations.
.PARAMETER FilePath
Specifies the path to the folder where the generated reports will be saved.
.PARAMETER Type
Specifies the type of operations to perform. If not specified, all supported types will be performed.
.PARAMETER PassThru
If specified, the command returns the generated reports.
.PARAMETER HideHTML
If specified, the HTML report will not be displayed.
.PARAMETER HideSteps
If specified, the steps of the operations will not be displayed.
.PARAMETER ShowError
If specified, any errors during the operations will be displayed.
.PARAMETER ShowWarning
If specified, any warnings during the operations will be displayed.
.PARAMETER Forest
Specifies the name of the forest to perform the operations. If not specified, the current forest will be used.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the operations.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the operations. If not specified, all domains will be included.
.PARAMETER Online
If specified, the command will perform the operations online.
.PARAMETER SplitReports
If specified, the command will generate separate reports for each type of operation.
.EXAMPLE
Invoke-ADEssentials -FilePath "C:\Reports" -Type "UserManagement" -PassThru -HideHTML -HideSteps -ShowError -ShowWarning -Forest "example.com" -ExcludeDomains "subdomain.example.com" -IncludeDomains "example.com" -Online -SplitReports
This example runs ADEssentials to perform user management operations on the "example.com" domain and generates separate reports for each operation type. The reports are saved to "C:\Reports" and the HTML report is not displayed.
.NOTES
This cmdlet requires the ADEssentials PowerShell module to be installed and imported.
#>
[cmdletBinding()]
param(
[string] $FilePath,
[Parameter(Position = 0)][string[]] $Type,
[switch] $PassThru,
[switch] $HideHTML,
[switch] $HideSteps,
[switch] $ShowError,
[switch] $ShowWarning,
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[switch] $Online,
[switch] $SplitReports
)
Reset-ADEssentialsStatus
#$Script:AllUsers = [ordered] @{}
$Script:Cache = [ordered] @{}
$Script:Reporting = [ordered] @{}
$Script:Reporting['Version'] = Get-GitHubVersion -Cmdlet 'Invoke-ADEssentials' -RepositoryOwner 'evotecit' -RepositoryName 'ADEssentials'
$Script:Reporting['Settings'] = @{
ShowError = $ShowError.IsPresent
ShowWarning = $ShowWarning.IsPresent
HideSteps = $HideSteps.IsPresent
}
Write-Color '[i]', "[ADEssentials] ", 'Version', ' [Informative] ', $Script:Reporting['Version'] -Color Yellow, DarkGray, Yellow, DarkGray, Magenta
# Verify requested types are supported
$Supported = [System.Collections.Generic.List[string]]::new()
[Array] $NotSupported = foreach ($T in $Type) {
if ($T -notin $Script:ADEssentialsConfiguration.Keys ) {
$T
} else {
$Supported.Add($T)
}
}
if ($Supported) {
Write-Color '[i]', "[ADEssentials] ", 'Supported types', ' [Informative] ', "Chosen by user: ", ($Supported -join ', ') -Color Yellow, DarkGray, Yellow, DarkGray, Yellow, Magenta
}
if ($NotSupported) {
Write-Color '[i]', "[ADEssentials] ", 'Not supported types', ' [Informative] ', "Following types are not supported: ", ($NotSupported -join ', ') -Color Yellow, DarkGray, Yellow, DarkGray, Yellow, Magenta
Write-Color '[i]', "[ADEssentials] ", 'Not supported types', ' [Informative] ', "Please use one/multiple from the list: ", ($Script:ADEssentialsConfiguration.Keys -join ', ') -Color Yellow, DarkGray, Yellow, DarkGray, Yellow, Magenta
return
}
$DisplayForest = if ($Forest) {
$Forest
} else {
'Not defined. Using current one'
}
$DisplayIncludedDomains = if ($IncludeDomains) {
$IncludeDomains -join ","
} else {
'Not defined. Using all domains of forest'
}
$DisplayExcludedDomains = if ($ExcludeDomains) {
$ExcludeDomains -join ','
} else {
'No exclusions provided'
}
Write-Color '[i]', "[ADEssentials] ", 'Domain Information', ' [Informative] ', "Forest: ", $DisplayForest -Color Yellow, DarkGray, Yellow, DarkGray, Yellow, Magenta
Write-Color '[i]', "[ADEssentials] ", 'Domain Information', ' [Informative] ', "Included Domains: ", $DisplayIncludedDomains -Color Yellow, DarkGray, Yellow, DarkGray, Yellow, Magenta
Write-Color '[i]', "[ADEssentials] ", 'Domain Information', ' [Informative] ', "Excluded Domains: ", $DisplayExcludedDomains -Color Yellow, DarkGray, Yellow, DarkGray, Yellow, Magenta
# Lets make sure we only enable those types which are requestd by user
if ($Type) {
foreach ($T in $Script:ADEssentialsConfiguration.Keys) {
$Script:ADEssentialsConfiguration[$T].Enabled = $false
}
# Lets enable all requested ones
foreach ($T in $Type) {
$Script:ADEssentialsConfiguration[$T].Enabled = $true
}
}
# Build data
foreach ($T in $Script:ADEssentialsConfiguration.Keys) {
if ($Script:ADEssentialsConfiguration[$T].Enabled -eq $true) {
$Script:Reporting[$T] = [ordered] @{
Name = $Script:ADEssentialsConfiguration[$T].Name
ActionRequired = $null
Data = $null
Exclusions = $null
WarningsAndErrors = $null
Time = $null
Summary = $null
Variables = Copy-Dictionary -Dictionary $Script:ADEssentialsConfiguration[$T]['Variables']
}
if ($Exclusions) {
if ($Exclusions -is [scriptblock]) {
$Script:Reporting[$T]['ExclusionsCode'] = $Exclusions
}
if ($Exclusions -is [Array]) {
$Script:Reporting[$T]['Exclusions'] = $Exclusions
}
}
$TimeLogADEssentials = Start-TimeLog
Write-Color -Text '[i]', '[Start] ', $($Script:ADEssentialsConfiguration[$T]['Name']) -Color Yellow, DarkGray, Yellow
$OutputCommand = Invoke-Command -ScriptBlock $Script:ADEssentialsConfiguration[$T]['Execute'] -WarningVariable CommandWarnings -ErrorVariable CommandErrors -ArgumentList $Forest, $ExcludeDomains, $IncludeDomains
if ($OutputCommand -is [System.Collections.IDictionary]) {
# in some cases the return will be wrapped in Hashtable/orderedDictionary and we need to handle this without an array
$Script:Reporting[$T]['Data'] = $OutputCommand
} else {
# since sometimes it can be 0 or 1 objects being returned we force it being an array
$Script:Reporting[$T]['Data'] = [Array] $OutputCommand
}
Invoke-Command -ScriptBlock $Script:ADEssentialsConfiguration[$T]['Processing']
$Script:Reporting[$T]['WarningsAndErrors'] = @(
if ($ShowWarning) {
foreach ($War in $CommandWarnings) {
[PSCustomObject] @{
Type = 'Warning'
Comment = $War
Reason = ''
TargetName = ''
}
}
}
if ($ShowError) {
foreach ($Err in $CommandErrors) {
[PSCustomObject] @{
Type = 'Error'
Comment = $Err
Reason = $Err.CategoryInfo.Reason
TargetName = $Err.CategoryInfo.TargetName
}
}
}
)
$TimeEndADEssentials = Stop-TimeLog -Time $TimeLogADEssentials -Option OneLiner
$Script:Reporting[$T]['Time'] = $TimeEndADEssentials
Write-Color -Text '[i]', '[End ] ', $($Script:ADEssentialsConfiguration[$T]['Name']), " [Time to execute: $TimeEndADEssentials]" -Color Yellow, DarkGray, Yellow, DarkGray
if ($SplitReports) {
Write-Color -Text '[i]', '[HTML ] ', 'Generating HTML report for ', $T -Color Yellow, DarkGray, Yellow
$TimeLogHTML = Start-TimeLog
New-HTMLReportADEssentialsWithSplit -FilePath $FilePath -Online:$Online -HideHTML:$HideHTML -CurrentReport $T
$TimeLogEndHTML = Stop-TimeLog -Time $TimeLogHTML -Option OneLiner
Write-Color -Text '[i]', '[HTML ] ', 'Generating HTML report for', $T, " [Time to execute: $TimeLogEndHTML]" -Color Yellow, DarkGray, Yellow, DarkGray
}
}
}
if ( -not $SplitReports) {
Write-Color -Text '[i]', '[HTML ] ', 'Generating HTML report' -Color Yellow, DarkGray, Yellow
$TimeLogHTML = Start-TimeLog
if (-not $FilePath) {
$FilePath = Get-FileName -Extension 'html' -Temporary
}
New-HTMLReportADEssentials -Type $Type -Online:$Online.IsPresent -HideHTML:$HideHTML.IsPresent -FilePath $FilePath
$TimeLogEndHTML = Stop-TimeLog -Time $TimeLogHTML -Option OneLiner
Write-Color -Text '[i]', '[HTML ] ', 'Generating HTML report', " [Time to execute: $TimeLogEndHTML]" -Color Yellow, DarkGray, Yellow, DarkGray
}
Reset-ADEssentialsStatus
if ($PassThru) {
$Script:Reporting
}
}
[scriptblock] $SourcesAutoCompleter = {
param($commandName, $parameterName, $wordToComplete, $commandAst, $fakeBoundParameters)
$Script:ADEssentialsConfiguration.Keys | Sort-Object | Where-Object { $_ -like "*$wordToComplete*" }
}
Register-ArgumentCompleter -CommandName Invoke-ADEssentials -ParameterName Type -ScriptBlock $SourcesAutoCompleter
function Invoke-PingCastle {
<#
.SYNOPSIS
Executes PingCastle to perform a health check on specified domains and saves the reports.
.DESCRIPTION
This cmdlet runs PingCastle to perform a health check on the specified domains and saves the generated reports to a specified location. It supports the option to include specific domains for the health check.
.PARAMETER FolderPath
Specifies the path to the folder containing the PingCastle executable.
.PARAMETER ReportPath
Specifies the path where the generated reports will be saved.
.PARAMETER IncludeDomain
Specifies an array of domain names to include in the health check. If not specified, all domains will be checked.
.EXAMPLE
Invoke-PingCastle -FolderPath "C:\PingCastle" -ReportPath "C:\Reports" -IncludeDomain "example.local", "subdomain.example.local"
This example runs PingCastle to perform a health check on the "example.local" and "subdomain.example.local" domains and saves the reports to "C:\Reports".
#>
[CmdletBinding()]
param(
[Parameter(Mandatory)][string] $FolderPath,
[Parameter(Mandatory)][string] $ReportPath,
[string[]] $IncludeDomain
)
$PingCastleExecutable = [io.path]::Combine($FolderPath, 'PingCastle.exe')
if ($FolderPath -and (Test-Path -LiteralPath $FolderPath) -and (Test-Path -LiteralPath $PingCastleExecutable)) {
} else {
Write-Warning -Message "Invoke-PingCastle - FolderPath [$FolderPath] doesn't exist. Please provide path with PingCastle.exe"
return
}
if ($ReportPath -and (Test-Path -LiteralPath $ReportPath)) {
} else {
Write-Warning -Message "Invoke-PingCastle - ReportPath [$ReportPath] doesn't exist. Please provide path with PingCastle report"
return
}
$TemporaryReportFolder = [io.path]::Combine($Env:TEMP, 'PingCastle')
if (-not (Test-Path -LiteralPath $TemporaryReportFolder)) {
$null = New-Item -Path $TemporaryReportFolder -ItemType Directory -Force
}
if (Test-Path -LiteralPath $TemporaryReportFolder) {
$Items = Get-ChildItem -LiteralPath $TemporaryReportFolder -Recurse
foreach ($Item in $Items) {
Remove-Item -LiteralPath $Item.FullName -Force
}
}
try {
Set-Location -LiteralPath $TemporaryReportFolder -ErrorAction Stop
} catch {
Write-Warning -Message "Invoke-PingCastle - Error while switch to $TemporaryReportFolder. Error: $($_.Exception.Message)"
return
}
if ($IncludeDomain) {
foreach ($Domain in $IncludeDomain) {
& $PingCastleExecutable --healthcheck --server $Domain --reachable
}
} else {
& $PingCastleExecutable --healthcheck --server * --reachable
}
$AllFiles = Get-ChildItem -LiteralPath $TemporaryReportFolder
foreach ($File in $AllFiles) {
$DomainName = $File.BaseName.Replace("ad_hc_", '')
$Name = "PingCastle-Domain-$($DomainName)_$(Get-Date -f yyyy-MM-dd_HHmmss -Date $File.CreationTime)$($File.Extension)"
$DestinationPath = [io.path]::Combine($ReportPath, $Name)
try {
Move-Item -LiteralPath $File.FullName -Destination $DestinationPath -Force -ErrorAction Stop
[PSCustomObject] @{
DomainName = $DomainName
FilePath = $DestinationPath
Error = $null
}
} catch {
Write-Warning -Message "Invoke-PingCastle - Error while moving file $File to $DestinationPath. Error: $($_.Exception.Message)"
[PSCustomObject] @{
DomainName = $DomainName
FilePath = $DestinationPath
Error = $_.Exception.Message
}
}
}
}
function New-ADACLObject {
<#
.SYNOPSIS
Define ACL permissions to be applied during Set-ADACLObject and in DelegationModel PowerShell Module
.DESCRIPTION
Define ACL permissions to be applied during Set-ADACLObject and in DelegationModel PowerShell Module
.PARAMETER Principal
Principal to apply permissions to
.PARAMETER SimplifiedDelegation
An experimental parameter that allows to choose predefined set of permissions instead of defining multiple rules to cover a single instance.
.PARAMETER AccessRule
Access rule to apply. Choices are:
- AccessSystemSecurity - 16777216 - The right to get or set the SACL in the object security descriptor.
- CreateChild - 1 - The right to create children of the object.
- Delete - 65536 - The right to delete the object.
- DeleteChild - 2 - The right to delete children of the object.
- DeleteTree - 64 - The right to delete all children of this object, regardless of the permissions of the children.
- ExtendedRight - 256 A customized control access right. For a list of possible extended rights, see the Extended Rights article. For more information about extended rights, see the Control Access Rights article.
- GenericAll - 983551 The right to create or delete children, delete a subtree, read and write properties, examine children and the object itself, add and remove the object from the directory, and read or write with an extended right.
- GenericExecute - 131076 The right to read permissions on, and list the contents of, a container object.
- GenericRead - 131220 The right to read permissions on this object, read all the properties on this object, list this object name when the parent container is listed, and list the contents of this object if it is a container.
- GenericWrite - 131112 The right to read permissions on this object, write all the properties on this object, and perform all validated writes to this object.
- ListChildren - 4 The right to list children of this object. For more information about this right, see the Controlling Object Visibility article.
- ListObject -128 - The right to list a particular object. For more information about this right, see the Controlling Object Visibility article.
- ReadControl - 131072 - The right to read data from the security descriptor of the object, not including the data in the SACL.
- ReadProperty - 16 - The right to read properties of the object.
- Self -8 - The right to perform an operation that is controlled by a validated write access right.
- Synchronize -1048576 - The right to use the object for synchronization. This right enables a thread to wait until that object is in the signaled state.
- WriteDacl - 262144 - The right to modify the DACL in the object security descriptor.
- WriteOwner - 524288 - The right to assume ownership of the object. The user must be an object trustee. The user cannot transfer the ownership to other users.
- WriteProperty -32 - The right to write properties of the object
.PARAMETER AccessControlType
Access control type to apply. Choices are:
- Allow - 0 - The access control entry (ACE) allows the specified access.
- Deny - 1 - The ACE denies the specified access.
.PARAMETER ObjectType
A list of schema properties to choose from.
.PARAMETER InheritedObjectType
A list of schema properties to choose from.
.PARAMETER InheritanceType
Inheritance type to apply. Choices are:
- All - 3 - The ACE applies to the object and all its children.
- Descendents - 2 - The ACE applies to the object and its immediate children.
- SelfAndChildren - 1 - The ACE applies to the object and its immediate children.
- None - 0 - The ACE applies only to the object.
.PARAMETER OneLiner
Return permissions as one liner. If used with Simplified Delegation multiple objects could be retured.
.PARAMETER Force
Forces refresh of the cache for user/groups. It's useful to run as a first query, especially if one created groups just before running the function
.EXAMPLE
New-ADACLObject -Principal 'przemyslaw.klys' -AccessControlType Allow -ObjectType All -InheritedObjectTypeName 'All' -AccessRule GenericAll -InheritanceType None
.NOTES
General notes
#>
[cmdletBinding(DefaultParameterSetName = 'Standard')]
param(
[parameter(Mandatory, ParameterSetName = 'Simplified')]
[parameter(Mandatory, ParameterSetName = 'Standard')][string] $Principal,
[parameter(Mandatory, ParameterSetName = 'Simplified')]
[string] $SimplifiedDelegation,
[parameter(Mandatory, ParameterSetName = 'Standard')][alias('ActiveDirectoryRights')][System.DirectoryServices.ActiveDirectoryRights] $AccessRule,
[parameter(Mandatory, ParameterSetName = 'Simplified')]
[parameter(Mandatory, ParameterSetName = 'Standard')][System.Security.AccessControl.AccessControlType] $AccessControlType,
[parameter(Mandatory, ParameterSetName = 'Standard')][alias('ObjectTypeName')][string] $ObjectType,
[parameter(Mandatory, ParameterSetName = 'Standard')][alias('InheritedObjectTypeName')][string] $InheritedObjectType,
[parameter(Mandatory, ParameterSetName = 'Simplified')]
[parameter(Mandatory, ParameterSetName = 'Standard')][alias('ActiveDirectorySecurityInheritance')][nullable[System.DirectoryServices.ActiveDirectorySecurityInheritance]] $InheritanceType,
[parameter(ParameterSetName = 'Simplified')]
[parameter(ParameterSetName = 'Standard')][switch] $OneLiner,
[parameter(ParameterSetName = 'Simplified')]
[parameter(ParameterSetName = 'Standard')][switch] $Force
)
$ConvertedIdentity = Convert-Identity -Identity $Principal -Verbose:$false -Force:$Force.IsPresent
if ($ConvertedIdentity.Error) {
Write-Warning -Message "New-ADACLObject - Converting identity $($Principal) failed with $($ConvertedIdentity.Error). Be warned."
}
$ConvertedPrincipal = ($ConvertedIdentity).Name
if ($SimplifiedDelegation) {
ConvertFrom-SimplifiedDelegation -Principal $ConvertedPrincipal -SimplifiedDelegation $SimplifiedDelegation -OneLiner:$OneLiner.IsPresent -AccessControlType $AccessControlType -InheritanceType $InheritanceType
} else {
ConvertTo-Delegation -AccessControlType $AccessControlType -InheritanceType $InheritanceType -Principal $ConvertedPrincipal -AccessRule $AccessRule -ObjectType $ObjectType -InheritedObjectType $InheritedObjectType -OneLiner:$OneLiner.IsPresent
}
}
[scriptblock] $ADACLObjectAutoCompleter = {
param($commandName, $parameterName, $wordToComplete, $commandAst, $fakeBoundParameters)
if (-not $Script:ADSchemaGuids) {
Import-Module ActiveDirectory -Verbose:$false
$Script:ADSchemaGuids = Convert-ADSchemaToGuid
}
$Script:ADSchemaGuids.Keys | Sort-Object | Where-Object { $_ -like "*$wordToComplete*" }
}
Register-ArgumentCompleter -CommandName New-ADACLObject -ParameterName ObjectType -ScriptBlock $ADACLObjectAutoCompleter
Register-ArgumentCompleter -CommandName New-ADACLObject -ParameterName InheritedObjectType -ScriptBlock $ADACLObjectAutoCompleter
[scriptblock] $ADACLSimplifiedDelegationDefinition = {
param($commandName, $parameterName, $wordToComplete, $commandAst, $fakeBoundParameters)
$Script:SimplifiedDelegationDefinitionList | Sort-Object | Where-Object { $_ -like "*$wordToComplete*" }
}
Register-ArgumentCompleter -CommandName New-ADACLObject -ParameterName SimplifiedDelegation -ScriptBlock $ADACLSimplifiedDelegationDefinition
function New-ADSite {
<#
.SYNOPSIS
Creates a new Active Directory site and configures its properties.
.DESCRIPTION
This cmdlet creates a new Active Directory site with the specified name and description. It also allows for the configuration of subnets, site links, and default sites. The cmdlet supports the use of credentials for authentication.
.PARAMETER Site
Specifies the name of the new Active Directory site to create.
.PARAMETER Description
Specifies the description of the new Active Directory site.
.PARAMETER SitePartner
Specifies the name of the partner site for the new site link.
.PARAMETER DefaultSite
Specifies the default site to which the new site will be added.
.PARAMETER Subnets
Specifies an array of subnet addresses to be associated with the new site.
.PARAMETER Credential
Specifies the credentials to use for authentication.
.EXAMPLE
New-ADSite -Site "NewSite" -Description "Description of the new site" -SitePartner "PartnerSite" -DefaultSite "DefaultSite" -Subnets @("10.0.0.0/8", "192.168.0.0/16") -Credential (Get-Credential)
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported.
#>
[CmdletBinding(SupportsShouldProcess = $true)]
param(
[Parameter(Mandatory = $true)][string]$Site,
[Parameter(Mandatory = $true)][string]$Description,
[Parameter(Mandatory = $true)][ValidateScript( { Get-ADReplicationSite -Identity $_ })][string]$SitePartner,
[Parameter(Mandatory = $true)][array]$DefaultSite,
[Parameter(Mandatory = $false)][array]$Subnets,
[Parameter(Mandatory = $false)][System.Management.Automation.PSCredential]$Credential
)
begin {
$InformationPreference = "Continue"
[string]$sServer = (Get-ADDomainController -Writable -Discover).HostName
$Site = $Site.ToUpper()
$SitePartner = $SitePartner.ToUpper()
$sSiteLink = "$($Site)-$($SitePartner)"
$sSiteLinkDescr = "$($SitePartner)-$($Site)"
$aSiteLinkSites = @($Site, $SitePartner)
}
process {
#region Create site
try {
$hParams = @{
Name = $Site
Description = $Description
Server = $sServer
}
if ($Credential) {
$hParams.Credential = $Credential
}
New-ADReplicationSite @hParams
Write-Verbose -Message "New-ADSite - Site $($Site) created"
} catch {
$ErrorMessage = $PSItem.Exception.Message
Write-Warning -Message "New-ADSite - Error: $ErrorMessage"
}
#endregion
#region Create/reconnect subnets
try {
if ($Subnets) {
foreach ($subnet in $Subnets) {
if (Get-ADReplicationSubnet -Filter "Name -eq '$subnet'") {
Write-Warning -Message "$($subnet) exists, will try reconnect to new site"
$hParams = @{
Identity = $subnet
Site = $Site
Description = $Description
Server = $sServer
}
if ($Credential) {
$hParams.Credential = $Credential
}
Set-ADReplicationSubnet @hParams
Write-Verbose -Message "New-ADSite - Subnet $($subnet) reconnected"
} else {
$hParams = @{
Name = $subnet
Site = $Site
Description = $Description
Server = $sServer
}
if ($Credential) {
$hParams.Credential = $Credential
}
New-ADReplicationSubnet @hParams
Write-Verbose -Message "New-ADSite - Subnet $($subnet) created"
}
}
}
} catch {
$ErrorMessage = $PSItem.Exception.Message
Write-Warning -Message "New-ADSite - Error: $ErrorMessage"
}
#endregion
#region Create sitelink
try {
$hParams = @{
Name = $sSiteLink
Description = $sSiteLinkDescr
ReplicationFrequencyInMinutes = 15
Cost = 10
SitesIncluded = $aSiteLinkSites
Server = $sServer
}
if ($Credential) {
$hParams.Credential = $Credential
}
New-ADReplicationSiteLink @hParams
Write-Verbose -Message "New-ADSite - $($sSiteLink) site link created"
} catch {
$ErrorMessage = $PSItem.Exception.Message
Write-Warning -Message "New-ADSite - Error: $ErrorMessage"
}
#endregion
#region Attach site to default sitelink
try {
$hParams = @{
Identity = $DefaultSite
SitesIncluded = @{ Add = $Site }
Server = $sServer
}
if ($Credential) {
$hParams.Credential = $Credential
}
Set-ADReplicationSiteLink @hParams
Write-Verbose -Message "New-ADSite - $($Site) added to $($DefaultSite)"
} catch {
$ErrorMessage = $PSItem.Exception.Message
Write-Warning -Message "New-ADSite - Error: $ErrorMessage"
}
#endregion
}
end {
}
}
function Remove-ADACL {
<#
.SYNOPSIS
Removes an Access Control List (ACL) entry from an Active Directory object or an NTSecurityDescriptor.
.DESCRIPTION
This cmdlet is designed to remove a specific ACL entry from an Active Directory object or an NTSecurityDescriptor. It allows for granular control over the removal process by specifying the object, ACL, principal, access rule, access control type, and inheritance settings. Additionally, it provides options to include or exclude specific object types and their inherited types.
.PARAMETER ADObject
Specifies the Active Directory object from which to remove the ACL entry. This can be a single object or an array of objects.
.PARAMETER ACL
Specifies the ACL from which to remove the entry. This parameter is mandatory when using the ACL or NTSecurityDescriptor parameter sets.
.PARAMETER Principal
Specifies the principal (user, group, or computer) for whom the ACL entry is being removed.
.PARAMETER AccessRule
Specifies the access rule to remove. This can be a specific right or a combination of rights.
.PARAMETER AccessControlType
Specifies the type of access control to apply. The default is Allow.
.PARAMETER IncludeObjectTypeName
Specifies the object types to include in the removal process.
.PARAMETER IncludeInheritedObjectTypeName
Specifies the inherited object types to include in the removal process.
.PARAMETER InheritanceType
Specifies the inheritance type for the ACL entry.
.PARAMETER Force
Forces the removal of inherited ACL entries. By default, inherited entries are skipped.
.EXAMPLE
Remove-ADACL -ADObject "CN=User1,DC=example,DC=com" -Principal "CN=User2,DC=example,DC=com" -AccessRule "ReadProperty, WriteProperty" -AccessControlType Allow
This example removes the ACL entry for User2 to read and write properties on User1's object in the example.com domain.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported.
#>
[cmdletBinding(SupportsShouldProcess, DefaultParameterSetName = 'ADObject')]
param(
[parameter(ParameterSetName = 'ADObject')][alias('Identity')][Array] $ADObject,
[parameter(ParameterSetName = 'NTSecurityDescriptor', Mandatory)]
[parameter(ParameterSetName = 'ACL', Mandatory)]
[Array] $ACL,
[parameter(ParameterSetName = 'ACL', Mandatory)]
[parameter(ParameterSetName = 'ADObject')]
[string] $Principal,
[parameter(ParameterSetName = 'ACL')]
[parameter(ParameterSetName = 'ADObject')]
[Alias('ActiveDirectoryRights')][System.DirectoryServices.ActiveDirectoryRights] $AccessRule,
[parameter(ParameterSetName = 'ACL')]
[parameter(ParameterSetName = 'ADObject')]
[System.Security.AccessControl.AccessControlType] $AccessControlType = [System.Security.AccessControl.AccessControlType]::Allow,
[parameter(ParameterSetName = 'ACL')]
[parameter(ParameterSetName = 'ADObject')]
[Alias('ObjectTypeName', 'ObjectType')][string[]] $IncludeObjectTypeName,
[parameter(ParameterSetName = 'ACL')]
[parameter(ParameterSetName = 'ADObject')]
[Alias('InheritedObjectTypeName', 'InheritedObjectType')][string[]] $IncludeInheritedObjectTypeName,
[parameter(ParameterSetName = 'ACL')]
[parameter(ParameterSetName = 'ADObject')]
[alias('ActiveDirectorySecurityInheritance')][nullable[System.DirectoryServices.ActiveDirectorySecurityInheritance]] $InheritanceType,
[parameter(ParameterSetName = 'NTSecurityDescriptor')]
[parameter(ParameterSetName = 'ACL')]
[parameter(ParameterSetName = 'ADObject')]
[switch] $Force,
[parameter(ParameterSetName = 'NTSecurityDescriptor', Mandatory)]
[alias('ActiveDirectorySecurity')][System.DirectoryServices.ActiveDirectorySecurity] $NTSecurityDescriptor
)
if (-not $Script:ForestDetails) {
Write-Verbose "Remove-ADACL - Gathering Forest Details"
$Script:ForestDetails = Get-WinADForestDetails
}
if ($PSBoundParameters.ContainsKey('ADObject')) {
foreach ($Object in $ADObject) {
$getADACLSplat = @{
ADObject = $Object
Bundle = $true
Resolve = $true
IncludeActiveDirectoryRights = $AccessRule
Principal = $Principal
AccessControlType = $AccessControlType
IncludeObjectTypeName = $IncludeObjectTypeName
IncludeActiveDirectorySecurityInheritance = $InheritanceType
IncludeInheritedObjectTypeName = $IncludeInheritedObjectTypeName
}
Remove-EmptyValue -Hashtable $getADACLSplat
$MYACL = Get-ADACL @getADACLSplat
$removePrivateACLSplat = @{
ACL = $MYACL
WhatIf = $WhatIfPreference
Force = $Force.IsPresent
}
Remove-EmptyValue -Hashtable $removePrivateACLSplat
Remove-PrivateACL @removePrivateACLSplat
}
} elseif ($PSBoundParameters.ContainsKey('ACL') -and $PSBoundParameters.ContainsKey('ntSecurityDescriptor')) {
foreach ($SubACL in $ACL) {
$removePrivateACLSplat = @{
ntSecurityDescriptor = $ntSecurityDescriptor
ACL = $SubACL
WhatIf = $WhatIfPreference
Force = $Force.IsPresent
}
Remove-EmptyValue -Hashtable $removePrivateACLSplat
Remove-PrivateACL @removePrivateACLSplat
}
} elseif ($PSBoundParameters.ContainsKey('ACL')) {
foreach ($SubACL in $ACL) {
$removePrivateACLSplat = @{
ACL = $SubACL
Principal = $Principal
AccessRule = $AccessRule
AccessControlType = $AccessControlType
IncludeObjectTypeName = $IncludeObjectTypeName
IncludeInheritedObjectTypeName = $IncludeInheritedObjectTypeName
InheritanceType = $InheritanceType
WhatIf = $WhatIfPreference
Force = $Force.IsPresent
}
Remove-EmptyValue -Hashtable $removePrivateACLSplat
Remove-PrivateACL @removePrivateACLSplat
}
}
}
function Remove-WinADDFSTopology {
<#
.SYNOPSIS
This command removes DFS topology objects from Active Directory that are missing one or more properties
.DESCRIPTION
This command removes DFS topology objects from Active Directory that are missing one or more properties.
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExcludeDomains
Exclude domain from search, by default whole forest is scanned
.PARAMETER IncludeDomains
Include only specific domains, by default whole forest is scanned
.PARAMETER Type
Type of objects to remove - to remove those missing at least one property or all properties (MissingAtLeastOne, MissingAll)
.EXAMPLE
Remove-WinADDFSTopology -Type MissingAll -Verbose -WhatIf
.NOTES
General notes
#>
[CmdletBinding(SupportsShouldProcess)]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[parameter(Mandatory)][ValidateSet('MissingAtLeastOne', 'MissingAll')][string] $Type
)
Write-Verbose -Message "Remove-WinADDFSTopology - Getting topology"
$Topology = Get-WinADDFSTopology -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -Type $Type
foreach ($Object in $Topology) {
Write-Verbose -Message "Remove-WinADDFSTopology - Removing '$($Object.Name)' with status '$($Object.Status)' / DN: '$($Object.DistinguishedName)' using '$($Object.QueryServer)'"
try {
Remove-ADObject -Identity $Object.DistinguishedName -Server $Object.QueryServer -Confirm:$false -ErrorAction Stop
} catch {
Write-Warning -Message "Remove-WinADDFSTopology - Failed to remove '$($Object.Name)' with status '$($Object.Status)' / DN: '$($Object.DistinguishedName)' using '$($Object.QueryServer)'. Error: $($_.Exception.Message)"
}
}
}
function Remove-WinADDuplicateObject {
<#
.SYNOPSIS
Removes duplicate objects from Active Directory based on specified criteria.
.DESCRIPTION
This cmdlet identifies and removes duplicate objects from Active Directory based on the provided parameters. It first retrieves a list of duplicate objects using Get-WinADDuplicateObject, then iterates through the list to remove each object. If an object is protected from accidental deletion, it attempts to remove the protection before deletion.
.PARAMETER Forest
Specifies the name of the forest to search for duplicate objects. This parameter is optional.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the search for duplicate objects.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the search for duplicate objects.
.PARAMETER ExtendedForestInformation
Specifies additional information about the forest, such as domain controllers or other forest-specific details.
.PARAMETER PartialMatchDistinguishedName
Specifies a partial distinguished name to match when searching for duplicate objects.
.PARAMETER IncludeObjectClass
Specifies an array of object classes to include in the search for duplicate objects.
.PARAMETER ExcludeObjectClass
Specifies an array of object classes to exclude from the search for duplicate objects.
.PARAMETER LimitProcessing
Specifies the maximum number of duplicate objects to process for removal. The default is to process all found duplicates.
.EXAMPLE
Remove-WinADDuplicateObject -Forest "example.local" -IncludeDomains "example.local", "subdomain.example.local" -IncludeObjectClass "User", "Group" -LimitProcessing 10
This example removes up to 10 duplicate user and group objects from the "example.local" and "subdomain.example.local" domains in the "example.local" forest.
.EXAMPLE
Remove-WinADDuplicateObject -ExcludeDomains "example.local" -PartialMatchDistinguishedName "OU=Finance,"
This example removes duplicate objects with a distinguished name containing "OU=Finance," from all domains except "example.local".
#>
[cmdletBinding(SupportsShouldProcess)]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[System.Collections.IDictionary] $ExtendedForestInformation,
[string] $PartialMatchDistinguishedName,
[string[]] $IncludeObjectClass,
[string[]] $ExcludeObjectClass,
[int] $LimitProcessing = [int32]::MaxValue
)
$getWinADDuplicateObjectSplat = @{
Forest = $Forest
ExcludeDomains = $ExcludeDomains
IncludeDomains = $IncludeDomains
IncludeObjectClass = $IncludeObjectClass
ExcludeObjectClass = $ExcludeObjectClass
PartialMatchDistinguishedName = $PartialMatchDistinguishedName
}
$Count = 0
$DuplicateObjects = Get-WinADDuplicateObject @getWinADDuplicateObjectSplat
foreach ($Duplicate in $DuplicateObjects | Select-Object -First $LimitProcessing) {
If ($Duplicate.ProtectedFromAccidentalDeletion -eq $true) {
Try {
Set-ADObject -Identity $($Duplicate.ObjectGUID) -ProtectedFromAccidentalDeletion $false -ErrorAction Stop -Server $Duplicate.Server
} Catch {
Write-Warning "Skipped object GUID: $($Duplicate.ObjectGUID) from deletion, failed to remove ProtectedFromAccidentalDeletion"
Write-Verbose "Error message $($_.Exception.Message)"
Continue
}
}
$Count++
try {
Write-Verbose "Remove-WinADDuplicateObject - [$Count/$($DuplicateObjects.Count)] Deleting $($Duplicate.ConflictDN) / $($Duplicate.DomainName) via GUID: $($Duplicate.ObjectGUID)"
Remove-ADObject -Identity $Duplicate.ObjectGUID -Recursive -ErrorAction Stop -Confirm:$false -Server $Duplicate.Server
} catch {
Write-Warning "Remove-WinADDuplicateObject - [$Count/$($DuplicateObjects.Count)] Deleting $($Duplicate.ConflictDN) / $($Duplicate.DomainName) via GUID: $($Duplicate.ObjectGUID) failed with error: $($_.Exception.Message)"
}
}
}
function Remove-WinADSharePermission {
<#
.SYNOPSIS
Removes permissions from a specified path or recursively from all items within a specified path.
.DESCRIPTION
This cmdlet removes permissions from a specified path or recursively from all items within a specified path. It targets permissions of a specific type, defaulting to 'Unknown'. The cmdlet also allows for limiting the number of processing operations.
.PARAMETER Path
Specifies the path from which to remove permissions. This parameter is mandatory and can be a file or a directory.
.PARAMETER Type
Specifies the type of permissions to remove. The default value is 'Unknown'. This parameter is validated to only accept 'Unknown'.
.PARAMETER LimitProcessing
Specifies the maximum number of processing operations to perform. This parameter is optional.
.EXAMPLE
Remove-WinADSharePermission -Path 'C:\Example\Path' -Type 'Unknown' -LimitProcessing 100
This example removes 'Unknown' type permissions from 'C:\Example\Path' and all items within it, limiting the processing to 100 operations.
.NOTES
This cmdlet requires the Get-FilePermission and Set-Acl cmdlets to function properly.
#>
[cmdletBinding(DefaultParameterSetName = 'Path', SupportsShouldProcess)]
param(
[Parameter(ParameterSetName = 'Path', Mandatory)][string] $Path,
[ValidateSet('Unknown')][string] $Type = 'Unknown',
[int] $LimitProcessing
)
Begin {
[int] $Count = 0
}
Process {
if ($Path -and (Test-Path -Path $Path)) {
$Data = @(Get-Item -Path $Path) + @(Get-ChildItem -Path $Path -Recurse:$true)
foreach ($_ in $Data) {
$PathToProcess = $_.FullName
$Permissions = Get-FilePermission -Path $PathToProcess -Extended -IncludeACLObject -ResolveTypes
$OutputRequiresCommit = foreach ($Permission in $Permissions) {
if ($Type -eq 'Unknown' -and $Permission.PrincipalType -eq 'Unknown' -and $Permission.IsInherited -eq $false) {
try {
Write-Verbose "Remove-WinADSharePermission - Removing permissions from $PathToProcess for $($Permission.Principal) / $($Permission.PrincipalType)"
$Permission.AllACL.RemoveAccessRule($Permission.ACL)
$true
} catch {
Write-Warning "Remove-WinADSharePermission - Removing permissions from $PathToProcess for $($Permission.Principal) / $($Permission.PrincipalType) failed: $($_.Exception.Message)"
$false
}
}
}
if ($OutputRequiresCommit -notcontains $false -and $OutputRequiresCommit -contains $true) {
try {
Set-Acl -Path $PathToProcess -AclObject $Permissions[0].ALLACL -ErrorAction Stop
} catch {
Write-Warning "Remove-WinADSharePermission - Commit for $($PathToProcess) failed: $($_.Exception.Message)"
}
$Count++
if ($Count -eq $LimitProcessing) {
break
}
}
}
}
}
End {
}
}
function Rename-WinADUserPrincipalName {
<#
.SYNOPSIS
Renames the UserPrincipalName of one or more Active Directory users based on specified parameters.
.DESCRIPTION
This function iterates through an array of users and generates a new UserPrincipalName based on the provided domain name and optional parameters.
It then compares the new UserPrincipalName with the existing one and updates it if they differ. The update operation can be simulated with the -WhatIf switch.
.PARAMETER Users
An array of user objects to process.
.PARAMETER DomainName
The domain name to use for the new UserPrincipalName.
.PARAMETER ReplaceDomain
If specified, the existing domain name in the UserPrincipalName will be replaced with the provided DomainName.
.PARAMETER NameSurname
If specified, the UserPrincipalName will be generated using the user's name and surname.
.PARAMETER FixLatinChars
If specified, Latin characters with diacritics will be replaced with their closest ASCII equivalent.
.PARAMETER ToLower
If specified, the UserPrincipalName will be converted to lowercase.
.PARAMETER WhatIf
Simulates the renaming operation without making actual changes.
.EXAMPLE
Rename-WinADUserPrincipalName -Users $users -DomainName "example.local" -ReplaceDomain -ToLower
Renames the UserPrincipalName of the users in the $users array to use the "example.local" domain and converts it to lowercase.
.EXAMPLE
Rename-WinADUserPrincipalName -Users $users -DomainName "example.local" -NameSurname -FixLatinChars -WhatIf
Simulates the renaming of the UserPrincipalName of the users in the $users array using their name and surname, replacing Latin characters with diacritics with their closest ASCII equivalent.
#>
[cmdletbinding()]
param(
[Parameter(Mandatory = $true)][Array] $Users,
[Parameter(Mandatory = $true)][string] $DomainName,
[switch] $ReplaceDomain,
[switch] $NameSurname,
[switch] $FixLatinChars,
[switch] $ToLower,
[switch] $WhatIf
)
foreach ($User in $Users) {
$NewUserPrincipalName = Get-WinADUserPrincipalName -User $User -DomainName $DomainName -ReplaceDomain:$ReplaceDomain -NameSurname:$NameSurname -FixLatinChars:$FixLatinChars -ToLower:$ToLower
if ($NewUserPrincipalName -ne $User.UserPrincipalName) {
Set-ADUser -Identity $User.DistinguishedName -UserPrincipalName $NewUserPrincipalName -WhatIf:$WhatIf
}
}
}
function Repair-WinADACLConfigurationOwner {
<#
.SYNOPSIS
Fixes all owners of certain object type (site,subnet,sitelink,interSiteTransport,wellKnownSecurityPrincipal) to be Enterprise Admins
.DESCRIPTION
Fixes all owners of certain object type (site,subnet,sitelink,interSiteTransport,wellKnownSecurityPrincipal) to be Enterprise Admins
.PARAMETER ObjectType
Gets owners from one or multiple types (and only that type). Possible choices are sites, subnets, interSiteTransport, siteLink, wellKnownSecurityPrincipals
.PARAMETER ContainerType
Gets owners from one or multiple types (including containers and anything below it). Possible choices are sites, subnets, interSiteTransport, siteLink, wellKnownSecurityPrincipals, services
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExtendedForestInformation
Ability to provide Forest Information from another command to speed up processing
.PARAMETER LimitProcessing
Provide limit of objects that will be fixed in a single run
.EXAMPLE
An example
.NOTES
General notes
#>
[cmdletBinding(DefaultParameterSetName = 'ObjectType', SupportsShouldProcess)]
param(
[parameter(ParameterSetName = 'ObjectType', Mandatory)][ValidateSet('site', 'subnet', 'interSiteTransport', 'siteLink', 'wellKnownSecurityPrincipal')][string[]] $ObjectType,
[parameter(ParameterSetName = 'FolderType', Mandatory)][ValidateSet('site', 'subnet', 'interSiteTransport', 'siteLink', 'wellKnownSecurityPrincipal', 'service')][string[]] $ContainerType,
[string] $Forest,
[System.Collections.IDictionary] $ExtendedForestInformation,
[int] $LimitProcessing = [int32]::MaxValue
)
$ADAdministrativeGroups = Get-ADADministrativeGroups -Type DomainAdmins, EnterpriseAdmins -Forest $Forest -ExtendedForestInformation $ForestInformation
$getWinADACLConfigurationSplat = @{
ContainerType = $ContainerType
ObjectType = $ObjectType
Owner = $true
Forest = $Forest
ExtendedForestInformation = $ExtendedForestInformation
}
Remove-EmptyValue -Hashtable $getWinADACLConfigurationSplat
Get-WinADACLConfiguration @getWinADACLConfigurationSplat | Where-Object {
if ($_.OwnerType -ne 'Administrative' -and $_.OwnerType -ne 'WellKnownAdministrative') {
$_
}
} | Select-Object -First $LimitProcessing | ForEach-Object {
$ADObject = $_
$DomainName = ConvertFrom-DistinguishedName -ToDomainCN -DistinguishedName $_.DistinguishedName
$EnterpriseAdmin = $ADAdministrativeGroups[$DomainName]['EnterpriseAdmins']
Set-ADACLOwner -ADObject $ADObject.DistinguishedName -Principal $EnterpriseAdmin
}
}
function Repair-WinADBrokenProtectedFromDeletion {
<#
.SYNOPSIS
Repairs Active Directory objects that have broken protection from accidental deletion.
.DESCRIPTION
This cmdlet fixes Active Directory objects where the ProtectedFromAccidentalDeletion flag doesn't match the actual ACL settings.
It processes objects identified by Get-WinADBrokenProtectedFromDeletion and corrects their protection status.
.PARAMETER Forest
The name of the forest to process. If not specified, the current forest is used.
.PARAMETER ExcludeDomains
Array of domain names to exclude from processing.
.PARAMETER IncludeDomains
Array of domain names to include in processing. If not specified, all domains are processed.
.PARAMETER ExtendedForestInformation
Dictionary containing cached forest information.
.PARAMETER Type
Required. Specifies the types of objects to process. Valid values are:
- Computer
- Group
- User
- ManagedServiceAccount
- GroupManagedServiceAccount
- Contact
- All
.PARAMETER Resolve
Switch to enable name resolution for Everyone permission.
This is only nessecary if you have non-english AD, as Everyone is not Everyone in all languages.
.PARAMETER LimitProcessing
Limits the number of objects to process. While this parameter may cause the cmdlet to return X number of objects, it may not match the actual number of fixes applied.
This is because the fix is per OU, not per object. If there are multiple objects in the same OU, only one fix is applied.
.EXAMPLE
Repair-WinADBrokenProtectedFromDeletion -Type User -WhatIf -LimitProcessing 5
Repairs protection settings for all user objects in the current forest.
.EXAMPLE
Repair-WinADBrokenProtectedFromDeletion -Type Computer,Group -Forest "contoso.com" -ExcludeDomains "dev.contoso.com" -WhatIf -LimitProcessing 5
Repairs protection settings for computer and group objects in the specified forest, excluding the dev domain.
#>
[CmdletBinding(SupportsShouldProcess)]
param (
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[System.Collections.IDictionary] $ExtendedForestInformation,
[ValidateSet(
'Computer',
'Group',
'User',
'ManagedServiceAccount',
'GroupManagedServiceAccount',
'Contact',
'All'
)][Parameter(Mandatory)][string[]] $Type,
[switch] $Resolve,
[int] $LimitProcessing
)
$getWinADBrokenProtectedObjectsSplat = @{
Forest = $Forest
ExcludeDomains = $ExcludeDomains
IncludeDomains = $IncludeDomains
ExtendedForestInformation = $ExtendedForestInformation
Type = $Type
Resolve = $Resolve.IsPresent
ReturnBrokenOnly = $true
LimitProcessing = $LimitProcessing
}
$BrokenObjects = Get-WinADBrokenProtectedFromDeletion @getWinADBrokenProtectedObjectsSplat
$ToFix = [ordered]@{}
foreach ($Object in $BrokenObjects) {
if (-not $ToFix[$Object.ParentContainer]) {
Write-Verbose -Message "Repair-WinADBrokenProtectedFromDeletion - Adding $($Object.DistinguishedName) to list of objects to fix for $($Object.ParentContainer)"
$ToFix[$Object.ParentContainer] = $Object
} else {
Write-Verbose -Message "Repair-WinADBrokenProtectedFromDeletion - Skipping $($Object.DistinguishedName) as it's OU $($Object.ParentContainer) is already in the list of objects to fix"
}
}
foreach ($Container in $ToFix.Keys) {
$Object = $ToFix[$Container]
Write-Verbose -Message "Repair-WinADBrokenProtectedFromDeletion - Fixing $($Object.DistinguishedName) in $Container"
try {
Set-ADObject -ProtectedFromAccidentalDeletion $true -Identity $Object.DistinguishedName -ErrorAction Stop
} catch {
if ($ErrorActionPreference -eq 'Stop') {
throw
} else {
Write-Warning -Message "Repair-WinADBrokenProtectedFromDeletion - Error fixing $($Object.DistinguishedName): $($_.Exception.Message)"
}
}
}
}
function Repair-WinADEmailAddress {
<#
.SYNOPSIS
Repairs and updates the email address and proxy addresses for a given Active Directory user.
.DESCRIPTION
This cmdlet updates the primary email address and proxy addresses for an Active Directory user. It ensures the primary email address is correctly set and adds or removes secondary email addresses as needed. It also updates the proxy addresses to include the primary email address and any additional secondary email addresses specified.
.PARAMETER ADUser
The Active Directory user object to update.
.PARAMETER ToEmail
The new primary email address to set for the user.
.PARAMETER Display
If specified, displays the summary of the operations performed without making any changes.
.PARAMETER AddSecondary
An array of secondary email addresses to add to the user's proxy addresses.
#>
[CmdletBinding(SupportsShouldProcess)]
param(
[Microsoft.ActiveDirectory.Management.ADAccount] $ADUser,
#[string] $FromEmail,
[string] $ToEmail,
[switch] $Display,
[Array] $AddSecondary #,
# [switch] $UpdateMailNickName
)
$Summary = [ordered] @{
SamAccountName = $ADUser.SamAccountName
UserPrincipalName = $ADUser.UserPrincipalName
EmailAddress = ''
ProxyAddresses = ''
EmailAddressStatus = 'Not required'
ProxyAddressesStatus = 'Not required'
EmailAddressError = ''
ProxyAddressesError = ''
}
$RequiredProperties = @(
'EmailAddress'
'proxyAddresses'
#'mailNickName'
)
foreach ($Property in $RequiredProperties) {
if ($ADUser.PSObject.Properties.Name -notcontains $Property) {
Write-Warning "Repair-WinADEmailAddress - User $($ADUser.SamAccountName) is missing properties ($($RequiredProperties -join ',')) which are required. Try again."
return
}
}
$ProcessUser = Get-WinADProxyAddresses -ADUser $ADUser -RemovePrefix
$EmailAddresses = [System.Collections.Generic.List[string]]::new()
$ProxyAddresses = [System.Collections.Generic.List[string]]::new()
$ExpectedUser = [ordered] @{
EmailAddress = $ToEmail
Primary = $ToEmail
Secondary = ''
Sip = $ProcessUser.Sip
x500 = $ProcessUser.x500
Other = $ProcessUser.Other
#MailNickName = $ProcessUser.mailNickName
}
if (-not $ToEmail) {
# We didn't wanted to change primary email address so we use whatever is set
$ExpectedUser.EmailAddress = $ProcessUser.EmailAddress
$ExpectedUser.Primary = $ProcessUser.Primary
# this is case where Proxy Addresses of current user don't have email address set as primary
# we want to fix the user right?
if (-not $ExpectedUser.Primary -and $ExpectedUser.EmailAddress) {
$ExpectedUser.Primary = $ExpectedUser.EmailAddress
}
}
# if ($UpdateMailNickName) {
#}
# Lets add expected primary to proxy addresses we need
$MakePrimary = "SMTP:$($ExpectedUser.EmailAddress)"
$ProxyAddresses.Add($MakePrimary)
# Lets add expected secondary to proxy addresses we need
$Types = @('Sip', 'x500', 'Other')
foreach ($Type in $Types) {
foreach ($Address in $ExpectedUser.$Type) {
$ProxyAddresses.Add($Address)
}
}
$TypesEmails = @('Primary', 'Secondary')
foreach ($Type in $TypesEmails) {
foreach ($Address in $ProcessUser.$Type) {
if ($Address -ne $ToEmail) {
$EmailAddresses.Add($Address)
}
}
}
foreach ($Email in $EmailAddresses) {
$ProxyAddresses.Add("smtp:$Email".ToLower())
}
foreach ($Email in $AddSecondary) {
if ($Email -like 'smtp:*') {
$ProxyAddresses.Add($Email.ToLower())
} else {
$ProxyAddresses.Add("smtp:$Email".ToLower())
}
}
# Lets fix primary email address
$Summary['EmailAddress'] = $ExpectedUser.EmailAddress
if ($ProcessUser.EmailAddress -ne $ExpectedUser.EmailAddress) {
if ($PSCmdlet.ShouldProcess($ADUser, "Email $ToEmail will be set in EmailAddresss field (1)")) {
try {
Set-ADUser -Identity $ADUser -EmailAddress $ExpectedUser.EmailAddress -ErrorAction Stop
$Summary['EmailAddressStatus'] = 'Success'
$Summary['EmailAddressError'] = ''
} catch {
$Summary['EmailAddressStatus'] = 'Failed'
$Summary['EmailAddressError'] = $_.Exception.Message
}
} else {
$Summary['EmailAddressStatus'] = 'Whatif'
$Summary['EmailAddressError'] = ''
}
}
# lets compare Expected Proxy Addresses, against current list
# lets make sure in new proxy list we have only unique addresses, so if there are duplicates in existing one it will be replaced
# We need to also convert it to [string[]] as Set-ADUser with -Replace is very picky about it
# Replacement for Sort-Object -Unique which removes primary SMTP: if it's duplicate of smtp:
$UniqueProxyList = [System.Collections.Generic.List[string]]::new()
foreach ($Proxy in $ProxyAddresses) {
if ($UniqueProxyList -notcontains $Proxy) {
$UniqueProxyList.Add($Proxy)
}
}
[string[]] $ExpectedProxyAddresses = ($UniqueProxyList | Sort-Object | ForEach-Object { $_ })
[string[]] $CurrentProxyAddresses = ($ADUser.ProxyAddresses | Sort-Object | ForEach-Object { $_ })
$Summary['ProxyAddresses'] = $ExpectedProxyAddresses -join ';'
# we need to compare case sensitive
if (Compare-Object -ReferenceObject $ExpectedProxyAddresses -DifferenceObject $CurrentProxyAddresses -CaseSensitive) {
if ($PSCmdlet.ShouldProcess($ADUser, "Email $ExpectedProxyAddresses will replace proxy addresses (2)")) {
try {
Set-ADUser -Identity $ADUser -Replace @{ proxyAddresses = $ExpectedProxyAddresses } -ErrorAction Stop
$Summary['ProxyAddressesStatus'] = 'Success'
$Summary['ProxyAddressesError'] = ''
} catch {
$Summary['ProxyAddressesStatus'] = 'Failed'
$Summary['ProxyAddressesError'] = $_.Exception.Message
}
} else {
$Summary['ProxyAddressesStatus'] = 'WhatIf'
$Summary['ProxyAddressesError'] = ''
}
}
if ($Display) {
[PSCustomObject] $Summary
}
}
<#
if ($FromEmail -and $FromEmail -like '*@*') {
if ($FromEmail -ne $ToEmail) {
$FindSecondary = "SMTP:$FromEmail"
if ($ProcessUser.Primary -contains $FromEmail) {
if ($PSCmdlet.ShouldProcess($ADUser, "Email $FindSecondary will be removed from proxy addresses as primary (1)")) {
Set-ADUser -Identity $ADUser -Remove @{ proxyAddresses = $FindSecondary }
}
}
$MakeSecondary = "smtp:$FromEmail"
if ($ProcessUser.Secondary -notcontains $FromEmail) {
if ($PSCmdlet.ShouldProcess($ADUser, "Email $MakeSecondary will be added to proxy addresses as secondary (2)")) {
Set-ADUser -Identity $ADUser -Add @{ proxyAddresses = $MakeSecondary }
}
}
}
}
if ($ToEmail -and $ToEmail -like '*@*') {
if ($ProcessUser.EmailAddress -ne $ToEmail) {
if ($PSCmdlet.ShouldProcess($ADUser, "Email $ToEmail will be set in EmailAddresss field (3)")) {
Set-ADUser -Identity $ADUser -EmailAddress $ToEmail
}
}
if ($ProcessUser.Secondary -contains $ToEmail) {
$RemovePotential = "smtp:$ToEmail"
if ($PSCmdlet.ShouldProcess($ADUser, "Email $RemovePotential will be removed from proxy addresses (4)")) {
Set-ADUser -Identity $ADUser -Remove @{ proxyAddresses = $RemovePotential }
}
}
$MakePrimary = "SMTP:$ToEmail"
if ($ProcessUser.Primary.Count -in @(0, 1) -and $ProcessUser.Primary -notcontains $ToEmail) {
if ($PSCmdlet.ShouldProcess($ADUser, "Email $MakePrimary will be added to proxy addresses as primary (5)")) {
Set-ADUser -Identity $ADUser -Add @{ proxyAddresses = $MakePrimary }
}
} elseif ($ProcessUser.Primary.Count -gt 1) {
[Array] $PrimaryEmail = $ProcessUser.Primary | Sort-Object -Unique
if ($PrimaryEmail.Count -eq 1) {
if ($PrimaryEmail -ne $ToEmail) {
if ($PSCmdlet.ShouldProcess($ADUser, "Email $MakePrimary will be added to proxy addresses as primary (6)")) {
Set-ADUser -Identity $ADUser -Add @{ proxyAddresses = $MakePrimary }
}
} else {
if ($ProcessUser.Secondary -notcontains $PrimaryEmail) {
$MakeSecondary = "smtp:$PrimaryEmail"
if ($PSCmdlet.ShouldProcess($ADUser, "Email $MakeSecondary will be added to proxy addresses as secondary (7)")) {
Set-ADUser -Identity $ADUser -Add @{ proxyAddresses = $MakeSecondary }
}
}
}
} else {
foreach ($Email in $PrimaryEmail) {
}
}
}
if ($ProcessUser.Primary -notcontains $ToEmail) {
#if ($PSCmdlet.ShouldProcess($ADUser, "Email $MakePrimary will be added to proxy addresses as primary (6)")) {
# Set-ADUser -Identity $ADUser -Add @{ proxyAddresses = $MakePrimary }
#}
}
}
if ($Display) {
$ProcessUser
}
#>
<#
if ($FromEmail -and $FromEmail -like '*@*') {
if ($FromEmail -ne $ToEmail) {
$FindSecondary = "SMTP:$FromEmail"
if ($ADUser.ProxyAddresses -ccontains $FindSecondary) {
if ($PSCmdlet.ShouldProcess($ADUser, "Email $FindSecondary will be removed from proxy addresses as primary (1)")) {
Set-ADUser -Identity $ADUser -Remove @{ proxyAddresses = $FindSecondary }
}
}
$MakeSecondary = "smtp:$FromEmail"
if ($ADUser.ProxyAddresses -cnotcontains $MakeSecondary) {
if ($PSCmdlet.ShouldProcess($ADUser, "Email $MakeSecondary will be added to proxy addresses as secondary (2)")) {
Set-ADUser -Identity $ADUser -Add @{ proxyAddresses = $MakeSecondary }
}
}
}
}
if ($ToEmail -and $ToEmail -like '*@*') {
$RemovePotential = "smtp:$ToEmail"
$MakePrimary = "SMTP:$ToEmail"
if ($ADUser.EmailAddress -ne $ToEmail) {
if ($PSCmdlet.ShouldProcess($ADUser, "Email $ToEmail will be set in EmailAddresss field (3)")) {
Set-ADUser -Identity $ADUser -EmailAddress $ToEmail
}
}
if ($ADUser.ProxyAddresses -ccontains $RemovePotential) {
if ($PSCmdlet.ShouldProcess($ADUser, "Email $RemovePotential will be removed from proxy addresses (4)")) {
Set-ADUser -Identity $ADUser -Remove @{ proxyAddresses = $RemovePotential }
}
}
if ($ADUser.ProxyAddresses -cnotcontains $MakePrimary) {
if ($PSCmdlet.ShouldProcess($ADUser, "Email $MakePrimary will be added to proxy addresses as primary (5)")) {
Set-ADUser -Identity $ADUser -Add @{ proxyAddresses = $MakePrimary }
}
}
}
#>
#}
function Repair-WinADForestControllerInformation {
<#
.SYNOPSIS
Repairs the Active Directory forest controller information by fixing ownership and management settings for domain controllers.
.DESCRIPTION
This cmdlet repairs the Active Directory forest controller information by ensuring that domain controllers are properly owned and managed. It can fix the ownership and management settings for domain controllers based on the specified type of repair. The cmdlet supports processing a limited number of domain controllers at a time.
.PARAMETER Type
Specifies the type of repair to perform on the domain controllers. The valid types are 'Owner' and 'Manager'. 'Owner' repairs the ownership settings, and 'Manager' repairs the management settings.
.PARAMETER ForestName
Specifies the name of the forest to repair.
.PARAMETER ExcludeDomains
Specifies the domains to exclude from the repair process.
.PARAMETER IncludeDomains
Specifies the domains to include in the repair process.
.PARAMETER ExtendedForestInformation
Specifies the extended information about the forest to use for the repair process.
.PARAMETER LimitProcessing
Specifies the maximum number of domain controllers to process in a single run.
.EXAMPLE
Repair-WinADForestControllerInformation -Type Owner, Manager -ForestName example.com -IncludeDomains example.com, sub.example.com -LimitProcessing 10
This example repairs the ownership and management settings for up to 10 domain controllers in the example.com and sub.example.com domains within the example.com forest.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and imported.
#>
[cmdletBinding(SupportsShouldProcess)]
param(
[parameter(Mandatory)][validateSet('Owner', 'Manager')][string[]] $Type,
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[System.Collections.IDictionary] $ExtendedForestInformation,
[int] $LimitProcessing
)
$ForestInformation = Get-WinADForestDetails -Extended -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
if (-not $ADAdministrativeGroups) {
$ADAdministrativeGroups = Get-ADADministrativeGroups -Type DomainAdmins, EnterpriseAdmins -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ForestInformation
}
$Fixed = 0
$DCs = Get-WinADForestControllerInformation -Forest $Forest -ExtendedForestInformation $ForestInformation -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains | ForEach-Object {
$DC = $_
$Done = $false
if ($Type -contains 'Owner') {
if ($DC.OwnerType -ne 'Administrative') {
Write-Verbose -Message "Repair-WinADForestControllerInformation - Fixing (Owner) [$($DC.DomainName)]($Count/$($DCs.Count)) $($DC.DNSHostName)"
$Principal = $ADAdministrativeGroups[$DC.DomainName]['DomainAdmins']
Set-ADACLOwner -ADObject $DC.DistinguishedName -Principal $Principal
$Done = $true
}
}
if ($Type -contains 'Manager') {
if ($null -ne $DC.ManagedBy) {
Write-Verbose -Message "Repair-WinADForestControllerInformation - Fixing (Manager) [$($DC.DomainName)]($Count/$($DCs.Count)) $($DC.DNSHostName)"
Set-ADComputer -Identity $DC.DistinguishedName -Clear ManagedBy -Server $ForestInformation['QueryServers'][$DC.DomainName]['HostName'][0]
$Done = $true
}
}
if ($Done -eq $true) {
$Fixed++
}
if ($LimitProcessing -ne 0 -and $Fixed -eq $LimitProcessing) {
break
}
}
}
function Request-ChangePasswordAtLogon {
<#
.SYNOPSIS
This command will find all users that have expired password and set them to change password at next logon.
.DESCRIPTION
This command will find all users that have expired password and set them to change password at next logon.
This is useful for example for Azure AD Connect where you want to force users to change password on next logon.
The password expiration doesn't get synced in specific conditions to Azure AD so you need to do it manually.
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExcludeDomains
Exclude domain from search, by default whole forest is scanned
.PARAMETER IncludeDomains
Include only specific domains, by default whole forest is scanned
.PARAMETER LimitProcessing
Provide limit of objects that will be processed in a single run
.PARAMETER IgnoreDisplayName
Allow to ignore certain users based on their DisplayName. -It uses -like operator so you can use wildcards.
This is useful for example for Exchange accounts that have expired password but are not used for anything else.
.PARAMETER IgnoreDistinguishedName
Allow to ignore certain users based on their DistinguishedName. It uses -like operator so you can use wildcards.
.PARAMETER IgnoreSamAccountName
Allow to ignore certain users based on their SamAccountName. It uses -like operator so you can use wildcards.
.PARAMETER OrganizationalUnit
Provide a list of Organizational Units to search for users that have expired password. If not provided, all users in the forest will be searched.
.PARAMETER PassThru
Returns objects that were processed.
.EXAMPLE
$OU = @(
'OU=Default,OU=Users.NoSync,OU=Accounts,OU=Production,DC=ad,DC=evotec,DC=xyz'
'OU=Administrative,OU=Users.NoSync,OU=Accounts,OU=Production,DC=ad,DC=evotec,DC=xyz'
)
Request-ChangePasswordAtLogon -OrganizationalUnit $OU -LimitProcessing 1 -PassThru -Verbose -WhatIf | Format-Table
.NOTES
Please note that for Azure AD to pickup the change, you may need:
Get-ADSyncAADCompanyFeature
Set-ADSyncAADCompanyFeature -ForcePasswordChangeOnLogOn $true
As described in https://learn.microsoft.com/en-us/entra/identity/hybrid/connect/how-to-connect-password-hash-synchronization#synchronizing-temporary-passwords-and-force-password-change-on-next-logon
The above is not required only for new users without a password set. If the password is set the feature is required.
#>
[CmdletBinding(SupportsShouldProcess)]
param (
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[int] $LimitProcessing,
[Array] $IgnoreDisplayName,
[Array] $IgnoreDistinguishedName,
[Array] $IgnoreSamAccountName,
[string[]] $OrganizationalUnit,
[switch] $PassThru
)
Begin {
$ForestDetails = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains
$IgnoreDisplayNameTotal = @(
'Microsoft Exchange*'
foreach ($I in $IgnoreDisplayName) {
$I
}
)
$IgnoreDistinguishedNameTotal = @(
"*,CN=Users,*"
foreach ($I in $IgnoreDistinguishedName) {
$I
}
)
$IgnoreSamAccountNameTotal = @(
'Administrator'
'Guest'
'krbtgt*'
'healthmailbox*'
foreach ($I in $IgnoreSamAccountName) {
$I
}
)
}
Process {
[Array] $UsersFound = foreach ($Domain in $ForestDetails.Domains) {
$QueryServer = $ForestDetails['QueryServers'][$Domain].HostName[0]
if ($OrganizationalUnit) {
$Users = @(
foreach ($OU in $OrganizationalUnit) {
$OUDomain = ConvertFrom-DistinguishedName -DistinguishedName $OU -ToDomainCN
if ($OUDomain -eq $Domain) {
Get-ADUser -Filter "Enabled -eq '$true'" -Properties DisplayName, SamAccountName, PasswordExpired, PasswordLastSet, pwdLastSet, PasswordNeverExpires -Server $QueryServer -SearchBase $OU
}
}
)
$Users = $Users | Sort-Object -Property DistinguishedName -Unique
} else {
$Users = Get-ADUser -Filter "Enabled -eq '$true'" -Properties DisplayName, SamAccountName, PasswordExpired, PasswordLastSet, pwdLastSet, PasswordNeverExpires -Server $QueryServer
}
:SkipUser foreach ($User in $Users) {
# lets asses if password is set to expire or not
$DateExpiry = $null
if ($User."msDS-UserPasswordExpiryTimeComputed" -ne 9223372036854775807) {
# This is standard situation where users password is expiring as needed
try {
$DateExpiry = ([datetime]::FromFileTime($User."msDS-UserPasswordExpiryTimeComputed"))
} catch {
$DateExpiry = $User."msDS-UserPasswordExpiryTimeComputed"
}
}
if ($User.pwdLastSet -eq 0 -and $DateExpiry.Year -eq 1601) {
$PasswordAtNextLogon = $true
} else {
$PasswordAtNextLogon = $false
}
if ($User.PasswordExpired -eq $true -and $PasswordAtNextLogon -eq $false -and $User.PasswordNeverExpires -eq $false) {
foreach ($I in $IgnoreSamAccountNameTotal) {
if ($User.SamAccountName -like $I) {
Write-Verbose -Message "Request-ChangePasswordOnExpiry - Ignoring $($User.SamAccountName) / $($User.DistinguishedName)"
continue SkipUser
}
}
foreach ($I in $IgnoreDistinguishedNameTotal) {
if ($User.DistinguishedName -like $I) {
Write-Verbose -Message "Request-ChangePasswordOnExpiry - Ignoring $($User.SamAccountName) / $($User.DistinguishedName)"
continue SkipUser
}
}
foreach ($I in $IgnoreDisplayNameTotal) {
if ($User.DisplayName -like $I) {
Write-Verbose -Message "Request-ChangePasswordOnExpiry - Ignoring $($User.SamAccountName) / $($User.DistinguishedName)"
continue SkipUser
}
}
[PSCustomObject] @{
SamAccountName = $User.SamAccountName
Domain = $Domain
DisplayName = $User.DisplayName
DistinguishedName = $User.DistinguishedName
PasswordExpired = $User.PasswordExpired
PasswordLastSet = $User.PasswordLastSet
PasswordNeverExpires = $User.PasswordNeverExpires
}
} else {
Write-Verbose -Message "Request-ChangePasswordOnExpiry - Skipping $($User.SamAccountName) / $($User.DistinguishedName) - Password already requested at next logon or never expires."
}
}
}
$Count = 0
Write-Verbose -Message "Request-ChangePasswordOnExpiry - Found $($UsersFound.Count) expired users. Processing..."
foreach ($User in $UsersFound) {
if ($LimitProcessing -and $Count -ge $LimitProcessing) {
break
}
Write-Verbose -Message "Request-ChangePasswordOnExpiry - Setting $($User.SamAccountName) to change password on next logon / $($User.Domain)"
Set-ADUser -ChangePasswordAtLogon $true -Identity $User.SamAccountName -Server $ForestDetails['QueryServers'][$User.Domain].HostName[0]
if ($PassThru) {
$User
}
$Count++
}
}
}
function Request-DisableOnAccountExpiration {
<#
.SYNOPSIS
This command will find all users that have expired account and set them to be disabled.
.DESCRIPTION
This command will find all users that have expired account and set them to be disabled.
This is useful for example for Azure AD Connect where you want to disable users that have expired account.
The account expiration doesn't get synced in specific conditions to Azure AD so you need to do it manually.
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExcludeDomains
Exclude domain from search, by default whole forest is scanned
.PARAMETER IncludeDomains
Include only specific domains, by default whole forest is scanned
.PARAMETER LimitProcessing
Provide limit of objects that will be processed in a single run
.PARAMETER IgnoreDisplayName
Allow to ignore certain users based on their DisplayName. -It uses -like operator so you can use wildcards.
This is useful for example for Exchange accounts that have expired password but are not used for anything else.
.PARAMETER IgnoreDistinguishedName
Allow to ignore certain users based on their DistinguishedName. It uses -like operator so you can use wildcards.
.PARAMETER IgnoreSamAccountName
Allow to ignore certain users based on their SamAccountName. It uses -like operator so you can use wildcards.
.PARAMETER OrganizationalUnit
Provide a list of Organizational Units to search for users that have expired password. If not provided, all users in the forest will be searched.
.PARAMETER PassThru
Returns objects that were processed.
.EXAMPLE
Request-DisableOnAccountExpiration -LimitProcessing 1 -PassThru -Verbose -WhatIf | Format-Table
.EXAMPLE
$OU = @(
'OU=Default,OU=Users.NoSync,OU=Accounts,OU=Production,DC=ad,DC=evotec,DC=xyz'
'OU=Administrative,OU=Users.NoSync,OU=Accounts,OU=Production,DC=ad,DC=evotec,DC=xyz'
)
Request-DisableOnAccountExpiration -LimitProcessing 1 -PassThru -Verbose -WhatIf -OrganizationalUnit $OU | Format-Table
.NOTES
General notes
#>
[cmdletbinding(SupportsShouldProcess)]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[int] $LimitProcessing,
[Array] $IgnoreDisplayName,
[Array] $IgnoreDistinguishedName,
[Array] $IgnoreSamAccountName,
[string[]] $OrganizationalUnit,
[switch] $PassThru
)
Begin {
$Today = Get-Date
$ForestDetails = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains
$IgnoreDisplayNameTotal = @(
'Microsoft Exchange*'
foreach ($I in $IgnoreDisplayName) {
$I
}
)
$IgnoreDistinguishedNameTotal = @(
"*,CN=Users,*"
foreach ($I in $IgnoreDistinguishedName) {
$I
}
)
$IgnoreSamAccountNameTotal = @(
'Administrator'
'Guest'
'krbtgt*'
'healthmailbox*'
foreach ($I in $IgnoreSamAccountName) {
$I
}
)
}
Process {
[Array] $UsersFound = foreach ($Domain in $ForestDetails.Domains) {
$QueryServer = $ForestDetails['QueryServers'][$Domain].HostName[0]
if ($OrganizationalUnit) {
$Users = @(
foreach ($OU in $OrganizationalUnit) {
$OUDomain = ConvertFrom-DistinguishedName -DistinguishedName $OU -ToDomainCN
if ($OUDomain -eq $Domain) {
Get-ADUser -Filter "Enabled -eq '$true'" -Properties DisplayName, SamAccountName, PasswordExpired, PasswordLastSet, pwdLastSet, PasswordNeverExpires, AccountExpirationDate -Server $QueryServer -SearchBase $OU
}
}
)
$Users = $Users | Sort-Object -Property DistinguishedName -Unique
} else {
$Users = Get-ADUser -Filter "Enabled -eq '$true'" -Properties DisplayName, SamAccountName, PasswordExpired, PasswordLastSet, pwdLastSet, PasswordNeverExpires, AccountExpirationDate -Server $QueryServer
}
:SkipUser foreach ($User in $Users) {
# lets asses if password is set to expire or not
$DateExpiry = $null
if ($User."msDS-UserPasswordExpiryTimeComputed" -ne 9223372036854775807) {
# This is standard situation where users password is expiring as needed
try {
$DateExpiry = ([datetime]::FromFileTime($User."msDS-UserPasswordExpiryTimeComputed"))
} catch {
$DateExpiry = $User."msDS-UserPasswordExpiryTimeComputed"
}
}
if ($User.pwdLastSet -eq 0 -and $DateExpiry.Year -eq 1601) {
$PasswordAtNextLogon = $true
} else {
$PasswordAtNextLogon = $false
}
if ($User.Enabled -eq $true -and $null -ne $User.AccountExpirationDate) {
if ($User.AccountExpirationDate -le $Today) {
foreach ($I in $IgnoreSamAccountNameTotal) {
if ($User.SamAccountName -like $I) {
Write-Verbose -Message "Request-DisableOnAccountExpiration - Ignoring $($User.SamAccountName) / $($User.DistinguishedName)"
continue SkipUser
}
}
foreach ($I in $IgnoreDistinguishedNameTotal) {
if ($User.DistinguishedName -like $I) {
Write-Verbose -Message "Request-DisableOnAccountExpiration - Ignoring $($User.SamAccountName) / $($User.DistinguishedName)"
continue SkipUser
}
}
foreach ($I in $IgnoreDisplayNameTotal) {
if ($User.DisplayName -like $I) {
Write-Verbose -Message "Request-DisableOnAccountExpiration - Ignoring $($User.SamAccountName) / $($User.DistinguishedName)"
continue SkipUser
}
}
Write-Verbose -Message "Request-DisableOnAccountExpiration - Found $($User.SamAccountName) / $Domain. Expiration date reached '$($User.AccountExpirationDate)'"
[PSCustomObject] @{
SamAccountName = $User.SamAccountName
Domain = $Domain
DisplayName = $User.DisplayName
AccountExpirationDate = $User.AccountExpirationDate
PasswordAtNextLogon = $PasswordAtNextLogon
PasswordExpired = $User.PasswordExpired
PasswordLastSet = $User.PasswordLastSet
PasswordNeverExpires = $User.PasswordNeverExpires
DistinguishedName = $User.DistinguishedName
}
} else {
Write-Verbose -Message "Request-DisableOnAccountExpiration - Skipping $($User.SamAccountName) / $Domain. Expiration date not reached '$($User.AccountExpirationDate)'"
}
}
}
}
$Count = 0
if ($LimitProcessing) {
Write-Verbose -Message "Request-DisableOnAccountExpiration - Found $($UsersFound.Count) expired users. Processing on disablement with limit of $LimitProcessing..."
} else {
Write-Verbose -Message "Request-DisableOnAccountExpiration - Found $($UsersFound.Count) expired users. Processing on disablement..."
}
foreach ($User in $UsersFound) {
if ($LimitProcessing -and $Count -ge $LimitProcessing) {
break
}
Write-Verbose -Message "Request-DisableOnAccountExpiration - Setting $($User.SamAccountName) to be disabled / $($User.Domain)"
Set-ADUser -Enabled $false -Identity $User.SamAccountName -Server $ForestDetails['QueryServers'][$User.Domain].HostName[0]
if ($PassThru) {
$User
}
$Count++
}
}
}
function Restore-ADACLDefault {
<#
.SYNOPSIS
Restore default permissions for given object in Active Directory
.DESCRIPTION
Restore default permissions for given object in Active Directory.
Equivalent of right click on object in Active Directory Users and Computers and selecting 'Restore defaults'
.PARAMETER Object
Specifies Active Directory objects to restore default permissions. This parameter is mandatory.
.PARAMETER RemoveInheritedAccessRules
Indicates whether to remove inherited ACEs from the object or principal.
If this switch is specified, inherited ACEs are removed from the object or principal.
If this switch is not specified, inherited ACEs are retained on the object or principal.
.EXAMPLE
$ObjectCheck = Get-ADObject -Id 'OU=_root,DC=ad,DC=evotec,DC=xyz' -Properties 'NtSecurityDescriptor', 'DistinguishedName'
Restore-ADACLDefault -Object $ObjectCheck -Verbose
.EXAMPLE
Restore-ADACLDefault -Object 'OU=ITR01,DC=ad,DC=evotec,DC=xyz' -RemoveInheritedAccessRules -Verbose -WhatIf
.NOTES
Please be aware that when you use Restore-ADACLDefault it clears up existing permissions which may cut you out.
#>
[CmdletBinding(SupportsShouldProcess)]
param(
[parameter(Mandatory)][alias('Identity')][Object] $Object,
[switch] $RemoveInheritedAccessRules
)
# lets get our forest details
if (-not $Script:ForestDetails) {
Write-Verbose "Restore-ADACLDefault - Gathering Forest Details"
$Script:ForestDetails = Get-WinADForestDetails
}
# Lets get our schema
if (-not $Script:RootDSESchema) {
$Script:RootDSESchema = (Get-ADRootDSE).SchemaNamingContext
}
# lets try to asses what we have for object and if not get it properly
if ($Object) {
if ($Object -is [Microsoft.ActiveDirectory.Management.ADEntity]) {
If ($Object.DistinguishedName -and $Object.NtSecurityDescriptor) {
# We have what we need
} else {
$DomainName = ConvertFrom-DistinguishedName -ToDomainCN -DistinguishedName $Object.DistinguishedName
$QueryServer = $Script:ForestDetails['QueryServers'][$DomainName].HostName[0]
$Object = Get-ADObject -Id $Object.DistinguishedName -Properties 'NtSecurityDescriptor', 'DistinguishedName' -Server $QueryServer
}
} elseif ($Object -is [string]) {
$DomainName = ConvertFrom-DistinguishedName -ToDomainCN -DistinguishedName $Object
$QueryServer = $Script:ForestDetails['QueryServers'][$DomainName].HostName[0]
$Object = Get-ADObject -Id $Object -Properties 'NtSecurityDescriptor', 'DistinguishedName' -Server $QueryServer
} else {
Write-Warning -Message "Restore-ADACLDefault - Unknown object type $($Object.GetType().FullName)"
return
}
} else {
$DomainName = ConvertFrom-DistinguishedName -ToDomainCN -DistinguishedName $Object
$QueryServer = $Script:ForestDetails['QueryServers'][$DomainName].HostName[0]
$Object = Get-ADObject -Id $Object -Properties 'NtSecurityDescriptor', 'DistinguishedName' -Server $QueryServer
}
# We have our object, now lets get the default permissions for given type
if ($Object.ObjectClass -eq 'Unknown') {
Write-Verbose -Message "Restore-ADACLDefault - Unknown object type $($Object.ObjectClass), using default filter for Organizational-Unit"
$Filter = 'name -eq "Organizational-Unit"'
} else {
$Class = $($Object.ObjectClass)
$Filter = "lDAPDisplayName -eq '$Class'"
}
Write-Verbose "Restore-ADACLDefault - Getting default permissions from $Script:RootDSESchema using filter $Filter"
#$ADObject = Get-ADObject -Filter $Filter -SearchBase $Script:RootDSESchema -Properties defaultSecurityDescriptor
$DefaultPermissionsObject = Get-ADObject -Filter $Filter -SearchBase (Get-ADRootDSE).SchemaNamingContext -Properties defaultSecurityDescriptor, canonicalName, lDAPDisplayName
if (-not $DefaultPermissionsObject.defaultsecuritydescriptor) {
Write-Warning -Message "Restore-ADACLDefault - Unable to find default permissions for $($Object.ObjectClass)"
return
}
$Descriptor = $DefaultPermissionsObject.defaultsecuritydescriptor
$DomainName = ConvertFrom-DistinguishedName -ToDomainCN -DistinguishedName $Object.DistinguishedName
$QueryServer = $Script:ForestDetails['QueryServers'][$DomainName].HostName[0]
#Write-Verbose -Message "Restore-ADACLDefault - Disabling inheritance for $($Object.DistinguishedName)"
#Disable-ADACLInheritance -ADObject $Object.DistinguishedName -RemoveInheritedAccessRules -Verbose
#Write-Verbose -Message "Restore-ADACLDefault - Removing permissions for $($Object.DistinguishedName)"
#Remove-ADACL -ADObject $Object.DistinguishedName
# $Descriptor | ConvertFrom-SddlString -Type ActiveDirectoryRights
# $SecurityDescriptor = [System.DirectoryServices.ActiveDirectorySecurity]::new()
# $SecurityDescriptor.SetSecurityDescriptorSddlForm($Descriptor)
# $SecurityDescriptor
$Object.NtSecurityDescriptor.SetSecurityDescriptorSddlForm($Descriptor)
Write-Verbose "Restore-ADACLDefault - Saving permissions for $($Object.DistinguishedName) on $($QueryServer)"
Set-ADObject -Identity $Object.DistinguishedName -Replace @{ ntSecurityDescriptor = $Object.NtSecurityDescriptor } -ErrorAction Stop -Server $QueryServer
if ($RemoveInheritedAccessRules) {
Write-Verbose -Message "Restore-ADACLDefault - Disabling inheritance for $($Object.DistinguishedName)"
Disable-ADACLInheritance -ADObject $Object.DistinguishedName -RemoveInheritedAccessRules
}
}
<# Code to use to find default permissions for given object type
$Object = Get-ADObject -Id 'OU=_root,DC=ad,DC=evotec,DC=xyz' -Properties 'NtSecurityDescriptor', 'DistinguishedName'
$Class = $($Object.ObjectClass)
$List = Get-ADObject -Filter "lDAPDisplayName -eq '$Class'" -SearchBase (Get-ADRootDSE).SchemaNamingContext -Properties defaultSecurityDescriptor, canonicalName, lDAPDisplayName
$List
#>
function Set-ADACL {
<#
.SYNOPSIS
Sets the access control list (ACL) for a specified Active Directory object.
.DESCRIPTION
This cmdlet sets the ACL for a specified Active Directory object. It supports both local and remote operations.
It can use a credential for remote connections. It filters out adapters that are DHCP enabled or do not have a DNS server search order set.
It then sets the DNS server IP addresses for the remaining adapters. If the operation is successful, it retrieves the current DNS server IP addresses.
.PARAMETER ADObject
Specifies the Active Directory object on which to set the ACL.
.PARAMETER ACLSettings
Specifies the ACL settings to apply to the ADObject.
.PARAMETER Inheritance
Specifies whether to enable or disable inheritance of ACEs from parent objects.
.PARAMETER Suppress
Indicates whether to suppress the operation.
.EXAMPLE
Set-ADACL -ADObject 'CN=TestOU,DC=contoso,DC=com' -ACLSettings @($ACL1, $ACL2) -Inheritance 'Disabled' -Suppress
This example sets the ACL for the specified Active Directory object with the provided ACL settings and inheritance, and suppresses the operation.
.NOTES
General notes
#>
[cmdletBinding(SupportsShouldProcess)]
param(
[Parameter(Mandatory, Position = 0, ValueFromPipeline, ValueFromPipelineByPropertyName)]
[alias('Identity')][string] $ADObject,
[Parameter(Mandatory)][Array] $ACLSettings,
[Parameter(Mandatory)][ValidateSet('Enabled', 'Disabled')] $Inheritance,
[switch] $Suppress
)
$Results = @{
Add = [System.Collections.Generic.List[PSCustomObject]]::new()
Remove = [System.Collections.Generic.List[PSCustomObject]]::new()
Skip = [System.Collections.Generic.List[PSCustomObject]]::new()
Warnings = [System.Collections.Generic.List[string]]::new()
Errors = [System.Collections.Generic.List[string]]::new()
}
$CachedACL = [ordered] @{}
$ExpectedProperties = @('ActiveDirectoryRights', 'AccessControlType', 'ObjectTypeName', 'InheritedObjectTypeName', 'InheritanceType')
$FoundDiscrepancy = $false
$Count = 1
foreach ($ACL in $ACLSettings) {
if ($ACL.Action -eq 'Skip') {
continue
} elseif ($ACL.Action -eq 'Copy') {
continue
}
# Check if all properties are present
if ($ACL.Principal -and $ACL.Permissions) {
foreach ($Permission in $ACL.Permissions) {
if ($Permission -is [System.Collections.IDictionary]) {
Compare-Object -ReferenceObject $ExpectedProperties -DifferenceObject @($Permission.Keys) | Where-Object { $_.SideIndicator -in '<=' } | ForEach-Object {
Write-Warning -Message "Set-ADACL - Entry $Count - $($ACL.Principal) is missing property $($_.InputObject) - provided only $($Permission.Keys)"
$FoundDiscrepancy = $true
}
} else {
Compare-Object -ReferenceObject $ExpectedProperties -DifferenceObject @($Permission.PSObject.Properties.Name) | Where-Object { $_.SideIndicator -in '<=' } | ForEach-Object {
Write-Warning -Message "Set-ADACL - Entry $Count - $($ACL.Principal) is missing property $($_.InputObject) - provided only $($Permission.PSObject.Properties.Name)"
$FoundDiscrepancy = $true
}
}
}
} elseif ($ACL.Principal) {
if ($ACL -is [System.Collections.IDictionary]) {
Compare-Object -ReferenceObject $ExpectedProperties -DifferenceObject @($ACL.Keys) | Where-Object { $_.SideIndicator -in '<=' } | ForEach-Object {
Write-Warning -Message "Set-ADACL - Entry $Count - $($ACL.Principal) is missing property $($_.InputObject) - provided only $($ACL.Keys)"
$FoundDiscrepancy = $true
}
} else {
Compare-Object -ReferenceObject $ExpectedProperties -DifferenceObject @($ACL.PSObject.Properties.Name) | Where-Object { $_.SideIndicator -in '<=' } | ForEach-Object {
Write-Warning -Message "Set-ADACL - Entry $Count - $($ACL.Principal) is missing property $($_.InputObject) - provided only $($ACL.PSObject.Properties.Name)"
$FoundDiscrepancy = $true
}
}
}
$Count++
}
if ($FoundDiscrepancy) {
Write-Warning -Message "Set-ADACL - Please check your ACL configuration is correct. Each entry must have the following properties: $($ExpectedProperties -join ', ')"
$Results.Warnings.Add("Please check your ACL configuration is correct. Each entry must have the following properties: $($ExpectedProperties -join ', ')")
if (-not $Suppress) {
return $Results
} else {
return
}
}
foreach ($ExpectedACL in $ACLSettings) {
if ($ExpectedACL.Principal -and $ExpectedACL.Permissions) {
foreach ($Principal in $ExpectedACL.Principal) {
$ConvertedIdentity = Convert-Identity -Identity $Principal -Verbose:$false
if ($ConvertedIdentity.Error) {
Write-Warning -Message "Set-ADACL - Converting identity $($Principal) failed with $($ConvertedIdentity.Error). Be warned."
$Results.Warnings.Add("Converting identity $($Principal) failed with $($ConvertedIdentity.Error). Be warned.")
}
$ConvertedPrincipal = ($ConvertedIdentity).Name
if (-not $CachedACL[$ConvertedPrincipal]) {
$CachedACL[$ConvertedPrincipal] = [ordered] @{}
}
# user may not provided any action, so we assume 'Set' as default
$Action = if ($ExpectedACL.Action) {
$ExpectedACL.Action
} else {
'Add'
}
#$ExpectedACL.Action = $Action
$CachedACL[$ConvertedPrincipal]['Action'] = $Action
if (-not $CachedACL[$ConvertedPrincipal]['Permissions']) {
$CachedACL[$ConvertedPrincipal]['Permissions'] = [System.Collections.Generic.List[object]]::new()
}
if ($ExpectedACL.Permissions) {
foreach ($Permission in $ExpectedACL.Permissions) {
$CachedACL[$ConvertedPrincipal]['Permissions'].Add([PSCustomObject] $Permission)
}
}
}
} elseif ($ExpectedACL.Principal) {
foreach ($Principal in $ExpectedACL.Principal) {
$ConvertedIdentity = Convert-Identity -Identity $Principal -Verbose:$false
if ($ConvertedIdentity.Error) {
Write-Warning -Message "Set-ADACL - Converting identity $($Principal) failed with $($ConvertedIdentity.Error). Be warned."
}
$ConvertedPrincipal = ($ConvertedIdentity).Name
if (-not $CachedACL[$ConvertedPrincipal]) {
$CachedACL[$ConvertedPrincipal] = [ordered] @{}
}
# user may not provided any action, so we assume 'Set' as default
$Action = if ($ExpectedACL.Action) {
$ExpectedACL.Action
} else {
'Add'
}
#$ExpectedACL.Action = $Action
$CachedACL[$ConvertedPrincipal]['Action'] = $Action
if (-not $CachedACL[$ConvertedPrincipal]['Permissions']) {
$CachedACL[$ConvertedPrincipal]['Permissions'] = [System.Collections.Generic.List[object]]::new()
}
$NewPermission = [ordered] @{}
if ($ExpectedACL -is [System.Collections.IDictionary]) {
foreach ($Key in $ExpectedACL.Keys) {
if ($Key -notin @('Principal')) {
$NewPermission.$Key = $ExpectedACL.$Key
}
}
} else {
foreach ($Property in $ExpectedACL.PSObject.Properties) {
if ($Property.Name -notin @('Principal')) {
$NewPermission.$($Property.Name) = $Property.Value
}
}
}
$CachedACL[$ConvertedPrincipal]['Permissions'].Add([PSCustomObject] $NewPermission)
}
}
}
$MainAccessRights = Get-ADACL -ADObject $ADObject -Bundle
foreach ($CurrentACL in $MainAccessRights.ACLAccessRules) {
$ConvertedIdentity = Convert-Identity -Identity $CurrentACL.Principal -Verbose:$false
if ($ConvertedIdentity.Error) {
Write-Warning -Message "Set-ADACL - Converting identity $($Principal) failed with $($ConvertedIdentity.Error). Be warned."
$Results.Warnings.Add("Converting identity $($Principal) failed with $($ConvertedIdentity.Error). Be warned.")
}
$ConvertedPrincipal = ($ConvertedIdentity).Name
if ($CachedACL[$ConvertedPrincipal]) {
if ($CachedACL[$ConvertedPrincipal]['Action'] -eq 'Skip') {
#Write-Verbose "Set-ADACL - Skipping $($CurrentACL.Principal)"
$Results.Skip.Add(
[PSCustomObject] @{
Principal = $ConvertedPrincipal
AccessControlType = $CurrentACL.AccessControlType
Action = 'Skip'
Permissions = $CurrentACL
}
)
continue
} else {
Write-Verbose "Set-ADACL - Processing $($ConvertedPrincipal)"
$DirectMatch = $false
foreach ($SetPermission in $CachedACL[$ConvertedPrincipal].Permissions) {
if ($CurrentACL.AccessControlType -eq $SetPermission.AccessControlType) {
# since it's possible people will differently name their object type name, we are going to convert it to GUID
$TypeObjectLeft = Convert-ADSchemaToGuid -SchemaName $CurrentACL.ObjectTypeName -AsString
$TypeObjectRight = Convert-ADSchemaToGuid -SchemaName $SetPermission.ObjectTypeName -AsString
if ($TypeObjectLeft -eq $TypeObjectRight) {
if ($CurrentACL.ActiveDirectoryRights -eq $SetPermission.ActiveDirectoryRights) {
if ($CurrentACL.InheritedObjectTypeName -eq $SetPermission.InheritedObjectTypeName) {
if ($CurrentACL.InheritanceType -eq $SetPermission.InheritanceType) {
$DirectMatch = $true
}
}
}
}
}
}
if ($DirectMatch) {
$Results.Skip.Add(
[PSCustomObject] @{
Principal = $ConvertedPrincipal
AccessControlType = $CurrentACL.AccessControlType
Action = 'Skip'
Permissions = $CurrentACL
}
)
} else {
if ($Inheritance -eq 'Enabled' -and $CurrentACL.IsInherited) {
# normally we would try to remove it, but it is inherited, so we will skip it
$Results.Skip.Add(
[PSCustomObject] @{
Principal = $ConvertedPrincipal
AccessControlType = $CurrentACL.AccessControlType
Action = 'Skip'
Permissions = $CurrentACL
}
)
} else {
$Results.Remove.Add(
[PSCustomObject] @{
Principal = $ConvertedPrincipal
AccessControlType = $CurrentACL.AccessControlType
Action = 'Remove'
Permissions = $CurrentACL
}
)
}
}
}
} else {
# we don't have this principal defined for set, needs to be removed
Write-Verbose "Set-ADACL - Preparing for removal of $($ConvertedPrincipal)"
if ($Inheritance -eq 'Enabled' -and $CurrentACL.IsInherited) {
$Results.Skip.Add(
[PSCustomObject] @{
Principal = $ConvertedPrincipal
AccessControlType = $CurrentACL.AccessControlType
Action = 'Skip'
Permissions = $CurrentACL
}
)
} else {
$Results.Remove.Add(
[PSCustomObject] @{
Principal = $ConvertedPrincipal
AccessControlType = $CurrentACL.AccessControlType
Action = 'Remove'
Permissions = $CurrentACL
}
)
}
}
}
$AlreadyCovered = [System.Collections.Generic.List[PSCustomObject]]::new()
foreach ($Principal in $CachedACL.Keys) {
if ($CachedACL[$Principal]['Action'] -in 'Add', 'Set') {
foreach ($SetPermission in $CachedACL[$Principal]['Permissions']) {
$DirectMatch = $false
foreach ($CurrentACL in $MainAccessRights.ACLAccessRules) {
if ($CurrentACL -in $AlreadyCovered) {
continue
}
$RequestedPrincipal = Convert-Identity -Identity $Principal -Verbose:$false
$RequestedPrincipalFromACL = Convert-Identity -Identity $CurrentACL.Principal -Verbose:$false
if ($RequestedPrincipalFromACL.Name -ne $RequestedPrincipal.Name) {
continue
}
if ($CurrentACL.AccessControlType -eq $SetPermission.AccessControlType) {
# since it's possible people will differently name their object type name, we are going to convert it to GUID
$TypeObjectLeft = Convert-ADSchemaToGuid -SchemaName $CurrentACL.ObjectTypeName -AsString
$TypeObjectRight = Convert-ADSchemaToGuid -SchemaName $SetPermission.ObjectTypeName -AsString
if ($TypeObjectLeft -eq $TypeObjectRight) {
if ($CurrentACL.ActiveDirectoryRights -eq $SetPermission.ActiveDirectoryRights) {
if ($CurrentACL.InheritedObjectTypeName -eq $SetPermission.InheritedObjectTypeName) {
if ($CurrentACL.InheritanceType -eq $SetPermission.InheritanceType) {
$DirectMatch = $true
$AlreadyCovered.Add($CurrentACL)
}
}
}
}
}
}
if ($DirectMatch) {
Write-Verbose -Message "Set-ADACL - Skipping $($Principal), as it already exists"
} else {
$Results.Add.Add(
[PSCustomObject] @{
Principal = $Principal
AccessControlType = $SetPermission.AccessControlType
Action = 'Add'
Permissions = $SetPermission
}
)
}
}
}
}
if (-not $WhatIfPreference) {
Write-Verbose -Message "Set-ADACL - Applying changes to ACL"
if ($Results.Remove.Permissions) {
Write-Verbose -Message "Set-ADACL - Removing ACL"
try {
Remove-ADACL -ActiveDirectorySecurity $MainAccessRights.ACL -ACL $Results.Remove.Permissions
} catch {
Write-Warning -Message "Set-ADACL - Failed to remove ACL for at least one of principals $($Results.Remove.Principal -join ', ')"
$Results.Errors.Add("Failed to remove ACL for $($Results.Remove.Principal -join ', ')")
}
}
Write-Verbose -Message "Set-ADACL - Adding ACL"
foreach ($Add in $Results.Add) {
$addADACLSplat = @{
NTSecurityDescriptor = $MainAccessRights.ACL
ADObject = $ADObject
Principal = $Add.Principal
AccessControlType = $Add.Permissions.AccessControlType
AccessRule = $Add.Permissions.ActiveDirectoryRights
ObjectType = $Add.Permissions.ObjectTypeName
InheritanceType = $Add.Permissions.InheritanceType
InheritedObjectType = $Add.Permissions.InheritedObjectTypeName
}
try {
Add-ADACL @addADACLSplat
} catch {
Write-Warning -Message "Set-ADACL - Failed to add ACL for $($Add.Principal)"
$Results.Errors.Add("Failed to add ACL for $($Add.Principal)")
}
}
}
if (-not $Suppress) {
$Results
}
}
function Set-ADACLInheritance {
<#
.SYNOPSIS
Enables or Disables the inheritance of access control entries (ACEs) from parent objects for one or more Active Directory objects or security principals.
.DESCRIPTION
Enables or Disables the inheritance of access control entries (ACEs) from parent objects for one or more Active Directory objects or security principals.
.PARAMETER ADObject
Specifies one or more Active Directory objects or security principals to enable or disable inheritance of ACEs from parent objects.
This parameter is mandatory when the 'ADObject' parameter set is used.
.PARAMETER ACL
Specifies one or more access control lists (ACLs) to enable or disable inheritance of ACEs from parent objects.
This parameter is mandatory when the 'ACL' parameter set is used.
.PARAMETER Inheritance
Specifies whether to enable or disable inheritance of ACEs from parent objects.
.PARAMETER RemoveInheritedAccessRules
Indicates whether to remove inherited ACEs from the object or principal.
.EXAMPLE
Set-ADACLInheritance -ADObject 'CN=TestOU,DC=contoso,DC=com' -Inheritance 'Disabled' -RemoveInheritedAccessRules
.EXAMPLE
Set-ADACLInheritance -ACL $ACL -Inheritance 'Disabled' -RemoveInheritedAccessRules
.EXAMPLE
Set-ADACLInheritance -ADObject 'CN=TestOU,DC=contoso,DC=com' -Inheritance 'Enabled'
.NOTES
General notes
#>
[cmdletBinding(SupportsShouldProcess, DefaultParameterSetName = 'ADObject')]
param(
[parameter(ParameterSetName = 'ADObject', Mandatory)][alias('Identity')][Array] $ADObject,
[parameter(ParameterSetName = 'ACL', Mandatory)][Array] $ACL,
[Parameter(Mandatory)][ValidateSet('Enabled', 'Disabled')] $Inheritance,
[switch] $RemoveInheritedAccessRules
)
if (-not $Script:ForestDetails) {
Write-Verbose "Set-ADACLInheritance - Gathering Forest Details"
$Script:ForestDetails = Get-WinADForestDetails
}
$PreserveInheritance = -not $RemoveInheritedAccessRules.IsPresent
if ($ACL) {
foreach ($A in $ACL) {
# isProtected - true to protect the access rules associated with this ObjectSecurity object from inheritance; false to allow inheritance.
# preserveInheritance - true to preserve inherited access rules; false to remove inherited access rules. This parameter is ignored if isProtected is false.
if ($Inheritance -eq 'Enabled') {
$A.ACL.SetAccessRuleProtection($false, -not $RemoveInheritedAccessRules.IsPresent)
$Action = "Inheritance $Inheritance"
Write-Verbose "Set-ADACLInheritance - Enabling inheritance for $($A.DistinguishedName)"
} elseif ($Inheritance -eq 'Disabled') {
$Action = "Inheritance $Inheritance, RemoveInheritedAccessRules $RemoveInheritedAccessRules"
$A.ACL.SetAccessRuleProtection($true, $PreserveInheritance)
Write-Verbose "Set-ADACLInheritance - Disabling inheritance for $($A.DistinguishedName) / Remove Inherited Rules: $($RemoveInheritedAccessRules.IsPresent)"
}
$DomainName = ConvertFrom-DistinguishedName -ToDomainCN -DistinguishedName $A.DistinguishedName
$QueryServer = $Script:ForestDetails['QueryServers'][$DomainName].HostName[0]
if ($PSCmdlet.ShouldProcess($A.DistinguishedName, $Action)) {
Write-Verbose "Set-ADACLInheritance - Saving permissions for $($A.DistinguishedName) on $QueryServer"
try {
Set-ADObject -Identity $A.DistinguishedName -Replace @{ ntSecurityDescriptor = $A.ACL } -ErrorAction Stop -Server $QueryServer
} catch {
Write-Warning "Set-ADACLInheritance - Saving permissions for $($A.DistinguishedName) on $QueryServer failed: $($_.Exception.Message)"
}
}
}
} else {
foreach ($Object in $ADObject) {
$getADACLSplat = @{
ADObject = $ADObject
Bundle = $true
Resolve = $true
}
$ACL = Get-ADACL @getADACLSplat
# isProtected - true to protect the access rules associated with this ObjectSecurity object from inheritance; false to allow inheritance.
# preserveInheritance - true to preserve inherited access rules; false to remove inherited access rules. This parameter is ignored if isProtected is false.
if ($Inheritance -eq 'Enabled') {
$ACL.ACL.SetAccessRuleProtection($false, -not $RemoveInheritedAccessRules.IsPresent)
$Action = "Inheritance $Inheritance"
Write-Verbose "Set-ADACLInheritance - Enabling inheritance for $($ACL.DistinguishedName)"
} elseif ($Inheritance -eq 'Disabled') {
$Action = "Inheritance $Inheritance, RemoveInheritedAccessRules $RemoveInheritedAccessRules"
$ACL.ACL.SetAccessRuleProtection($true, $PreserveInheritance)
Write-Verbose "Set-ADACLInheritance - Disabling inheritance for $($ACL.DistinguishedName) / Remove Inherited Rules: $($RemoveInheritedAccessRules.IsPresent)"
}
$DomainName = ConvertFrom-DistinguishedName -ToDomainCN -DistinguishedName $ACL.DistinguishedName
$QueryServer = $Script:ForestDetails['QueryServers'][$DomainName].HostName[0]
if ($PSCmdlet.ShouldProcess($ACL.DistinguishedName, $Action)) {
Write-Verbose "Set-ADACLInheritance - Saving permissions for $($ACL.DistinguishedName) on $QueryServer"
try {
Set-ADObject -Identity $ACL.DistinguishedName -Replace @{ ntSecurityDescriptor = $ACL.ACL } -ErrorAction Stop -Server $QueryServer
# Set-Acl -Path $ACL.Path -AclObject $ACL.ACL -ErrorAction Stop
} catch {
Write-Warning "Set-ADACLInheritance - Saving permissions for $($ACL.DistinguishedName) on $QueryServer failed: $($_.Exception.Message)"
}
}
}
}
}
function Set-ADACLOwner {
<#
.SYNOPSIS
Sets the owner of the ACLs on specified Active Directory objects to a specified principal.
.DESCRIPTION
This cmdlet sets the owner of the ACLs on specified Active Directory objects to a specified principal. It supports setting the owner on multiple objects at once and can handle both local and remote operations. It also provides verbose and warning messages to facilitate troubleshooting.
.PARAMETER ADObject
Specifies the Active Directory objects on which to set the owner. This can be a list of objects or a list of Distinguished Names of objects.
.PARAMETER Principal
Specifies the principal to set as the owner of the ACLs. This can be a string in the format of 'Domain\Username' or 'Username@Domain'.
.EXAMPLE
Set-ADACLOwner -ADObject 'OU=Users,DC=example,DC=com', 'CN=Computers,DC=example,DC=com' -Principal 'example\DomainAdmins'
This example sets the owner of the ACLs on the specified OU and CN to 'example\DomainAdmins'.
.EXAMPLE
Set-ADACLOwner -ADObject 'CN=User1,DC=example,DC=com', 'CN=Computer1,DC=example,DC=com' -Principal '[email protected]'
This example sets the owner of the ACLs on the specified user and computer to '[email protected]'.
#>
[cmdletBinding(SupportsShouldProcess)]
param(
[parameter(Mandatory)][alias('Identity')][Array] $ADObject,
[Parameter(Mandatory)][string] $Principal
)
Begin {
if ($Principal -is [string]) {
if ($Principal -like '*/*') {
$SplittedName = $Principal -split '/'
[System.Security.Principal.IdentityReference] $PrincipalIdentity = [System.Security.Principal.NTAccount]::new($SplittedName[0], $SplittedName[1])
} else {
[System.Security.Principal.IdentityReference] $PrincipalIdentity = [System.Security.Principal.NTAccount]::new($Principal)
}
} else {
# Not yet ready
return
}
}
Process {
foreach ($Object in $ADObject) {
#$ADObjectData = $null
if ($Object -is [Microsoft.ActiveDirectory.Management.ADOrganizationalUnit] -or $Object -is [Microsoft.ActiveDirectory.Management.ADEntity]) {
# if object already has proper security descriptor we don't need to do additional querying
#if ($Object.ntSecurityDescriptor) {
# $ADObjectData = $Object
#}
[string] $DistinguishedName = $Object.DistinguishedName
[string] $CanonicalName = $Object.CanonicalName
[string] $ObjectClass = $Object.ObjectClass
} elseif ($Object -is [string]) {
[string] $DistinguishedName = $Object
[string] $CanonicalName = ''
[string] $ObjectClass = ''
} else {
Write-Warning "Set-ADACLOwner - Object not recognized. Skipping..."
continue
}
$DNConverted = (ConvertFrom-DistinguishedName -DistinguishedName $DistinguishedName -ToDC) -replace '=' -replace ','
if (-not (Get-PSDrive -Name $DNConverted -ErrorAction SilentlyContinue)) {
Write-Verbose "Set-ADACLOwner - Enabling PSDrives for $DistinguishedName to $DNConverted"
New-ADForestDrives -ForestName $ForestName # -ObjectDN $DistinguishedName
if (-not (Get-PSDrive -Name $DNConverted -ErrorAction SilentlyContinue)) {
Write-Warning "Set-ADACLOwner - Drive $DNConverted not mapped. Terminating..."
continue
}
}
$PathACL = "$DNConverted`:\$($DistinguishedName)"
try {
$ACLs = Get-Acl -Path $PathACL -ErrorAction Stop
} catch {
Write-Warning "Get-ADACL - Path $DistinguishedName / $PathACL - Error: $($_.Exception.Message)"
continue
}
<#
if (-not $ADObjectData) {
try {
$ADObjectData = Get-ADObject -Identity $DistinguishedName -Properties ntSecurityDescriptor -ErrorAction Stop
$ACLs = $ADObjectData.ntSecurityDescriptor
} catch {
Write-Warning "Get-ADACL - Path $DistinguishedName - Error: $($_.Exception.Message)"
continue
}
}
#>
$CurrentOwner = $ACLs.Owner
Write-Verbose "Set-ADACLOwner - Changing owner from $($CurrentOwner) to $PrincipalIdentity for $($DistinguishedName)"
try {
$ACLs.SetOwner($PrincipalIdentity)
} catch {
Write-Warning "Set-ADACLOwner - Unable to change owner from $($CurrentOwner) to $PrincipalIdentity for $($DistinguishedName): $($_.Exception.Message)"
continue
}
try {
#Set-ADObject -Identity $DistinguishedName -Replace @{ ntSecurityDescriptor = $ACLs } -ErrorAction Stop
Set-Acl -Path $PathACL -AclObject $ACLs -ErrorAction Stop
} catch {
Write-Warning "Set-ADACLOwner - Unable to change owner from $($CurrentOwner) to $PrincipalIdentity for $($DistinguishedName): $($_.Exception.Message)"
}
# }
}
}
End {
}
}
function Set-DnsServerIP {
<#
.SYNOPSIS
Sets the DNS server IP addresses for a specified list of computers.
.DESCRIPTION
This cmdlet sets the DNS server IP addresses for a specified list of computers. It supports both local and remote operations.
It can use a credential for remote connections. It filters out adapters that are DHCP enabled or do not have a DNS server search order set.
It then sets the DNS server IP addresses for the remaining adapters. If the operation is successful, it retrieves the current DNS server IP addresses.
.PARAMETER ComputerName
Specifies the names of the computers on which to set the DNS server IP addresses.
.PARAMETER DnsIpAddress
Specifies the IP addresses of the DNS servers to set.
.PARAMETER Credential
Specifies the credentials to use for remote connections.
.EXAMPLE
Set-DnsServerIP -ComputerName 'Computer1', 'Computer2' -DnsIpAddress '8.8.8.8', '8.8.4.4'
This example sets the DNS server IP addresses to '8.8.8.8' and '8.8.4.4' for 'Computer1' and 'Computer2'.
.EXAMPLE
Set-DnsServerIP -ComputerName 'Computer1', 'Computer2' -DnsIpAddress '8.8.8.8', '8.8.4.4' -Credential (Get-Credential)
This example sets the DNS server IP addresses to '8.8.8.8' and '8.8.4.4' for 'Computer1' and 'Computer2' using the credentials provided by the user.
#>
[alias('Set-WinDNSServerIP')]
[cmdletbInding(SupportsShouldProcess)]
param(
[string[]] $ComputerName,
[string[]] $DnsIpAddress,
[pscredential] $Credential
)
foreach ($Computer in $Computers) {
try {
if ($Credential) {
$CimSession = New-CimSession -ComputerName $Computer -Credential $Credential -Authentication Negotiate -ErrorAction Stop
} else {
$CimSession = New-CimSession -ComputerName $Computer -ErrorAction Stop -Authentication Negotiate
}
} catch {
Write-Warning "Couldn't authorize session to $Computer. Error $($_.Exception.Message). Skipping."
continue
}
$Adapters = Get-CimData -Class Win32_NetworkAdapterConfiguration -ComputerName $Computer | Where-Object { $_.DHCPEnabled -ne 'True' -and $null -ne $_.DNSServerSearchOrder }
if ($Adapters) {
$Text = "Setting DNS to $($DNSIPAddress -join ', ')"
if ($PSCmdlet.ShouldProcess($Computer, $Text)) {
if ($Adapters) {
try {
$Adapters | Set-DnsClientServerAddress -ServerAddresses $DnsIpAddress -CimSession $CimSession
} catch {
Write-Warning "Couldn't fix adapters with IP Address for $Computer. Error $($_.Exception.Message)"
continue
}
}
Get-DNSServerIP -ComputerName $Computer
}
}
}
}
function Set-WinADDiagnostics {
<#
.SYNOPSIS
Sets the diagnostics level for various Active Directory components on specified domain controllers.
.DESCRIPTION
This cmdlet sets the diagnostics level for various Active Directory components on specified domain controllers. It allows you to specify the forest name, domains, domain controllers, and diagnostics components to target. Additionally, it provides options to exclude certain domains and domain controllers, as well as skip read-only domain controllers.
.PARAMETER Forest
Specifies the name of the forest for which to set the diagnostics.
.PARAMETER ExcludeDomains
Specifies an array of domain names to exclude from the operation.
.PARAMETER ExcludeDomainControllers
Specifies an array of domain controller names to exclude from the operation.
.PARAMETER IncludeDomains
Specifies an array of domain names to include in the operation.
.PARAMETER IncludeDomainControllers
Specifies an array of domain controller names to include in the operation.
.PARAMETER SkipRODC
Specifies whether to skip read-only domain controllers.
.PARAMETER Diagnostics
Specifies an array of diagnostics components to set. Valid values include:
- Knowledge Consistency Checker (KCC)
- Security Events
- ExDS Interface Events
- MAPI Interface Events
- Replication Events
- Garbage Collection
- Internal Configuration
- Directory Access
- Internal Processing
- Performance Counters
- Initialization / Termination
- Service Control
- Name Resolution
- Backup
- Field Engineering
- LDAP Interface Events
- Setup
- Global Catalog
- Inter-site Messaging
- Group Caching
- Linked-Value Replication
- DS RPC Client
- DS RPC Server
- DS Schema
- Transformation Engine
- Claims-Based Access Control
- Netlogon
.PARAMETER Level
Specifies the level of diagnostics to set. Valid values include:
- None: Only critical events and error events are logged.
- Minimal: Very high-level events are recorded.
- Basic: More detailed information is recorded.
- Extensive: Detailed information, including steps performed to complete tasks, is recorded.
- Verbose: All events, including debug strings and configuration changes, are logged.
- Internal: A complete log of the service is recorded.
.PARAMETER ExtendedForestInformation
Specifies additional information about the forest.
.EXAMPLE
Set-WinADDiagnostics -Forest 'example.local' -Diagnostics 'Security Events', 'Replication Events' -Level 'Basic'
Sets the diagnostics level for Security Events and Replication Events to Basic on all domain controllers in the example.local forest.
.EXAMPLE
Set-WinADDiagnostics -Forest 'example.local' -IncludeDomainControllers 'dc1.example.local', 'dc2.example.local' -Diagnostics 'Netlogon' -Level 'Verbose'
Sets the diagnostics level for Netlogon to Verbose on the specified domain controllers in the example.local forest.
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers', 'ComputerName')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[ValidateSet(
'Knowledge Consistency Checker (KCC)',
'Security Events',
'ExDS Interface Events',
'MAPI Interface Events',
'Replication Events',
'Garbage Collection',
'Internal Configuration',
'Directory Access',
'Internal Processing',
'Performance Counters',
'Initialization / Termination',
'Service Control',
'Name Resolution',
'Backup',
'Field Engineering',
'LDAP Interface Events',
'Setup',
'Global Catalog',
'Inter-site Messaging',
#New to Windows Server 2003:
'Group Caching',
'Linked-Value Replication',
'DS RPC Client',
'DS RPC Server',
'DS Schema',
#New to Windows Server 2012 and Windows 8:
'Transformation Engine',
'Claims-Based Access Control',
# Added, but not setting in same place
'Netlogon'
)][string[]] $Diagnostics,
#[ValidateSet('None', 'Minimal', 'Basic', 'Extensive', 'Verbose', 'Internal')]
[string] $Level,
[System.Collections.IDictionary] $ExtendedForestInformation
)
<# Levels
0 (None): Only critical events and error events are logged at this level. This is the default setting for all entries, and it should be modified only if a problem occurs that you want to investigate.
1 (Minimal): Very high-level events are recorded in the event log at this setting. Events may include one message for each major task that is performed by the service. Use this setting to start an investigation when you do not know the location of the problem.
2 (Basic)
3 (Extensive): This level records more detailed information than the lower levels, such as steps that are performed to complete a task. Use this setting when you have narrowed the problem to a service or a group of categories.
4 (Verbose)
5 (Internal): This level logs all events, including debug strings and configuration changes. A complete log of the service is recorded. Use this setting when you have traced the problem to a particular category of a small set of categories.
#>
$LevelsDictionary = @{
'None' = 0
'Minimal' = 1
'Basic' = 2
'Extensive' = 3
'Verbose' = 4
'Internal' = 5
}
$Type = @{
'Knowledge Consistency Checker (KCC)' = '1 Knowledge Consistency Checker'
'Security Events' = '2 Security Events'
'ExDS Interface Events' = '3 ExDS Interface Events'
'MAPI Interface Events' = '4 MAPI Interface Events'
'Replication Events' = '5 Replication Events'
'Garbage Collection' = '6 Garbage Collection'
'Internal Configuration' = '7 Internal Configuration'
'Directory Access' = '8 Directory Access'
'Internal Processing' = '9 Internal Processing'
'Performance Counters' = '10 Performance Counters'
'Initialization / Termination' = '11 Initialization/Termination'
'Service Control' = '12 Service Control'
'Name Resolution' = '13 Name Resolution'
'Backup' = '14 Backup'
'Field Engineering' = '15 Field Engineering'
'LDAP Interface Events' = '16 LDAP Interface Events'
'Setup' = '17 Setup'
'Global Catalog' = '18 Global Catalog'
'Inter-site Messaging' = '19 Inter-site Messaging'
#New to Windows Server 2003: = #New to Windows Server 2003:
'Group Caching' = '20 Group Caching'
'Linked-Value Replication' = '21 Linked-Value Replication'
'DS RPC Client' = '22 DS RPC Client'
'DS RPC Server' = '23 DS RPC Server'
'DS Schema' = '24 DS Schema'
#New to Windows Server 2012 and Windows 8: = #New to Windows Server 2012 and Windows 8:
'Transformation Engine' = '25 Transformation Engine'
'Claims-Based Access Control' = '26 Claims-Based Access Control'
}
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
[Array] $Computers = $ForestInformation.ForestDomainControllers.HostName
foreach ($Computer in $Computers) {
foreach ($D in $Diagnostics) {
if ($D) {
$DiagnosticsType = $Type[$D]
$DiagnosticsLevel = $LevelsDictionary[$Level]
if ($null -ne $DiagnosticsType -and $null -ne $DiagnosticsLevel) {
Write-Verbose "Set-WinADDiagnostics - Setting $DiagnosticsType to $DiagnosticsLevel on $Computer"
Set-PSRegistry -RegistryPath 'HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics' -Type REG_DWORD -Key $DiagnosticsType -Value $DiagnosticsLevel -ComputerName $Computer
} else {
if ($D -eq 'Netlogon') {
# https://support.microsoft.com/en-us/help/109626/enabling-debug-logging-for-the-netlogon-service
# Weirdly enough nltest sets it as REG_SZ and article above says REG_DWORD
if ($Level -eq 'None') {
# nltest /dbflag:0x2080ffff # Enable
Write-Verbose "Set-WinADDiagnostics - Setting Netlogon Diagnostics to Enabled on $Computer"
Set-PSRegistry -RegistryPath 'HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters' -Type REG_DWORD -Key 'DbFlag' -Value 0 -ComputerName $Computer -Verbose:$false
} else {
# nltest /dbflag:0x0 # Disable
Write-Verbose "Set-WinADDiagnostics - Setting Netlogon Diagnostics to Disabled on $Computer"
Set-PSRegistry -RegistryPath 'HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters' -Type REG_DWORD -Key 'DbFlag' -Value 545325055 -ComputerName $Computer -Verbose:$false
}
# Retart of NetLogon service is not required.
}
}
}
}
}
}
[scriptblock] $LevelAutoCompleter = {
param($commandName, $parameterName, $wordToComplete, $commandAst, $fakeBoundParameters)
@('None', 'Minimal', 'Basic', 'Extensive', 'Verbose', 'Internal')
}
Register-ArgumentCompleter -CommandName Set-WinADDiagnostics -ParameterName Level -ScriptBlock $LevelAutoCompleter
function Set-WinADDomainControllerNetLogonSettings {
<#
.SYNOPSIS
Helps settings SiteCoverage, GCSiteCoverage and RequireSeal on Domain Controllers
.DESCRIPTION
Helps settings SiteCoverage, GCSiteCoverage and RequireSeal on Domain Controllers
.PARAMETER DomainController
Specifies the Domain Controller to set information on
.PARAMETER SiteCoverage
Specifies the Site Coverage to set on the Domain Controller. If null, it will remove the Site Coverage
.PARAMETER GCSiteCoverage
Specifies the GC Site Coverage to set on the Domain Controller. If null, it will remove the GC Site Coverage
.PARAMETER RequireSeal
Specifies the RequireSeal to set on the Domain Controller. Possible values are Disabled, Compatibility, Enforcement
.EXAMPLE
An example
.NOTES
SiteCoverage:
- https://www.oreilly.com/library/view/active-directory-cookbook/0596004648/ch11s20.html
- https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.NetLogon::Netlogon_AutoSiteCoverage
- https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.NetLogon::Netlogon_SiteCoverage
- https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.NetLogon::Netlogon_GcSiteCoverage
RequireSeal:
- https://support.microsoft.com/en-us/topic/kb5021130-how-to-manage-the-netlogon-protocol-changes-related-to-cve-2022-38023-46ea3067-3989-4d40-963c-680fd9e8ee25
#>
[CmdletBinding(SupportsShouldProcess)]
param(
[Alias('ComputerName')][string] $DomainController,
[string[]] $SiteCoverage,
[string[]] $GCSiteCoverage,
[ValidateSet('Disabled', 'Compatibility', 'Enforcement')] $RequireSeal,
[switch] $DoNotSuppress
)
$RegistryNetLogon = Get-PSRegistry -RegistryPath "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters" -ComputerName $DomainController
if ($RequireSeal) {
$RequireSealTranslation = @{
'Disabled' = 0
'Compatibility' = 1 # this shouldn't be used after 2023
'Enforcement' = 2
}
$RequireSealValue = $RequireSealTranslation[$RequireSeal]
if ($RegistryNetLogon.'RequireSignOrSeal' -ne $RequireSealValue) {
if ($PSCmdlet.ShouldProcess("Setting RequireSignOrSeal to $RequireSealValue")) {
$Output = Set-PSRegistry -RegistryPath "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters" -Key 'RequireSeal' -Value $RequireSealValue -Type REG_DWORD -ComputerName $DomainController
if ($DoNotSuppress) {
$Output
}
}
}
}
if ($PSBoundParameters.ContainsKey('SiteCoverage')) {
if ($null -eq $SiteCoverage) {
if ($null -ne $RegistryNetLogon.'SiteCoverage') {
if ($PSCmdlet.ShouldProcess($DomainController, "Removing SiteCoverage from Domain Controller")) {
$Output = Remove-PSRegistry -RegistryPath "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters" -Key 'SiteCoverage' -ComputerName $DomainController
if ($DoNotSuppress) {
$Output
}
}
}
} else {
if ($SiteCoverage -isnot [string]) {
$JoinedSiteCoverage = $SiteCoverage -join ','
} else {
$JoinedSiteCoverage = $SiteCoverage
}
if ($RegistryNetLogon.'SiteCoverage' -ne $JoinedSiteCoverage) {
if ($PSCmdlet.ShouldProcess($DomainController, "Setting SiteCoverage to $JoinedSiteCoverage")) {
$Output = Set-PSRegistry -RegistryPath "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters" -Type REG_SZ -Key 'SiteCoverage' -Value $JoinedSiteCoverage -ComputerName $DomainController
if ($DoNotSuppress) {
$Output
}
}
}
}
}
if ($PSBoundParameters.ContainsKey('GCSiteCoverage')) {
if ($null -eq $GCSiteCoverage) {
if ($null -ne $RegistryNetLogon.'GCSiteCoverage') {
if ($PSCmdlet.ShouldProcess($DomainController, "Removing GCSiteCoverage from Domain Controller")) {
$Output = Remove-PSRegistry -RegistryPath "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters" -Key 'GcSiteCoverage' -ComputerName $DomainController
if ($DoNotSuppress) {
$Output
}
}
}
} else {
if ($GCSiteCoverage -isnot [string]) {
$JoinedGCSiteCoverage = $GCSiteCoverage -join ','
} else {
$JoinedGCSiteCoverage = $GCSiteCoverage
}
if ($RegistryNetLogon.'GCSiteCoverage' -ne $JoinedGCSiteCoverage) {
if ($PSCmdlet.ShouldProcess($DomainController, "Setting GCSiteCoverage to $JoinedGCSiteCoverage")) {
$Output = Set-PSRegistry -RegistryPath "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters" -Type REG_SZ -Key 'GcSiteCoverage' -Value $JoinedGCSiteCoverage -ComputerName $DomainController
if ($DoNotSuppress) {
$Output
}
}
}
}
}
}
function Set-WinADDomainControllerOption {
<#
.SYNOPSIS
Command to set the options of a domain controller
.DESCRIPTION
Command to set the options of a domain controller that uses the repadmin command
Available options:
- DISABLE_OUTBOUND_REPL: Disables outbound replication.
- DISABLE_INBOUND_REPL: Disables inbound replication.
- DISABLE_NTDSCONN_XLATE: Disables the translation of NTDSConnection objects.
- DISABLE_SPN_REGISTRATION: Disables Service Principal Name (SPN) registration.
- IS_GC: Sets or unsets the Global Catalog (GC) for the domain controller.
.PARAMETER DomainController
The domain controller to set the options on
.PARAMETER Option
Choose one or more options from the list of available options to enable or disable
Options:
- DISABLE_OUTBOUND_REPL: Disables outbound replication.
- DISABLE_INBOUND_REPL: Disables inbound replication.
- DISABLE_NTDSCONN_XLATE: Disables the translation of NTDSConnection objects.
- DISABLE_SPN_REGISTRATION: Disables Service Principal Name (SPN) registration.
- IS_GC: Sets or unsets the Global Catalog (GC) for the domain controller.
.PARAMETER Action
Choose to enable or disable the option(s)
.EXAMPLE
Set-WinADDomainControllerOption -DomainController 'ADRODC' -Option 'IS_GC' -Action Enable
.NOTES
General notes
#>
[cmdletBinding()]
param(
[parameter(Mandatory)][string]$DomainController,
[ValidateSet(
"DISABLE_OUTBOUND_REPL", "DISABLE_INBOUND_REPL",
"DISABLE_NTDSCONN_XLATE", "DISABLE_SPN_REGISTRATION",
"IS_GC"
)]
[parameter(Mandatory)][string[]]$Option,
[parameter(Mandatory)][ValidateSet("Enable", "Disable")][string]$Action
)
# Validate Domain Controller input
if (-not $DomainController) {
Write-Host "Domain Controller is required."
return
}
# Determine the action to be taken
$actionFlag = switch ($Action) {
"Enable" {
"+"
}
"Disable" {
"-"
}
}
foreach ($O in $Option) {
# Construct the repadmin command
# Execute the repadmin command
try {
$NewOptions = $null
$CurrentOptions = $null
Write-Verbose -Message "Set-WinADDomainControllerOption - Executing repadmin /options $DomainController $actionFlag$O"
$Output = & repadmin /options $DomainController $actionFlag$O
if ($Output) {
foreach ($O in $Output) {
if ($O.StartsWith("Current DSA Options:")) {
$Options = $O.Split(":")[1].Trim().Split(",")
$CurrentOptions = foreach ($O in $Options) {
$Value = $O.Trim()
if ($Value) {
$Value
}
}
} elseif ($O.StartsWith("New DSA Options:")) {
$Options = $O.Split(":")[1].Trim().Split(",")
$NewOptions = foreach ($O in $Options) {
$Value = $O.Trim()
if ($Value) {
$Value
}
}
}
}
If ($CurrentOptions) {
$Status = $true
} else {
$Status = $false
}
if ($CurrentOptions -eq $NewOptions) {
$ActionStatus = $false
} else {
$ActionStatus = $true
}
[PSCustomObject] @{
DomainController = $DomainController
Status = $Status
Action = $Action
ActionStatus = $ActionStatus
ActionStatusText = if ($ActionStatus) {
"Changed"
} else {
"No changes"
}
CurrentOptions = $CurrentOptions -split " "
NewOptions = $NewOptions -split " "
Output = $Output
}
}
} catch {
Write-Warning -Message "Set-WinADDomainControllerOption - Failed to execute repadmin /options $DomainController $actionFlag$O. Exception: $($_.Exception.Message)"
}
}
}
function Set-WinADForestACLOwner {
<#
.SYNOPSIS
Replaces the owner of the ACLs on all the objects (to Domain Admins) in the forest (or specific domain) that are not Administrative or WellKnownAdministrative.
.DESCRIPTION
Replaces the owner of the ACLs on all the objects (to Domain Admins) in the forest (or specific domain) that are not Administrative or WellKnownAdministrative.
.PARAMETER IncludeOwnerType
Defines which object owners are to be included in the replacement. Options are: 'WellKnownAdministrative', 'Administrative', 'NotAdministrative', 'Unknown'
.PARAMETER ExcludeOwnerType
Defines which object owners are to be included in the replacement. Options are: 'WellKnownAdministrative', 'Administrative', 'NotAdministrative', 'Unknown'
.PARAMETER LimitProcessing
Provide limit of objects that will be processed in a single run
.PARAMETER Principal
Defines the principal to be used as the new owner. By default those are Domain Admins for all objects. If you want to use a different principal, you can specify it here. Not really useful as the idea is to always have Domain Admins as object owners.
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExcludeDomains
Exclude domain from search, by default whole forest is scanned
.PARAMETER IncludeDomains
Include only specific domains, by default whole forest is scanned
.PARAMETER ExtendedForestInformation
Ability to provide Forest Information from another command to speed up processing
.PARAMETER ADAdministrativeGroups
Ability to provide AD Administrative Groups from another command to speed up processing
.EXAMPLE
Set-WinADForestACLOwner -WhatIf -Verbose -LimitProcessing 2 -IncludeOwnerType 'NotAdministrative', 'Unknown'
.NOTES
General notes
#>
[cmdletBinding(SupportsShouldProcess, DefaultParameterSetName = 'Include')]
param(
[parameter(Mandatory, ParameterSetName = 'Include')][validateSet('WellKnownAdministrative', 'Administrative', 'NotAdministrative', 'Unknown')][string[]] $IncludeOwnerType,
[parameter(Mandatory, ParameterSetName = 'Exclude')][validateSet('WellKnownAdministrative', 'Administrative', 'NotAdministrative', 'Unknown')][string[]] $ExcludeOwnerType,
[int] $LimitProcessing,
[string] $Principal,
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[System.Collections.IDictionary] $ExtendedForestInformation,
[System.Collections.IDictionary] $ADAdministrativeGroups
)
$Count = 0
$getWinADACLForestSplat = @{
Owner = $true
IncludeOwnerType = $IncludeOwnerType
ExcludeOwnerType = $ExcludeOwnerType
Forest = $Forest
IncludeDomains = $IncludeDomains
ExcludeDomains = $ExcludeDomains
ExtendedForestInformation = $ExtendedForestInformation
}
Remove-EmptyValue -Hashtable $getWinADACLForestSplat
if (-not $ADAdministrativeGroups) {
$ADAdministrativeGroups = Get-ADADministrativeGroups -Type DomainAdmins, EnterpriseAdmins -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
}
Get-WinADACLForest @getWinADACLForestSplat | ForEach-Object {
if (-not $Principal) {
$DomainName = ConvertFrom-DistinguishedName -ToDomainCN -DistinguishedName $_.DistinguishedName
$Principal = $ADAdministrativeGroups[$DomainName]['DomainAdmins']
}
$Count += 1
Set-ADACLOwner -ADObject $_.DistinguishedName -Principal $Principal
if ($LimitProcessing -gt 0 -and $Count -ge $LimitProcessing) {
break
}
}
}
function Set-WinADReplication {
<#
.SYNOPSIS
Sets the replication interval for site links in an Active Directory forest.
.DESCRIPTION
This cmdlet sets the replication interval for site links within a specified Active Directory forest. It can also enable instant replication for site links if desired. The cmdlet supports setting a custom replication interval and provides an option to force instant replication.
.PARAMETER Forest
The name of the Active Directory forest for which to set the replication interval.
.PARAMETER ReplicationInterval
The interval in minutes to set for replication. The default is 15 minutes.
.PARAMETER Instant
Switch parameter to enable instant replication for site links.
.PARAMETER ExtendedForestInformation
Additional information about the forest that can be used to facilitate the operation.
.EXAMPLE
Set-WinADReplication -Forest 'example.com' -ReplicationInterval 30
This example sets the replication interval for site links in the 'example.com' forest to 30 minutes.
.EXAMPLE
Set-WinADReplication -Forest 'example.com' -Instant
This example enables instant replication for site links in the 'example.com' forest.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and configured.
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[int] $ReplicationInterval = 15,
[switch] $Instant,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -ExtendedForestInformation $ExtendedForestInformation
$QueryServer = $ForestInformation.QueryServers['Forest']['HostName'][0]
$NamingContext = (Get-ADRootDSE -Server $QueryServer).configurationNamingContext
Get-ADObject -LDAPFilter "(objectCategory=sitelink)" -SearchBase $NamingContext -Properties options, replInterval -Server $QueryServer | ForEach-Object {
if ($Instant) {
Set-ADObject $_ -Replace @{ replInterval = $ReplicationInterval } -Server $QueryServer
Set-ADObject $_ -Replace @{ options = $($_.options -bor 1) } -Server $QueryServer
} else {
Set-ADObject $_ -Replace @{ replInterval = $ReplicationInterval } -Server $QueryServer
}
}
}
function Set-WinADReplicationConnections {
<#
.SYNOPSIS
Modifies the replication connections within an Active Directory forest.
.DESCRIPTION
This cmdlet updates the replication connections within a specified Active Directory forest. It can be used to enable or disable specific connection options for each connection. The cmdlet supports modifying connections that are automatically generated or manually created.
.PARAMETER Forest
Specifies the name of the Active Directory forest for which to modify the replication connections.
.PARAMETER Force
Forces the modification of all replication connections, including those that are automatically generated.
.PARAMETER ExtendedForestInformation
Provides additional information about the forest that can be used to facilitate the operation.
.EXAMPLE
Set-WinADReplicationConnections -Forest 'example.com' -Force
This example modifies all replication connections within the 'example.com' forest, including automatically generated ones.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and configured.
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[switch] $Force,
[System.Collections.IDictionary] $ExtendedForestInformation
)
[Flags()]
enum ConnectionOption {
None
IsGenerated
TwoWaySync
OverrideNotifyDefault = 4
UseNotify = 8
DisableIntersiteCompression = 16
UserOwnedSchedule = 32
RodcTopology = 64
}
$ForestInformation = Get-WinADForestDetails -Forest $Forest -ExtendedForestInformation $ExtendedForestInformation
$QueryServer = $ForestInformation.QueryServers['Forest']['HostName'][0]
$NamingContext = (Get-ADRootDSE -Server $QueryServer).configurationNamingContext
$Connections = Get-ADObject -SearchBase $NamingContext -LDAPFilter "(objectCategory=ntDSConnection)" -Properties * -Server $QueryServer
foreach ($_ in $Connections) {
$OptionsTranslated = [ConnectionOption] $_.Options
if ($OptionsTranslated -like '*IsGenerated*' -and -not $Force) {
Write-Verbose "Set-WinADReplicationConnections - Skipping $($_.CN) automatically generated link"
} else {
Write-Verbose "Set-WinADReplicationConnections - Changing $($_.CN)"
Set-ADObject $_ -Replace @{ options = $($_.options -bor 8) } -Server $QueryServer
}
}
}
function Set-WinADShare {
<#
.SYNOPSIS
Sets the owner or displays permissions for a specified Windows Active Directory share.
.DESCRIPTION
This cmdlet sets the owner or displays permissions for a specified Windows Active Directory share. It can target a specific share type across multiple domains or a single path. It also supports setting the owner to a specific principal or to the default owner.
.PARAMETER Path
The path to the share to set the owner or display permissions for. This parameter is required if the ShareType parameter is not specified.
.PARAMETER ShareType
The type of share to target. This parameter is required if the Path parameter is not specified. Valid values are 'NetLogon'.
.PARAMETER Owner
Switch parameter to indicate that the owner of the share should be set. If this parameter is not specified, the cmdlet will display the permissions of the share instead.
.PARAMETER Principal
The principal to set as the owner of the share. This parameter is required if the Owner parameter is specified and the ParameterSetName is 'Principal'.
.PARAMETER Type
The type of share to set the owner for. This parameter is required if the Owner parameter is specified and the ParameterSetName is 'Type'. Valid values are 'Default'.
.EXAMPLE
Set-WinADShare -Path "\\example.com\NetLogon" -Owner -Principal "Domain Admins"
This example sets the owner of the NetLogon share on the example.com domain to "Domain Admins".
.EXAMPLE
Set-WinADShare -ShareType NetLogon -Owner -Type Default
This example sets the owner of all NetLogon shares across all domains to the default owner.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and configured.
#>
[cmdletBinding(SupportsShouldProcess, DefaultParameterSetName = 'Type')]
param(
[string] $Path,
[validateset('NetLogon')][string[]] $ShareType,
[switch] $Owner,
[Parameter(ParameterSetName = 'Principal', Mandatory)][string] $Principal,
[Parameter(ParameterSetName = 'Type', Mandatory)]
[validateset('Default')][string[]] $Type
)
if ($ShareType) {
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation
foreach ($Domain in $ForestInformation.Domains) {
$Path = -join ("\\", $Domain, "\$ShareType")
@(Get-Item -Path $Path) + @(Get-ChildItem -Path $Path -Recurse:$true) | ForEach-Object -Process {
if ($Owner) {
Get-FileOwner -JustPath -Path $_ -Resolve
} else {
Get-FilePermission -Path $_ -ResolveTypes -Extended
}
}
}
} else {
if ($Path -and (Test-Path -Path $Path)) {
@(Get-Item -Path $Path) + @(Get-ChildItem -Path $Path -Recurse:$true) | ForEach-Object -Process {
if ($Owner) {
$IdentityOwner = Get-FileOwner -JustPath -Path $_.FullName -Resolve
if ($PSCmdlet.ParameterSetName -eq 'Principal') {
} else {
if ($IdentityOwner.OwnerSid -ne 'S-1-5-32-544') {
Set-FileOwner -Path $Path -JustPath -Owner 'S-1-5-32-544'
} else {
Write-Verbose "Set-WinADShare - Owner of $($_.FullName) already set to $($IdentityOwner.OwnerName). Skipping."
}
}
} else {
Get-FilePermission -Path $_ -ResolveTypes -Extended
}
}
}
}
}
function Set-WinADTombstoneLifetime {
<#
.SYNOPSIS
Sets the tombstone lifetime for a specified Active Directory forest.
.DESCRIPTION
This cmdlet sets the tombstone lifetime for a specified Active Directory forest. The tombstone lifetime determines how long a deleted object is retained in the Active Directory database before it is permanently removed.
.PARAMETER Forest
The name of the Active Directory forest for which to set the tombstone lifetime.
.PARAMETER Days
The number of days to set as the tombstone lifetime. The default is 180 days.
.PARAMETER ExtendedForestInformation
Additional information about the forest that can be used to facilitate the operation.
.EXAMPLE
Set-WinADTombstoneLifetime -Forest 'example.com' -Days 365
This example sets the tombstone lifetime for the 'example.com' forest to 365 days.
.NOTES
This cmdlet requires the Active Directory PowerShell module to be installed and configured.
#>
[cmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[int] $Days = 180,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -ExtendedForestInformation $ExtendedForestInformation
$QueryServer = $ForestInformation.QueryServers['Forest']['HostName'][0]
$Partition = $((Get-ADRootDSE -Server $QueryServer).configurationNamingContext)
Set-ADObject -Identity "CN=Directory Service,CN=Windows NT,CN=Services,$Partition" -Partition $Partition -Replace @{ tombstonelifetime = $Days } -Server $QueryServer
}
function Show-WinADDNSRecords {
<#
.SYNOPSIS
Small command that gathers quick information about DNS Server records and shows them in HTML output
.DESCRIPTION
Small command that gathers quick information about DNS Server records and shows them in HTML output
.PARAMETER FilePath
Path to HTML file where it's saved. If not given temporary path is used
.PARAMETER HideHTML
Prevents HTML output from being displayed in browser after generation is done
.PARAMETER Online
Forces use of online CDN for JavaScript/CSS which makes the file smaller. Default - use offline.
.EXAMPLE
Show-WinADDNSRecords
.EXAMPLE
Show-WinADDNSRecords -FilePath C:\Temp\test.html
.NOTES
General notes
#>
[cmdletBinding()]
param(
[parameter(Mandatory)][string] $FilePath,
[switch] $HideHTML,
[switch] $Online,
[switch] $TabPerZone
)
# Gather data
$DNSByName = Get-WinADDnsRecords -Prettify -IncludeDetails
$DNSByIP = Get-WinADDnsIPAddresses -Prettify -IncludeDetails
$DNSZones = Get-WinADDNSZones
$CachedZones = [ordered] @{}
if ($TabPerZone) {
foreach ($DnsEntry in $DNSByName) {
if (-not $CachedZones[$DnsEntry.Zone]) {
$CachedZones[$DnsEntry.Zone] = [System.Collections.Generic.List[Object]]::new()
}
$CachedZones[$DnsEntry.Zone].Add($DnsEntry)
}
}
New-HTML {
New-HTMLTab -Name 'DNS Zones' {
New-HTMLTable -DataTable $DNSZones -DataStore JavaScript -Filtering
}
New-HTMLTab -Name "DNS by Name" {
if ($TabPerZone) {
foreach ($Zone in $CachedZones.Keys) {
New-HTMLTab -Name $Zone {
New-HTMLTable -DataTable $CachedZones[$Zone] -DataStore JavaScript -Filtering {
New-HTMLTableCondition -Name 'Count' -ComparisonType number -Value 1 -BackgroundColor LightGreen
New-HTMLTableCondition -Name 'Count' -ComparisonType number -Value 1 -Operator gt -BackgroundColor Orange
New-HTMLTableConditionGroup -Logic AND {
New-HTMLTableCondition -Name 'Count' -ComparisonType number -Value 1 -Operator gt
New-HTMLTableCondition -Name 'Types' -Operator like -ComparisonType string -Value 'static'
New-HTMLTableCondition -Name 'Types' -Operator like -ComparisonType string -Value 'dynamic'
} -BackgroundColor Rouge -Row -Color White
New-HTMLTableCondition -Name 'Status' -ComparisonType string -Value 'Tombstoned' -BackgroundColor Orange -FailBackgroundColor LightGreen
}
}
}
} else {
New-HTMLTable -DataTable $DNSByName -Filtering {
New-HTMLTableCondition -Name 'Count' -ComparisonType number -Value 1 -BackgroundColor LightGreen
New-HTMLTableCondition -Name 'Count' -ComparisonType number -Value 1 -Operator gt -BackgroundColor Orange
New-HTMLTableConditionGroup -Logic AND {
New-HTMLTableCondition -Name 'Count' -ComparisonType number -Value 1 -Operator gt
New-HTMLTableCondition -Name 'Types' -Operator like -ComparisonType string -Value 'static'
New-HTMLTableCondition -Name 'Types' -Operator like -ComparisonType string -Value 'dynamic'
} -BackgroundColor Rouge -Row -Color White
New-HTMLTableCondition -Name 'Status' -ComparisonType string -Value 'Tombstoned' -BackgroundColor Orange -FailBackgroundColor LightGreen
} -DataStore JavaScript
}
}
New-HTMLTab -Name 'DNS by IP' {
New-HTMLTable -DataTable $DNSByIP -Filtering {
New-HTMLTableCondition -Name 'Count' -ComparisonType number -Value 1 -BackgroundColor LightGreen
New-HTMLTableCondition -Name 'Count' -ComparisonType number -Value 1 -Operator gt -BackgroundColor Orange
New-HTMLTableConditionGroup -Logic AND {
New-HTMLTableCondition -Name 'Count' -ComparisonType number -Value 1 -Operator gt
New-HTMLTableCondition -Name 'Types' -Operator like -ComparisonType string -Value 'static'
New-HTMLTableCondition -Name 'Types' -Operator like -ComparisonType string -Value 'dynamic'
} -BackgroundColor Rouge -Row -Color White
} -DataStore JavaScript
}
} -ShowHTML:(-not $HideHTML.IsPresent) -Online:$Online.IsPresent -TitleText "DNS Configuration" -FilePath $FilePath
}
function Show-WinADForestReplicationSummary {
<#
.SYNOPSIS
Generates an HTML report for Active Directory replication summary.
.DESCRIPTION
This function generates an HTML report for Active Directory replication summary using the Get-WinADForestReplicationSummary function.
The report includes statistics and detailed replication information.
.PARAMETER FilePath
The path where the HTML report will be saved.
.PARAMETER Online
Switch to indicate if the report should be generated with online resources.
.PARAMETER HideHTML
Switch to indicate if the HTML report should be hidden after generation.
.PARAMETER PassThru
Switch to return the replication summary and statistics as output.
.EXAMPLE
Show-WinADForestReplicationSummary -FilePath "C:\Reports\ReplicationSummary.html"
.EXAMPLE
Show-WinADForestReplicationSummary -Online -HideHTML
.EXAMPLE
Show-WinADForestReplicationSummary -PassThru
.NOTES
#>
[CmdletBinding()]
param(
[string] $FilePath,
[switch] $Online,
[switch] $HideHTML,
[switch] $PassThru
)
$Script:Reporting = [ordered] @{}
$Script:Reporting['Version'] = Get-GitHubVersion -Cmdlet 'Invoke-ADEssentials' -RepositoryOwner 'evotecit' -RepositoryName 'ADEssentials'
if ($FilePath -eq '') {
$FilePath = Get-FileName -Extension 'html' -Temporary
}
$ReplicationSummary = Get-WinADForestReplicationSummary -IncludeStatisticsVariable Statistics
New-HTML {
New-HTMLSectionStyle -BorderRadius 0px -HeaderBackGroundColor Grey -RemoveShadow
New-HTMLTableOption -DataStore JavaScript -ArrayJoin -ArrayJoinString "," -BoolAsString
New-HTMLTabStyle -BorderRadius 0px -TextTransform capitalize -BackgroundColorActive SlateGrey
New-HTMLHeader {
New-HTMLSection -Invisible {
New-HTMLSection {
New-HTMLText -Text "Report generated on $(Get-Date)" -Color Blue
} -JustifyContent flex-start -Invisible
New-HTMLSection {
New-HTMLText -Text "ADEssentials - $($Script:Reporting['Version'])" -Color Blue
} -JustifyContent flex-end -Invisible
}
}
New-HTMLSection -HeaderText "Summary" {
New-HTMLList {
New-HTMLListItem -Text "Servers with good replication: ", $($Statistics.Good) -Color Black, SpringGreen -FontWeight normal, bold
New-HTMLListItem -Text "Servers with replication failures: ", $($Statistics.Failures) -Color Black, Red -FontWeight normal, bold
New-HTMLListItem -Text "Servers with replication delta over 24 hours: ", $($Statistics.DeltaOver24Hours) -Color Black, Red -FontWeight normal, bold
New-HTMLListItem -Text "Servers with replication delta over 12 hours: ", $($Statistics.DeltaOver12Hours) -Color Black, Red -FontWeight normal, bold
New-HTMLListItem -Text "Servers with replication delta over 6 hours: ", $($Statistics.DeltaOver6Hours) -Color Black, Red -FontWeight normal, bold
New-HTMLListItem -Text "Servers with replication delta over 3 hours: ", $($Statistics.DeltaOver3Hours) -Color Black, Red -FontWeight normal, bold
New-HTMLListItem -Text "Servers with replication delta over 1 hour: ", $($Statistics.DeltaOver1Hours) -Color Black, Red -FontWeight normal, bold
New-HTMLListItem -Text "Unique replication errors: ", $($Statistics.UniqueErrors.Count) -Color Black, Red -FontWeight normal, bold
}
}
New-HTMLSection -HeaderText "Replication Summary" {
New-HTMLTable -DataTable $ReplicationSummary -DataTableID 'DT-ReplicationSummary' -ScrollX {
New-HTMLTableCondition -Inline -Name "Fail" -HighlightHeaders 'Fails', 'Total', 'PercentageError' -ComparisonType number -Operator gt 0 -BackgroundColor Salmon -FailBackgroundColor SpringGreen
} -Filtering -PagingLength 50 -PagingOptions @(5, 10, 15, 25, 50, 100)
}
} -FilePath $FilePath -ShowHTML:(-not $HideHTML)
if ($PassThru) {
[ordered] @{
ReplicationSummary = $ReplicationSummary
Statistics = $Statistics
}
}
}
function Show-WinADGroupCritical {
<#
.SYNOPSIS
Command to gather nested group membership from default critical groups in the Active Directory.
.DESCRIPTION
Command to gather nested group membership from default critical groups in the Active Directory.
This command will show data in table and diagrams in HTML format.
.PARAMETER GroupName
Group Name or Names to search for from provided list. If skipped all groups will be checked.
.PARAMETER FilePath
Path to HTML file where it's saved. If not given temporary path is used
.PARAMETER HideAppliesTo
Allows to define to which diagram HideComputers,HideUsers,HideOther applies to
.PARAMETER HideComputers
Hide computers from diagrams - useful for performance reasons
.PARAMETER HideUsers
Hide users from diagrams - useful for performance reasons
.PARAMETER HideOther
Hide other objects from diagrams - useful for performance reasons
.PARAMETER Online
Forces use of online CDN for JavaScript/CSS which makes the file smaller. Default - use offline.
.PARAMETER HideHTML
Prevents HTML output from being displayed in browser after generation is done
.PARAMETER DisableBuiltinConditions
Disables table coloring allowing user to define it's own conditions
.PARAMETER AdditionalStatistics
Adds additional data to Self object. It includes count for NestingMax, NestingGroup, NestingGroupSecurity, NestingGroupDistribution. It allows for easy filtering where we expect security groups only when there are nested distribution groups.
.PARAMETER SkipDiagram
Skips diagram generation and only displays table. Useful if the diagram can't handle amount of data or if the diagrams are not nessecary.
.PARAMETER Summary
Adds additional tab with all groups together on two diagrams
.PARAMETER EnableDiagramFiltering
Enables search in diagrams. It's useful when there are many groups and it's hard to find the one you are looking for.
.PARAMETER DiagramFilteringMinimumCharacters
Minimum characters to start search in diagrams. Default is 3.
.PARAMETER EnableDiagramFilteringButton
Adds button to enable/disable filtering in diagrams. It's extension to EnableDiagramFiltering, when you prefer button over automatic filtering.
.PARAMETER ScrollX
Adds horizontal scroll to the table. Useful when there are many columns.
.EXAMPLE
Show-WinADGroupCritical
.NOTES
General notes
#>
[alias('Show-WinADCriticalGroups')]
[cmdletBinding()]
param(
[validateSet(
"Domain Admins",
"Cert Publishers",
"Schema Admins",
"Enterprise Admins",
"DnsAdmins",
"DnsAdmins2",
"DnsUpdateProxy",
"Group Policy Creator Owners",
'Protected Users',
'Key Admins',
'Enterprise Key Admins',
'Server Management',
'Organization Management',
'DHCP Users',
'DHCP Administrators',
'Administrators',
'Account Operators',
'Server Operators',
'Print Operators',
'Backup Operators',
'Replicators',
'Network Configuration Operations',
'Incoming Forest Trust Builders',
'Internet Information Services',
'Event Log Readers',
'Hyper-V Administrators',
'Remote Management Users'
)]
[string[]] $GroupName,
[alias('ReportPath')][string] $FilePath,
[ValidateSet('Default', 'Hierarchical', 'Both')][string] $HideAppliesTo = 'Both',
[switch] $HideComputers,
[switch] $HideUsers,
[switch] $HideOther,
[switch] $Online,
[switch] $HideHTML,
[switch] $DisableBuiltinConditions,
[switch] $AdditionalStatistics,
[switch] $SkipDiagram,
[switch] $Summary,
[switch] $EnableDiagramFiltering,
[switch] $EnableDiagramFilteringButton,
[int] $DiagramFilteringMinimumCharacters = 3,
[switch] $ScrollX
)
$ForestInformation = Get-WinADForestDetails -Extended
[Array] $ListGroups = foreach ($Domain in $ForestInformation.Domains) {
$DomainSidValue = $ForestInformation.DomainsExtended[$Domain].DomainSID
$PriviligedGroups = [ordered] @{
"Domain Admins" = "$DomainSidValue-512"
"Cert Publishers" = "$DomainSidValue-517"
"Schema Admins" = "$DomainSidValue-518"
"Enterprise Admins" = "$DomainSidValue-519"
"DnsAdmins" = "$DomainSidValue-1101"
"DnsAdmins2" = "$DomainSidValue-1105"
"DnsUpdateProxy" = "$DomainSidValue-1106"
"Group Policy Creator Owners" = "$DomainSidValue-520"
'Protected Users' = "$DomainSidValue-525"
'Key Admins' = "$DomainSidValue-526"
'Enterprise Key Admins' = "$DomainSidValue-527"
'Server Management' = "$DomainSidValue-1125"
'Organization Management' = "$DomainSidValue-1117"
'DHCP Users' = "$DomainSidValue-2111"
'DHCP Administrators' = "$DomainSidValue-2112"
'Administrators' = "S-1-5-32-544"
'Account Operators' = "S-1-5-32-548"
'Server Operators' = "S-1-5-32-549"
'Print Operators' = "S-1-5-32-550"
'Backup Operators' = "S-1-5-32-551"
'Replicators' = "S-1-5-32-552"
'Network Configuration Operations' = "S-1-5-32-556"
'Incoming Forest Trust Builders' = "S-1-5-32-557"
'Internet Information Services' = "S-1-5-32-568"
'Event Log Readers' = "S-1-5-32-573"
'Hyper-V Administrators' = "S-1-5-32-578"
'Remote Management Users' = "S-1-5-32-580"
}
foreach ($Group in $PriviligedGroups.Keys) {
$SearchName = $PriviligedGroups[$Group]
if ($GroupName -and $Group -notin $GroupName) {
continue
}
$GroupInformation = (Get-ADGroup -Filter "SID -eq '$SearchName'" -Server $ForestInformation['QueryServers'][$Domain].HostName[0] -ErrorAction SilentlyContinue).DistinguishedName
if ($GroupInformation) {
$GroupInformation
}
}
}
if ($ListGroups.Count -gt 0) {
Show-WinADGroupMember -Identity $ListGroups -HideHTML:$HideHTML.IsPresent -FilePath $FilePath -DisableBuiltinConditions:$DisableBuiltinConditions.IsPresent -Online:$Online.IsPresent -HideUsers:$HideUsers.IsPresent -HideComputers:$HideComputers.IsPresent -AdditionalStatistics:$AdditionalStatistics.IsPresent -Summary:$Summary.IsPresent -SkipDiagram:$SkipDiagram.IsPresent -EnableDiagramFiltering:$EnableDiagramFiltering.IsPresent -DiagramFilteringMinimumCharacters $DiagramFilteringMinimumCharacters -ScrollX:$ScrollX.IsPresent -EnableDiagramFilteringButton:$EnableDiagramFilteringButton.IsPresent
} else {
Write-Warning -Message "Show-WinADGroupCritical - Requested group(s) not found."
}
}
function Show-WinADGroupMember {
<#
.SYNOPSIS
Command to gather nested group membership from one or more groups and display in table with two diagrams
.DESCRIPTION
Command to gather nested group membership from one or more groups and display in table with two diagrams
This command will show data in table and diagrams in HTML format.
.PARAMETER Identity
Group Name or Names to search for
.PARAMETER Conditions
Provides ability to control look and feel of tables across HTML
.PARAMETER FilePath
Path to HTML file where it's saved. If not given temporary path is used
.PARAMETER HideAppliesTo
Allows to define to which diagram HideComputers,HideUsers,HideOther applies to
.PARAMETER HideComputers
Hide computers from diagrams - useful for performance reasons
.PARAMETER HideUsers
Hide users from diagrams - useful for performance reasons
.PARAMETER HideOther
Hide other objects from diagrams - useful for performance reasons
.PARAMETER Online
Forces use of online CDN for JavaScript/CSS which makes the file smaller. Default - use offline.
.PARAMETER HideHTML
Prevents HTML output from being displayed in browser after generation is done
.PARAMETER DisableBuiltinConditions
Disables table coloring allowing user to define it's own conditions
.PARAMETER AdditionalStatistics
Adds additional data to Self object. It includes count for NestingMax, NestingGroup, NestingGroupSecurity, NestingGroupDistribution. It allows for easy filtering where we expect security groups only when there are nested distribution groups.
.PARAMETER SkipDiagram
Skips diagram generation and only displays table. Useful if the diagram can't handle amount of data or if the diagrams are not nessecary.
.PARAMETER Summary
Adds additional tab with all groups together on two diagrams
.PARAMETER SummaryOnly
Adds one tab with all groups together on two diagrams
.PARAMETER EnableDiagramFiltering
Enables search in diagrams. It's useful when there are many groups and it's hard to find the one you are looking for.
.PARAMETER DiagramFilteringMinimumCharacters
Minimum characters to start search in diagrams. Default is 3.
.PARAMETER EnableDiagramFilteringButton
Adds button to enable/disable filtering in diagrams. It's extension to EnableDiagramFiltering, when you prefer button over automatic filtering.
.PARAMETER ScrollX
Adds horizontal scroll to the table. Useful when there are many columns.
.EXAMPLE
Show-WinADGroupMember -GroupName 'Domain Admins' -FilePath $PSScriptRoot\Reports\GroupMembership1.html -Online -Verbose
.EXAMPLE
Show-WinADGroupMember -GroupName 'Test-Group', 'Domain Admins' -FilePath $PSScriptRoot\Reports\GroupMembership2.html -Online -Verbose
.EXAMPLE
Show-WinADGroupMember -GroupName 'GDS-TestGroup4' -FilePath $PSScriptRoot\Reports\GroupMembership3.html -Summary -Online -Verbose
.EXAMPLE
Show-WinADGroupMember -GroupName 'Group1' -Verbose -Online
.NOTES
General notes
#>
[alias('Show-ADGroupMember')]
[cmdletBinding(DefaultParameterSetName = 'Default')]
param(
[Parameter(Position = 0)][alias('GroupName', 'Group')][Array] $Identity,
[Parameter(Position = 1)][scriptblock] $Conditions,
[string] $FilePath,
[ValidateSet('Default', 'Hierarchical', 'Both')][string] $HideAppliesTo = 'Both',
[switch] $HideComputers,
[switch] $HideUsers,
[switch] $HideOther,
[switch] $Online,
[switch] $HideHTML,
[switch] $DisableBuiltinConditions,
[switch] $AdditionalStatistics,
[switch] $SkipDiagram,
[Parameter(ParameterSetName = 'Default')][switch] $Summary,
[Parameter(ParameterSetName = 'SummaryOnly')][switch] $SummaryOnly,
[switch] $EnableDiagramFiltering,
[switch] $EnableDiagramFilteringButton,
[int] $DiagramFilteringMinimumCharacters = 3,
[switch] $ScrollX
)
$Script:Reporting = [ordered] @{}
$Script:Reporting['Version'] = Get-GitHubVersion -Cmdlet 'Show-WinADGroupMember' -RepositoryOwner 'evotecit' -RepositoryName 'ADEssentials'
$VisualizeOnly = $false
if ($FilePath -eq '') {
$FilePath = Get-FileName -Extension 'html' -Temporary
}
$GroupsList = [System.Collections.Generic.List[object]]::new()
if ($Identity.Count -gt 0) {
New-HTML -TitleText "Visual Group Membership" {
New-HTMLHeader {
New-HTMLSection -Invisible {
New-HTMLSection {
New-HTMLText -Text "Report generated on $(Get-Date)" -Color Blue
} -JustifyContent flex-start -Invisible
New-HTMLSection {
New-HTMLText -Text "ADEssentials - $($Script:Reporting['Version'])" -Color Blue
} -JustifyContent flex-end -Invisible
}
}
New-HTMLSectionStyle -BorderRadius 0px -HeaderBackGroundColor Grey -RemoveShadow
New-HTMLTableOption -DataStore JavaScript -BoolAsString
New-HTMLTabStyle -BorderRadius 0px -TextTransform capitalize -BackgroundColorActive SlateGrey
if ($Identity[0].GroupName) {
$GroupMembersCache = [ordered] @{}
$VisualizeOnly = $true
foreach ($Entry in $Identity) {
$IdentityGroupName = "($($Entry.GroupName) / $($Entry.GroupDomainName))"
if (-not $GroupMembersCache[$IdentityGroupName]) {
$GroupMembersCache[$IdentityGroupName] = [System.Collections.Generic.List[PSCustomObject]]::new()
}
$GroupMembersCache[$IdentityGroupName].Add($Entry)
}
[Array] $IdentityList = $GroupMembersCache.Keys
} else {
[Array] $IdentityList = $Identity
}
foreach ($Group in $IdentityList) {
if ($null -eq $Group) {
continue
}
try {
Write-Verbose "Show-WinADGroupMember - requesting $Group group nested membership"
if ($VisualizeOnly) {
[Array] $ADGroup = $GroupMembersCache[$Group]
} else {
[Array] $ADGroup = Get-WinADGroupMember -Group $Group -All -AddSelf -AdditionalStatistics:$AdditionalStatistics
}
if ($Summary -or $SummaryOnly) {
foreach ($Object in $ADGroup) {
$GroupsList.Add($Object)
}
}
} catch {
Write-Warning "Show-WinADGroupMember - Error processing group $Group. Skipping. Needs investigation why it failed. Error: $($_.Exception.Message)"
continue
}
Write-Verbose "Show-WinADGroupMember - processing HTML generation for $Group group"
if (-not $SummaryOnly) {
if ($ADGroup) {
# Means group returned something
$GroupName = $ADGroup[0].GroupName
$NetBIOSName = Convert-DomainFqdnToNetBIOS -DomainName $ADGroup[0].DomainName
$ObjectsCount = $ADGroup.Count - 1
$FullName = "$NetBIOSName\$GroupName ($ObjectsCount)"
} else {
# Means group returned nothing, probably wrong request, but we still need to show something
$GroupName = $Group
$FullName = "$Group (0)"
}
$DataStoreID = -join ('table', (Get-RandomStringName -Size 10 -ToLower))
$DataTableID = -join ('table', (Get-RandomStringName -Size 10 -ToLower))
New-HTMLTab -TabName $FullName {
Write-Verbose -Message "Show-WinADGroupMember - processing HTML generation for $Group group - Table"
$SectionInformation = New-HTMLSection -Title "Information for $GroupName" {
New-HTMLTable -DataTable $ADGroup -Filtering -DataStoreID $DataStoreID {
if (-not $DisableBuiltinConditions) {
New-TableHeader -Names Name, SamAccountName, DomainName, DisplayName -Title 'Member'
New-TableHeader -Names DirectMembers, DirectGroups, IndirectMembers, TotalMembers -Title 'Statistics'
New-TableHeader -Names GroupType, GroupScope -Title 'Group Details'
New-TableCondition -BackgroundColor CoralRed -Color White -ComparisonType bool -Value $false -Name Enabled -Operator eq
New-TableCondition -BackgroundColor LightBlue -ComparisonType string -Value '' -Name ParentGroup -Operator eq -Row
New-TableCondition -BackgroundColor CoralRed -Color White -ComparisonType bool -Value $true -Name CrossForest -Operator eq
New-TableCondition -BackgroundColor CoralRed -Color White -ComparisonType bool -Value $true -Name CircularIndirect -Operator eq -Row
New-TableCondition -BackgroundColor CoralRed -Color White -ComparisonType bool -Value $true -Name CircularDirect -Operator eq -Row
}
if ($Conditions) {
& $Conditions
}
} -ScrollX:$ScrollX.IsPresent
}
if (-not $SkipDiagram.IsPresent) {
New-HTMLTab -TabName 'Information' {
$SectionInformation
}
} else {
$SectionInformation
}
if (-not $SkipDiagram.IsPresent) {
Write-Verbose -Message "Show-WinADGroupMember - processing HTML generation for $Group group - Diagram"
New-HTMLTab -TabName 'Diagram Basic' {
New-HTMLSection -Title "Diagram for $GroupName" {
New-HTMLGroupDiagramDefault -ADGroup $ADGroup -HideAppliesTo $HideAppliesTo -HideUsers:$HideUsers -HideComputers:$HideComputers -HideOther:$HideOther -DataTableID $DataTableID -ColumnID 1 -Online:$Online -EnableDiagramFiltering:$EnableDiagramFiltering.IsPresent -DiagramFilteringMinimumCharacters $DiagramFilteringMinimumCharacters -EnableDiagramFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
}
Write-Verbose -Message "Show-WinADGroupMember - processing HTML generation for $Group group - Diagram Hierarchy"
New-HTMLTab -TabName 'Diagram Hierarchy' {
New-HTMLSection -Title "Diagram for $GroupName" {
New-HTMLGroupDiagramHierachical -ADGroup $ADGroup -HideAppliesTo $HideAppliesTo -HideUsers:$HideUsers -HideComputers:$HideComputers -HideOther:$HideOther -Online:$Online -EnableDiagramFiltering:$EnableDiagramFiltering.IsPresent -DiagramFilteringMinimumCharacters $DiagramFilteringMinimumCharacters -EnableDiagramFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
}
}
}
}
}
if (-not $SkipDiagram.IsPresent -and ($Summary -or $SummaryOnly)) {
Write-Verbose "Show-WinADGroupMember - processing HTML generation for Summary"
New-HTMLTab -Name 'Summary' {
New-HTMLTab -TabName 'Diagram Basic' {
New-HTMLSection -Title "Diagram for Summary" {
New-HTMLGroupDiagramSummary -ADGroup $GroupsList -HideAppliesTo $HideAppliesTo -HideUsers:$HideUsers -HideComputers:$HideComputers -HideOther:$HideOther -DataTableID $DataTableID -ColumnID 1 -Online:$Online -EnableDiagramFiltering:$EnableDiagramFiltering.IsPresent -DiagramFilteringMinimumCharacters $DiagramFilteringMinimumCharacters -EnableDiagramFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
}
New-HTMLTab -TabName 'Diagram Hierarchy' {
New-HTMLSection -Title "Diagram for Summary" {
New-HTMLGroupDiagramSummaryHierarchical -ADGroup $GroupsList -HideAppliesTo $HideAppliesTo -HideUsers:$HideUsers -HideComputers:$HideComputers -HideOther:$HideOther -Online:$Online -EnableDiagramFiltering:$EnableDiagramFiltering.IsPresent -DiagramFilteringMinimumCharacters $DiagramFilteringMinimumCharacters -EnableDiagramFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
}
}
}
Write-Verbose -Message "Show-WinADGroupMember - saving HTML report"
} -Online:$Online -FilePath $FilePath -ShowHTML:(-not $HideHTML)
Write-Verbose -Message "Show-WinADGroupMember - HTML report saved to $FilePath"
} else {
Write-Warning -Message "Show-WinADGroupMember - Error processing Identity, as it's empty."
}
}
function Show-WinADGroupMemberOf {
<#
.SYNOPSIS
Command to gather group membership that the user is member of displaying information in table and diagrams.
.DESCRIPTION
Command to gather group membership that the user is member of displaying information in table and diagrams.
.PARAMETER Identity
User or Computer object to get group membership for.
.PARAMETER Conditions
Provides ability to control look and feel of tables across HTML
.PARAMETER FilePath
Path to HTML file where it's saved. If not given temporary path is used
.PARAMETER Summary
Adds additional tab with all groups together on two diagrams
.PARAMETER SummaryOnly
Adds one tab with all groups together on two diagrams
.PARAMETER Online
Forces use of online CDN for JavaScript/CSS which makes the file smaller. Default - use offline.
.PARAMETER HideHTML
Prevents HTML output from being displayed in browser after generation is done
.PARAMETER DisableBuiltinConditions
Disables table coloring allowing user to define it's own conditions
.PARAMETER SkipDiagram
Skips diagram generation and only displays table. Useful if the diagram can't handle amount of data or if the diagrams are not nessecary.
.PARAMETER EnableDiagramFiltering
Enables search in diagrams. It's useful when there are many groups and it's hard to find the one you are looking for.
.PARAMETER DiagramFilteringMinimumCharacters
Minimum characters to start search in diagrams. Default is 3.
.PARAMETER EnableDiagramFilteringButton
Adds button to enable/disable filtering in diagrams. It's extension to EnableDiagramFiltering, when you prefer button over automatic filtering.
.EXAMPLE
Show-WinADGroupMemberOf -Identity 'przemyslaw.klys' -Verbose -Summary
.EXAMPLE
Show-WinADGroupMemberOf -Identity 'przemyslaw.klys', 'adm.pklys' -Summary
.NOTES
General notes
#>
[alias('Show-ADGroupMemberOf')]
[cmdletBinding(DefaultParameterSetName = 'Default')]
param(
[Parameter(Position = 1)][scriptblock] $Conditions,
[parameter(Position = 0, Mandatory)][string[]] $Identity,
[string] $FilePath,
[Parameter(ParameterSetName = 'Default')][switch] $Summary,
[Parameter(ParameterSetName = 'SummaryOnly')][switch] $SummaryOnly,
[switch] $Online,
[switch] $HideHTML,
[switch] $DisableBuiltinConditions,
[switch] $SkipDiagram,
[switch] $EnableDiagramFiltering,
[switch] $EnableDiagramFilteringButton,
[int] $DiagramFilteringMinimumCharacters = 3
)
$HideAppliesTo = 'Both'
$Script:Reporting = [ordered] @{}
$Script:Reporting['Version'] = Get-GitHubVersion -Cmdlet 'Show-WinADGroupMemberOf' -RepositoryOwner 'evotecit' -RepositoryName 'ADEssentials'
if ($FilePath -eq '') {
$FilePath = Get-FileName -Extension 'html' -Temporary
}
$GroupsList = [System.Collections.Generic.List[object]]::new()
New-HTML -TitleText "Visual Object MemberOf" {
New-HTMLHeader {
New-HTMLSection -Invisible {
New-HTMLSection {
New-HTMLText -Text "Report generated on $(Get-Date)" -Color Blue
} -JustifyContent flex-start -Invisible
New-HTMLSection {
New-HTMLText -Text "ADEssentials - $($Script:Reporting['Version'])" -Color Blue
} -JustifyContent flex-end -Invisible
}
}
New-HTMLSectionStyle -BorderRadius 0px -HeaderBackGroundColor Grey -RemoveShadow
New-HTMLTableOption -DataStore JavaScript -BoolAsString
New-HTMLTabStyle -BorderRadius 0px -TextTransform capitalize -BackgroundColorActive SlateGrey
foreach ($ADObject in $Identity) {
if ($null -eq $ADObject) {
continue
}
try {
Write-Verbose "Show-WinADObjectMember - requesting $ADObject memberof property"
$MyObject = Get-WinADGroupMemberOf -Identity $ADObject -AddSelf
if ($Summary -or $SummaryOnly) {
foreach ($Object in $MyObject) {
$GroupsList.Add($Object)
}
}
} catch {
Write-Warning "Show-WinADGroupMemberOf - Error processing group $Group. Skipping. Needs investigation why it failed. Error: $($_.Exception.Message)"
continue
}
Write-Verbose -Message "Show-WinADGroupMemberOf - Processing HTML generation for $ADObject"
if ($MyObject -and -not $SummaryOnly) {
$ObjectName = $MyObject[0].ObjectName
$DataStoreID = -join ('table', (Get-RandomStringName -Size 10 -ToLower))
$DataTableID = -join ('table', (Get-RandomStringName -Size 10 -ToLower))
New-HTMLTab -TabName $ObjectName {
Write-Verbose -Message "Show-WinADGroupMemberOf - Processing HTML generation for $ObjectName - Table"
$DataSection = New-HTMLSection -Title "Information for $ObjectName" {
New-HTMLTable -DataTable $MyObject -Filtering -DataStoreID $DataStoreID {
if (-not $DisableBuiltinConditions) {
New-TableHeader -Names Name, SamAccountName, DomainName, DisplayName -Title 'Member'
New-TableHeader -Names GroupType, GroupScope -Title 'Group Details'
New-TableCondition -BackgroundColor CoralRed -Color White -ComparisonType bool -Value $false -Name Enabled -Operator eq
New-TableCondition -BackgroundColor LightBlue -ComparisonType string -Value '' -Name ParentGroup -Operator eq -Row
New-TableCondition -BackgroundColor CoralRed -Color White -ComparisonType bool -Value $true -Name CircularDirect -Operator eq -Row
New-TableCondition -BackgroundColor CoralRed -Color White -ComparisonType bool -Value $true -Name CircularIndirect -Operator eq -Row
}
if ($Conditions) {
& $Conditions
}
}
}
if ($SkipDiagram.IsPresent) {
$DataSection
} else {
New-HTMLTab -TabName 'Information' {
$DataSection
}
Write-Verbose -Message "Show-WinADGroupMemberOf - Processing HTML generation for $ObjectName - Diagram"
New-HTMLTab -TabName 'Diagram Basic' {
New-HTMLSection -Title "Diagram for $ObjectName" {
New-HTMLGroupOfDiagramDefault -Identity $MyObject -HideAppliesTo $HideAppliesTo -HideUsers:$HideUsers -HideComputers:$HideComputers -HideOther:$HideOther -DataTableID $DataTableID -ColumnID 1 -Online:$Online -EnableDiagramFiltering:$EnableDiagramFiltering.IsPresent -DiagramFilteringMinimumCharacters $DiagramFilteringMinimumCharacters -EnableDiagramFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
}
Write-Verbose -Message "Show-WinADGroupMemberOf - Processing HTML generation for $ObjectName - Diagram Hierarchy"
New-HTMLTab -TabName 'Diagram Hierarchy' {
New-HTMLSection -Title "Diagram for $ObjectName" {
New-HTMLGroupOfDiagramHierarchical -Identity $MyObject -HideAppliesTo $HideAppliesTo -HideUsers:$HideUsers -HideComputers:$HideComputers -HideOther:$HideOther -Online:$Online -EnableDiagramFiltering:$EnableDiagramFiltering.IsPresent -DiagramFilteringMinimumCharacters $DiagramFilteringMinimumCharacters -EnableDiagramFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
}
}
}
}
}
if (-not $SkipDiagram.IsPresent -and ($Summary -or $SummaryOnly)) {
Write-Verbose -Message "Show-WinADGroupMemberOf - Processing HTML generation for Summary"
New-HTMLTab -Name 'Summary' {
New-HTMLTab -TabName 'Diagram Basic' {
New-HTMLSection -Title "Diagram for Summary" {
New-HTMLGroupOfDiagramSummary -ADGroup $GroupsList -HideAppliesTo $HideAppliesTo -HideUsers:$HideUsers -HideComputers:$HideComputers -HideOther:$HideOther -DataTableID $DataTableID -ColumnID 1 -Online:$Online -EnableDiagramFiltering:$EnableDiagramFiltering.IsPresent -DiagramFilteringMinimumCharacters $DiagramFilteringMinimumCharacters -EnableDiagramFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
}
New-HTMLTab -TabName 'Diagram Hierarchy' {
New-HTMLSection -Title "Diagram for Summary" {
New-HTMLGroupOfDiagramSummaryHierarchical -ADGroup $GroupsList -HideAppliesTo $HideAppliesTo -HideUsers:$HideUsers -HideComputers:$HideComputers -HideOther:$HideOther -Online:$Online -EnableDiagramFiltering:$EnableDiagramFiltering.IsPresent -DiagramFilteringMinimumCharacters $DiagramFilteringMinimumCharacters -EnableDiagramFilteringButton:$EnableDiagramFilteringButton.IsPresent
}
}
}
}
Write-Verbose -Message "Show-WinADGroupMemberOf - saving HTML report"
} -Online:$Online -FilePath $FilePath -ShowHTML:(-not $HideHTML)
}
function Show-WinADKerberosAccount {
<#
.SYNOPSIS
This function generates an HTML report for Kerberos accounts in Active Directory.
.DESCRIPTION
The Show-WinADKerberosAccount function generates an HTML report for Kerberos accounts in Active Directory.
It includes information about the account, domain controllers, global catalogs, and critical accounts.
.PARAMETER Forest
The name of the forest to generate the report for.
.PARAMETER ExcludeDomains
An array of domain names to exclude from the report.
.PARAMETER IncludeDomains
An array of domain names to include in the report.
.PARAMETER Online
A switch parameter to indicate if the report should be generated online.
.PARAMETER HideHTML
A switch parameter to indicate if the HTML report should be hidden.
.PARAMETER FilePath
The path to save the HTML report.
.PARAMETER PassThru
A switch parameter to indicate if the function should return the account data.
.EXAMPLE
Show-WinADKerberosAccount -Forest 'example.com' -ExcludeDomains @('test.com') -IncludeDomains @('example.com') -Online -HideHTML -FilePath 'C:\Reports\KerberosReport.html' -PassThru
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[switch] $Online,
[switch] $HideHTML,
[string] $FilePath,
[switch] $PassThru
)
$Today = Get-Date
$Script:Reporting = [ordered] @{}
$Script:Reporting['Version'] = Get-GitHubVersion -Cmdlet 'Invoke-ADEssentials' -RepositoryOwner 'evotecit' -RepositoryName 'ADEssentials'
$AccountData = Get-WinADKerberosAccount -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -IncludeCriticalAccounts
Write-Verbose -Message "Show-WinADKerberosAccount - Building HTML report based on delivered data"
New-HTML -Author 'Przemysław Kłys' -TitleText 'Kerberos Reporting' {
New-HTMLTabStyle -BorderRadius 0px -TextTransform lowercase -BackgroundColorActive SlateGrey
New-HTMLSectionStyle -BorderRadius 0px -HeaderBackGroundColor Grey -RemoveShadow
New-HTMLPanelStyle -BorderRadius 0px
New-HTMLTableOption -DataStore JavaScript -BoolAsString -ArrayJoinString ', ' -ArrayJoin
New-HTMLHeader {
New-HTMLSection -Invisible {
New-HTMLSection {
New-HTMLText -Text "Report generated on $(Get-Date)" -Color Blue
} -JustifyContent flex-start -Invisible
New-HTMLSection {
New-HTMLText -Text "ADEssentials - $($Script:Reporting['Version'])" -Color Blue
} -JustifyContent flex-end -Invisible
}
}
foreach ($Domain in $AccountData.Data.Keys) {
New-HTMLTab -Name $Domain {
New-HTMLPanel {
New-HTMLTable -DataTable $AccountData['Data'][$Domain].Values.FullInformation -Filtering -DataStore JavaScript -ScrollX {
$newHTMLTableConditionSplat = @{
Name = 'PasswordLastSetDays'
ComparisonType = 'number'
Operator = 'le'
Value = 180
BackgroundColor = 'LimeGreen'
FailBackgroundColor = 'Salmon'
HighlightHeaders = 'PasswordLastSetDays', 'PasswordLastSet'
}
New-HTMLTableCondition @newHTMLTableConditionSplat
}
}
New-HTMLTabPanel {
foreach ($Account in $AccountData['Data'][$Domain].Values) {
$DomainControllers = $Account.DomainControllers
$GlobalCatalogs = $Account.GlobalCatalogs
$CountMatched = 0
$CountNotMatched = 0
$CountTotal = 0
$NewestPassword = $DomainControllers.Values.PasswordLastSet | Sort-Object -Descending | Select-Object -First 1
foreach ($Password in $DomainControllers.Values.PasswordLastSet) {
if ($Password -eq $NewestPassword) {
$CountMatched++
} else {
$CountNotMatched++
}
$CountTotal++
}
if ($NewestPassword) {
$TimeSinceLastChange = ($Today) - $NewestPassword
} else {
$TimeSinceLastChange = $null
}
$CountMatchedGC = 0
$CountNotMatchedGC = 0
$CountTotalGC = 0
$NewestPasswordGC = $GlobalCatalogs.Values.PasswordLastSet | Sort-Object -Descending | Select-Object -First 1
foreach ($Password in $GlobalCatalogs.Values.PasswordLastSet) {
if ($Password -eq $NewestPasswordGC) {
$CountMatchedGC++
} else {
$CountNotMatchedGC++
}
$CountTotalGC++
}
if ($NewestPasswordGC) {
$TimeSinceLastChangeGC = ($Today) - $NewestPasswordGC
} else {
$TimeSinceLastChangeGC = $null
}
New-HTMLTab -Name $Account.FullInformation.SamAccountName {
New-HTMLSection -Invisible {
# DC Status
New-HTMLSection -Invisible {
New-HTMLPanel -Invisible {
New-HTMLStatus {
$Percentage = "$([math]::Round(($CountMatched / $CountTotal) * 100))%"
if ($Percentage -eq '100%') {
$BackgroundColor = '#0ef49b'
$Icon = 'Good'
} elseif ($Percentage -ge '70%') {
$BackgroundColor = '#d2dc69'
$Icon = 'Bad'
} elseif ($Percentage -ge '30%') {
$BackgroundColor = '#faa04b'
$Icon = 'Bad'
} elseif ($Percentage -ge '10%') {
$BackgroundColor = '#ff9035'
$Icon = 'Bad'
} elseif ($Percentage -ge '0%') {
$BackgroundColor = '#ff5a64'
$Icon = 'Dead'
}
if ($Icon -eq 'Dead') {
$IconType = '☠'
} elseif ($Icon -eq 'Bad') {
$IconType = '☹'
} elseif ($Icon -eq 'Good') {
$IconType = '✔'
}
New-HTMLStatusItem -Name 'Domain Controller' -Status "Synchronized $CountMatched/$CountTotal ($Percentage)" -BackgroundColor $BackgroundColor -IconHex $IconType
$newHTMLToastSplat = @{
TextHeader = 'Kerberos password date'
Text = "Password set on: $NewestPassword (Days: $($TimeSinceLastChange.Days), Hours: $($TimeSinceLastChange.Hours), Minutes: $($TimeSinceLastChange.Minutes))"
BarColorLeft = 'AirForceBlue'
IconSolid = 'info-circle'
IconColor = 'AirForceBlue'
}
if ($TimeSinceLastChange.Days -ge 180) {
$newHTMLToastSplat['BarColorLeft'] = 'Salmon'
$newHTMLToastSplat['IconSolid'] = 'exclamation-triangle'
$newHTMLToastSplat['IconColor'] = 'Salmon'
$newHTMLToastSplat['TextHeader'] = 'Kerberos password date (outdated)'
}
New-HTMLToast @newHTMLToastSplat
}
}
}
# GC Status
New-HTMLSection -Invisible {
New-HTMLStatus {
$Percentage = "$([math]::Round(($CountMatchedGC / $CountTotalGC) * 100))%"
if ($Percentage -eq '100%') {
$BackgroundColor = '#0ef49b'
$Icon = 'Good'
} elseif ($Percentage -ge '70%') {
$BackgroundColor = '#d2dc69'
$Icon = 'Bad'
} elseif ($Percentage -ge '30%') {
$BackgroundColor = '#faa04b'
$Icon = 'Bad'
} elseif ($Percentage -ge '10%') {
$BackgroundColor = '#ff9035'
$Icon = 'Bad'
} elseif ($Percentage -ge '0%') {
$BackgroundColor = '#ff5a64'
$Icon = 'Dead'
}
if ($Icon -eq 'Dead') {
$IconType = '☠'
} elseif ($Icon -eq 'Bad') {
$IconType = '☹'
} elseif ($Icon -eq 'Good') {
$IconType = '✔'
}
New-HTMLStatusItem -Name 'Global Catalogs' -Status "Synchronized $CountMatchedGC/$CountTotalGC ($Percentage)" -BackgroundColor $BackgroundColor -IconHex $IconType
$newHTMLToastSplat = @{
TextHeader = 'Kerberos password date'
Text = "Password set on: $NewestPasswordGC (Days: $($TimeSinceLastChangeGC.Days), Hours: $($TimeSinceLastChangeGC.Hours), Minutes: $($TimeSinceLastChangeGC.Minutes))"
BarColorLeft = 'AirForceBlue'
IconSolid = 'info-circle'
IconColor = 'AirForceBlue'
}
if ($TimeSinceLastChange.Days -ge 180) {
$newHTMLToastSplat['BarColorLeft'] = 'Salmon'
$newHTMLToastSplat['IconSolid'] = 'exclamation-triangle'
$newHTMLToastSplat['IconColor'] = 'Salmon'
$newHTMLToastSplat['TextHeader'] = 'Kerberos password date (outdated)'
}
New-HTMLToast @newHTMLToastSplat
}
}
}
#$DataAccount = $Account.FullInformation
New-HTMLSection -HeaderText "Domain Controllers for '$($Account.FullInformation.SamAccountName)'" {
New-HTMLTable -DataTable $DomainControllers.Values {
New-HTMLTableCondition -Name 'Status' -Operator eq -Value 'OK' -BackgroundColor '#0ef49b' -FailBackgroundColor '#ff5a64'
} -Filtering -DataStore JavaScript
}
New-HTMLSection -HeaderText "Global Catalogs for account '$($Account.FullInformation.SamAccountName)'" {
New-HTMLTable -DataTable $GlobalCatalogs.Values {
New-HTMLTableCondition -Name 'Status' -Operator eq -Value 'OK' -BackgroundColor '#0ef49b' -FailBackgroundColor '#ff5a64'
} -Filtering -DataStore JavaScript
}
}
}
}
$KerberosAccount = $AccountData['Data'][$Domain]['krbtgt'].FullInformation
$NewestPassword = $KerberosAccount.PasswordLastSetDays
New-HTMLSection -HeaderText "Critical Accounts for domain '$Domain'" {
New-HTMLContainer {
New-HTMLPanel {
New-HTMLText -Text "Critical accounts that should have their password changed after every kerberos password change."
New-HTMLList {
New-HTMLListItem -Text 'Domain Admins'
New-HTMLListItem -Text 'Enterprise Admins'
}
}
New-HTMLPanel {
New-HTMLTable -DataTable $AccountData['CriticalAccounts'][$Domain] {
if ($null -ne $NewestPassword) {
New-HTMLTableCondition -Name 'PasswordLastSetDays' -Operator le -Value $NewestPassword -ComparisonType number -BackgroundColor MintGreen -FailBackgroundColor Salmon -HighlightHeaders PasswordLastSetDays, PasswordLastSet
}
} -Filtering -DataStore JavaScript -ScrollX
}
}
}
}
}
} -Online:$Online.IsPresent -ShowHTML:(-not $HideHTML) -FilePath $FilePath
if ($PassThru) {
$AccountData
}
Write-Verbose -Message "Show-WinADKerberosAccount - HTML Report generated"
}
function Show-WinADLdapSummary {
<#
.SYNOPSIS
Generates an HTML report for LDAP summary.
.DESCRIPTION
This function generates an HTML report for LDAP summary using the Get-WinADLDAPSummary function.
The report includes statistics and detailed LDAP server information.
.PARAMETER Forest
The name of the Active Directory forest.
.PARAMETER ExcludeDomains
Domains to exclude from the summary.
.PARAMETER ExcludeDomainControllers
Domain controllers to exclude from the summary.
.PARAMETER IncludeDomains
Domains to include in the summary.
.PARAMETER IncludeDomainControllers
Domain controllers to include in the summary.
.PARAMETER SkipRODC
Switch to skip read-only domain controllers.
.PARAMETER Identity
The identity to use for the summary.
.PARAMETER RetryCount
The number of retries for testing.
.PARAMETER FilePath
The path where the HTML report will be saved.
.PARAMETER Online
Switch to indicate if the report should be generated with online resources.
.PARAMETER HideHTML
Switch to indicate if the HTML report should be hidden after generation.
.PARAMETER PassThru
Switch to return the LDAP summary as output.
.EXAMPLE
Show-WinADLdapSummary -Forest "ad.evotec.xyz" -FilePath "C:\Reports\LDAPSummary.html"
.EXAMPLE
Show-WinADLdapSummary -IncludeDomains "domain1", "domain2" -HideHTML
.EXAMPLE
Show-WinADLdapSummary -PassThru
.NOTES
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
$Identity,
[int] $RetryCount = 3,
[string] $FilePath,
[switch] $Online,
[switch] $HideHTML,
[switch] $PassThru
)
$Script:Reporting = [ordered] @{}
$Script:Reporting['Version'] = Get-GitHubVersion -Cmdlet 'Invoke-ADEssentials' -RepositoryOwner 'evotecit' -RepositoryName 'ADEssentials'
if ($FilePath -eq '') {
$FilePath = Get-FileName -Extension 'html' -Temporary
}
$getWinADLDAPSummarySplat = @{
IncludeDomains = $IncludeDomains
ExcludeDomains = $ExcludeDomains
IncludeDomainControllers = $IncludeDomainControllers
ExcludeDomainControllers = $ExcludeDomainControllers
SkipRODC = $SkipRODC
Identity = $Identity
RetryCount = $RetryCount
Forest = $Forest
Extended = $true
}
$Output = Get-WinADLDAPSummary @getWinADLDAPSummarySplat
New-HTML {
New-HTMLSectionStyle -BorderRadius 0px -HeaderBackGroundColor Grey -RemoveShadow
New-HTMLTableOption -DataStore JavaScript -ArrayJoin -ArrayJoinString "," -BoolAsString
New-HTMLTabStyle -BorderRadius 0px -TextTransform capitalize -BackgroundColorActive SlateGrey
New-HTMLHeader {
New-HTMLSection -Invisible {
New-HTMLSection {
New-HTMLText -Text "Report generated on $(Get-Date)" -Color Blue
} -JustifyContent flex-start -Invisible
New-HTMLSection {
New-HTMLText -Text "ADEssentials - $($Script:Reporting['Version'])" -Color Blue
} -JustifyContent flex-end -Invisible
}
}
New-HTMLSection -HeaderText "LDAP Summary" {
New-HTMLPanel -Invisible {
New-HTMLText -Text "Summary for $($Output.Count) servers" -Color Blue -FontSize 10pt -FontWeight bold
New-HTMLList -FontSize 10pt {
New-HTMLListItem -Text "Servers with no issues: ", $($Output.GoodServers.Count) -Color None, LightGreen -FontWeight normal, bold
New-HTMLListItem -Text "Servers with issues: ", $($Output.FailedServersCount) -Color None, Salmon -FontWeight normal, bold
}
New-HTMLText -Text "Servers certificate summary" -Color Blue -FontSize 10pt -FontWeight bold
New-HTMLList -FontSize 10pt {
New-HTMLListItem -Text "Servers with certificate expiring More Than 30 Days: ", $($Output.ServersExpiringMoreThan30Days.Count) -FontWeight normal, bold
New-HTMLListItem -Text "Servers with certificate expiring In 30 Days: ", $($Output.ServersExpiringIn30Days.Count) -FontWeight normal, bold
New-HTMLListItem -Text "Servers with certificate expiring In 15 Days: ", $($Output.ServersExpiringIn15Days.Count) -FontWeight normal, bold
New-HTMLListItem -Text "Servers with certificate expiring In 7 Days: ", $($Output.ServersExpiringIn7Days.Count) -FontWeight normal, bold
New-HTMLListItem -Text "Servers with certificate expiring In 3 Days Or Less: ", $($Output.ServersExpiringIn3DaysOrLess.Count) -FontWeight normal, bold
New-HTMLListItem -Text "Servers with certificate expired: ", $($Output.ServersExpired.Count) -FontWeight normal, bold
}
}
New-HTMLPanel {
New-HTMLPanel {
New-HTMLChart {
New-ChartPie -Name 'Servers with no issues' -Value $($Output.GoodServers.Count) -Color LightGreen
New-ChartPie -Name 'Servers with issues' -Value $($Output.FailedServersCount) -Color Salmon
} -Title 'Servers status' -TitleColor Dandelion
}
}
}
New-HTMLSection -HeaderText "LDAP Servers" {
New-HTMLTable -DataTable $Output.List -Filtering {
New-HTMLTableCondition -Name 'StatusDate' -ComparisonType string -Operator eq -Value 'OK' -BackgroundColor LightGreen -FailBackgroundColor Salmon
New-HTMLTableCondition -Name 'X509DnsNameStatus' -ComparisonType string -Operator eq -Value 'OK' -BackgroundColor LightGreen -FailBackgroundColor Salmon -HighlightHeaders 'X509DnsNameStatus', 'X509DnsNameList'
New-HTMLTableCondition -Name 'StatusPorts' -ComparisonType string -Operator eq -Value 'OK' -BackgroundColor LightGreen -FailBackgroundColor Salmon
New-HTMLTableCondition -Name 'StatusIdentity' -ComparisonType string -Operator eq -Value 'OK' -BackgroundColor LightGreen -FailBackgroundColor Salmon
} -DataTableID 'DT-LDAPSummary' -ScrollX -WarningAction SilentlyContinue
}
} -FilePath $FilePath -ShowHTML:(-not $HideHTML)
if ($PassThru) {
$Output
}
}
function Show-WinADObjectDifference {
<#
.SYNOPSIS
This function shows the differences between Active Directory objects.
.DESCRIPTION
The function takes an array of Identity, a switch for Global Catalog, an array of Properties, a string for FilePath, and a switch to hide HTML.
It then generates an HTML report using the Find-WinADObjectDifference function and displays it.
.PARAMETER Identity
An array of Identity to compare.
.PARAMETER GlobalCatalog
A switch to specify if the comparison should be done in the Global Catalog.
.PARAMETER Properties
An array of Properties to compare.
.PARAMETER FilePath
A string specifying the file path to save the HTML report.
.PARAMETER HideHTML
A switch to hide the HTML report.
.EXAMPLE
Show-WinADObjectDifference -Identity "user1", "user2" -GlobalCatalog -Properties "Name", "Email" -FilePath "C:\ADReport.html" -HideHTML
#>
[CmdletBinding()]
param(
[Array] $Identity,
[switch] $GlobalCatalog,
[string[]] $Properties,
[string] $FilePath,
[switch] $HideHTML
)
$OutputValue = Find-WinADObjectDifference -Identity $Identity -GlobalCatalog:$GlobalCatalog.IsPresent -Properties $Properties
Write-Verbose -Message "Show-WinADObjectDifference - Generating HTML"
New-HTML {
New-HTMLTableOption -DataStore JavaScript -BoolAsString -ArrayJoinString ", " -ArrayJoin
New-HTMLTab -Name 'Summary' {
New-HTMLTable -DataTable $OutputValue.ListSummary -Filtering -DataStore JavaScript -ScrollX {
New-HTMLTableCondition -Name 'DifferentServersCount' -Operator eq -ComparisonType number -Value 0 -BackgroundColor LimeGreen -FailBackgroundColor Salmon -HighlightHeaders 'DifferentServersCount', 'DifferentServers', 'DifferentProperties'
New-HTMLTableCondition -Name 'SameServersCount' -Operator eq -ComparisonType number -Value 0 -BackgroundColor Salmon -FailBackgroundColor LimeGreen -HighlightHeaders 'SameServersCount', 'SameServers', 'SameProperties'
}
}
New-HTMLTab -Name 'Details per property' {
New-HTMLTable -DataTable $OutputValue.ListDetails -Filtering -DataStore JavaScript -ScrollX -AllProperties
}
New-HTMLTab -Name 'Details per server' {
New-HTMLTable -DataTable $OutputValue.ListDetailsReversed -Filtering -DataStore JavaScript -ScrollX
}
New-HTMLTab -Name 'Detailed Differences' {
New-HTMLTable -DataTable $OutputValue.List -Filtering -DataStore JavaScript -ScrollX
}
} -ShowHTML:(-not $HideHTML.IsPresent) -FilePath $FilePath
Write-Verbose -Message "Show-WinADObjectDifference - Generating HTML - Done"
}
function Show-WinADOrganization {
<#
.SYNOPSIS
Generates a detailed HTML report on the organizational units and their relationships within a specified Active Directory forest.
.DESCRIPTION
This cmdlet creates a comprehensive HTML report that includes a diagram of the organizational units and their relationships, as well as a table with detailed information about the organizational units. The report is designed to provide a clear overview of the organizational structure within the Active Directory.
.PARAMETER Conditions
Specifies the conditions to filter the organizational units and their relationships. This can be a script block that returns a boolean value.
.PARAMETER FilePath
The path to save the HTML report. If not specified, a temporary file is used.
.EXAMPLE
Show-WinADOrganization -FilePath "C:\Reports\AD Organization Report.html"
.NOTES
This cmdlet is useful for administrators to visualize and analyze the organizational structure within Active Directory, helping to identify potential issues and ensure efficient management of resources.
#>
[cmdletBinding()]
param(
[ScriptBlock] $Conditions,
[string] $FilePath
)
$CachedOU = [ordered] @{}
$ForestInformation = Get-WinADForestDetails
$Script:OrganiazationalUnits = @()
#$Organization = Get-WinADOrganization
New-HTML -TitleText "Visual Active Directory Organization" {
New-HTMLSectionStyle -BorderRadius 0px -HeaderBackGroundColor Grey -RemoveShadow
New-HTMLTableOption -DataStore HTML
New-HTMLTabStyle -BorderRadius 0px -TextTransform capitalize -BackgroundColorActive SlateGrey
New-HTMLTabPanel {
New-HTMLTab -TabName 'Standard' {
New-HTMLSection -HeaderText 'Organization Diagram' {
New-HTMLDiagram -Height 'calc(50vh)' {
New-DiagramEvent -ID 'DT-StandardOrg' -ColumnID 3
New-DiagramOptionsPhysics -RepulsionNodeDistance 150 -Solver repulsion
#foreach ($OU in $Organization.Keys) {
#Add-Node -Name $OU -Organization $Organization
#New-DiagramNode -Label $OU
#}
foreach ($Domain in $ForestInformation.Domains) {
New-DiagramNode -Label $Domain -Id $Domain -Image 'https://cdn-icons-png.flaticon.com/512/6329/6329785.png'
$Script:OrganiazationalUnits = Get-ADOrganizationalUnit -Filter "*" -Server $ForestInformation['QueryServers'][$Domain].HostName[0] -Properties DistinguishedName, CanonicalName
foreach ($OU in $OrganiazationalUnits) {
New-DiagramNode -Id $OU.DistinguishedName -Label $OU.Name -Image 'https://cdn-icons-png.flaticon.com/512/3767/3767084.png'
[Array] $SubOU = ConvertFrom-DistinguishedName -DistinguishedName $OU.DistinguishedName -ToMultipleOrganizationalUnit
if ($SubOU.Count -gt 0) {
foreach ($Sub in $SubOU[0]) {
$Name = ConvertFrom-DistinguishedName -DistinguishedName $Sub -ToLastName
New-DiagramNode -Id $Sub -Label $Name -Image 'https://cdn-icons-png.flaticon.com/512/3767/3767084.png'
New-DiagramEdge -From $OU.DistinguishedName -To $Sub -Color Blue -ArrowsToEnabled -Dashes
}
} else {
New-DiagramEdge -From $Domain -To $OU.DistinguishedName -Color Blue -ArrowsToEnabled -Dashes
}
<#
$NameSplit = $OU.canonicalName.Split("/")
$CurrentLevel = $CachedOU[$Domain]
foreach ($N in $NameSplit) {
if ($N -ne $Domain) {
if (-not $CurrentLevel[$N]) {
$CurrentLevel[$N] = [ordered] @{}
} else {
$CurrentLevel = $CurrentLevel[$N]
}
}
}
#>
}
<#
foreach ($OU in $OrganiazationalUnits) {
[Array] $SubOU = ConvertFrom-DistinguishedName -DistinguishedName $OU.DistinguishedName -ToMultipleOrganizationalUnit -IncludeParent | Select-Object -Last 1
New-DiagramLink -From $OU.DistinguishedName -To $O
}
#>
}
#$CachedOU
foreach ($Trust in $ADTrusts) {
#New-DiagramNode -Label $Trust.'TrustSource' -IconSolid audio-description #-IconColor LightSteelBlue
#New-DiagramNode -Label $Trust.'TrustTarget' -IconSolid audio-description #-IconColor LightSteelBlue
$newDiagramLinkSplat = @{
From = $Trust.'TrustSource'
To = $Trust.'TrustTarget'
ColorOpacity = 0.7
}
<#
if ($Trust.'TrustDirection' -eq 'Disabled') {
} elseif ($Trust.'TrustDirection' -eq 'Inbound') {
$newDiagramLinkSplat.ArrowsFromEnabled = $true
} elseif ($Trust.'TrustDirection' -eq 'Outbount') {
$newDiagramLinkSplat.ArrowsToEnabled = $true
New-DiagramLink @newDiagramLinkSplat
} elseif ($Trust.'TrustDirection' -eq 'Bidirectional') {
$newDiagramLinkSplat.ArrowsToEnabled = $true
$newDiagramLinkSplat.ArrowsFromEnabled = $true
}
if ($Trust.IntraForest) {
$newDiagramLinkSplat.Color = 'DarkSpringGreen'
}
if ($Trust.QueryStatus -eq 'OK' -or $Trust.TrustStatus -eq 'OK') {
$newDiagramLinkSplat.Dashes = $false
$newDiagramLinkSplat.FontColor = 'Green'
} else {
$newDiagramLinkSplat.Dashes = $true
$newDiagramLinkSplat.FontColor = 'Red'
}
if ($Trust.IsTGTDelegationEnabled) {
$newDiagramLinkSplat.Color = 'Red'
$newDiagramLinkSplat.Label = "Delegation Enabled"
} else {
$newDiagramLinkSplat.Label = $Trust.QueryStatus
}
#>
#New-DiagramLink @newDiagramLinkSplat
}
}
}
}
New-HTMLTab -TabName 'Hierarchical' {
New-HTMLSection -HeaderText 'Organization Diagram' {
New-HTMLDiagram -Height 'calc(50vh)' {
New-DiagramOptionsLayout -HierarchicalEnabled $true
New-DiagramEvent -ID 'DT-StandardOrg' -ColumnID 3
New-DiagramOptionsPhysics -RepulsionNodeDistance 150 -Solver repulsion
#foreach ($OU in $Organization.Keys) {
#Add-Node -Name $OU -Organization $Organization
#New-DiagramNode -Label $OU
#}
foreach ($Domain in $ForestInformation.Domains) {
New-DiagramNode -Label $Domain -Id $Domain -Image 'https://cdn-icons-png.flaticon.com/512/6329/6329785.png'
$Script:OrganiazationalUnits = Get-ADOrganizationalUnit -Filter "*" -Server $ForestInformation['QueryServers'][$Domain].HostName[0] -Properties DistinguishedName, CanonicalName
foreach ($OU in $OrganiazationalUnits) {
New-DiagramNode -Id $OU.DistinguishedName -Label $OU.Name -Image 'https://cdn-icons-png.flaticon.com/512/3767/3767084.png'
[Array] $SubOU = ConvertFrom-DistinguishedName -DistinguishedName $OU.DistinguishedName -ToMultipleOrganizationalUnit
if ($SubOU.Count -gt 0) {
foreach ($Sub in $SubOU[0]) {
$Name = ConvertFrom-DistinguishedName -DistinguishedName $Sub -ToLastName
New-DiagramNode -Id $Sub -Label $Name -Image 'https://cdn-icons-png.flaticon.com/512/3767/3767084.png'
New-DiagramEdge -From $OU.DistinguishedName -To $Sub
}
} else {
New-DiagramEdge -From $Domain -To $OU.DistinguishedName
}
<#
$NameSplit = $OU.canonicalName.Split("/")
$CurrentLevel = $CachedOU[$Domain]
foreach ($N in $NameSplit) {
if ($N -ne $Domain) {
if (-not $CurrentLevel[$N]) {
$CurrentLevel[$N] = [ordered] @{}
} else {
$CurrentLevel = $CurrentLevel[$N]
}
}
}
#>
}
<#
foreach ($OU in $OrganiazationalUnits) {
[Array] $SubOU = ConvertFrom-DistinguishedName -DistinguishedName $OU.DistinguishedName -ToMultipleOrganizationalUnit -IncludeParent | Select-Object -Last 1
New-DiagramLink -From $OU.DistinguishedName -To $O
}
#>
}
#$CachedOU
foreach ($Trust in $ADTrusts) {
#New-DiagramNode -Label $Trust.'TrustSource' -IconSolid audio-description #-IconColor LightSteelBlue
#New-DiagramNode -Label $Trust.'TrustTarget' -IconSolid audio-description #-IconColor LightSteelBlue
$newDiagramLinkSplat = @{
From = $Trust.'TrustSource'
To = $Trust.'TrustTarget'
ColorOpacity = 0.7
}
<#
if ($Trust.'TrustDirection' -eq 'Disabled') {
} elseif ($Trust.'TrustDirection' -eq 'Inbound') {
$newDiagramLinkSplat.ArrowsFromEnabled = $true
} elseif ($Trust.'TrustDirection' -eq 'Outbount') {
$newDiagramLinkSplat.ArrowsToEnabled = $true
New-DiagramLink @newDiagramLinkSplat
} elseif ($Trust.'TrustDirection' -eq 'Bidirectional') {
$newDiagramLinkSplat.ArrowsToEnabled = $true
$newDiagramLinkSplat.ArrowsFromEnabled = $true
}
if ($Trust.IntraForest) {
$newDiagramLinkSplat.Color = 'DarkSpringGreen'
}
if ($Trust.QueryStatus -eq 'OK' -or $Trust.TrustStatus -eq 'OK') {
$newDiagramLinkSplat.Dashes = $false
$newDiagramLinkSplat.FontColor = 'Green'
} else {
$newDiagramLinkSplat.Dashes = $true
$newDiagramLinkSplat.FontColor = 'Red'
}
if ($Trust.IsTGTDelegationEnabled) {
$newDiagramLinkSplat.Color = 'Red'
$newDiagramLinkSplat.Label = "Delegation Enabled"
} else {
$newDiagramLinkSplat.Label = $Trust.QueryStatus
}
#>
#New-DiagramLink @newDiagramLinkSplat
}
}
}
}
}
New-HTMLSection -Title "Information about Trusts" {
New-HTMLTable -DataTable $Script:OrganiazationalUnits -Filtering {
if (-not $DisableBuiltinConditions) {
#New-TableCondition -BackgroundColor MediumSeaGreen -ComparisonType string -Value 'OK' -Name TrustStatus -Operator eq
#New-TableCondition -BackgroundColor MediumSeaGreen -ComparisonType string -Value 'OK' -Name QueryStatus -Operator eq
#New-TableCondition -BackgroundColor CoralRed -ComparisonType string -Value 'NOT OK' -Name QueryStatus -Operator eq
#New-TableCondition -BackgroundColor CoralRed -ComparisonType bool -Value $true -Name IsTGTDelegationEnabled -Operator eq
}
if ($Conditions) {
& $Conditions
}
} -DataTableID 'DT-StandardOrg'
}
} -ShowHTML -FilePath $FilePath -Online
}
function Show-WinADSites {
<#
.SYNOPSIS
Generates a detailed HTML report on the sites and replication in a specified Active Directory forest.
.DESCRIPTION
This cmdlet creates a comprehensive HTML report that includes a diagram of the sites and their relationships, as well as a table with detailed information about the sites and their replication status. The report is designed to provide a clear overview of the site structure and replication health within the Active Directory.
.PARAMETER Conditions
Specifies the conditions to filter the sites and replication information. This can be a script block that returns a boolean value.
.PARAMETER FilePath
The path to save the HTML report. If not specified, a temporary file is used.
.EXAMPLE
Show-WinADSites -FilePath "C:\Reports\AD Sites Report.html"
.NOTES
This cmdlet is useful for administrators to visualize and analyze the site structure and replication health in Active Directory, helping to identify potential issues and ensure efficient domain controller communication.
#>
[cmdletBinding()]
param(
[ScriptBlock] $Conditions,
[string] $FilePath
)
$CacheReplication = @{}
$Sites = Get-WinADForestSites
$Replication = Get-WinADForestReplication
foreach ($Rep in $Replication) {
$CacheReplication["$($Rep.Server)$($Rep.ServerPartner)"] = $Rep
}
New-HTML -TitleText "Visual Active Directory Organization" {
New-HTMLSectionStyle -BorderRadius 0px -HeaderBackGroundColor Grey -RemoveShadow
New-HTMLTableOption -DataStore HTML
New-HTMLTabStyle -BorderRadius 0px -TextTransform capitalize -BackgroundColorActive SlateGrey
New-HTMLTabPanel {
New-HTMLTab -TabName 'Standard' {
New-HTMLSection -HeaderText 'Organization Diagram' {
New-HTMLDiagram -Height 'calc(50vh)' {
New-DiagramEvent -ID 'DT-StandardSites' -ColumnID 0
New-DiagramOptionsPhysics -RepulsionNodeDistance 150 -Solver repulsion
foreach ($Site in $Sites) {
New-DiagramNode -Id $Site.DistinguishedName -Label $Site.Name -Image 'https://cdn-icons-png.flaticon.com/512/1104/1104991.png'
foreach ($Subnet in $Site.Subnets) {
New-DiagramNode -Id $Subnet -Label $Subnet -Image 'https://cdn-icons-png.flaticon.com/512/1674/1674968.png'
New-DiagramEdge -From $Subnet -To $Site.DistinguishedName
}
foreach ($DC in $Site.DomainControllers) {
New-DiagramNode -Id $DC -Label $DC -Image 'https://cdn-icons-png.flaticon.com/512/1383/1383395.png'
New-DiagramEdge -From $DC -To $Site.DistinguishedName
}
}
foreach ($R in $CacheReplication.Values) {
if ($R.ConsecutiveReplicationFailures -gt 0) {
$Color = 'CoralRed'
} else {
$Color = 'MediumSeaGreen'
}
New-DiagramEdge -From $R.Server -To $R.ServerPartner -Color $Color -ArrowsToEnabled -ColorOpacity 0.5
}
}
}
}
}
New-HTMLSection -Title "Information about Sites" {
New-HTMLTable -DataTable $Sites -Filtering {
if (-not $DisableBuiltinConditions) {
New-TableCondition -BackgroundColor MediumSeaGreen -ComparisonType number -Value 0 -Name SubnetsCount -Operator gt
New-TableCondition -BackgroundColor CoralRed -ComparisonType number -Value 0 -Name SubnetsCount -Operator eq
}
if ($Conditions) {
& $Conditions
}
} -DataTableID 'DT-StandardSites' -DataStore JavaScript
}
New-HTMLTable -DataTable $Replication -Filtering {
if (-not $DisableBuiltinConditions) {
New-TableCondition -BackgroundColor MediumSeaGreen -ComparisonType number -Value 0 -Name SubnetsCount -Operator gt
New-TableCondition -BackgroundColor CoralRed -ComparisonType number -Value 0 -Name SubnetsCount -Operator eq
}
if ($Conditions) {
& $Conditions
}
} -DataTableID 'DT-StandardSites1' -DataStore JavaScript
} -ShowHTML -FilePath $FilePath -Online
}
function Show-WinADSitesCoverage {
[alias('Show-WinADSiteCoverage')]
[CmdletBinding()]
param(
[string] $Forest,
[alias('Domain')][string[]] $IncludeDomains,
[string[]] $ExcludeDomains,
[alias('DomainControllers')][string[]] $IncludeDomainControllers,
[string[]] $ExcludeDomainControllers,
[switch] $SkipRODC,
[System.Collections.IDictionary] $ExtendedForestInformation,
[string] $FilePath,
[switch] $Online,
[switch] $HideHTML,
[switch] $PassThru
)
$Today = Get-Date
$Script:Reporting = [ordered] @{}
$Script:Reporting['Version'] = Get-GitHubVersion -Cmdlet 'Invoke-ADEssentials' -RepositoryOwner 'evotecit' -RepositoryName 'ADEssentials'
$SiteCoverage = Get-WinADSiteCoverage -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
New-HTML -TitleText "Active Directory Site Coverage" {
New-HTMLSectionStyle -BorderRadius 0px -HeaderBackGroundColor Grey -RemoveShadow
New-HTMLTableOption -DataStore JavaScript -ArrayJoin -ArrayJoinString "," -BoolAsString
New-HTMLTabStyle -BorderRadius 0px -TextTransform capitalize -BackgroundColorActive SlateGrey
New-HTMLHeader {
New-HTMLSection -Invisible {
New-HTMLSection {
New-HTMLText -Text "Report generated on $($Today)" -Color Blue
} -JustifyContent flex-start -Invisible
New-HTMLSection {
New-HTMLText -Text "ADEssentials - $($Script:Reporting['Version'])" -Color Blue
} -JustifyContent flex-end -Invisible
}
}
New-HTMLSection -HeaderText "Active Directory Site Coverage" {
New-HTMLTable -DataTable $SiteCoverage -Filtering {
New-TableCondition -BackgroundColor CoralRed -ComparisonType number -Value 0 -Name NonExistingSiteCoverageCount -Operator gt -FailBackgroundColor MediumSeaGreen
New-TableCondition -BackgroundColor CoralRed -ComparisonType number -Value 0 -Name NonExistingGCSiteCoverageCount -Operator gt -FailBackgroundColor MediumSeaGreen
New-TableCondition -BackgroundColor CoralRed -ComparisonType bool -Value $true -Name HasIssues -Operator eq -FailBackgroundColor MediumSeaGreen
New-TableCondition -BackgroundColor CoralRed -ComparisonType bool -Value $true -Name Error -Operator eq -FailBackgroundColor MediumSeaGreen
} -DataTableID 'DT-CoverageSites' -ScrollX
}
} -Online:$Online -FilePath $FilePath -ShowHTML:(-not $HideHTML)
if ($PassThru) {
$SiteCoverage
}
}
function Show-WinADTrust {
<#
.SYNOPSIS
Generates a detailed HTML report on the trust relationships in a specified Active Directory forest.
.DESCRIPTION
This cmdlet creates a comprehensive HTML report that includes the trust relationships, their properties, and a diagram of their relationships. The report is designed to provide a clear overview of the trust relationships within the Active Directory.
.PARAMETER Conditions
Specifies the conditions to filter the trust relationships. This can be a script block that returns a boolean value.
.PARAMETER Recursive
A switch to include all trust relationships in the report, including those that are not direct.
.PARAMETER FilePath
The path to save the HTML report. If not specified, a temporary file is used.
.PARAMETER Online
A switch to display the HTML report in the default web browser.
.PARAMETER HideHTML
A switch to hide the HTML report after it is generated.
.PARAMETER DisableBuiltinConditions
A switch to disable the built-in conditions for filtering the trust relationships.
.PARAMETER PassThru
A switch to return the trust relationships as objects.
.EXAMPLE
Show-WinADTrust -Recursive -Online
.NOTES
This cmdlet is useful for auditing and analyzing the trust relationships in Active Directory, helping administrators to identify potential security risks and ensure compliance with organizational policies.
#>
[alias('Show-ADTrust', 'Show-ADTrusts', 'Show-WinADTrusts')]
[cmdletBinding()]
param(
[Parameter(Position = 0)][scriptblock] $Conditions,
[switch] $Recursive,
[string] $FilePath,
[switch] $Online,
[switch] $HideHTML,
[switch] $DisableBuiltinConditions,
[switch] $PassThru
)
if ($FilePath -eq '') {
$FilePath = Get-FileName -Extension 'html' -Temporary
}
$Script:ADTrusts = @()
New-HTML -TitleText "Visual Trusts" {
New-HTMLSectionStyle -BorderRadius 0px -HeaderBackGroundColor Grey -RemoveShadow
New-HTMLTableOption -DataStore HTML
New-HTMLTabStyle -BorderRadius 0px -TextTransform capitalize -BackgroundColorActive SlateGrey
$Script:ADTrusts = Get-WinADTrust -Recursive:$Recursive
Write-Verbose "Show-WinADTrust - Found $($ADTrusts.Count) trusts"
New-HTMLTab -TabName 'Summary' {
New-HTMLSection -HeaderText 'Trusts Diagram' {
New-HTMLDiagram -Height 'calc(50vh)' {
#New-DiagramEvent -ID 'DT-TrustsInformation' -ColumnID 0
New-DiagramOptionsPhysics -RepulsionNodeDistance 150 -Solver repulsion
foreach ($Node in $AllNodes) {
New-DiagramNode -Label $Node.'Trust'
}
foreach ($Trust in $ADTrusts) {
New-DiagramNode -Label $Trust.'TrustSource' -IconSolid audio-description
New-DiagramNode -Label $Trust.'TrustTarget' -IconSolid audio-description
$newDiagramLinkSplat = @{
From = $Trust.'TrustSource'
To = $Trust.'TrustTarget'
ColorOpacity = 0.7
}
if ($Trust.'TrustDirection' -eq 'Disabled') {
} elseif ($Trust.'TrustDirection' -eq 'Inbound') {
$newDiagramLinkSplat.ArrowsFromEnabled = $true
} elseif ($Trust.'TrustDirection' -eq 'Outbount') {
$newDiagramLinkSplat.ArrowsToEnabled = $true
New-DiagramLink @newDiagramLinkSplat
} elseif ($Trust.'TrustDirection' -eq 'Bidirectional') {
$newDiagramLinkSplat.ArrowsToEnabled = $true
$newDiagramLinkSplat.ArrowsFromEnabled = $true
}
if ($Trust.IntraForest) {
$newDiagramLinkSplat.Color = 'DarkSpringGreen'
}
if ($Trust.QueryStatus -eq 'OK' -or $Trust.TrustStatus -eq 'OK') {
$newDiagramLinkSplat.Dashes = $false
$newDiagramLinkSplat.FontColor = 'Green'
} else {
$newDiagramLinkSplat.Dashes = $true
$newDiagramLinkSplat.FontColor = 'Red'
}
if ($Trust.IsTGTDelegationEnabled) {
$newDiagramLinkSplat.Color = 'Red'
$newDiagramLinkSplat.Label = "Delegation Enabled"
} else {
$newDiagramLinkSplat.Label = $Trust.QueryStatus
}
New-DiagramLink @newDiagramLinkSplat
}
}
}
New-HTMLSection -Title "Information about Trusts" {
New-HTMLTable -DataTable $ADTrusts -Filtering {
if (-not $DisableBuiltinConditions) {
New-TableCondition -BackgroundColor LimeGreen -ComparisonType string -Value 'OK' -Name TrustStatus -Operator eq
New-TableCondition -BackgroundColor LimeGreen -ComparisonType string -Value 'OK' -Name QueryStatus -Operator eq
New-TableCondition -BackgroundColor CoralRed -ComparisonType string -Value 'NOT OK' -Name QueryStatus -Operator eq
New-TableCondition -BackgroundColor CoralRed -ComparisonType bool -Value $true -Name IsTGTDelegationEnabled -Operator eq
New-TableCondition -ComparisonType number -Name 'ModifiedDaysAgo' -Operator gt -Value 15 -BackgroundColor MediumSeaGreen
New-TableCondition -ComparisonType number -Name 'ModifiedDaysAgo' -Operator gt -Value 30 -BackgroundColor GoldenFizz
New-TableCondition -ComparisonType number -Name 'ModifiedDaysAgo' -Operator gt -Value 90 -BackgroundColor CoralRed
New-TableCondition -ComparisonType number -Name 'ModifiedDaysAgo' -Operator le -Value 15 -BackgroundColor LimeGreen
New-TableCondition -ComparisonType string -Name 'Status' -Operator eq -Value 'Enabled' -BackgroundColor LimeGreen
New-TableCondition -ComparisonType string -Name 'Status' -Operator eq -Value 'Internal' -BackgroundColor LightBlue
New-TableCondition -ComparisonType string -Name 'Status' -Operator notin -Value 'Internal', 'Enabled' -BackgroundColor LightCoral
}
if ($Conditions) {
& $Conditions
}
} -DataTableID 'DT-TrustsInformation' -ScrollX -ExcludeProperty 'AdditionalInformation'
}
}
# Lets try to sort it into source domain per tab
$TrustCache = [ordered]@{}
foreach ($Trust in $ADTrusts) {
Write-Verbose "Show-WinADTrust - Processing $($Trust.TrustSource) to $($Trust.TrustTarget)"
if (-not $TrustCache[$Trust.TrustSource]) {
Write-Verbose "Show-WinADTrust - Creating cache for $($Trust.TrustSource)"
$TrustCache[$Trust.TrustSource] = [System.Collections.Generic.List[PSCustomObject]]::new()
}
$TrustCache[$Trust.TrustSource].Add($Trust)
}
foreach ($Source in $TrustCache.Keys) {
New-HTMLTab -TabName "Source $($Source.ToUpper())" {
foreach ($Trust in $TrustCache[$Source]) {
if ($Trust.QueryStatus -eq 'OK' -or $Trust.TrustStatus -eq 'OK') {
$IconColor = 'MediumSeaGreen'
$IconSolid = 'smile'
} else {
$IconColor = 'CoralRed'
$IconSolid = 'angry'
}
New-HTMLTab -TabName "Target $($Trust.TrustTarget.ToUpper())" -IconColor $IconColor -IconSolid $IconSolid -TextColor $IconColor {
New-HTMLSection -Invisible {
New-HTMLSection -Title "Trust Information" {
New-HTMLTable -DataTable $Trust {
} -Transpose -TransposeName 'Setting' -HideFooter -DisablePaging -Buttons copyHtml5, excelHtml5, pdfHtml5 -ExcludeProperty AdditionalInformation
}
New-HTMLSection -Invisible -Wrap wrap {
New-HTMLSection -Title "Name suffix status" {
New-HTMLTable -DataTable $Trust.AdditionalInformation.msDSTrustForestTrustInfo -Filtering {
if ($Trust.AdditionalInformation.msDSTrustForestTrustInfo.Count -gt 0) {
New-TableCondition -BackgroundColor MediumSeaGreen -ComparisonType string -Value 'Enabled' -Name Status -Operator eq -Row
New-TableCondition -BackgroundColor CoralRed -ComparisonType string -Value 'Enabled' -Name Status -Operator ne -Row
}
}
}
New-HTMLSection -Title "Name suffix routing (include)" {
New-HTMLTable -DataTable $Trust.AdditionalInformation.SuffixesInclude -Filtering {
if ($Trust.AdditionalInformation.SuffixesInclude.Count -gt 0) {
New-TableCondition -BackgroundColor MediumSeaGreen -ComparisonType string -Value 'Enabled' -Name Status -Operator eq -Row
New-TableCondition -BackgroundColor CoralRed -ComparisonType string -Value 'Enabled' -Name Status -Operator ne -Row
}
}
}
New-HTMLSection -Title "Name suffix routing (exclude)" {
New-HTMLTable -DataTable $Trust.AdditionalInformation.SuffixesExclude -Filtering {
if ($Trust.AdditionalInformation.SuffixesExclude.Count -gt 0) {
New-TableCondition -BackgroundColor MediumSeaGreen -ComparisonType string -Value 'Enabled' -Name Status -Operator eq -Row
New-TableCondition -BackgroundColor CoralRed -ComparisonType string -Value 'Enabled' -Name Status -Operator ne -Row
}
}
}
}
}
}
}
}
}
} -Online:$Online -FilePath $FilePath -ShowHTML:(-not $HideHTML)
if ($PassThru) {
$Script:ADTrusts
}
}
function Show-WinADUserSecurity {
<#
.SYNOPSIS
Generates a detailed HTML report on the security settings for a specified Active Directory user.
.DESCRIPTION
This cmdlet creates a comprehensive HTML report that includes the user's properties, access control list (ACL), group memberships, and a diagram of their group hierarchy. The report is designed to provide a clear overview of the user's security settings and relationships within the Active Directory.
.PARAMETER Identity
Specifies the identity of the user for whom to generate the report. This can be a distinguished name, GUID, security identifier (SID), or SAM account name.
.EXAMPLE
Show-WinADUserSecurity -Identity "CN=User1,DC=example,DC=com"
.NOTES
This cmdlet is useful for auditing and analyzing the security settings of Active Directory users, helping administrators to identify potential security risks and ensure compliance with organizational policies.
#>
[cmdletBinding()]
param(
[string[]] $Identity
)
New-HTML {
foreach ($I in $Identity) {
$User = Get-WinADObject -Identity $I
$ACL = Get-ADACL -ADObject $User.Distinguishedname
$Objects = [ordered] @{}
$GroupsList = foreach ($A in $ACL) {
$Objects[$A.Principal] = Get-WinADObject -Identity $A.Principal
if ($Objects[$A.Principal].ObjectClass -eq 'group') {
$Objects[$A.Principal].Distinguishedname
}
}
$Groups = $Objects.Values | Where-Object { $_.ObjectClass -eq 'group' } | Sort-Object -Property Distinguishedname
$GroupsList = foreach ($G in $Groups) {
Get-WinADGroupMember -Identity $G.Distinguishedname -AddSelf
}
New-HTMLTab -Name "$($User.DomainName)\$($User.SamAccountName)" {
New-HTMLSection -Invisible {
New-HTMLPanel {
New-HTMLTable -DataTable $User
}
New-HTMLPanel {
New-HTMLTable -Filtering -DataTable $ACL -IncludeProperty Principal, AccessControlType, ActiveDirectoryRights, ObjectTypeName, InheritedObjectTypeName, InhertitanceType, IsInherited
}
}
New-HTMLSection -Invisible {
New-HTMLTable -Filtering -DataTable $Objects.Keys
}
$HideAppliesTo = 'Default'
New-HTMLTabPanel {
New-HTMLTab -TabName 'Diagram Basic' {
New-HTMLSection -Title "Diagram for Summary" {
New-HTMLGroupDiagramSummary -ADGroup $GroupsList -HideAppliesTo $HideAppliesTo -HideUsers:$HideUsers -HideComputers:$HideComputers -HideOther:$HideOther -DataTableID $DataTableID -ColumnID 1 -Online:$Online
}
}
New-HTMLTab -TabName 'Diagram Hierarchy' {
New-HTMLSection -Title "Diagram for Summary" {
New-HTMLGroupDiagramSummaryHierarchical -ADGroup $GroupsList -HideAppliesTo $HideAppliesTo -HideUsers:$HideUsers -HideComputers:$HideComputers -HideOther:$HideOther -Online:$Online
}
}
}
}
}
} -Online -ShowHTML
}
function Sync-WinADDomainController {
<#
.SYNOPSIS
Synchronizes domain controllers across a specified forest or domains.
.DESCRIPTION
This cmdlet synchronizes domain controllers across a specified forest or domains. It uses the repadmin tool to force synchronization of domain controllers for each domain in the forest. The cmdlet can be filtered to include or exclude specific domains or domain controllers, and can also skip Read-Only Domain Controllers (RODCs).
.PARAMETER Forest
The name of the forest to synchronize domain controllers for. If not specified, the current user's forest is used.
.PARAMETER ExcludeDomains
An array of domain names to exclude from the synchronization process.
.PARAMETER ExcludeDomainControllers
An array of domain controller names to exclude from the synchronization process.
.PARAMETER IncludeDomains
An array of domain names to include in the synchronization process. If specified, only these domains will be synchronized.
.PARAMETER IncludeDomainControllers
An array of domain controller names to include in the synchronization process. If specified, only these domain controllers will be synchronized.
.PARAMETER SkipRODC
A switch to skip Read-Only Domain Controllers (RODCs) during the synchronization process.
.PARAMETER ExtendedForestInformation
A dictionary containing extended information about the forest, which can be used to speed up processing.
.EXAMPLE
Sync-WinADDomainController -Forest "example.com"
.NOTES
This cmdlet is useful for ensuring domain controllers are synchronized across a forest or domains, which is essential for maintaining consistency and ensuring all domain controllers have the same information.
#>
[alias('Sync-DomainController')]
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
foreach ($Domain in $ForestInformation.Domains) {
$QueryServer = $ForestInformation['QueryServers']["$Domain"].HostName[0]
$DistinguishedName = (Get-ADDomain -Server $QueryServer).DistinguishedName
($ForestInformation['DomainDomainControllers']["$Domain"]).Name | ForEach-Object {
Write-Verbose -Message "Sync-DomainController - Forcing synchronization $_"
repadmin /syncall $_ $DistinguishedName /e /A | Out-Null
}
}
}
function Test-ADDomainController {
<#
.SYNOPSIS
Tests the domain controllers in a specified forest for various aspects of their functionality.
.DESCRIPTION
This cmdlet tests the domain controllers in a specified forest for various aspects of their functionality, including DNS resolution, LDAP connectivity, and FSMO role availability. It returns a custom object with detailed information about the domain controllers, their status, and any errors encountered during the test.
.PARAMETER Forest
The name of the forest to test domain controllers for. If not specified, the current user's forest is used.
.PARAMETER ExcludeDomains
An array of domain names to exclude from the test.
.PARAMETER ExcludeDomainControllers
An array of domain controller names to exclude from the test.
.PARAMETER IncludeDomains
An array of domain names to include in the test. If specified, only these domains will be tested.
.PARAMETER IncludeDomainControllers
An array of domain controller names to include in the test. If specified, only these domain controllers will be tested.
.PARAMETER SkipRODC
A switch to skip Read-Only Domain Controllers (RODCs) during the test.
.PARAMETER Credential
A PSCredential object to use for authentication when connecting to domain controllers.
.PARAMETER ExtendedForestInformation
A dictionary containing extended information about the forest, which can be used to speed up processing.
.EXAMPLE
Test-ADDomainController -Forest "example.com"
.NOTES
This cmdlet is useful for monitoring the health and functionality of domain controllers in a forest.
#>
[CmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers', 'DomainController', 'ComputerName')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[Parameter(Mandatory = $false)][PSCredential] $Credential = $null,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$CredentialParameter = @{ }
if ($null -ne $Credential) {
$CredentialParameter['Credential'] = $Credential
}
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
$Output = foreach ($Computer in $ForestInformation.ForestDomainControllers.HostName) {
$Result = Invoke-Command -ComputerName $Computer -ScriptBlock {
dcdiag.exe /v /c /Skip:OutboundSecureChannels
} @CredentialParameter
for ($Line = 0; $Line -lt $Result.length; $Line++) {
# Correct wrong line breaks
if ($Result[$Line] -match '^\s{9}.{25} (\S+) (\S+) test$') {
$Result[$Line] = $Result[$Line] + ' ' + $Result[$Line + 2].Trim()
}
# Verify test start line
if ($Result[$Line] -match '^\s{6}Starting test: \S+$') {
$LineStart = $Line
}
# Verify test end line
if ($Result[$Line] -match '^\s{9}.{25} (\S+) (\S+) test (\S+)$') {
$DiagnosticResult = [PSCustomObject] @{
ComputerName = $Computer
#Domain = $Domain
Target = $Matches[1]
Test = $Matches[3]
Result = $Matches[2] -eq 'passed'
Data = $Result[$LineStart..$Line] -join [System.Environment]::NewLine
}
$DiagnosticResult
}
}
}
$Output
}
function Test-ADRolesAvailability {
<#
.SYNOPSIS
Tests the availability of Active Directory roles across domain controllers in a specified forest.
.DESCRIPTION
This cmdlet tests the availability of Active Directory roles across domain controllers in a specified forest. It returns a custom object with details about the role, the hostname of the domain controller, and the status of the connection to the domain controller.
.PARAMETER Forest
The name of the forest to test roles for. If not specified, the current user's forest is used.
.PARAMETER ExcludeDomains
Exclude specific domains from the test.
.PARAMETER ExcludeDomainControllers
Exclude specific domain controllers from the test.
.PARAMETER IncludeDomains
Include only specific domains in the test.
.PARAMETER IncludeDomainControllers
Include only specific domain controllers in the test.
.PARAMETER SkipRODC
Skip Read-Only Domain Controllers when testing roles.
.PARAMETER ExtendedForestInformation
Ability to provide Forest Information from another command to speed up processing.
.EXAMPLE
Test-ADRolesAvailability
.EXAMPLE
Test-ADRolesAvailability -Forest "example.com"
.NOTES
This cmdlet is useful for monitoring the availability of Active Directory roles across domain controllers in a forest.
#>
[cmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$Roles = Get-WinADForestRoles -Forest $Forest -IncludeDomains $IncludeDomains -IncludeDomainControllers $IncludeDomainControllers -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation
if ($IncludeDomains) {
[PSCustomObject] @{
PDCEmulator = $Roles['PDCEmulator']
PDCEmulatorAvailability = if ($Roles['PDCEmulator']) {
(Test-NetConnection -ComputerName $Roles['PDCEmulator']).PingSucceeded
} else {
$false
}
RIDMaster = $Roles['RIDMaster']
RIDMasterAvailability = if ($Roles['RIDMaster']) {
(Test-NetConnection -ComputerName $Roles['RIDMaster']).PingSucceeded
} else {
$false
}
InfrastructureMaster = $Roles['InfrastructureMaster']
InfrastructureMasterAvailability = if ($Roles['InfrastructureMaster']) {
(Test-NetConnection -ComputerName $Roles['InfrastructureMaster']).PingSucceeded
} else {
$false
}
}
} else {
[PSCustomObject] @{
SchemaMaster = $Roles['SchemaMaster']
SchemaMasterAvailability = if ($Roles['SchemaMaster']) {
(Test-NetConnection -ComputerName $Roles['SchemaMaster']).PingSucceeded
} else {
$false
}
DomainNamingMaster = $Roles['DomainNamingMaster']
DomainNamingMasterAvailability = if ($Roles['DomainNamingMaster']) {
(Test-NetConnection -ComputerName $Roles['DomainNamingMaster']).PingSucceeded
} else {
$false
}
}
}
}
function Test-ADSiteLinks {
<#
.SYNOPSIS
Tests the Active Directory site links for a specified forest.
.DESCRIPTION
This cmdlet queries the specified forest to check the status of its site links. It returns a custom object with details about the site links, their status, and any errors encountered during the query.
.PARAMETER Forest
The name of the forest to query. If not specified, the current user's forest is used.
.PARAMETER Splitter
The character to use for splitting the site links. If not specified, the default is used.
.PARAMETER ExtendedForestInformation
Ability to provide Forest Information from another command to speed up processing.
.EXAMPLE
Test-ADSiteLinks -Forest "example.com"
.NOTES
This cmdlet is useful for monitoring the status of site links in a forest.
#>
[cmdletBinding()]
param(
[alias('ForestName')][string] $Forest,
[string] $Splitter,
[System.Collections.IDictionary] $ExtendedForestInformation
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -ExtendedForestInformation $ExtendedForestInformation
if (($ForestInformation.ForestDomainControllers).Count -eq 1) {
[ordered] @{
SiteLinksManual = 'No sitelinks, single DC'
SiteLinksAutomatic = 'No sitelinks, single DC'
SiteLinksCrossSiteUseNotify = 'No sitelinks, single DC'
SiteLinksCrossSiteNotUseNotify = 'No sitelinks, single DC'
SiteLinksSameSiteUseNotify = 'No sitelinks, single DC'
SiteLinksSameSiteNotUseNotify = 'No sitelinks, single DC'
SiteLinksDisabled = 'No sitelinks, single DC'
SiteLinksEnabled = 'No sitelinks, single DC'
SiteLinksCrossSiteUseNotifyCount = 0
SiteLinksCrossSiteNotUseNotifyCount = 0
SiteLinksSameSiteUseNotifyCount = 0
SiteLinksSameSiteNotUseNotifyCount = 0
SiteLinksManualCount = 0
SiteLinksAutomaticCount = 0
SiteLinksDisabledCount = 0
SiteLinksEnabledCount = 0
SiteLinksTotalCount = 0
SiteLinksTotalActiveCount = 0
Comment = 'No sitelinks, single DC'
}
} else {
[Array] $SiteLinks = Get-WinADSiteConnections -ExtendedForestInformation $ForestInformation
if ($SiteLinks) {
$Collection = @($SiteLinks).Where( { $_.Options -notcontains 'IsGenerated' -and $_.EnabledConnection -eq $true }, 'Split')
[Array] $LinksManual = foreach ($Link in $Collection[0]) {
"$($Link.ServerFrom) to $($Link.ServerTo)"
}
[Array] $LinksAutomatic = foreach ($Link in $Collection[1]) {
"$($Link.ServerFrom) to $($Link.ServerTo)"
}
$LinksUsingNotificationsUnnessecary = [System.Collections.Generic.List[string]]::new()
$LinksUsingNotifications = [System.Collections.Generic.List[string]]::new()
$LinksNotUsingNotifications = [System.Collections.Generic.List[string]]::new()
$LinksUsingNotificationsWhichIsOk = [System.Collections.Generic.List[string]]::new()
$DisabledLinks = [System.Collections.Generic.List[string]]::new()
$EnabledLinks = [System.Collections.Generic.List[string]]::new()
foreach ($Link in $SiteLinks) {
if ($Link.EnabledConnection -eq $true) {
$EnabledLinks.Add("$($Link.ServerFrom) to $($Link.ServerTo)")
} else {
$DisabledLinks.Add("$($Link.ServerFrom) to $($Link.ServerTo)")
}
if ($Link.SiteFrom -eq $Link.SiteTo) {
if ($Link.Options -contains 'UseNotify') {
# Bad
$LinksUsingNotificationsUnnessecary.Add("$($Link.ServerFrom) to $($Link.ServerTo)")
} else {
# Good
$LinksUsingNotificationsWhichIsOk.Add("$($Link.ServerFrom) to $($Link.ServerTo)")
}
} else {
if ($Link.Options -contains 'UseNotify') {
# Good
$LinksUsingNotifications.Add("$($Link.ServerFrom) to $($Link.ServerTo)")
} else {
# Bad
$LinksNotUsingNotifications.Add("$($Link.ServerFrom) to $($Link.ServerTo)")
}
}
}
[ordered] @{
SiteLinksManual = if ($Splitter -eq '') {
$LinksManual
} else {
$LinksManual -join $Splitter
}
SiteLinksAutomatic = if ($Splitter -eq '') {
$LinksAutomatic
} else {
$LinksAutomatic -join $Splitter
}
SiteLinksCrossSiteUseNotify = if ($Splitter -eq '') {
$LinksUsingNotifications
} else {
$LinksUsingNotifications -join $Splitter
}
SiteLinksCrossSiteNotUseNotify = if ($Splitter -eq '') {
$LinksNotUsingNotifications
} else {
$LinksNotUsingNotifications -join $Splitter
}
SiteLinksSameSiteUseNotify = if ($Splitter -eq '') {
$LinksUsingNotificationsUnnessecary
} else {
$LinksUsingNotificationsUnnessecary -join $Splitter
}
SiteLinksSameSiteNotUseNotify = if ($Splitter -eq '') {
$LinksUsingNotificationsWhichIsOk
} else {
$LinksUsingNotificationsWhichIsOk -join $Splitter
}
SiteLinksDisabled = if ($Splitter -eq '') {
$DisabledLinks
} else {
$DisabledLinks -join $Splitter
}
SiteLinksEnabled = if ($Splitter -eq '') {
$EnabledLinks
} else {
$EnabledLinks -join $Splitter
}
SiteLinksCrossSiteUseNotifyCount = $LinksUsingNotifications.Count
SiteLinksCrossSiteNotUseNotifyCount = $LinksNotUsingNotifications.Count
SiteLinksSameSiteUseNotifyCount = $LinksUsingNotificationsUnnessecary.Count
SiteLinksSameSiteNotUseNotifyCount = $LinksUsingNotificationsWhichIsOk.Count
SiteLinksManualCount = $Collection[0].Count
SiteLinksAutomaticCount = $Collection[1].Count
SiteLinksDisabledCount = $DisabledLinks.Count
SiteLinksEnabledCount = $EnabledLinks.Count
SiteLinksTotalCount = $SiteLinks.Count
SiteLinksTotalActiveCount = ($SiteLinks | Where-Object { $_.EnabledConnection -eq $true } ).Count
Comment = 'OK'
}
} else {
[ordered] @{
SiteLinksManual = 'No sitelinks'
SiteLinksAutomatic = 'No sitelinks'
SiteLinksCrossSiteUseNotify = 'No sitelinks'
SiteLinksCrossSiteNotUseNotify = 'No sitelinks'
SiteLinksSameSiteUseNotify = 'No sitelinks'
SiteLinksSameSiteNotUseNotify = 'No sitelinks'
SiteLinksDisabled = 'No sitelinks'
SiteLinksEnabled = 'No sitelinks'
SiteLinksCrossSiteUseNotifyCount = 0
SiteLinksCrossSiteNotUseNotifyCount = 0
SiteLinksSameSiteUseNotifyCount = 0
SiteLinksSameSiteNotUseNotifyCount = 0
SiteLinksManualCount = 0
SiteLinksAutomaticCount = 0
SiteLinksDisabledCount = 0
SiteLinksEnabledCount = 0
SiteLinksTotalCount = 0
SiteLinksTotalActiveCount = 0
Comment = 'Error'
}
}
}
}
function Test-DNSNameServers {
<#
.SYNOPSIS
Tests the DNS name servers for a specified domain controller and domain.
.DESCRIPTION
This cmdlet queries the specified domain controller for the DNS name servers of the specified domain. It returns a custom object with details about the domain controllers, name servers, their status, and any errors encountered during the query.
.PARAMETER DomainController
The name of the domain controller to query.
.PARAMETER Domain
The name of the domain to query.
.EXAMPLE
Test-DNSNameServers -DomainController "DC1" -Domain "example.com"
.NOTES
This cmdlet is useful for monitoring the DNS name servers of a domain.
#>
[cmdletBinding()]
param(
[string] $DomainController,
[string] $Domain
)
if ($DomainController) {
$AllDomainControllers = (Get-ADDomainController -Server $Domain -Filter 'IsReadOnly -eq $false').HostName
try {
$Hosts = Get-DnsServerResourceRecord -ZoneName $Domain -ComputerName $DomainController -RRType NS -ErrorAction Stop
$NameServers = (($Hosts | Where-Object { $_.HostName -eq '@' }).RecordData.NameServer) -replace ".$"
$Compare = ((Compare-Object -ReferenceObject $AllDomainControllers -DifferenceObject $NameServers -IncludeEqual).SideIndicator -notin @('=>', '<='))
[PSCustomObject] @{
DomainControllers = $AllDomainControllers
NameServers = $NameServers
Status = $Compare
Comment = "Name servers found $($NameServers -join ', ')"
}
} catch {
[PSCustomObject] @{
DomainControllers = $AllDomainControllers
NameServers = $null
Status = $false
Comment = $_.Exception.Message
}
}
}
}
function Test-FSMORolesAvailability {
<#
.SYNOPSIS
Tests the availability of FSMO roles across domain controllers in a specified domain.
.DESCRIPTION
This cmdlet tests the availability of Flexible Single Master Operations (FSMO) roles across domain controllers in a specified domain. It returns a custom object with details about the role, the hostname of the domain controller, and the status of the connection to the domain controller.
.PARAMETER Domain
The name of the domain to test FSMO roles for. If not specified, the current user's DNS domain is used.
.EXAMPLE
Test-FSMORolesAvailability
.EXAMPLE
Test-FSMORolesAvailability -Domain "example.com"
.NOTES
This cmdlet is useful for monitoring the availability of FSMO roles across domain controllers in a domain.
#>
[cmdletBinding()]
param(
[string] $Domain = $Env:USERDNSDOMAIN
)
$DC = Get-ADDomainController -Server $Domain -Filter "*"
$Output = foreach ($S in $DC) {
if ($S.OperationMasterRoles.Count -gt 0) {
$Status = Test-Connection -ComputerName $S.HostName -Count 2 -Quiet
} else {
$Status = $null
}
foreach ($_ in $S.OperationMasterRoles) {
[PSCustomObject] @{
Role = $_
HostName = $S.HostName
Status = $Status
}
}
}
$Output
}
Function Test-LDAP {
<#
.SYNOPSIS
Tests LDAP connectivity to one ore more servers.
.DESCRIPTION
Tests LDAP connectivity to one ore more servers. It's able to gather certificate information which provides useful information.
.PARAMETER Forest
Target different Forest, by default current forest is used
.PARAMETER ExcludeDomains
Exclude domain from search, by default whole forest is scanned
.PARAMETER IncludeDomains
Include only specific domains, by default whole forest is scanned
.PARAMETER ExcludeDomainControllers
Exclude specific domain controllers, by default there are no exclusions
.PARAMETER IncludeDomainControllers
Include only specific domain controllers, by default all domain controllers are included
.PARAMETER SkipRODC
Skip Read-Only Domain Controllers. By default all domain controllers are included.
.PARAMETER ExtendedForestInformation
Ability to provide Forest Information from another command to speed up processing
.PARAMETER ComputerName
Provide FQDN, IpAddress or NetBIOS name to test LDAP connectivity. This can be used instead of targetting Forest/Domain specific LDAP Servers
.PARAMETER GCPortLDAP
Global Catalog Port for LDAP. If not defined uses default 3268 port.
.PARAMETER GCPortLDAPSSL
Global Catalog Port for LDAPs. If not defined uses default 3269 port.
.PARAMETER PortLDAP
LDAP port. If not defined uses default 389
.PARAMETER PortLDAPS
LDAPs port. If not defined uses default 636
.PARAMETER VerifyCertificate
Binds to LDAP and gathers information about certificate available
.PARAMETER Credential
Allows to define credentials. This switches authentication for LDAP Binding from Kerberos to Basic
.PARAMETER Identity
User to search for using LDAP query by objectGUID, objectSID, SamAccountName, UserPrincipalName, Name or DistinguishedName
.PARAMETER Extended
Returns additional information about LDAP Server including full objects
.PARAMETER SkipCheckGC
Skips querying GC ports
.PARAMETER RetryCount
Number of retries to perform in case of failure
.EXAMPLE
Test-LDAP -ComputerName 'AD1' -VerifyCertificate | Format-Table *
.EXAMPLE
Test-LDAP -VerifyCertificate -SkipRODC | Format-Table *
.NOTES
General notes
#>
[CmdletBinding(DefaultParameterSetName = 'Forest')]
param (
[Parameter(ParameterSetName = 'Forest')][alias('ForestName')][string] $Forest,
[Parameter(ParameterSetName = 'Forest')][string[]] $ExcludeDomains,
[Parameter(ParameterSetName = 'Forest')][string[]] $ExcludeDomainControllers,
[Parameter(ParameterSetName = 'Forest')][alias('Domain', 'Domains')][string[]] $IncludeDomains,
[Parameter(ParameterSetName = 'Forest')][alias('DomainControllers')][string[]] $IncludeDomainControllers,
[Parameter(ParameterSetName = 'Forest')][switch] $SkipRODC,
[Parameter(ParameterSetName = 'Forest')][System.Collections.IDictionary] $ExtendedForestInformation,
[alias('Server', 'IpAddress')][Parameter(ValueFromPipelineByPropertyName, ValueFromPipeline, Mandatory, ParameterSetName = 'Computer')][string[]]$ComputerName,
[Parameter(ParameterSetName = 'Forest')]
[Parameter(ParameterSetName = 'Computer')]
[int] $GCPortLDAP = 3268,
[Parameter(ParameterSetName = 'Forest')]
[Parameter(ParameterSetName = 'Computer')]
[int] $GCPortLDAPSSL = 3269,
[Parameter(ParameterSetName = 'Forest')]
[Parameter(ParameterSetName = 'Computer')]
[int] $PortLDAP = 389,
[Parameter(ParameterSetName = 'Forest')]
[Parameter(ParameterSetName = 'Computer')]
[int] $PortLDAPS = 636,
[Parameter(ParameterSetName = 'Forest')]
[Parameter(ParameterSetName = 'Computer')]
[switch] $VerifyCertificate,
[Parameter(ParameterSetName = 'Forest')]
[Parameter(ParameterSetName = 'Computer')]
[PSCredential] $Credential,
[Parameter(ParameterSetName = 'Computer')]
[Parameter(ParameterSetName = 'Forest')]
[string] $Identity,
[Parameter(ParameterSetName = 'Computer')]
[Parameter(ParameterSetName = 'Forest')]
[switch] $Extended,
[Parameter(ParameterSetName = 'Computer')]
[switch] $SkipCheckGC,
[Parameter(ParameterSetName = 'Computer')]
[Parameter(ParameterSetName = 'Forest')]
[int] $RetryCount,
[Parameter(ParameterSetName = 'Computer')]
[Parameter(ParameterSetName = 'Forest')]
[string] $CertificateIncludeDomainName
)
begin {
Add-Type -Assembly System.DirectoryServices.Protocols
if (-not $ComputerName) {
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExtendedForestInformation $ExtendedForestInformation -SkipRODC:$SkipRODC.IsPresent -IncludeDomainControllers $IncludeDomainControllers -ExcludeDomainControllers $ExcludeDomainControllers
}
}
Process {
if ($ComputerName) {
foreach ($Computer in $ComputerName) {
if ($Computer -match '^(\d+\.){3}\d+$') {
try {
$ServerName = [System.Net.Dns]::GetHostByAddress($Computer).HostName
} catch {
Write-Warning "Test-LDAP - Unable to resolve $Computer. $($_.Exception.Message)"
$ServerName = $Computer
}
} else {
try {
$ServerName = [System.Net.Dns]::GetHostByName($Computer).HostName
} catch {
Write-Warning "Test-LDAP - Unable to resolve $Computer. $($_.Exception.Message)"
$ServerName = $Computer
}
}
Write-Verbose "Test-LDAP - Processing $Computer / $ServerName"
$testLdapServerSplat = @{
ServerName = $ServerName
Computer = $Computer
GCPortLDAP = $GCPortLDAP
GCPortLDAPSSL = $GCPortLDAPSSL
PortLDAP = $PortLDAP
PortLDAPS = $PortLDAPS
VerifyCertificate = $VerifyCertificate.IsPresent
Identity = $Identity
SkipCheckGC = $SkipCheckGC
RetryCount = $RetryCount
}
if ($CertificateIncludeDomainName) {
$testLdapServerSplat.CertificateIncludeDomainName = $CertificateIncludeDomainName
}
if ($PSBoundParameters.ContainsKey('Credential')) {
$testLdapServerSplat.Credential = $Credential
}
Test-LdapServer @testLdapServerSplat
}
} else {
foreach ($Computer in $ForestInformation.ForestDomainControllers) {
Write-Verbose "Test-LDAP - Processing $($Computer.HostName)"
$testLdapServerSplat = @{
ServerName = $($Computer.HostName)
Computer = $Computer.HostName
Advanced = $Computer
GCPortLDAP = $GCPortLDAP
GCPortLDAPSSL = $GCPortLDAPSSL
PortLDAP = $PortLDAP
PortLDAPS = $PortLDAPS
VerifyCertificate = $VerifyCertificate.IsPresent
Identity = $Identity
RetryCount = $RetryCount
}
$IncludeCertificateIncludeDomainName = @(
if ($CertificateIncludeDomainName) {
$CertificateIncludeDomainName
}
if ($Computer.Domain) {
$Computer.Domain
}
)
if ($IncludeCertificateIncludeDomainName) {
$testLdapServerSplat.CertificateIncludeDomainName = $IncludeCertificateIncludeDomainName
}
if ($PSBoundParameters.ContainsKey('Credential')) {
$testLdapServerSplat.Credential = $Credential
}
Test-LdapServer @testLdapServerSplat
}
}
}
}
function Test-WinADDNSResolving {
<#
.SYNOPSIS
Test DNS resolving for specific DNS record type across all Domain Controllers in the forest.
.DESCRIPTION
Test DNS resolving for specific DNS record type across all Domain Controllers in the forest.
.PARAMETER Name
Name of the DNS record to resolve
.PARAMETER Type
Type of the DNS record to resolve
.PARAMETER Forest
Forest name to use for resolving. If not given it will use current forest.
.PARAMETER ExcludeDomains
Exclude specific domains from test
.PARAMETER ExcludeDomainControllers
Exclude specific domain controllers from test
.PARAMETER IncludeDomains
Include specific domains in test
.PARAMETER IncludeDomainControllers
Include specific domain controllers in test
.PARAMETER SkipRODC
Skip Read Only Domain Controllers when querying for information
.PARAMETER NotDNSOnly
Do not use DNS only switch for resolving DNS names
.EXAMPLE
@(
Test-WinADDNSResolving -Name "PILAFU085.ad.evotec.xyz" -Type "A" -Verbose -IncludeDomains 'ad.evotec.xyz'
Test-WinADDNSResolving -Name "15.241.168.192.in-addr.arpa" -Type "PTR" -Verbose
Test-WinADDNSResolving -Name "192.168.241.15" -Type "PTR" -Verbose
Test-WinADDNSResolving -Name "Evo-win.ad.evotec.xyz" -Type "CNAME" -Verbose
Test-WinADDNSResolving -Name "test.domain.pl" -Type "MX" -Verbose
) | Format-Table
.OUTPUTS
Name Type DC Resolving Identical ErrorMessage ResolvedName ResolvedData
---- ---- -- --------- --------- ------------ ------------ ------------
PILAFU085.ad.evotec.xyz A AD2.ad.evotec.xyz True True PILAFU085.ad.evotec.xyz 10.104.65.85
PILAFU085.ad.evotec.xyz A AD1.ad.evotec.xyz True True PILAFU085.ad.evotec.xyz 10.104.65.85
PILAFU085.ad.evotec.xyz A AD0.ad.evotec.xyz True True PILAFU085.ad.evotec.xyz 10.104.65.85
15.241.168.192.in-addr.arpa PTR AD2.ad.evotec.xyz True True 15.241.168.192.in-addr.arpa ADConnect.ad.evotec.xyz
15.241.168.192.in-addr.arpa PTR AD1.ad.evotec.xyz True True 15.241.168.192.in-addr.arpa ADConnect.ad.evotec.xyz
15.241.168.192.in-addr.arpa PTR AD0.ad.evotec.xyz True True 15.241.168.192.in-addr.arpa ADConnect.ad.evotec.xyz
15.241.168.192.in-addr.arpa PTR DC1.ad.evotec.pl True True 15.241.168.192.in-addr.arpa ADConnect.ad.evotec.xyz
15.241.168.192.in-addr.arpa PTR ADRODC.ad.evotec.pl True True 15.241.168.192.in-addr.arpa ADConnect.ad.evotec.xyz
192.168.241.15 PTR AD2.ad.evotec.xyz True True 15.241.168.192.in-addr.arpa ADConnect.ad.evotec.xyz
192.168.241.15 PTR AD1.ad.evotec.xyz True True 15.241.168.192.in-addr.arpa ADConnect.ad.evotec.xyz
192.168.241.15 PTR AD0.ad.evotec.xyz True True 15.241.168.192.in-addr.arpa ADConnect.ad.evotec.xyz
192.168.241.15 PTR DC1.ad.evotec.pl True True 15.241.168.192.in-addr.arpa ADConnect.ad.evotec.xyz
192.168.241.15 PTR ADRODC.ad.evotec.pl True True 15.241.168.192.in-addr.arpa ADConnect.ad.evotec.xyz
Evo-win.ad.evotec.xyz CNAME AD2.ad.evotec.xyz True True Evo-win.ad.evotec.xyz EVOWIN.ad.evotec.xyz
Evo-win.ad.evotec.xyz CNAME AD1.ad.evotec.xyz True True Evo-win.ad.evotec.xyz EVOWIN.ad.evotec.xyz
Evo-win.ad.evotec.xyz CNAME AD0.ad.evotec.xyz True True Evo-win.ad.evotec.xyz EVOWIN.ad.evotec.xyz
Evo-win.ad.evotec.xyz CNAME DC1.ad.evotec.pl True True Evo-win.ad.evotec.xyz EVOWIN.ad.evotec.xyz
Evo-win.ad.evotec.xyz CNAME ADRODC.ad.evotec.pl True True Evo-win.ad.evotec.xyz EVOWIN.ad.evotec.xyz
test.domain.pl MX AD2.ad.evotec.xyz True True test.domain.pl 10 office.com
test.domain.pl MX AD1.ad.evotec.xyz True True test.domain.pl 10 office.com
test.domain.pl MX AD0.ad.evotec.xyz True True test.domain.pl 10 office.com
test.domain.pl MX DC1.ad.evotec.pl True True test.domain.pl 10 office.com
test.domain.pl MX ADRODC.ad.evotec.pl True True test.domain.pl 10 office.com
.NOTES
General notes
#>
[CmdletBinding()]
param(
[Parameter(Mandatory)][string[]] $Name,
[Parameter(Mandatory)][ValidateSet('PTR', 'A', 'AAAA', 'MX', 'CNAME', 'SRV')][string] $Type,
[alias('ForestName')][string] $Forest,
[string[]] $ExcludeDomains,
[string[]] $ExcludeDomainControllers,
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[alias('DomainControllers')][string[]] $IncludeDomainControllers,
[switch] $SkipRODC,
[switch] $NotDNSOnly
)
$ForestInformation = Get-WinADForestDetails -Forest $Forest -IncludeDomains $IncludeDomains -ExcludeDomains $ExcludeDomains -ExcludeDomainControllers $ExcludeDomainControllers -IncludeDomainControllers $IncludeDomainControllers -SkipRODC:$SkipRODC -ExtendedForestInformation $ExtendedForestInformation -Extended
$StatusIdentical = [ordered] @{}
foreach ($N in $Name) {
foreach ($DC in $ForestInformation.ForestDomainControllers) {
Write-Verbose -Message "Test-WinADDNSResolving - Processing $N on $($DC.Hostname)"
try {
$ResolvedDNS = Resolve-DnsName -Name $N -Server $DC.Hostname -Type $Type -ErrorAction Stop -DnsOnly:(-not $NotDNSOnly) -Verbose:$false
$ErrorMessage = $null
} catch {
$ErrorMessage = $_.Exception.Message
$ResolvedDNS = $null
Write-Warning -Message "Test-WinADDNSResolving - Failed to resolve $N on $($DC.HostName). Error: $($_.Exception.Message)"
}
$Status = $false
$ResolvedName = $null
$ResolvedData = $null
if ($ResolvedDNS) {
if ($ResolvedDNS.Type -eq 'SOA') {
$Status = $false
} else {
if ($Type -eq "PTR") {
$ResolvedName = $ResolvedDNS.Name
$ResolvedData = $ResolvedDNS.NameHost
$Status = $true
} elseif ($Type -eq "A") {
$ResolvedName = $ResolvedDNS.Name
$ResolvedData = $ResolvedDNS.IPAddress
$Status = $true
} elseif ($Type -eq 'AAAA') {
$ResolvedName = $ResolvedDNS.Name
$ResolvedData = $ResolvedDNS.IPAddress
$Status = $true
} elseif ($Type -eq "SRV") {
$ResolvedName = $ResolvedDNS.Name
$ResolvedData = $ResolvedDNS.NameTarget
$Status = $true
} elseif ($Type -eq 'CNAME') {
$ResolvedName = $ResolvedDNS.Name
$ResolvedData = $ResolvedDNS.NameHost
$Status = $true
} elseif ($Type -eq 'MX') {
$OnlyMX = $ResolvedDNS | Where-Object { $_.QueryType -eq 'MX' }
if ($OnlyMX) {
$ResolvedName = $OnlyMX.Name
$ResolvedData = "$($OnlyMX.Preference) $($OnlyMX.NameExchange)"
$Status = $true
} else {
$ResolvedName = $null
$ResolvedData = $null
$Status = $false
}
} else {
$ResolvedName = $ResolvedDNS.Name
$ResolvedData = $ResolvedDNS.NameHost
$Status = $true
}
}
}
if (-not $StatusIdentical[$N]) {
$StatusIdentical[$N] = $ResolvedData
$Identical = $true
} else {
if ($StatusIdentical[$N] -ne $ResolvedData) {
$Identical = $false
} else {
$Identical = $true
}
}
[PSCustomObject] @{
Name = $N
Type = $Type
DC = $DC.Hostname
Resolving = $Status
Identical = $Identical
ErrorMessage = $ErrorMessage
ResolvedName = $ResolvedName
ResolvedData = $ResolvedData
}
}
}
}
function Test-WinADObjectReplicationStatus {
<#
.SYNOPSIS
Tests the replication status of a Windows Active Directory object across domain controllers.
.DESCRIPTION
This cmdlet queries the specified object across all domain controllers in the forest, including global catalogs if specified, to check its replication status. It returns a custom object with details about the object's properties and any errors encountered during the query.
.PARAMETER Identity
The identity of the object to test. This can be a distinguished name, GUID, or SAM account name.
.PARAMETER Forest
The name of the forest to query. If not specified, the current forest is used.
.PARAMETER ExcludeDomains
An array of domain names to exclude from the query.
.PARAMETER IncludeDomains
An array of domain names to include in the query. If not specified, all domains in the forest are queried.
.PARAMETER GlobalCatalog
A switch parameter to include global catalogs in the query.
.EXAMPLE
Test-WinADObjectReplicationStatus -Identity "CN=User,DC=example,DC=com"
.EXAMPLE
Test-WinADObjectReplicationStatus -Identity "CN=User,DC=example,DC=com" -GlobalCatalog
.NOTES
This cmdlet is useful for monitoring the replication status of critical objects across the domain controllers in a forest.
#>
[CmdletBinding(DefaultParameterSetName = 'Standard')]
param(
[Parameter(ParameterSetName = 'Standard')]
[string] $Identity,
[Parameter(ParameterSetName = 'Standard')]
[alias('ForestName')][string] $Forest,
[Parameter(ParameterSetName = 'Standard')]
[string[]] $ExcludeDomains,
[Parameter(ParameterSetName = 'Standard')]
[alias('Domain', 'Domains')][string[]] $IncludeDomains,
[Parameter(ParameterSetName = 'Standard')]
[switch] $GlobalCatalog
)
$ObjectInformation = Get-WinADObject -Identity $Identity
if ($null -eq $ObjectInformation) {
Write-Warning "Test-WinADObjectReplicationStatus - Object not found. Try again later or check the object does exists."
return
}
$DomainFromIdentity = $ObjectInformation.Domain
$DistinguishedName = $ObjectInformation.DistinguishedName
$ForestInformation = Get-WinADForestDetails -Extended -PreferWritable
if ($GlobalCatalog) {
[Array] $GCs = foreach ($DC in $ForestInformation.ForestDomainControllers) {
if ($DC.IsGlobalCatalog) {
$DC
}
}
} else {
[Array] $GCs = foreach ($DC in $ForestInformation.ForestDomainControllers) {
if ($DC.Domain -eq $DomainFromIdentity) {
$DC
}
}
}
$ResultsCached = [ordered] @{}
$Results = foreach ($GC in $GCs) {
# Query the specific object on each GC
Try {
if ($GlobalCatalog) {
Write-Verbose -Message "Test-WinADObjectReplicationStatus - Querying $($GC.HostName) on port 3268 for $DistinguishedName"
$ObjectInfo = Get-ADObject -Identity $DistinguishedName -Server "$($GC.HostName):3268" -Properties * -ErrorAction Stop
} else {
Write-Verbose -Message "Test-WinADObjectReplicationStatus - Querying $($GC.HostName) for $DistinguishedName"
$ObjectInfo = Get-ADObject -Identity $DistinguishedName -Server $GC.HostName -Properties * -ErrorAction Stop
}
$ErrorValue = $null
} catch {
$ObjectInfo = $null
Write-Warning "Test-WinADObjectReplicationStatus - Error: $($_.Exception.Message.Replace([System.Environment]::NewLine,''))"
$ErrorValue = $_.Exception.Message.Replace([System.Environment]::NewLine, '')
}
if ($ObjectInfo) {
$PreparedObject = [PSCustomObject] @{
DomainController = $GC.HostName
Domain = $GC.Domain
UserAccountControl = $ObjectInfo.userAccountCOntrol
Created = $ObjectInfo.Created
uSNChanged = $ObjectInfo.uSNChanged
uSNCreated = $ObjectInfo.uSNCreated
whenCreated = $ObjectInfo.whenCreated
WhenChanged = $ObjectInfo.WhenChanged
Error = $ErrorValue
}
$ResultsCached[$GC.HostName] = $PreparedObject
$PreparedObject
} else {
$PreparedObject = [PSCustomObject] @{
DomainController = $GC.HostName
Domain = $GC.Domain
UserAccountControl = $null
Created = $null
uSNChanged = $null
uSNCreated = $null
whenCreated = $null
WhenChanged = $null
Error = $ErrorValue
}
$ResultsCached[$GC.HostName] = $PreparedObject
$PreparedObject
}
}
$SortedResults = $Results | Sort-Object -Property WhenChanged
$FistResult = $SortedResults | Where-Object { $null -ne $_.WhenChanged } | Select-Object -First 1
$Output = foreach ($Result in $SortedResults) {
[PSCustomObject] @{
SamAccountName = $ObjectInformation.SamAccountName
DomainController = $Result.DomainController
Domain = $Result.Domain
WhenCreated = $Result.whenCreated
WhenChanged = $Result.WhenChanged
TimeSinceFirst = if ($Result.WhenChanged) {
$Result.WhenChanged - $FistResult.WhenChanged
} else {
$null
}
Error = $Result.Error
}
}
$Output | Sort-Object -Property WhenChanged -Descending
}
function Test-WinADVulnerableSchemaClass {
<#
.SYNOPSIS
Checks for CVE-2021-34470 and returns and object with output
.DESCRIPTION
Checks for CVE-2021-34470 and returns and object with output
.EXAMPLE
Test-WinADVulnerableSchemaClass
.NOTES
Based on https://microsoft.github.io/CSS-Exchange/Security/Test-CVE-2021-34470/
To repair either upgrade Microsoft Exchange Schema or run the fix from URL above
#>
[cmdletBinding()]
param()
$schemaMaster = [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().SchemaRoleOwner
$schemaDN = ([ADSI]"LDAP://$($schemaMaster)/RootDSE").schemaNamingContext
$storageGroupSchemaEntryDN = "LDAP://$($schemaMaster)/CN=ms-Exch-Storage-Group,$schemaDN"
if (-not ([System.DirectoryServices.DirectoryEntry]::Exists($storageGroupSchemaEntryDN))) {
return [PSCustomObject] @{
"Vulnerable" = $false
"Status" = "Exchange was not installed in this forest. Therefore, CVE-2021-34470 vulnerability is not present."
"HasUnexpectedValue" = $false
'Superior' = $null
}
}
$storageGroupSchemaEntry = [ADSI]($storageGroupSchemaEntryDN)
if ($storageGroupSchemaEntry.Properties["possSuperiors"].Count -eq 0) {
return [PSCustomObject] @{
"Vulnerable" = $false
"Status" = "CVE-2021-34470 vulnerability is not present."
"HasUnexpectedValue" = $false
'Superior' = $null
}
}
foreach ($val in $storageGroupSchemaEntry.Properties["possSuperiors"]) {
if ($val -eq "computer") {
return [PSCustomObject] @{
"Vulnerable" = $true
"Status" = "CVE-2021-34470 vulnerability is present."
"HasUnexpectedValue" = $false
'Superior' = $null
}
} else {
return [PSCustomObject] @{
"Vulnerable" = $true
"Status" = "CVE-2021-34470 vulnerability may be present due to an unexpected superior: $val"
"HasUnexpectedValue" = $true
"Superior" = $val
}
}
}
}
function Update-LastLogonTimestamp {
<#
.SYNOPSIS
Uses Kerberos to impersonate a user and update the LastLogonTimestamp attribute
.DESCRIPTION
Uses Kerberos to impersonate a user and update the LastLogonTimestamp attribute
It's a trick to last logon time updated without actually logging in
.PARAMETER Identity
The identity of the user to impersonate
.EXAMPLE
Update-LastLogonTimestamp -UserName 'PUID'
.EXAMPLE
Update-LastLogonTimestamp -UserName '[email protected]'
.NOTES
The lastLogontimeStamp attribute is not updated every time a user or computer logs on to the domain.
The decision to update the value is based on the current date minus the value of the ( ms-DS-Logon-Time-Sync-Interval attribute minus a random percentage of 5).
If the result is equal to or greater than lastLogontimeStamp the attribute is updated.
If your Domain Admin is in Protected Users you may need to remove it from there to make it work
#>
[CmdletBinding(SupportsShouldProcess)]
param (
[parameter(Position = 0, Mandatory)][alias('UserName')][string]$Identity
)
begin {
$impersonatedContext = $null
$impersonationSuccessful = $false
$ErrorMessage = $null
}
process {
try {
$windowsIdentity = [System.Security.Principal.WindowsIdentity]::new($Identity)
} catch {
Write-Warning "Update-LastLogonTimestamp - Failed to create WindowsIdentity for $Identity - $($_.Exception.Message)"
$windowsIdentity = $null
$ErrorMessage = $_.Exception.Message
}
if ($windowsIdentity) {
try {
if ($PSCmdlet.ShouldProcess("Impersonating user - $Identity")) {
Write-Verbose "Update-LastLogonTimestamp - Impersonating user - $Identity"
$impersonatedContext = $windowsIdentity.Impersonate()
$impersonationSuccessful = $true
}
} catch {
Write-Warning "Update-LastLogonTimestamp - Failed to impersonate user $Identity - $($_.Exception.Message)"
$impersonationSuccessful = $false
$ErrorMessage = $_.Exception.Message
} finally {
if ($impersonatedContext) {
$impersonatedContext.Undo()
}
}
}
}
end {
[PSCustomObject] @{
Identity = $Identity
WhatIf = $WhatIfPreference.ispresent
UserName = $windowsIdentity.Name
ImpersonationSuccessful = $impersonationSuccessful
ErrorMessage = $ErrorMessage
WindowsIdentity = $windowsIdentity
}
}
}
$ModuleFunctions = @{
ActiveDirectory = @{
'Add-ADACL' = ''
'Copy-ADOUSecurity' = ''
'New-ADACLObject' = ''
'Enable-ADACLInheritance' = ''
'Disable-ADACLInheritance' = ''
'Export-ADACLObject' = ''
'Get-ADACL' = ''
'Get-ADACLOwner' = ''
'Get-WinADACLConfiguration' = ''
'Get-WinADACLForest' = ''
'Get-WinADBitlockerLapsSummary' = ''
'Get-WinADComputerACLLAPS' = ''
'Get-WinADComputers' = ''
'Get-WinADDelegatedAccounts' = ''
'Get-WinADDFSHealth' = ''
'Get-WinADDHCP' = ''
'Get-WinADDiagnostics' = ''
'Get-WinADDuplicateObject' = 'Get-WinADForestObjectsConflict'
'Get-WinADDuplicateSPN' = ''
'Get-WinADForestControllerInformation' = ''
'Get-WinADForestOptionalFeatures' = ''
'Get-WinADForestReplication' = ''
'Get-WinADForestRoles' = 'Get-WinADRoles', 'Get-WinADDomainRoles'
'Get-WinADForestSchemaProperties' = ''
'Get-WinADForestSites' = ''
'Get-WinADForestSubnet' = 'Get-WinADSubnet'
'Get-WinADLastBackup' = ''
'Get-WinADLDAPBindingsSummary' = ''
'Get-WinADLMSettings' = ''
'Get-WinADPrivilegedObjects' = 'Get-WinADPriviligedObjects'
'Get-WinADProtocol' = ''
'Get-WinADProxyAddresses' = ''
'Get-WinADServiceAccount' = ''
'Get-WinADSharePermission' = ''
'Get-WinADSiteConnections' = ''
'Get-WinADSiteLinks' = ''
'Get-WinADTomebstoneLifetime' = ''
'Get-WinADTrustLegacy' = ''
'Get-WinADUserPrincipalName' = ''
'Get-WinADUsers' = ''
'Get-WinADUsersForeignSecurityPrincipalList' = 'Get-WinADUsersFP'
'Get-WinADWellKnownFolders' = ''
'Get-WinADPasswordPolicy' = ''
'Invoke-ADEssentials' = ''
'Remove-ADACL' = ''
'Remove-WinADDuplicateObject' = ''
'Remove-WinADSharePermission' = ''
'Rename-WinADUserPrincipalName' = ''
'Repair-WinADACLConfigurationOwner' = ''
'Repair-WinADEmailAddress' = ''
'Repair-WinADForestControllerInformation' = ''
'Set-ADACLOwner' = ''
'Set-DnsServerIP' = 'Set-WinDNSServerIP'
'Set-WinADDiagnostics' = ''
'Set-WinADReplication' = ''
'Set-WinADReplicationConnections' = ''
'Set-WinADShare' = ''
'Set-WinADTombstoneLifetime' = ''
'Show-WinADGroupCritical' = 'Show-WinADCriticalGroups'
'Show-WinADOrganization' = ''
'Show-WinADSites' = ''
'Show-WinADUserSecurity' = ''
'Sync-DomainController' = ''
'Test-ADDomainController' = ''
'Test-ADRolesAvailability' = ''
'Test-ADSiteLinks' = ''
'Test-DNSNameServers' = ''
'Test-FSMORolesAvailability' = ''
'Test-LDAP' = ''
'Get-WinDNSZones' = ''
'Get-WinDNSIPAddresses' = ''
'Find-WinADObjectDifference' = ''
'Show-WinADObjectDifference' = ''
'Test-WinADDNSResolving' = ''
'Get-WinADDomainControllerGenerationId' = ''
'Compare-WinADGlobalCatalogObjects' = ''
'Test-WinADObjectReplicationStatus' = ''
'Get-WinADSiteCoverage' = ''
'Get-WinADLDAPSummary' = ''
'Get-WinADForestReplicationSummary' = ''
'Show-WinADLdapSummary' = ''
'Show-WinADReplicationSummary' = ''
}
DHCPServer = @{
'Get-WinADDHCP' = ''
}
DNSServer = @{
'Get-WinADDnsInformation' = ''
'Get-WinADDNSIPAddresses' = 'Get-WinDnsIPAddresses'
'Get-WinADDNSRecords' = 'Get-WinDNSRecords'
'Get-WinADDnsServerForwarder' = ''
'Get-WinADDnsServerScavenging' = ''
'Get-WinADDnsServerZones' = ''
'Get-WinADDnsZones' = 'Get-WinDNSZones'
'Remove-WinADDnsRecord' = ''
}
}
[Array] $FunctionsAll = 'Add-ADACL', 'Compare-PingCastleReport', 'Compare-WinADGlobalCatalogObjects', 'Convert-ADSecurityDescriptor', 'Copy-ADOUSecurity', 'Disable-ADACLInheritance', 'Enable-ADACLInheritance', 'Export-ADACLObject', 'Find-WinADObjectDifference', 'Get-ADACL', 'Get-ADACLOwner', 'Get-ADWinDnsServerZones', 'Get-DNSServerIP', 'Get-PingCastleReport', 'Get-WinADACLConfiguration', 'Get-WinADACLForest', 'Get-WinADBitlockerLapsSummary', 'Get-WinADBrokenProtectedFromDeletion', 'Get-WinADComputerACLLAPS', 'Get-WinADComputers', 'Get-WinADDelegatedAccounts', 'Get-WinADDFSHealth', 'Get-WinADDFSTopology', 'Get-WinADDHCP', 'Get-WinADDiagnostics', 'Get-WinADDnsInformation', 'Get-WinADDnsIPAddresses', 'Get-WinADDnsRecords', 'Get-WinADDnsServerForwarder', 'Get-WinADDnsServerScavenging', 'Get-WinADDNSZones', 'Get-WinADDomain', 'Get-WinADDomainControllerGenerationId', 'Get-WinADDomainControllerNetLogonSettings', 'Get-WinADDomainControllerNTDSSettings', 'Get-WinADDomainControllerOption', 'Get-WinADDuplicateObject', 'Get-WinADDuplicateSPN', 'Get-WinADForest', 'Get-WinADForestControllerInformation', 'Get-WinADForestOptionalFeatures', 'Get-WinADForestReplication', 'Get-WinADForestReplicationSummary', 'Get-WinADForestRoles', 'Get-WinADForestSchemaDetails', 'Get-WinADForestSchemaProperties', 'Get-WinADForestSites', 'Get-WinADForestSubnet', 'Get-WinADGroupMember', 'Get-WinADGroupMemberOf', 'Get-WinADGroups', 'Get-WinADKerberosAccount', 'Get-WinADLastBackup', 'Get-WinADLDAPBindingsSummary', 'Get-WinADLDAPSummary', 'Get-WinADLMSettings', 'Get-WinADObject', 'Get-WinADPasswordPolicy', 'Get-WinADPrivilegedObjects', 'Get-WinADProtocol', 'Get-WinADProxyAddresses', 'Get-WinADServiceAccount', 'Get-WinADSharePermission', 'Get-WinADSiteConnections', 'Get-WinADSiteCoverage', 'Get-WinADSiteLinks', 'Get-WinADSiteOptions', 'Get-WinADTombstoneLifetime', 'Get-WinADTrust', 'Get-WinADTrustLegacy', 'Get-WinADUserPrincipalName', 'Get-WinADUsers', 'Get-WinADUsersForeignSecurityPrincipalList', 'Get-WinADWellKnownFolders', 'Invoke-ADEssentials', 'Invoke-PingCastle', 'New-ADACLObject', 'New-ADSite', 'Remove-ADACL', 'Remove-WinADDFSTopology', 'Remove-WinADDuplicateObject', 'Remove-WinADSharePermission', 'Rename-WinADUserPrincipalName', 'Repair-WinADACLConfigurationOwner', 'Repair-WinADBrokenProtectedFromDeletion', 'Repair-WinADEmailAddress', 'Repair-WinADForestControllerInformation', 'Request-ChangePasswordAtLogon', 'Request-DisableOnAccountExpiration', 'Restore-ADACLDefault', 'Set-ADACL', 'Set-ADACLInheritance', 'Set-ADACLOwner', 'Set-DnsServerIP', 'Set-WinADDiagnostics', 'Set-WinADDomainControllerNetLogonSettings', 'Set-WinADDomainControllerOption', 'Set-WinADForestACLOwner', 'Set-WinADReplication', 'Set-WinADReplicationConnections', 'Set-WinADShare', 'Set-WinADTombstoneLifetime', 'Show-WinADDNSRecords', 'Show-WinADForestReplicationSummary', 'Show-WinADGroupCritical', 'Show-WinADGroupMember', 'Show-WinADGroupMemberOf', 'Show-WinADKerberosAccount', 'Show-WinADLdapSummary', 'Show-WinADObjectDifference', 'Show-WinADOrganization', 'Show-WinADSites', 'Show-WinADSitesCoverage', 'Show-WinADTrust', 'Show-WinADUserSecurity', 'Sync-WinADDomainController', 'Test-ADDomainController', 'Test-ADRolesAvailability', 'Test-ADSiteLinks', 'Test-DNSNameServers', 'Test-FSMORolesAvailability', 'Test-LDAP', 'Test-WinADDNSResolving', 'Test-WinADObjectReplicationStatus', 'Test-WinADVulnerableSchemaClass', 'Update-LastLogonTimestamp'
[Array] $AliasesAll = 'Get-WinADDomainRoles', 'Get-WinADForestObjectsConflict', 'Get-WinADForestTombstoneLifetime', 'Get-WinADPriviligedObjects', 'Get-WinADRoles', 'Get-WinADSubnet', 'Get-WinADTrusts', 'Get-WinADUsersFP', 'Get-WinDnsIPAddresses', 'Get-WinDNSRecords', 'Get-WinDNSServerIP', 'Get-WinDnsServerZones', 'Get-WinDNSZones', 'Set-WinDNSServerIP', 'Show-ADGroupMember', 'Show-ADGroupMemberOf', 'Show-ADTrust', 'Show-ADTrusts', 'Show-WinADCriticalGroups', 'Show-WinADSiteCoverage', 'Show-WinADTrusts', 'Sync-DomainController'
$AliasesToRemove = [System.Collections.Generic.List[string]]::new()
$FunctionsToRemove = [System.Collections.Generic.List[string]]::new()
foreach ($Module in $ModuleFunctions.Keys) {
try {
Import-Module -Name $Module -ErrorAction Stop
} catch {
foreach ($Function in $ModuleFunctions[$Module].Keys) {
$FunctionsToRemove.Add($Function)
$ModuleFunctions[$Module][$Function] | ForEach-Object {
if ($_) {
$AliasesToRemove.Add($_)
}
}
}
}
}
$FunctionsToLoad = foreach ($Function in $FunctionsAll) {
if ($Function -notin $FunctionsToRemove) {
$Function
}
}
$AliasesToLoad = foreach ($Alias in $AliasesAll) {
if ($Alias -notin $AliasesToRemove) {
$Alias
}
}
# Export functions and aliases as required
Export-ModuleMember -Function @($FunctionsToLoad) -Alias @($AliasesToLoad)
# SIG # Begin signature block
# MIItqwYJKoZIhvcNAQcCoIItnDCCLZgCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDnJPHICCKqZ9Ak
# 76EFY/aeKpSsdLV/oTWRS9Cumpp+gKCCJq4wggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggWQMIIDeKADAgECAhAFmxtXno4hMuI5B72nd3VcMA0GCSqG
# SIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMx
# GTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRy
# dXN0ZWQgUm9vdCBHNDAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGIx
# CzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3
# dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBH
# NDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL/mkHNo3rvkXUo8MCIw
# aTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3EMB/zG6Q4FutWxpdtHauyefLK
# EdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKyunWZanMylNEQRBAu34LzB4Tm
# dDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsFxl7sWxq868nPzaw0QF+xembu
# d8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU15zHL2pNe3I6PgNq2kZhAkHnD
# eMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJBMtfbBHMqbpEBfCFM1LyuGwN1
# XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObURWBf3JFxGj2T3wWmIdph2PVld
# QnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6nj3cAORFJYm2mkQZK37AlLTS
# YW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxBYKqxYxhElRp2Yn72gLD76GSm
# M9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5SUUd0viastkF13nqsX40/ybzT
# QRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+xq4aLT8LWRV+dIPyhHsXAj6Kx
# fgommfXkaS+YHS312amyHeUbAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYD
# VR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwPTzANBgkq
# hkiG9w0BAQwFAAOCAgEAu2HZfalsvhfEkRvDoaIAjeNkaA9Wz3eucPn9mkqZucl4
# XAwMX+TmFClWCzZJXURj4K2clhhmGyMNPXnpbWvWVPjSPMFDQK4dUPVS/JA7u5iZ
# aWvHwaeoaKQn3J35J64whbn2Z006Po9ZOSJTROvIXQPK7VB6fWIhCoDIc2bRoAVg
# X+iltKevqPdtNZx8WorWojiZ83iL9E3SIAveBO6Mm0eBcg3AFDLvMFkuruBx8lbk
# apdvklBtlo1oepqyNhR6BvIkuQkRUNcIsbiJeoQjYUIp5aPNoiBB19GcZNnqJqGL
# FNdMGbJQQXE9P01wI4YMStyB0swylIQNCAmXHE/A7msgdDDS4Dk0EIUhFQEI6FUy
# 3nFJ2SgXUE3mvk3RdazQyvtBuEOlqtPDBURPLDab4vriRbgjU2wGb2dVf0a1TD9u
# KFp5JtKkqGKX0h7i7UqLvBv9R0oN32dmfrJbQdA75PQ79ARj6e/CVABRoIoqyc54
# zNXqhwQYs86vSYiv85KZtrPmYQ/ShQDnUBrkG5WdGaG5nLGbsQAe79APT0JsyQq8
# 7kP6OnGlyE0mpTX9iV28hWIdMtKgK1TtmlfB2/oQzxm3i0objwG2J5VT6LaJbVu8
# aNQj6ItRolb58KaAoNYes7wPD1N1KarqE3fk3oyBIa0HEEcRrYc9B9F1vM/zZn4w
# ggauMIIElqADAgECAhAHNje3JFR82Ees/ShmKl5bMA0GCSqGSIb3DQEBCwUAMGIx
# CzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3
# dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBH
# NDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIyMzU5NTlaMGMxCzAJBgNVBAYTAlVT
# MRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1
# c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0EwggIiMA0GCSqG
# SIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUGSbPBPXJJUVXHJQPE8pE3qZdRodbS
# g9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOciQt/nR+eDzMfUBMLJnOWbfhXqAJ9
# /UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkrPkLcZ47qUT3w1lbU5ygt69OxtXXn
# HwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rwN3mfXazL6IRktFLydkf3YYMZ3V+0
# VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSmxR3NNg1c1eYbqMFkdECnwHLFuk4f
# sbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu9Yemj052FVUmcJgmf6AaRyBD40Nj
# gHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirHkr+g3uM+onP65x9abJTyUpURK1h0
# QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506o9UD4L/wojzKQtwYSH8UNM/STKvv
# mz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklNiyDSLFc1eSuo80VgvCONWPfcYd6T
# /jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGTyYwMO1uKIqjBJgj5FBASA31fI7tk
# 42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgADoRU7s7pXcheMBK9Rp6103a50g5r
# mQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4E
# FgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5n
# P+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMIMHcG
# CCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQu
# Y29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGln
# aUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8v
# Y3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAgBgNV
# HSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwDQYJKoZIhvcNAQELBQADggIB
# AH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPPMFPOvxj7x1Bd4ksp+3CKDaopafxp
# wc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKWb8RQTGIdDAiCqBa9qVbPFXONASIl
# zpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpPkWaeLJ7giqzl/Yy8ZCaHbJK9nXzQ
# cAp876i8dU+6WvepELJd6f8oVInw1YpxdmXazPByoyP6wCeCRK6ZJxurJB4mwbfe
# Kuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKvxMfBwWpx2cYTgAnEtp/Nh4cku0+j
# Sbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl63f8lY5knLD0/a6fxZsNBzU+2QJsh
# IUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YBT70/O3itTK37xJV77QpfMzmHQXh6
# OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4nLCbbbxV7HhmLNriT1ObyF5lZynDw
# N7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvtlUG3OtUVmDG0YgkPCr2B2RP+v6TR
# 81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm2fBldkKmKYcJRyvmfxqkhQ/8mJb2
# VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqhK/bt1nz8MIIGsDCCBJigAwIBAgIQ
# CK1AsmDSnEyfXs2pvZOu2TANBgkqhkiG9w0BAQwFADBiMQswCQYDVQQGEwJVUzEV
# MBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29t
# MSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjEwNDI5MDAw
# MDAwWhcNMzYwNDI4MjM1OTU5WjBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGln
# aUNlcnQsIEluYy4xQTA/BgNVBAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBT
# aWduaW5nIFJTQTQwOTYgU0hBMzg0IDIwMjEgQ0ExMIICIjANBgkqhkiG9w0BAQEF
# AAOCAg8AMIICCgKCAgEA1bQvQtAorXi3XdU5WRuxiEL1M4zrPYGXcMW7xIUmMJ+k
# jmjYXPXrNCQH4UtP03hD9BfXHtr50tVnGlJPDqFX/IiZwZHMgQM+TXAkZLON4gh9
# NH1MgFcSa0OamfLFOx/y78tHWhOmTLMBICXzENOLsvsI8IrgnQnAZaf6mIBJNYc9
# URnokCF4RS6hnyzhGMIazMXuk0lwQjKP+8bqHPNlaJGiTUyCEUhSaN4QvRRXXegY
# E2XFf7JPhSxIpFaENdb5LpyqABXRN/4aBpTCfMjqGzLmysL0p6MDDnSlrzm2q2AS
# 4+jWufcx4dyt5Big2MEjR0ezoQ9uo6ttmAaDG7dqZy3SvUQakhCBj7A7CdfHmzJa
# wv9qYFSLScGT7eG0XOBv6yb5jNWy+TgQ5urOkfW+0/tvk2E0XLyTRSiDNipmKF+w
# c86LJiUGsoPUXPYVGUztYuBeM/Lo6OwKp7ADK5GyNnm+960IHnWmZcy740hQ83eR
# Gv7bUKJGyGFYmPV8AhY8gyitOYbs1LcNU9D4R+Z1MI3sMJN2FKZbS110YU0/EpF2
# 3r9Yy3IQKUHw1cVtJnZoEUETWJrcJisB9IlNWdt4z4FKPkBHX8mBUHOFECMhWWCK
# ZFTBzCEa6DgZfGYczXg4RTCZT/9jT0y7qg0IU0F8WD1Hs/q27IwyCQLMbDwMVhEC
# AwEAAaOCAVkwggFVMBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFGg34Ou2
# O/hfEYb7/mF7CIhl9E5CMB8GA1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9P
# MA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzB3BggrBgEFBQcB
# AQRrMGkwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggr
# BgEFBQcwAoY1aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1
# c3RlZFJvb3RHNC5jcnQwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGln
# aWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcmwwHAYDVR0gBBUwEzAH
# BgVngQwBAzAIBgZngQwBBAEwDQYJKoZIhvcNAQEMBQADggIBADojRD2NCHbuj7w6
# mdNW4AIapfhINPMstuZ0ZveUcrEAyq9sMCcTEp6QRJ9L/Z6jfCbVN7w6XUhtldU/
# SfQnuxaBRVD9nL22heB2fjdxyyL3WqqQz/WTauPrINHVUHmImoqKwba9oUgYftzY
# gBoRGRjNYZmBVvbJ43bnxOQbX0P4PpT/djk9ntSZz0rdKOtfJqGVWEjVGv7XJz/9
# kNF2ht0csGBc8w2o7uCJob054ThO2m67Np375SFTWsPK6Wrxoj7bQ7gzyE84FJKZ
# 9d3OVG3ZXQIUH0AzfAPilbLCIXVzUstG2MQ0HKKlS43Nb3Y3LIU/Gs4m6Ri+kAew
# Q3+ViCCCcPDMyu/9KTVcH4k4Vfc3iosJocsL6TEa/y4ZXDlx4b6cpwoG1iZnt5Lm
# Tl/eeqxJzy6kdJKt2zyknIYf48FWGysj/4+16oh7cGvmoLr9Oj9FpsToFpFSi0HA
# SIRLlk2rREDjjfAVKM7t8RhWByovEMQMCGQ8M4+uKIw8y4+ICw2/O/TOHnuO77Xr
# y7fwdxPm5yg/rBKupS8ibEH5glwVZsxsDsrFhsP2JjMMB0ug0wcCampAMEhLNKhR
# ILutG4UI4lkNbcoFUCvqShyepf2gpx8GdOfy1lKQ/a+FSCH5Vzu0nAPthkX0tGFu
# v2jiJmCG6sivqf6UHedjGzqGVnhOMIIGvDCCBKSgAwIBAgIQC65mvFq6f5WHxvnp
# BOMzBDANBgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGln
# aUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5
# NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMB4XDTI0MDkyNjAwMDAwMFoXDTM1MTEy
# NTIzNTk1OVowQjELMAkGA1UEBhMCVVMxETAPBgNVBAoTCERpZ2lDZXJ0MSAwHgYD
# VQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyNDCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL5qc5/2lSGrljC6W23mWaO16P2RHxjEiDtqmeOlwf0KMCBD
# Er4IxHRGd7+L660x5XltSVhhK64zi9CeC9B6lUdXM0s71EOcRe8+CEJp+3R2O8oo
# 76EO7o5tLuslxdr9Qq82aKcpA9O//X6QE+AcaU/byaCagLD/GLoUb35SfWHh43rO
# H3bpLEx7pZ7avVnpUVmPvkxT8c2a2yC0WMp8hMu60tZR0ChaV76Nhnj37DEYTX9R
# eNZ8hIOYe4jl7/r419CvEYVIrH6sN00yx49boUuumF9i2T8UuKGn9966fR5X6kgX
# j3o5WHhHVO+NBikDO0mlUh902wS/Eeh8F/UFaRp1z5SnROHwSJ+QQRZ1fisD8UTV
# DSupWJNstVkiqLq+ISTdEjJKGjVfIcsgA4l9cbk8Smlzddh4EfvFrpVNnes4c16J
# idj5XiPVdsn5n10jxmGpxoMc6iPkoaDhi6JjHd5ibfdp5uzIXp4P0wXkgNs+CO/C
# acBqU0R4k+8h6gYldp4FCMgrXdKWfM4N0u25OEAuEa3JyidxW48jwBqIJqImd93N
# Rxvd1aepSeNeREXAu2xUDEW8aqzFQDYmr9ZONuc2MhTMizchNULpUEoA6Vva7b1X
# CB+1rxvbKmLqfY/M/SdV6mwWTyeVy5Z/JkvMFpnQy5wR14GJcv6dQ4aEKOX5AgMB
# AAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s
# BwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFJ9X
# LAN3DigVkGalY17uT5IfdqBbMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwz
# LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1l
# U3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhho
# dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNl
# cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZU
# aW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAD2tHh92mVvjOIQS
# R9lDkfYR25tOCB3RKE/P09x7gUsmXqt40ouRl3lj+8QioVYq3igpwrPvBmZdrlWB
# b0HvqT00nFSXgmUrDKNSQqGTdpjHsPy+LaalTW0qVjvUBhcHzBMutB6HzeledbDC
# zFzUy34VarPnvIWrqVogK0qM8gJhh/+qDEAIdO/KkYesLyTVOoJ4eTq7gj9UFAL1
# UruJKlTnCVaM2UeUUW/8z3fvjxhN6hdT98Vr2FYlCS7Mbb4Hv5swO+aAXxWUm3Wp
# ByXtgVQxiBlTVYzqfLDbe9PpBKDBfk+rabTFDZXoUke7zPgtd7/fvWTlCs30VAGE
# sshJmLbJ6ZbQ/xll/HjO9JbNVekBv2Tgem+mLptR7yIrpaidRJXrI+UzB6vAlk/8
# a1u7cIqV0yef4uaZFORNekUgQHTqddmsPCEIYQP7xGxZBIhdmm4bhYsVA6G2WgNF
# YagLDBzpmk9104WQzYuVNsxyoVLObhx3RugaEGru+SojW4dHPoWrUhftNpFC5H7Q
# EY7MhKRyrBe7ucykW7eaCuWBsBb4HOKRFVDcrZgdwaSIqMDiCLg4D+TPVgKx2EgE
# deoHNHT9l3ZDBD+XgbF+23/zBjeCtxz+dL/9NWR6P2eZRi7zcEO1xwcdcqJsyz/J
# ceENc2Sg8h3KeFUCS7tpFk7CrDqkMIIHXzCCBUegAwIBAgIQB8JSdCgUotar/iTq
# F+XdLjANBgkqhkiG9w0BAQsFADBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGln
# aUNlcnQsIEluYy4xQTA/BgNVBAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBT
# aWduaW5nIFJTQTQwOTYgU0hBMzg0IDIwMjEgQ0ExMB4XDTIzMDQxNjAwMDAwMFoX
# DTI2MDcwNjIzNTk1OVowZzELMAkGA1UEBhMCUEwxEjAQBgNVBAcMCU1pa2/FgsOz
# dzEhMB8GA1UECgwYUHJ6ZW15c8WCYXcgS8WCeXMgRVZPVEVDMSEwHwYDVQQDDBhQ
# cnplbXlzxYJhdyBLxYJ5cyBFVk9URUMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw
# ggIKAoICAQCUmgeXMQtIaKaSkKvbAt8GFZJ1ywOH8SwxlTus4McyrWmVOrRBVRQA
# 8ApF9FaeobwmkZxvkxQTFLHKm+8knwomEUslca8CqSOI0YwELv5EwTVEh0C/Daeh
# vxo6tkmNPF9/SP1KC3c0l1vO+M7vdNVGKQIQrhxq7EG0iezBZOAiukNdGVXRYOLn
# 47V3qL5PwG/ou2alJ/vifIDad81qFb+QkUh02Jo24SMjWdKDytdrMXi0235CN4Rr
# W+8gjfRJ+fKKjgMImbuceCsi9Iv1a66bUc9anAemObT4mF5U/yQBgAuAo3+jVB8w
# iUd87kUQO0zJCF8vq2YrVOz8OJmMX8ggIsEEUZ3CZKD0hVc3dm7cWSAw8/FNzGNP
# lAaIxzXX9qeD0EgaCLRkItA3t3eQW+IAXyS/9ZnnpFUoDvQGbK+Q4/bP0ib98XLf
# QpxVGRu0cCV0Ng77DIkRF+IyR1PcwVAq+OzVU3vKeo25v/rntiXCmCxiW4oHYO28
# eSQ/eIAcnii+3uKDNZrI15P7VxDrkUIc6FtiSvOhwc3AzY+vEfivUkFKRqwvSSr4
# fCrrkk7z2Qe72Zwlw2EDRVHyy0fUVGO9QMuh6E3RwnJL96ip0alcmhKABGoIqSW0
# 5nXdCUbkXmhPCTT5naQDuZ1UkAXbZPShKjbPwzdXP2b8I9nQ89VSgQIDAQABo4IC
# AzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHQYDVR0OBBYE
# FHrxaiVZuDJxxEk15bLoMuFI5233MA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAK
# BggrBgEFBQcDAzCBtQYDVR0fBIGtMIGqMFOgUaBPhk1odHRwOi8vY3JsMy5kaWdp
# Y2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmluZ1JTQTQwOTZTSEEz
# ODQyMDIxQ0ExLmNybDBToFGgT4ZNaHR0cDovL2NybDQuZGlnaWNlcnQuY29tL0Rp
# Z2lDZXJ0VHJ1c3RlZEc0Q29kZVNpZ25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5j
# cmwwPgYDVR0gBDcwNTAzBgZngQwBBAEwKTAnBggrBgEFBQcCARYbaHR0cDovL3d3
# dy5kaWdpY2VydC5jb20vQ1BTMIGUBggrBgEFBQcBAQSBhzCBhDAkBggrBgEFBQcw
# AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMFwGCCsGAQUFBzAChlBodHRwOi8v
# Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmlu
# Z1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJBgNVHRMEAjAAMA0GCSqGSIb3DQEB
# CwUAA4ICAQC3EeHXUPhpe31K2DL43Hfh6qkvBHyR1RlD9lVIklcRCR50ZHzoWs6E
# BlTFyohvkpclVCuRdQW33tS6vtKPOucpDDv4wsA+6zkJYI8fHouW6Tqa1W47YSrc
# 5AOShIcJ9+NpNbKNGih3doSlcio2mUKCX5I/ZrzJBkQpJ0kYha/pUST2CbE3JroJ
# f2vQWGUiI+J3LdiPNHmhO1l+zaQkSxv0cVDETMfQGZKKRVESZ6Fg61b0djvQSx51
# 0MdbxtKMjvS3ZtAytqnQHk1ipP+Rg+M5lFHrSkUlnpGa+f3nuQhxDb7N9E8hUVev
# xALTrFifg8zhslVRH5/Df/CxlMKXC7op30/AyQsOQxHW1uNx3tG1DMgizpwBasrx
# h6wa7iaA+Lp07q1I92eLhrYbtw3xC2vNIGdMdN7nd76yMIjdYnAn7r38wwtaJ3KY
# D0QTl77EB8u/5cCs3ShZdDdyg4K7NoJl8iEHrbqtooAHOMLiJpiL2i9Yn8kQMB6/
# Q6RMO3IUPLuycB9o6DNiwQHf6Jt5oW7P09k5NxxBEmksxwNbmZvNQ65Zn3exUAKq
# G+x31Egz5IZ4U/jPzRalElEIpS0rgrVg8R8pEOhd95mEzp5WERKFyXhe6nB6bSYH
# v8clLAV0iMku308rpfjMiQkqS3LLzfUJ5OHqtKKQNMLxz9z185UCszGCBlMwggZP
# AgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMUEw
# PwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0IENvZGUgU2lnbmluZyBSU0E0MDk2
# IFNIQTM4NCAyMDIxIENBMQIQB8JSdCgUotar/iTqF+XdLjANBglghkgBZQMEAgEF
# AKCBhDAYBgorBgEEAYI3AgEMMQowCKACgAChAoAAMBkGCSqGSIb3DQEJAzEMBgor
# BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3
# DQEJBDEiBCCuUTxUYUFnRqi6+NsRVoWMsqnp4k/Vbvg6fqcrSLazaDANBgkqhkiG
# 9w0BAQEFAASCAgA2S0ouOLbDSFITWcug4wU8nTvQ8+jN5LYbrDEeZqtgwHayyAIN
# JXHl0kJd4AUwdVmVfGMAt+UVGcZqElz9CD4M+Gof6+obg1UXGzYweJEF0Ph1rRGz
# dm4WeljvyE7a3Edo8LkUiMUf1z5GQfBD32NQbC5PyG04MVBmvJXlAMFQymMaPlhy
# BTj12q4XIt+Pm0lXPFlGhdnewND0Jqrfj/D1tPaqvjBJyynO5qOestWtiGP2umtQ
# tl8C7OgKuFQwSy/Xt/2ObbyCEMp5nNlOwB+FlVU2uVzoWj2hmy7/mPSF3lRGvVSl
# v3XX4JeczD+NixOw2WtdzyM4knIAKzhyp9SANzqqTaBVU+0wb8++PapNJvbV8y4W
# veSsQvB25LdMw+JoBhZZjXkOuotezbmPXfWcBBxvJS5VF7RzwemPzbq8v/eZOpZV
# aPXXNhPnxJ4ViWChxKp823UD/aWOGm2trg/rLCNfWCFNKxV5dGM/PWPOE3Xy5oGy
# Re/Bl5X6EHZrDki7j10+myk7MjCnAhIrrjQHgAhxoCGldPXDwVbVbBMZy0grkw9g
# Wew7W5Chye4j3ibQMpNwdqIEISUKmacAklhi3P/0wkj5IvkKXyPfx4cWnvZkuHNX
# WSV4SLPVwT1hZgffu1/J/K4k6F6fxPz//Bj/9Od3oq50hqhGp2tlAosrO6GCAyAw
# ggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3MGMxCzAJBgNVBAYTAlVTMRcwFQYD
# VQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBH
# NCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0ECEAuuZrxaun+Vh8b56QTj
# MwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwG
# CSqGSIb3DQEJBTEPFw0yNDExMjQxNzM1MTFaMC8GCSqGSIb3DQEJBDEiBCBeHECV
# PeAkZgul0rJBkPULibGn6d1WMs7qq0vm1skXMjANBgkqhkiG9w0BAQEFAASCAgB9
# czoDYHnSuA8/WpyozmetZfdWLMB4UM4ADjGf6sMJt0wYwu/ruyGNmRBmnATElxUz
# yzB+I1yeEZmnjkWDLMDSfeJYiFKyPii8IQaU6i9qpEf4X0ET6Egshb3BZC0rSyy9
# DadJa5NEMk28ZOee3sIZouIqTZ5LjYjdOi7UhtM0QzhVxXhuhaRhfR81Jz0pM7U5
# ia/HmzJjNZ3wWQld94oK8zJ1Q/3FgF7L01ft50HzdVGbXt4gUlvBmZGvnvvlkLB8
# 9tA/WKhO1HoMUn5muFqKWW/doJ1zCHlvEIOBLycYx06HR95bylJdR1daOHlkY/1n
# 82N8ohkYg00wm15xCSUNtW/DnmL0dsdrolEEEVNajXvzPhxMEpOgkweS5e2Zy3VB
# R06XwTiDpGHfBO9d/7+/Npg1aDWxXtdReT/Cm5JGPAurMr/EjDXb6U3ymBnokdcY
# DUACNutASuz1G7KMa97bipEvmDuhDgM7B9nh/Cgpbms7UK8LizrbuEgpSm9KDLn5
# QC3mvXLI5gxRmHwaXdTfdNJmJEsdOvGCGIVNy0R614iUk2yACSGYidHu6OXK+Zu4
# qdWFtIzOaj9mPPpKmGji9TcqyOVhi/yDsNr9N+RHXo17S2yw+KKluh1VFOicQ7/z
# mc9buumEbb11Ot1p9rd6NP7sURmS7mbSLiO5k3U95g==
# SIG # End signature block
|
ADEssentials.psd1 | ADEssentials-0.0.226 | @{
AliasesToExport = @('Get-WinDNSServerIP', 'Get-WinDnsIPAddresses', 'Get-WinDNSRecords', 'Get-WinDnsServerZones', 'Get-WinDNSZones', 'Get-WinADForestObjectsConflict', 'Get-WinADRoles', 'Get-WinADDomainRoles', 'Get-WinADSubnet', 'Get-WinADPriviligedObjects', 'Get-WinADForestTombstoneLifetime', 'Get-WinADTrusts', 'Get-WinADUsersFP', 'Set-WinDNSServerIP', 'Show-WinADCriticalGroups', 'Show-ADGroupMember', 'Show-ADGroupMemberOf', 'Show-WinADSiteCoverage', 'Show-ADTrust', 'Show-ADTrusts', 'Show-WinADTrusts', 'Sync-DomainController')
Author = 'Przemyslaw Klys'
CmdletsToExport = @()
CompanyName = 'Evotec'
CompatiblePSEditions = @('Desktop', 'Core')
Copyright = '(c) 2011 - 2024 Przemyslaw Klys @ Evotec. All rights reserved.'
Description = 'Helper module for Active Directory with lots of useful functions that simplify supporting Active Directory.'
FunctionsToExport = @('Add-ADACL', 'Compare-PingCastleReport', 'Compare-WinADGlobalCatalogObjects', 'Convert-ADSecurityDescriptor', 'Copy-ADOUSecurity', 'Disable-ADACLInheritance', 'Enable-ADACLInheritance', 'Export-ADACLObject', 'Find-WinADObjectDifference', 'Get-ADACL', 'Get-ADACLOwner', 'Get-DNSServerIP', 'Get-PingCastleReport', 'Get-WinADACLConfiguration', 'Get-WinADACLForest', 'Get-WinADBitlockerLapsSummary', 'Get-WinADBrokenProtectedFromDeletion', 'Get-WinADComputerACLLAPS', 'Get-WinADComputers', 'Get-WinADDelegatedAccounts', 'Get-WinADDFSHealth', 'Get-WinADDFSTopology', 'Get-WinADDHCP', 'Get-WinADDiagnostics', 'Get-WinADDnsInformation', 'Get-WinADDnsIPAddresses', 'Get-WinADDnsRecords', 'Get-WinADDnsServerForwarder', 'Get-WinADDnsServerScavenging', 'Get-ADWinDnsServerZones', 'Get-WinADDNSZones', 'Get-WinADDomain', 'Get-WinADDomainControllerGenerationId', 'Get-WinADDomainControllerNetLogonSettings', 'Get-WinADDomainControllerNTDSSettings', 'Get-WinADDomainControllerOption', 'Get-WinADDuplicateObject', 'Get-WinADDuplicateSPN', 'Get-WinADForest', 'Get-WinADForestControllerInformation', 'Get-WinADForestOptionalFeatures', 'Get-WinADForestReplication', 'Get-WinADForestReplicationSummary', 'Get-WinADForestRoles', 'Get-WinADForestSchemaDetails', 'Get-WinADForestSchemaProperties', 'Get-WinADForestSites', 'Get-WinADForestSubnet', 'Get-WinADGroupMember', 'Get-WinADGroupMemberOf', 'Get-WinADGroups', 'Get-WinADKerberosAccount', 'Get-WinADLastBackup', 'Get-WinADLDAPBindingsSummary', 'Get-WinADLDAPSummary', 'Get-WinADLMSettings', 'Get-WinADObject', 'Get-WinADPasswordPolicy', 'Get-WinADPrivilegedObjects', 'Get-WinADProtocol', 'Get-WinADProxyAddresses', 'Get-WinADServiceAccount', 'Get-WinADSharePermission', 'Get-WinADSiteConnections', 'Get-WinADSiteCoverage', 'Get-WinADSiteLinks', 'Get-WinADSiteOptions', 'Get-WinADTombstoneLifetime', 'Get-WinADTrust', 'Get-WinADTrustLegacy', 'Get-WinADUserPrincipalName', 'Get-WinADUsers', 'Get-WinADUsersForeignSecurityPrincipalList', 'Get-WinADWellKnownFolders', 'Invoke-ADEssentials', 'Invoke-PingCastle', 'New-ADACLObject', 'New-ADSite', 'Remove-ADACL', 'Remove-WinADDFSTopology', 'Remove-WinADDuplicateObject', 'Remove-WinADSharePermission', 'Rename-WinADUserPrincipalName', 'Repair-WinADACLConfigurationOwner', 'Repair-WinADBrokenProtectedFromDeletion', 'Repair-WinADEmailAddress', 'Repair-WinADForestControllerInformation', 'Request-ChangePasswordAtLogon', 'Request-DisableOnAccountExpiration', 'Restore-ADACLDefault', 'Set-ADACL', 'Set-ADACLInheritance', 'Set-ADACLOwner', 'Set-DnsServerIP', 'Set-WinADDiagnostics', 'Set-WinADDomainControllerNetLogonSettings', 'Set-WinADDomainControllerOption', 'Set-WinADForestACLOwner', 'Set-WinADReplication', 'Set-WinADReplicationConnections', 'Set-WinADShare', 'Set-WinADTombstoneLifetime', 'Show-WinADDNSRecords', 'Show-WinADForestReplicationSummary', 'Show-WinADGroupCritical', 'Show-WinADGroupMember', 'Show-WinADGroupMemberOf', 'Show-WinADKerberosAccount', 'Show-WinADLdapSummary', 'Show-WinADObjectDifference', 'Show-WinADOrganization', 'Show-WinADSites', 'Show-WinADSitesCoverage', 'Show-WinADTrust', 'Show-WinADUserSecurity', 'Sync-WinADDomainController', 'Test-ADDomainController', 'Test-ADRolesAvailability', 'Test-ADSiteLinks', 'Test-DNSNameServers', 'Test-FSMORolesAvailability', 'Test-LDAP', 'Test-WinADDNSResolving', 'Test-WinADObjectReplicationStatus', 'Test-WinADVulnerableSchemaClass', 'Update-LastLogonTimestamp')
GUID = '9fc9fd61-7f11-4f4b-a527-084086f1905f'
ModuleVersion = '0.0.226'
PowerShellVersion = '5.1'
PrivateData = @{
PSData = @{
ProjectUri = 'https://github.com/EvotecIT/ADEssentials'
Tags = @('Windows', 'ActiveDirectory')
}
}
RequiredModules = @(@{
Guid = 'a7bdf640-f5cb-4acf-9de0-365b322d245c'
ModuleName = 'PSWriteHTML'
ModuleVersion = '1.27.0'
}, @{
Guid = '5df72a79-cdf6-4add-b38d-bcacf26fb7bc'
ModuleName = 'PSEventViewer'
ModuleVersion = '1.0.22'
})
RootModule = 'ADEssentials.psm1'
ScriptsToProcess = @()
}
# SIG # Begin signature block
# MIItqwYJKoZIhvcNAQcCoIItnDCCLZgCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDF6wqlu9Wm/MHC
# JtSMS82wo1KhGLp2V0Rzm4I2Y0BzO6CCJq4wggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggWQMIIDeKADAgECAhAFmxtXno4hMuI5B72nd3VcMA0GCSqG
# SIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMx
# GTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRy
# dXN0ZWQgUm9vdCBHNDAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGIx
# CzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3
# dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBH
# NDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL/mkHNo3rvkXUo8MCIw
# aTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3EMB/zG6Q4FutWxpdtHauyefLK
# EdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKyunWZanMylNEQRBAu34LzB4Tm
# dDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsFxl7sWxq868nPzaw0QF+xembu
# d8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU15zHL2pNe3I6PgNq2kZhAkHnD
# eMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJBMtfbBHMqbpEBfCFM1LyuGwN1
# XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObURWBf3JFxGj2T3wWmIdph2PVld
# QnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6nj3cAORFJYm2mkQZK37AlLTS
# YW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxBYKqxYxhElRp2Yn72gLD76GSm
# M9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5SUUd0viastkF13nqsX40/ybzT
# QRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+xq4aLT8LWRV+dIPyhHsXAj6Kx
# fgommfXkaS+YHS312amyHeUbAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYD
# VR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwPTzANBgkq
# hkiG9w0BAQwFAAOCAgEAu2HZfalsvhfEkRvDoaIAjeNkaA9Wz3eucPn9mkqZucl4
# XAwMX+TmFClWCzZJXURj4K2clhhmGyMNPXnpbWvWVPjSPMFDQK4dUPVS/JA7u5iZ
# aWvHwaeoaKQn3J35J64whbn2Z006Po9ZOSJTROvIXQPK7VB6fWIhCoDIc2bRoAVg
# X+iltKevqPdtNZx8WorWojiZ83iL9E3SIAveBO6Mm0eBcg3AFDLvMFkuruBx8lbk
# apdvklBtlo1oepqyNhR6BvIkuQkRUNcIsbiJeoQjYUIp5aPNoiBB19GcZNnqJqGL
# FNdMGbJQQXE9P01wI4YMStyB0swylIQNCAmXHE/A7msgdDDS4Dk0EIUhFQEI6FUy
# 3nFJ2SgXUE3mvk3RdazQyvtBuEOlqtPDBURPLDab4vriRbgjU2wGb2dVf0a1TD9u
# KFp5JtKkqGKX0h7i7UqLvBv9R0oN32dmfrJbQdA75PQ79ARj6e/CVABRoIoqyc54
# zNXqhwQYs86vSYiv85KZtrPmYQ/ShQDnUBrkG5WdGaG5nLGbsQAe79APT0JsyQq8
# 7kP6OnGlyE0mpTX9iV28hWIdMtKgK1TtmlfB2/oQzxm3i0objwG2J5VT6LaJbVu8
# aNQj6ItRolb58KaAoNYes7wPD1N1KarqE3fk3oyBIa0HEEcRrYc9B9F1vM/zZn4w
# ggauMIIElqADAgECAhAHNje3JFR82Ees/ShmKl5bMA0GCSqGSIb3DQEBCwUAMGIx
# CzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3
# dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBH
# NDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIyMzU5NTlaMGMxCzAJBgNVBAYTAlVT
# MRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1
# c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0EwggIiMA0GCSqG
# SIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUGSbPBPXJJUVXHJQPE8pE3qZdRodbS
# g9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOciQt/nR+eDzMfUBMLJnOWbfhXqAJ9
# /UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkrPkLcZ47qUT3w1lbU5ygt69OxtXXn
# HwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rwN3mfXazL6IRktFLydkf3YYMZ3V+0
# VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSmxR3NNg1c1eYbqMFkdECnwHLFuk4f
# sbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu9Yemj052FVUmcJgmf6AaRyBD40Nj
# gHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirHkr+g3uM+onP65x9abJTyUpURK1h0
# QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506o9UD4L/wojzKQtwYSH8UNM/STKvv
# mz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklNiyDSLFc1eSuo80VgvCONWPfcYd6T
# /jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGTyYwMO1uKIqjBJgj5FBASA31fI7tk
# 42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgADoRU7s7pXcheMBK9Rp6103a50g5r
# mQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4E
# FgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5n
# P+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMIMHcG
# CCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQu
# Y29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGln
# aUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8v
# Y3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAgBgNV
# HSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwDQYJKoZIhvcNAQELBQADggIB
# AH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPPMFPOvxj7x1Bd4ksp+3CKDaopafxp
# wc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKWb8RQTGIdDAiCqBa9qVbPFXONASIl
# zpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpPkWaeLJ7giqzl/Yy8ZCaHbJK9nXzQ
# cAp876i8dU+6WvepELJd6f8oVInw1YpxdmXazPByoyP6wCeCRK6ZJxurJB4mwbfe
# Kuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKvxMfBwWpx2cYTgAnEtp/Nh4cku0+j
# Sbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl63f8lY5knLD0/a6fxZsNBzU+2QJsh
# IUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YBT70/O3itTK37xJV77QpfMzmHQXh6
# OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4nLCbbbxV7HhmLNriT1ObyF5lZynDw
# N7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvtlUG3OtUVmDG0YgkPCr2B2RP+v6TR
# 81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm2fBldkKmKYcJRyvmfxqkhQ/8mJb2
# VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqhK/bt1nz8MIIGsDCCBJigAwIBAgIQ
# CK1AsmDSnEyfXs2pvZOu2TANBgkqhkiG9w0BAQwFADBiMQswCQYDVQQGEwJVUzEV
# MBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29t
# MSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjEwNDI5MDAw
# MDAwWhcNMzYwNDI4MjM1OTU5WjBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGln
# aUNlcnQsIEluYy4xQTA/BgNVBAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBT
# aWduaW5nIFJTQTQwOTYgU0hBMzg0IDIwMjEgQ0ExMIICIjANBgkqhkiG9w0BAQEF
# AAOCAg8AMIICCgKCAgEA1bQvQtAorXi3XdU5WRuxiEL1M4zrPYGXcMW7xIUmMJ+k
# jmjYXPXrNCQH4UtP03hD9BfXHtr50tVnGlJPDqFX/IiZwZHMgQM+TXAkZLON4gh9
# NH1MgFcSa0OamfLFOx/y78tHWhOmTLMBICXzENOLsvsI8IrgnQnAZaf6mIBJNYc9
# URnokCF4RS6hnyzhGMIazMXuk0lwQjKP+8bqHPNlaJGiTUyCEUhSaN4QvRRXXegY
# E2XFf7JPhSxIpFaENdb5LpyqABXRN/4aBpTCfMjqGzLmysL0p6MDDnSlrzm2q2AS
# 4+jWufcx4dyt5Big2MEjR0ezoQ9uo6ttmAaDG7dqZy3SvUQakhCBj7A7CdfHmzJa
# wv9qYFSLScGT7eG0XOBv6yb5jNWy+TgQ5urOkfW+0/tvk2E0XLyTRSiDNipmKF+w
# c86LJiUGsoPUXPYVGUztYuBeM/Lo6OwKp7ADK5GyNnm+960IHnWmZcy740hQ83eR
# Gv7bUKJGyGFYmPV8AhY8gyitOYbs1LcNU9D4R+Z1MI3sMJN2FKZbS110YU0/EpF2
# 3r9Yy3IQKUHw1cVtJnZoEUETWJrcJisB9IlNWdt4z4FKPkBHX8mBUHOFECMhWWCK
# ZFTBzCEa6DgZfGYczXg4RTCZT/9jT0y7qg0IU0F8WD1Hs/q27IwyCQLMbDwMVhEC
# AwEAAaOCAVkwggFVMBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFGg34Ou2
# O/hfEYb7/mF7CIhl9E5CMB8GA1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9P
# MA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzB3BggrBgEFBQcB
# AQRrMGkwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggr
# BgEFBQcwAoY1aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1
# c3RlZFJvb3RHNC5jcnQwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGln
# aWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcmwwHAYDVR0gBBUwEzAH
# BgVngQwBAzAIBgZngQwBBAEwDQYJKoZIhvcNAQEMBQADggIBADojRD2NCHbuj7w6
# mdNW4AIapfhINPMstuZ0ZveUcrEAyq9sMCcTEp6QRJ9L/Z6jfCbVN7w6XUhtldU/
# SfQnuxaBRVD9nL22heB2fjdxyyL3WqqQz/WTauPrINHVUHmImoqKwba9oUgYftzY
# gBoRGRjNYZmBVvbJ43bnxOQbX0P4PpT/djk9ntSZz0rdKOtfJqGVWEjVGv7XJz/9
# kNF2ht0csGBc8w2o7uCJob054ThO2m67Np375SFTWsPK6Wrxoj7bQ7gzyE84FJKZ
# 9d3OVG3ZXQIUH0AzfAPilbLCIXVzUstG2MQ0HKKlS43Nb3Y3LIU/Gs4m6Ri+kAew
# Q3+ViCCCcPDMyu/9KTVcH4k4Vfc3iosJocsL6TEa/y4ZXDlx4b6cpwoG1iZnt5Lm
# Tl/eeqxJzy6kdJKt2zyknIYf48FWGysj/4+16oh7cGvmoLr9Oj9FpsToFpFSi0HA
# SIRLlk2rREDjjfAVKM7t8RhWByovEMQMCGQ8M4+uKIw8y4+ICw2/O/TOHnuO77Xr
# y7fwdxPm5yg/rBKupS8ibEH5glwVZsxsDsrFhsP2JjMMB0ug0wcCampAMEhLNKhR
# ILutG4UI4lkNbcoFUCvqShyepf2gpx8GdOfy1lKQ/a+FSCH5Vzu0nAPthkX0tGFu
# v2jiJmCG6sivqf6UHedjGzqGVnhOMIIGvDCCBKSgAwIBAgIQC65mvFq6f5WHxvnp
# BOMzBDANBgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGln
# aUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5
# NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMB4XDTI0MDkyNjAwMDAwMFoXDTM1MTEy
# NTIzNTk1OVowQjELMAkGA1UEBhMCVVMxETAPBgNVBAoTCERpZ2lDZXJ0MSAwHgYD
# VQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyNDCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL5qc5/2lSGrljC6W23mWaO16P2RHxjEiDtqmeOlwf0KMCBD
# Er4IxHRGd7+L660x5XltSVhhK64zi9CeC9B6lUdXM0s71EOcRe8+CEJp+3R2O8oo
# 76EO7o5tLuslxdr9Qq82aKcpA9O//X6QE+AcaU/byaCagLD/GLoUb35SfWHh43rO
# H3bpLEx7pZ7avVnpUVmPvkxT8c2a2yC0WMp8hMu60tZR0ChaV76Nhnj37DEYTX9R
# eNZ8hIOYe4jl7/r419CvEYVIrH6sN00yx49boUuumF9i2T8UuKGn9966fR5X6kgX
# j3o5WHhHVO+NBikDO0mlUh902wS/Eeh8F/UFaRp1z5SnROHwSJ+QQRZ1fisD8UTV
# DSupWJNstVkiqLq+ISTdEjJKGjVfIcsgA4l9cbk8Smlzddh4EfvFrpVNnes4c16J
# idj5XiPVdsn5n10jxmGpxoMc6iPkoaDhi6JjHd5ibfdp5uzIXp4P0wXkgNs+CO/C
# acBqU0R4k+8h6gYldp4FCMgrXdKWfM4N0u25OEAuEa3JyidxW48jwBqIJqImd93N
# Rxvd1aepSeNeREXAu2xUDEW8aqzFQDYmr9ZONuc2MhTMizchNULpUEoA6Vva7b1X
# CB+1rxvbKmLqfY/M/SdV6mwWTyeVy5Z/JkvMFpnQy5wR14GJcv6dQ4aEKOX5AgMB
# AAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s
# BwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFJ9X
# LAN3DigVkGalY17uT5IfdqBbMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwz
# LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1l
# U3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhho
# dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNl
# cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZU
# aW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAD2tHh92mVvjOIQS
# R9lDkfYR25tOCB3RKE/P09x7gUsmXqt40ouRl3lj+8QioVYq3igpwrPvBmZdrlWB
# b0HvqT00nFSXgmUrDKNSQqGTdpjHsPy+LaalTW0qVjvUBhcHzBMutB6HzeledbDC
# zFzUy34VarPnvIWrqVogK0qM8gJhh/+qDEAIdO/KkYesLyTVOoJ4eTq7gj9UFAL1
# UruJKlTnCVaM2UeUUW/8z3fvjxhN6hdT98Vr2FYlCS7Mbb4Hv5swO+aAXxWUm3Wp
# ByXtgVQxiBlTVYzqfLDbe9PpBKDBfk+rabTFDZXoUke7zPgtd7/fvWTlCs30VAGE
# sshJmLbJ6ZbQ/xll/HjO9JbNVekBv2Tgem+mLptR7yIrpaidRJXrI+UzB6vAlk/8
# a1u7cIqV0yef4uaZFORNekUgQHTqddmsPCEIYQP7xGxZBIhdmm4bhYsVA6G2WgNF
# YagLDBzpmk9104WQzYuVNsxyoVLObhx3RugaEGru+SojW4dHPoWrUhftNpFC5H7Q
# EY7MhKRyrBe7ucykW7eaCuWBsBb4HOKRFVDcrZgdwaSIqMDiCLg4D+TPVgKx2EgE
# deoHNHT9l3ZDBD+XgbF+23/zBjeCtxz+dL/9NWR6P2eZRi7zcEO1xwcdcqJsyz/J
# ceENc2Sg8h3KeFUCS7tpFk7CrDqkMIIHXzCCBUegAwIBAgIQB8JSdCgUotar/iTq
# F+XdLjANBgkqhkiG9w0BAQsFADBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGln
# aUNlcnQsIEluYy4xQTA/BgNVBAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBT
# aWduaW5nIFJTQTQwOTYgU0hBMzg0IDIwMjEgQ0ExMB4XDTIzMDQxNjAwMDAwMFoX
# DTI2MDcwNjIzNTk1OVowZzELMAkGA1UEBhMCUEwxEjAQBgNVBAcMCU1pa2/FgsOz
# dzEhMB8GA1UECgwYUHJ6ZW15c8WCYXcgS8WCeXMgRVZPVEVDMSEwHwYDVQQDDBhQ
# cnplbXlzxYJhdyBLxYJ5cyBFVk9URUMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw
# ggIKAoICAQCUmgeXMQtIaKaSkKvbAt8GFZJ1ywOH8SwxlTus4McyrWmVOrRBVRQA
# 8ApF9FaeobwmkZxvkxQTFLHKm+8knwomEUslca8CqSOI0YwELv5EwTVEh0C/Daeh
# vxo6tkmNPF9/SP1KC3c0l1vO+M7vdNVGKQIQrhxq7EG0iezBZOAiukNdGVXRYOLn
# 47V3qL5PwG/ou2alJ/vifIDad81qFb+QkUh02Jo24SMjWdKDytdrMXi0235CN4Rr
# W+8gjfRJ+fKKjgMImbuceCsi9Iv1a66bUc9anAemObT4mF5U/yQBgAuAo3+jVB8w
# iUd87kUQO0zJCF8vq2YrVOz8OJmMX8ggIsEEUZ3CZKD0hVc3dm7cWSAw8/FNzGNP
# lAaIxzXX9qeD0EgaCLRkItA3t3eQW+IAXyS/9ZnnpFUoDvQGbK+Q4/bP0ib98XLf
# QpxVGRu0cCV0Ng77DIkRF+IyR1PcwVAq+OzVU3vKeo25v/rntiXCmCxiW4oHYO28
# eSQ/eIAcnii+3uKDNZrI15P7VxDrkUIc6FtiSvOhwc3AzY+vEfivUkFKRqwvSSr4
# fCrrkk7z2Qe72Zwlw2EDRVHyy0fUVGO9QMuh6E3RwnJL96ip0alcmhKABGoIqSW0
# 5nXdCUbkXmhPCTT5naQDuZ1UkAXbZPShKjbPwzdXP2b8I9nQ89VSgQIDAQABo4IC
# AzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHQYDVR0OBBYE
# FHrxaiVZuDJxxEk15bLoMuFI5233MA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAK
# BggrBgEFBQcDAzCBtQYDVR0fBIGtMIGqMFOgUaBPhk1odHRwOi8vY3JsMy5kaWdp
# Y2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmluZ1JTQTQwOTZTSEEz
# ODQyMDIxQ0ExLmNybDBToFGgT4ZNaHR0cDovL2NybDQuZGlnaWNlcnQuY29tL0Rp
# Z2lDZXJ0VHJ1c3RlZEc0Q29kZVNpZ25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5j
# cmwwPgYDVR0gBDcwNTAzBgZngQwBBAEwKTAnBggrBgEFBQcCARYbaHR0cDovL3d3
# dy5kaWdpY2VydC5jb20vQ1BTMIGUBggrBgEFBQcBAQSBhzCBhDAkBggrBgEFBQcw
# AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMFwGCCsGAQUFBzAChlBodHRwOi8v
# Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmlu
# Z1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJBgNVHRMEAjAAMA0GCSqGSIb3DQEB
# CwUAA4ICAQC3EeHXUPhpe31K2DL43Hfh6qkvBHyR1RlD9lVIklcRCR50ZHzoWs6E
# BlTFyohvkpclVCuRdQW33tS6vtKPOucpDDv4wsA+6zkJYI8fHouW6Tqa1W47YSrc
# 5AOShIcJ9+NpNbKNGih3doSlcio2mUKCX5I/ZrzJBkQpJ0kYha/pUST2CbE3JroJ
# f2vQWGUiI+J3LdiPNHmhO1l+zaQkSxv0cVDETMfQGZKKRVESZ6Fg61b0djvQSx51
# 0MdbxtKMjvS3ZtAytqnQHk1ipP+Rg+M5lFHrSkUlnpGa+f3nuQhxDb7N9E8hUVev
# xALTrFifg8zhslVRH5/Df/CxlMKXC7op30/AyQsOQxHW1uNx3tG1DMgizpwBasrx
# h6wa7iaA+Lp07q1I92eLhrYbtw3xC2vNIGdMdN7nd76yMIjdYnAn7r38wwtaJ3KY
# D0QTl77EB8u/5cCs3ShZdDdyg4K7NoJl8iEHrbqtooAHOMLiJpiL2i9Yn8kQMB6/
# Q6RMO3IUPLuycB9o6DNiwQHf6Jt5oW7P09k5NxxBEmksxwNbmZvNQ65Zn3exUAKq
# G+x31Egz5IZ4U/jPzRalElEIpS0rgrVg8R8pEOhd95mEzp5WERKFyXhe6nB6bSYH
# v8clLAV0iMku308rpfjMiQkqS3LLzfUJ5OHqtKKQNMLxz9z185UCszGCBlMwggZP
# AgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMUEw
# PwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0IENvZGUgU2lnbmluZyBSU0E0MDk2
# IFNIQTM4NCAyMDIxIENBMQIQB8JSdCgUotar/iTqF+XdLjANBglghkgBZQMEAgEF
# AKCBhDAYBgorBgEEAYI3AgEMMQowCKACgAChAoAAMBkGCSqGSIb3DQEJAzEMBgor
# BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3
# DQEJBDEiBCD9H++5LIHSdOkiiWRonnf/G9fxVGfYp5cfemCKmTldeDANBgkqhkiG
# 9w0BAQEFAASCAgAMkrz9xfmFmA2O81zIc/1M4esMyBnvaRTIpFXtFNnvthxrG9t6
# 8G4UubyxLjmOpnA+dLoVv2OEiNMclCma410to+zebZ4n9uy0ia9+9e2PPjzM1f/U
# O9UORw0VG63GH40wvH7vvH4A57MvJ2jnZWJacPOZV+DY8K+7TKkwI5nXHaAApz8p
# dqfZd77fTfKZcftnONHDcex7E7opumZN7iySsrqyQOyxeJ99qVHTGX2UYehstZ+S
# smU7CBZRjukDW5hHjEXIqnLwAUA/GCRksaJEgorRjMCIQ9SXPkq/9tn1oAeLyK6V
# FiqOnwOv0Roe7k1e3BOUOyqzF3q17BQRPcwFNulTGHHK6gmlAV7oSFr1cQ7F0Q9T
# ze2PruVcL+Aiwi45RZJmmq+ddgveiMK8t5m5mBL71KpWZOXVoVaUTOVmsRTwuvK9
# t6vQYKitfaKlOfskUZLDn8BHJ9xaVI4hZxX4o5YMdrtbo771gPgEHiUM16PWEJei
# eIXBGWzFzNrye7+CR0w7D+G2Hj1iCwdOVE9rz3MqxUyDFrqw+h8IOaHavvIFiwPj
# CVbcG3M+ZuFTMYDEXOWQjKMjl6oc8GJZKXR9oZtVMOtWztGTEwTMAitpmlGhQhKB
# Y5OBaQwRiZ2o9M6TQPRL/XxjlD1MdkU9Zo3734NRO7aS4LJQxCJW0aE8DqGCAyAw
# ggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3MGMxCzAJBgNVBAYTAlVTMRcwFQYD
# VQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBH
# NCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0ECEAuuZrxaun+Vh8b56QTj
# MwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwG
# CSqGSIb3DQEJBTEPFw0yNDExMjQxNzM1MTFaMC8GCSqGSIb3DQEJBDEiBCCZ9qIs
# oAPDNbTSfLTpQ1s1uMwwnaitFyG0ykkLO14vYTANBgkqhkiG9w0BAQEFAASCAgCC
# vVA/XlISvoe7LbhFLHtFgaCZzU9sDCM2sR0vEa9khkRIQXbFm85yBGtOK6n2RFy/
# eQRT9oRm9++o3daYWpLeT3dwI5MC4vk2O7LK6JftY//NLWn+RKnA2EhEi7qTLrIO
# 1qjbn7EHcV3CsQV1Ss7A1lypyjTKtY+yPsKF4yUCMfDm2qMuTjE6jBSKjWZzNKTF
# u3ThR86z2OOY0qrwNaBX23Od0pNInidFjNMvVrBUe0BNY6Q+JqY4yY2RB8/khzUr
# XXBMvhJJFbUPMzzayHXzR8CyNLZkysJQM0bzD1muQLZAdIlQI90qcTD0ettIgMMw
# QPV1Eco10ouAQm/uz4cRQ2HgnZjfBI3rpVOvmHWWXT5q2SRgPyevZFItJIKFYU8A
# KhlTKiq7A02q1FHc5P/GWVm7PTWXAmwoHaf39/4o6CnJKdSjbIq+Jnb6O0GLjiIz
# 1fP3QFeStppISTDaIOsL2bdOyXivDLZYerenMuWw3vP0Yj1OJF2iDPooaPvLUEk4
# PWnP3LrtBr2e2XYWDH4y9r/JTJYpZcBSStswU49iN5gZYor+hHfjsVJai62OFcwx
# zScTsnHAch2qEpHTKdevcShlmzYvQAs7QWbWF37aNL/58/HDFCYdF3b/ZGkj1sH7
# fbPNH8Reo6vDIf1ysVFw8iZs+3Kiuq4qQmhMj1Rfcw==
# SIG # End signature block
|
New-MsolSecurePassword.ps1 | ADFSConfigurationTools-1.0.0.1 | Function New-MsolSecurePassword{
[cmdletbinding()]
param(
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[String]$KeyFile,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[String]$PlainTextPassword,
[parameter(ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[String]$UserName,
[parameter(ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[String]$PasswordFile,
[parameter(ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[ValidateSet("16","24","32")]
[String]$Byte
)
PROCESS{
#Create Cryptography Key
$Key = New-Object Byte[] 16
[Security.Cryptography.RNGCryptoServiceProvider]::Create().GetBytes($Key)
$key | Out-File $KeyFile
$Key = Get-Content $KeyFile
$Password = "$PlainTextPassword" | ConvertTo-SecureString -AsPlainText -Force
$Password | ConvertFrom-SecureString -key $Key | Out-File $PasswordFile
$properties = [Ordered]@{
"PasswordFile" = $PasswordFile
"KeyFile" = $KeyFile
"SecurePassword" = (Get-Content $PasswordFile)
"Key" = $Key
}
$Object = New-Object -TypeName Psobject -Property $properties
$username = $UserName
$AESKey = Get-Content "$($KeyFile)"
$pwdTxt = Get-Content "$($PasswordFile)"
$securePwd = $pwdTxt | ConvertTo-SecureString -Key $AESKey
$credObject = New-Object System.Management.Automation.PSCredential -ArgumentList $username, $securePwd
Return $credObject
}
}#Function
|
Start-AdDCSync.ps1 | ADFSConfigurationTools-1.0.0.1 | Function Start-AdDCSync {
[cmdletbinding(SupportsShouldProcess)]
param(
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$false)]
[ValidateScript( {Test-Path $_ -PathType Container})]
[String]$logFilePath
)
BEGIN{
Import-Module ActiveDirectory
}
PROCESS{
$DomainName = Get-ADDomain | Select-Object -ExpandProperty DNSRoot
$DC = Get-ADDomain | Select-Object -ExpandProperty Pdcemulator
$ADPSSession = New-PSSession -ComputerName $DC
if($PSCmdlet.ShouldProcess($DomainName)){
$DomainName = Get-ADDomain | Select-Object -ExpandProperty DNSRoot
$Date = (get-date).ToString("ddMMyyyy_hh_mm_ss")
$ReplicationLog = Invoke-Command -Session $ADPSSession -ScriptBlock { repadmin /syncall /AdePq }
$ReplicationLog | Out-File "$($logFilePath)\$($DomainName)_ReplicationLog_$($date).log" -Append
}#END_IF
}
END{
$ReplicationLog
}
}#END_Function
# SIG # Begin signature block
# MIIIaAYJKoZIhvcNAQcCoIIIWTCCCFUCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUOGGBYT1Hj5ldnyVEO9fFLA/5
# vEOgggXMMIIFyDCCBLCgAwIBAgITHwAAAAKXhlLnQ34QXwAAAAAAAjANBgkqhkiG
# 9w0BAQsFADBOMRIwEAYKCZImiZPyLGQBGRYCYXUxEzARBgoJkiaJk/IsZAEZFgNv
# cmcxFDASBgoJkiaJk/IsZAEZFgRBQklPMQ0wCwYDVQQDEwRDQ1JUMB4XDTE4MDcy
# MDAzNDczMFoXDTIwMDcyMDAzNTczMFowZzESMBAGCgmSJomT8ixkARkWAmF1MRMw
# EQYKCZImiZPyLGQBGRYDb3JnMRQwEgYKCZImiZPyLGQBGRYEQUJJTzEOMAwGA1UE
# AxMFVXNlcnMxFjAUBgNVBAMTDUFkbWluaXN0cmF0b3IwggEiMA0GCSqGSIb3DQEB
# AQUAA4IBDwAwggEKAoIBAQCNq7s560Wz2Q/s2pZ3sN2r1u0ldKPpGlhhJnzdJMra
# kHKybnUbRB76TY5VBN6t3FDrBMN7qV31gWKn5GHveppDS6gZHVJGQNEcAREpaGgy
# tewEkpmyY7toNSdXn7ydvlqql1AGGu2kGNFA5jEaOqHfm4Nw+Mt0EBfkXXKjSWB5
# 6+0a44feZiAfaGnNUbDq/5P8zgPvnNnrOuKRuagjPy3AehDElk19fDK9ZKOMzu4S
# 11QbPS8Pppc9hOi956d/HysPdKfaCC7UFBlrMagRAOi7M4MDS3JB4heZ5iBcEIBZ
# l7QY6m2NH103YDZ1xUl2cobo196XCiUObCIpZQzbliYPAgMBAAGjggKEMIICgDA9
# BgkrBgEEAYI3FQcEMDAuBiYrBgEEAYI3FQiD9+NKhIacS4eBnT+Gz8FFhKz9TEeB
# vf4ZhaODBgIBZAIBBTATBgNVHSUEDDAKBggrBgEFBQcDAzAOBgNVHQ8BAf8EBAMC
# B4AwGwYJKwYBBAGCNxUKBA4wDDAKBggrBgEFBQcDAzAdBgNVHQ4EFgQU162YALpI
# MdSWjsWIwbV0i4A8gk0wHwYDVR0jBBgwFoAUKVmuscbhxWcRNj/GnF+rJD3Fdwcw
# gcoGA1UdHwSBwjCBvzCBvKCBuaCBtoaBs2xkYXA6Ly8vQ049Q0NSVCxDTj1GT1NB
# VU1FTERDMDEsQ049Q0RQLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNl
# cnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9QUJJTyxEQz1vcmcsREM9YXU/Y2Vy
# dGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3Ry
# aWJ1dGlvblBvaW50MIG5BggrBgEFBQcBAQSBrDCBqTCBpgYIKwYBBQUHMAKGgZls
# ZGFwOi8vL0NOPUNDUlQsQ049QUlBLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2Vz
# LENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9QUJJTyxEQz1vcmcsREM9
# YXU/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNlcnRpZmljYXRpb25B
# dXRob3JpdHkwNAYDVR0RBC0wK6ApBgorBgEEAYI3FAIDoBsMGUFkbWluaXN0cmF0
# b3JAQUJJTy5vcmcuYXUwDQYJKoZIhvcNAQELBQADggEBAFh89pk6ZQf/o99v1yip
# YpDd1FO3R8aRJIOCVAIrkcY/lWngUPzCftxU3qRMwltFLn7qHIApi1U3H7MAvvBG
# GLvEkJUVI1tXg9NqowwLSggPhtzRH/T/G404UL3c3wRFOqm3ctj66FfqIY2JJRds
# UeX6divBXz6SRYfMko+Yedu7xoab/Uz7FHgQ37NZb6Jn+iqanrty88stDSnSy0Zv
# EvnZkUx1BY3ObVUPht4U/SWYS/O2QoK7AOO2SJMOBHIFDB+nlrB4bKwfAe50bGfG
# x4cGstq3EpBRpHh79A3mFhvjOYrCHMkuo+TKeBD8lKbzatq26rhKYnlskWPH8092
# tu0xggIGMIICAgIBATBlME4xEjAQBgoJkiaJk/IsZAEZFgJhdTETMBEGCgmSJomT
# 8ixkARkWA29yZzEUMBIGCgmSJomT8ixkARkWBEFCSU8xDTALBgNVBAMTBENDUlQC
# Ex8AAAACl4ZS50N+EF8AAAAAAAIwCQYFKw4DAhoFAKB4MBgGCisGAQQBgjcCAQwx
# CjAIoAKAAKECgAAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGC
# NwIBCzEOMAwGCisGAQQBgjcCARUwIwYJKoZIhvcNAQkEMRYEFHh1Y5whiXhDzWaH
# gcDq0oA+qqjjMA0GCSqGSIb3DQEBAQUABIIBAEx96VxEEYg5S+RdU4+4apaRH8QV
# 3IO/vIkwSwVMdGH8H7eiqWTKBmjCO05BjWpnWNx0e1h3aHJrfxqIfB82VCy/Vxqu
# 6KfAw7dyzpEogA3zuLlBBLjRP6c5F0HCkDwX4N/pHa7lMLCH1BZFpjpTMoaZx0om
# Qnmleqmntxw6E2NrWTn482Gl4YGhhq2d3HxZnXgYypv0UXa6uApcTjTUgcA+eJOz
# a3nFqfFhwVK+lvaK/G9YQwYDIZkDpFUy6QvJEFvUCqYu04QVVvFuKoijwHXTvpwv
# kKzhn6Xd98gt/UZgSsurrUQHx6aT6kwNYgRPdgC/DPn+YVzVhHRcZQIPf8c=
# SIG # End signature block
|
Update-SPAduserUPNFederatedInformation.ps1 | ADFSConfigurationTools-1.0.0.1 | Function Update-SPAduserUPNFederatedInformation {
# .ExternalHelp .\Update-SPAduserUPNFederatedInformation.xml
[cmdletbinding(SupportsShouldProcess)]
param(
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true,ParameterSetName="ByUsername")]
[string[]]$UserName,
[parameter(ValueFromPipeline=$false,ValueFromPipelineByPropertyName=$true,Mandatory=$true,ParameterSetName="BySearchBase")]
[string]$SearchBase,
[parameter(ValueFromPipeline=$false,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$ADLocalDomain,
[parameter(ValueFromPipeline=$false,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$AzureADSyncServerFQDN,
[parameter(ValueFromPipeline=$false,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$FederatedDomain,
[parameter(ValueFromPipeline=$false,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[ValidateScript( {Test-Path $_ -PathType Container})]
[string]$LogFilePath
)
BEGIN{
Function Get-UPNAzureADSyncStatus {
param(
[object]$SyncJobStatus
)
$Script:ADSyncStauts = $null
if($SyncJobStatus -eq "Success"){
$SyncInProgress = $true
do{
$SyncInProgress = Invoke-Command -ComputerName $AzureADSyncServerFQDN -ScriptBlock {Get-ADSyncScheduler | select-object -ExpandProperty SyncCycleInProgress} -ErrorAction Stop
if($SyncInProgress -eq $true){
Start-Sleep -Seconds 10
}#end_SubIF
}While($SyncInProgress -eq $true)
$Script:ADSyncStauts = "Complete"
return
}#END_IF
}#END_ScriptFunction
Function Start-UpnUpdateAzureADSync{
param(
[String]$ServerName
)
filter Out-Default { $_ | Out-Null }
$JobStatus = "Success"
$AzureADjobRunStatus = "Running"
while($AzureADjobRunStatus -eq "Running"){
Get-UPNAzureADSyncStatus -SyncJobStatus $JobStatus
if($($Script:ADSyncStauts) -eq "Complete"){
$ADSyncStart = Invoke-Command -ComputerName $ServerName -ScriptBlock {Start-ADSyncSyncCycle -PolicyType Delta} -ErrorAction Stop
Return $ADSyncStart.Result
}#END_IF
}#While
}#END_ScriptFunction
}#BEGIN
PROCESS{
Try{
if($UserName){
if($PSCmdlet.ShouldProcess($Username)){
$DomainUPN = $false
$FederatedUPN = $false
while($DomainUPN -eq $false){
foreach ($AdUser in $UserName){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: UPN to $($ADLocalDomain) for user $($AdUser)"
Set-AdUserUPNInformation -UserName $AdUser -Domain $ADLocalDomain -Verbose -ErrorAction Stop
}#END_Foreach
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Invoking: Active directory replication $($AzureADSyncServerFQDN)"
Start-AdDCSync -logFilePath $LogFilePath -Verbose:$false
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Invoking: AzureAD DeltaSync on server $($AzureADSyncServerFQDN)"
$AzureJobStatus = Start-UpnUpdateAzureADSync -ServerName $AzureADSyncServerFQDN
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: AzureAD DeltaSync Job Status on server $($AzureADSyncServerFQDN)"
Get-UPNAzureADSyncStatus -SyncJobStatus $AzureJobStatus
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: AzureAD Sync Complete"
$DomainUPN = $true
}#END_While
while($FederatedUPN -eq $false){
foreach ($AdUser in $UserName){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: User UPN to $($FederatedDomain) for user $($UserName)"
Set-AdUserUPNInformation -UserName $AdUser -Domain $FederatedDomain -Verbose -ErrorAction Stop
}#foreaech
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Invoking: Active directory replication $($AzureADSyncServerFQDN)"
Start-AdDCSync -logFilePath $LogFilePath -Verbose:$false
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Invoking: AzureAD DeltaSync on server $($AzureADSyncServerFQDN)"
$AzureJobStatus = Start-UpnUpdateAzureADSync -ServerName $AzureADSyncServerFQDN
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: AzureAD DeltaSync Job Status on server $($AzureADSyncServerFQDN)"
Get-UPNAzureADSyncStatus -SyncJobStatus $AzureJobStatus
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: AzureAD Sync Complete"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Complete: User UPN updated successfully"
$FederatedUPN = $true
}#END_While
}#END_IF
}#END_IF
elseif($SearchBase){
if($PSCmdlet.ShouldProcess($SearchBase)){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: user UPN to $($ADLocalDomain) in OU $($SearchBase)"
Set-AdUserUPNInformation -SearchBase $SearchBase -Domain $ADLocalDomain -Verbose -ErrorAction Stop
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Invoking: Active directory replication $($AzureADSyncServerFQDN)"
Start-AdDCSync -logFilePath $LogFilePath -Verbose:$false | Out-Null
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Invoking: AzureAD DeltaSync on server $($AzureADSyncServerFQDN)"
$AzureJobStatus = Start-UpnUpdateAzureADSync -ServerName $AzureADSyncServerFQDN
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: AzureAD DeltaSync Job Status on server $($AzureADSyncServerFQDN)"
Get-UPNAzureADSyncStatus -SyncJobStatus $AzureJobStatus
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: AzureAD Sync Complete"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: User UPN to $($FederatedDomain) in OU $($SearchBase)"
Set-AdUserUPNInformation -SearchBase $SearchBase -Domain $FederatedDomain -Verbose -ErrorAction Stop
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Invoking: Active directory replication $($AzureADSyncServerFQDN)"
Start-AdDCSync -logFilePath $LogFilePath -Verbose:$false | Out-Null
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Invoking: AzureAD DeltaSync on server $($AzureADSyncServerFQDN)"
$AzureJobStatus = Start-UpnUpdateAzureADSync -ServerName $AzureADSyncServerFQDN
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: AzureAD DeltaSync Job Status on server $($AzureADSyncServerFQDN)"
Get-UPNAzureADSyncStatus -SyncJobStatus $AzureJobStatus
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: AzureAD Sync Complete"
Get-ADUser -Filter * -SearchBase $($SearchBase) | Select-Object Name, UserPrincipalName
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Complete: User UPN in OU $($SearchBase) updated successfully"
}#END_IF
}#EndElseIF
}#Try
Catch{
$ErrorMessage = $_.Exception.Message
$ErrorMessage
}#Catch
}#PROCESS
END{
}#END
}#Function
# SIG # Begin signature block
# MIIIaAYJKoZIhvcNAQcCoIIIWTCCCFUCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUS6no0zX5YuzMHPP94tAJJb1v
# k++gggXMMIIFyDCCBLCgAwIBAgITHwAAAAKXhlLnQ34QXwAAAAAAAjANBgkqhkiG
# 9w0BAQsFADBOMRIwEAYKCZImiZPyLGQBGRYCYXUxEzARBgoJkiaJk/IsZAEZFgNv
# cmcxFDASBgoJkiaJk/IsZAEZFgRBQklPMQ0wCwYDVQQDEwRDQ1JUMB4XDTE4MDcy
# MDAzNDczMFoXDTIwMDcyMDAzNTczMFowZzESMBAGCgmSJomT8ixkARkWAmF1MRMw
# EQYKCZImiZPyLGQBGRYDb3JnMRQwEgYKCZImiZPyLGQBGRYEQUJJTzEOMAwGA1UE
# AxMFVXNlcnMxFjAUBgNVBAMTDUFkbWluaXN0cmF0b3IwggEiMA0GCSqGSIb3DQEB
# AQUAA4IBDwAwggEKAoIBAQCNq7s560Wz2Q/s2pZ3sN2r1u0ldKPpGlhhJnzdJMra
# kHKybnUbRB76TY5VBN6t3FDrBMN7qV31gWKn5GHveppDS6gZHVJGQNEcAREpaGgy
# tewEkpmyY7toNSdXn7ydvlqql1AGGu2kGNFA5jEaOqHfm4Nw+Mt0EBfkXXKjSWB5
# 6+0a44feZiAfaGnNUbDq/5P8zgPvnNnrOuKRuagjPy3AehDElk19fDK9ZKOMzu4S
# 11QbPS8Pppc9hOi956d/HysPdKfaCC7UFBlrMagRAOi7M4MDS3JB4heZ5iBcEIBZ
# l7QY6m2NH103YDZ1xUl2cobo196XCiUObCIpZQzbliYPAgMBAAGjggKEMIICgDA9
# BgkrBgEEAYI3FQcEMDAuBiYrBgEEAYI3FQiD9+NKhIacS4eBnT+Gz8FFhKz9TEeB
# vf4ZhaODBgIBZAIBBTATBgNVHSUEDDAKBggrBgEFBQcDAzAOBgNVHQ8BAf8EBAMC
# B4AwGwYJKwYBBAGCNxUKBA4wDDAKBggrBgEFBQcDAzAdBgNVHQ4EFgQU162YALpI
# MdSWjsWIwbV0i4A8gk0wHwYDVR0jBBgwFoAUKVmuscbhxWcRNj/GnF+rJD3Fdwcw
# gcoGA1UdHwSBwjCBvzCBvKCBuaCBtoaBs2xkYXA6Ly8vQ049Q0NSVCxDTj1GT1NB
# VU1FTERDMDEsQ049Q0RQLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNl
# cnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9QUJJTyxEQz1vcmcsREM9YXU/Y2Vy
# dGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3Ry
# aWJ1dGlvblBvaW50MIG5BggrBgEFBQcBAQSBrDCBqTCBpgYIKwYBBQUHMAKGgZls
# ZGFwOi8vL0NOPUNDUlQsQ049QUlBLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2Vz
# LENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9QUJJTyxEQz1vcmcsREM9
# YXU/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNlcnRpZmljYXRpb25B
# dXRob3JpdHkwNAYDVR0RBC0wK6ApBgorBgEEAYI3FAIDoBsMGUFkbWluaXN0cmF0
# b3JAQUJJTy5vcmcuYXUwDQYJKoZIhvcNAQELBQADggEBAFh89pk6ZQf/o99v1yip
# YpDd1FO3R8aRJIOCVAIrkcY/lWngUPzCftxU3qRMwltFLn7qHIApi1U3H7MAvvBG
# GLvEkJUVI1tXg9NqowwLSggPhtzRH/T/G404UL3c3wRFOqm3ctj66FfqIY2JJRds
# UeX6divBXz6SRYfMko+Yedu7xoab/Uz7FHgQ37NZb6Jn+iqanrty88stDSnSy0Zv
# EvnZkUx1BY3ObVUPht4U/SWYS/O2QoK7AOO2SJMOBHIFDB+nlrB4bKwfAe50bGfG
# x4cGstq3EpBRpHh79A3mFhvjOYrCHMkuo+TKeBD8lKbzatq26rhKYnlskWPH8092
# tu0xggIGMIICAgIBATBlME4xEjAQBgoJkiaJk/IsZAEZFgJhdTETMBEGCgmSJomT
# 8ixkARkWA29yZzEUMBIGCgmSJomT8ixkARkWBEFCSU8xDTALBgNVBAMTBENDUlQC
# Ex8AAAACl4ZS50N+EF8AAAAAAAIwCQYFKw4DAhoFAKB4MBgGCisGAQQBgjcCAQwx
# CjAIoAKAAKECgAAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGC
# NwIBCzEOMAwGCisGAQQBgjcCARUwIwYJKoZIhvcNAQkEMRYEFB54dYskMy4AeGIB
# 8G46uzlZP8cOMA0GCSqGSIb3DQEBAQUABIIBAASuCl9lOHm34kfIZfxyAuujlaYR
# BOGgOH63QaIN/a0gwsQLz+2H7HqtQql5bG1fB8ScymoYVmcrFv0R68oI8TBnIp4k
# 2GIzHupN0aXD5HgspLI5H1w42liYZ41H16U7NNCAEkW9r5wVxvOs7gcakUW918yM
# MPHpY4nYHJVbGlSQgmBvkUQH3ZVRy3fmQm6Y9Z6ZJ0KeC4VclgtEdllSr2EqMkUx
# AqWOid/93RSWt3qLJcq6LA4o2GEYhBHZy7cj15YcIrg97NCKxZTmkuDOLD8pBymK
# cqnWVTc0OYQgcSAkrRMLMXECZ9pE7QSAAcPJpNRY5U0LFbZc6X01POL9OnE=
# SIG # End signature block
|
Update-SPADFSUrlEndpoint.ps1 | ADFSConfigurationTools-1.0.0.1 | Function Update-SPADFSUrlEndpoint {
# .ExternalHelp .\Update-SPADFSUrlEndpoint.xml
[cmdletbinding(SupportsShouldProcess)]
param(
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$PrimaryADFSServer,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$CurrentFederatedDomainURL,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$NewFederatedDomainURL,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string[]]$FederatedDomains,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$NewFederatedDisplayName,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$MsolUserName,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$MsolPassword,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$DomainUsername,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$DomainPassword,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$CertificateThumbprint,
[parameter(ValueFromPipeline=$false,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[ValidateScript( {Test-Path $_ -PathType Container})]
[string]$LogFilePath,
[parameter(ValueFromPipeline=$false,ValueFromPipelineByPropertyName=$true,Mandatory=$false)]
[switch]$MultiDomainSupportEnabled
)
BEGIN{
$SecureCred = New-MsolSecurePassword -UserName $MsolUserName -KeyFile "$LogFilePath\keyfile.txt" -PlainTextPassword $MsolPassword -PasswordFile "$LogFilePath\SecurePass.txt" -Byte 32 -ErrorAction Stop
$DomainCred = New-MsolSecurePassword -UserName $DomainUsername -KeyFile "$LogFilePath\Domainkeyfile.txt" -PlainTextPassword $DomainPassword -PasswordFile "$LogFilePath\DomainSecurePass.txt" -Byte 32 -ErrorAction Stop
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Opening: Powershell Session to $($PrimaryADFSServer)"
$ADFSPSSession = New-PSSession -ComputerName $PrimaryADFSServer
Function Get-ADFSCurrentServiceProperties {
param(
[object]$ADFSSession,
[String]$LogFilePath,
[boolean]$AdfsUpdateStatus
)
$CurrentADFSProerties = Invoke-Command -Session $ADFSPSSession -ScriptBlock {
Get-AdfsProperties | Select-Object *
} -ErrorAction Stop
if($AdfsUpdateStatus -eq $False){
$CurrentADFSProerties | Tee-Object -FilePath "$($logFilePath)\CurrentADFSProperties_$($date).log" -Append
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Creating: Current ADFS properties written to log file $($logFilePath)\CurrentADFSProperties_$($date).log"
}#IF_End
else{
$CurrentADFSProerties | Tee-Object -FilePath "$($logFilePath)\UpdatedADFSProperties_$($date).log" -Append
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Creating: Updated ADFS properties written to log file $($logFilePath)\UpdatedADFSProperties_$($date).log"
}#Eles_EnD
}#End_SubFunction_Get-ADFSCurrentServiceProperties
Function Get-ADFSCertificateStatus {
param(
[object]$ADFSSession,
[String]$LogFilePath,
[boolean]$AdfsCertUpdateStatus
)
$CurrentADFSCertificateStatus = Invoke-Command -Session $ADFSPSSession -ScriptBlock {
Get-AdfsSslCertificate | Select-Object *
} -ErrorAction Stop
if($AdfsCertUpdateStatus -eq $False){
$CurrentADFSCertificateStatus | Tee-Object -FilePath "$($logFilePath)\CurrentADFSSSLCertificateStatus_$($date).log" -Append
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Creating: Current ADFS certificate status written to log file $($logFilePath)\CurrentADFSSSLCertificateStatus_$($date).log"
}#IF_End
else{
$CurrentADFSCertificateStatus | Tee-Object -FilePath "$($logFilePath)\UpdatedADFSSSLCertificateStatus_$($date).log" -Append
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Creating: Updated ADFS certificate status written to log file $($logFilePath)\UpdatedADFSSSLCertificateStatus_$($date).log"
}#Eles_EnD
}#End_SubFunction_Get-ADFSCurrentServiceProperties
Function Get-AdfsCommunicationCertificateStatus {
param(
[object]$ADFSSession,
[String]$LogFilePath,
[boolean]$AdfsComCertStatus
)
$CurrentADFSComCertStatus = Invoke-Command -Session $ADFSPSSession -ScriptBlock {
Get-AdfsCertificate | Select-Object *
} -ErrorAction Stop
if($AdfsComCertStatus -eq $False){
$CurrentADFSComCertStatus | Tee-Object -FilePath "$($logFilePath)\CurrentADFSComCert_$($date).log" -Append
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Creating: Current ADFS communication certificate status written to log file $($logFilePath)\CurrentADFSComCert_$($date).log"
}#IF_End
else{
$CurrentADFSComCertStatus | Tee-Object -FilePath "$($logFilePath)\UpdatedADFSComCert_$($date).log" -Append
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Creating: Updated ADFS communication certificate status written to log file $($logFilePath)\UpdatedADFSComCert_$($date).log"
}#Eles_EnD
}#END_Function_Get-AdfsCommunicationCertificateStatus
Function Get-ADFSCertificateBindingStaus {
param(
[object]$ADFSSession,
[String]$LogFilePath,
[boolean]$AdfsCertBindingStatus
)
$CurrentADFSCertificateBinding = Invoke-Command -Session $ADFSPSSession -ScriptBlock {
netsh http show sslcert
} -ErrorAction Stop | Out-Null
if($AdfsCertBindingStatus -eq $False){
$CurrentADFSCertificateBinding | Tee-Object -FilePath "$($logFilePath)\CurrentADFSCertificateBinding$($date).log" -Append
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Creating: Current ADFS certificate binding status written to log file $($logFilePath)\CurrentADFSSSLCertificateStatus_$($date).log"
}#IF_End
else{
$CurrentADFSCertificateBinding | Tee-Object -FilePath "$($logFilePath)\UpdatedADFSCertificateBinding$($date).log" -Append
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Creating: Updated ADFS certificate binding status written to log file $($logFilePath)\UpdatedADFSSSLCertificateStatus_$($date).log"
}#Eles_EnD
}#ENd_SubFunction_Get-ADFSCertificateBindingStatus
}#BEGIN
PROCESS{
TRY{
if($PSCmdlet.ShouldProcess("$($PrimaryADFSServer)")){
$Date = (get-date).ToString("ddMMyyyy_hh_mm_ss")
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: Current ADFS properties on $($PrimaryADFSServer)"
Get-ADFSCurrentServiceProperties -ADFSSession $ADFSPSSession -LogFilePath $LogFilePath -AdfsUpdateStatus $False | Out-Null
if($PSCmdlet.ShouldContinue("BEGIN STEP 01 ?", "Service interruptions can occur during ADFS URL Update to $($NewFederatedDomainURL)")){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: STEP01 - START"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: STEP01 - ADFS server $($PrimaryADFSServer) with new URL information"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: STEP01 - ADFS DisplayName to $($NewFederatedDisplayName)"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: STEP01 - ADFS Hostname to $($NewFederatedDomainURL)"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: STEP01 - ADFS Identifier to http://$($NewFederatedDomainURL)/adfs/services/trust"
Invoke-Command -Session $ADFSPSSession -ScriptBlock {
Set-AdfsProperties -DisplayName $args[0] -hostname $args[1] -Identifier $args[2]
} -ArgumentList $($NewFederatedDisplayName), $($NewFederatedDomainURL), "http://$($NewFederatedDomainURL)/adfs/services/trust" -ErrorAction Stop | Out-Null
Get-ADFSCurrentServiceProperties -ADFSSession $ADFSPSSession -LogFilePath $LogFilePath -AdfsUpdateStatus $true | Out-Null
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] COMPLETE: STEP01 COMPLETE"
}#Confirm
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: Current ADFS certificate status on $($PrimaryADFSServer)"
Get-ADFSCertificateStatus -ADFSSession $ADFSPSSession -AdfsCertUpdateStatus $False -LogFilePath $LogFilePath | Out-Null
if($PSCmdlet.ShouldContinue("BEGIN STEP02 ?", "Service interruptions can occur during ADFS Certificate Update to $($NewFederatedDomainURL)")){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: STEP02 - START"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: STEP02 - ADFS server $($PrimaryADFSServer) with new SSL Certificate using thumbprint $($CertificateThumbprint)"
Invoke-Command -Session $ADFSPSSession -ScriptBlock {
Set-AdfsSslCertificate -Thumbprint $args[0]
} -ArgumentList $CertificateThumbprint -ErrorAction Stop
Get-ADFSCertificateStatus -ADFSSession $ADFSPSSession -AdfsCertUpdateStatus $true -LogFilePath $LogFilePath | Out-Null
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] COMPLETE: STEP02 COMPLETE"
}#Confirm
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: Current ADFS Service Communication, Token Signing/Decrypting certificate status on $($PrimaryADFSServer)"
Get-AdfsCommunicationCertificateStatus -ADFSSession $ADFSPSSession -LogFilePath $LogFilePath -AdfsComCertStatus $false | Out-Null
if($PSCmdlet.ShouldContinue("BEGIN STEP03", "Service interruptions can occur during ADFS Communication Certificate Update to $($NewFederatedDomainURL)")){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: STEP03 - START"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: STEP03 - ADFS server $($PrimaryADFSServer) with new SSL Certificate using thumbprint $($CertificateThumbprint)"
Invoke-Command -Session $ADFSPSSession -ScriptBlock {
Set-AdfsCertificate -CertificateType Service-Communications -Thumbprint $args[0]
Update-AdfsCertificate -Urgent
} -ArgumentList $CertificateThumbprint -ErrorAction Stop
Get-AdfsCommunicationCertificateStatus -ADFSSession $ADFSPSSession -AdfsComCertStatus $true -LogFilePath $LogFilePath | Out-Null
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] COMPLETE: STEP03 COMPLETE"
}#Confirm
if($PSCmdlet.ShouldContinue("BEGIN STEP04 ?", "ADFS services will be offline until all remaining tasks are completed")){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: STEP04 - START"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] ServiceRestart: STEP04 restarting Adfssrv service on $($PrimaryADFSServer)"
Invoke-Command -Session $ADFSPSSession -ScriptBlock {Get-Service adfssrv | Restart-Service} -ErrorAction Stop
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] COMPLETE: STEP04 - COMPLETE"
}#Confirm
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: Current ADFS communication certificate status on $($PrimaryADFSServer)"
Get-ADFSCertificateBindingStaus -ADFSSession $ADFSPSSession -AdfsCertUpdateStatus $False | Out-Null
if($PSCmdlet.ShouldContinue("BEGIN STEP05 ?", "Removing SSL binding from domain $($CurrentFederatedDomainURL)")){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: STEP05 - START"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Removing: STEP05 - SSL binding $($PrimaryADFSServer)"
$URL1 = "netsh http delete sslcert hostnameport=$($CurrentFederatedDomainURL):443"
$URL2 = "netsh http delete sslcert hostnameport=$($CurrentFederatedDomainURL):49443"
Invoke-Command -Session $ADFSPSSession -ScriptBlock {
& cmd /c $args[0]
& cmd /c $args[1]
} -ArgumentList $URL1, $URL2 -ErrorAction Stop | Out-Null
Get-ADFSCertificateBindingStaus -ADFSSession $ADFSPSSession -AdfsCertUpdateStatus $True | Out-Null
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] COMPLETE: STEP05 COMPLETE"
}#Confirm
if($PSCmdlet.ShouldContinue("BEGIN STEP06 ?", "Updating Domains on Microsoft Online")){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: STEP06 - START"
foreach ($FederatedDomain in $FederatedDomains){
if($MultiDomainSupportEnabled.IsPresent){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: STEP06 $($FederatedDomain) on Microsoft Office365"
Invoke-Command -Session $ADFSPSSession -ScriptBlock `
{
Set-MsolADFSContext -Computer $Args[2] -ADFSUserCredentials $Args[3]
Connect-MsolService -Credential $Args[0]
Update-MsolFederatedDomain -domainName $Args[1] -SupportMultipleDomain
Get-Service adfssrv | Restart-Service
} -ArgumentList $SecureCred, $FederatedDomain, $PrimaryADFSServer, $DomainCred -ErrorAction Stop
}#END_IF
else{
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: STEP06 $($FederatedDomain) on Microsoft Office365"
Invoke-Command -Session $ADFSPSSession -ScriptBlock `
{
Set-MsolADFSContext -Computer $Args[2] -ADFSUserCredentials $Args[3]
Connect-MsolService -Credential $Args[0]
Update-MsolFederatedDomain -domainName $Args[1]
Get-Service adfssrv | Restart-Service
} -ArgumentList $SecureCred, $FederatedDomain, $PrimaryADFSServer, $DomainCred -ErrorAction Stop
}#else
}#Forech_END
}#Config
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] COMPLETE: STEP06 - COMPLETE"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] ServiceRestart: STEP07 Restarting Adfssrv service on $($PrimaryADFSServer)"
Invoke-Command -Session $ADFSPSSession -ScriptBlock {Get-Service adfssrv | Restart-Service} -ErrorAction Stop
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] ServiceRestart: STEP07 COMPLETE)"
}#IF_END
}#Try
Catch{
$ErrorMessage = $_.Exception.Message
$ErrorMessage
}#catch
}#PROCESS
END{
Write-Verbose "[$((get-date).TimeOfDay.ToString()) END ] Remove: Removing PSSessions on $($PrimaryADFSServer)"
$ADFSPSSession | Remove-PSSession
Write-Verbose "[$((get-date).TimeOfDay.ToString()) END ] Testing: Testing Updated ADFS URL https://$($NewFederatedDomainURL)/adfs/ls/idpinitiatedsignon.htm"
$ADFSTestStatus = Invoke-WebRequest -Uri https://$($NewFederatedDomainURL)/adfs/ls/idpinitiatedsignon.htm -ErrorAction SilentlyContinue
if($($ADFSTestStatus.StatusDescription) -eq "OK"){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) END ] Testing: Test from Internal to ADFS URL https://$($NewFederatedDomainURL)/adfs/ls/idpinitiatedsignon.htm Successful"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) END ] Information: Update Web Application Proxy servers if in use"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) END ] Information: URL Update completed, Microsoft Online Services can take between 10 - 30 Mins to update settings"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) END ] COMPLETE: Task Complete"
}#IF_END
else{
Write-Error -Message "Test Failed to https://$($NewFederatedDomainURL)/adfs/ls/idpinitiatedsignon.htm, Check ADFS configuration settings and log files"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) END ] COMPLETE: Task Complete"
}#Else_END
}#END
}#Function
# SIG # Begin signature block
# MIIIaAYJKoZIhvcNAQcCoIIIWTCCCFUCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQU+qF0KsJN6bmFKVSNoXWZA+Rh
# U9agggXMMIIFyDCCBLCgAwIBAgITHwAAAAKXhlLnQ34QXwAAAAAAAjANBgkqhkiG
# 9w0BAQsFADBOMRIwEAYKCZImiZPyLGQBGRYCYXUxEzARBgoJkiaJk/IsZAEZFgNv
# cmcxFDASBgoJkiaJk/IsZAEZFgRBQklPMQ0wCwYDVQQDEwRDQ1JUMB4XDTE4MDcy
# MDAzNDczMFoXDTIwMDcyMDAzNTczMFowZzESMBAGCgmSJomT8ixkARkWAmF1MRMw
# EQYKCZImiZPyLGQBGRYDb3JnMRQwEgYKCZImiZPyLGQBGRYEQUJJTzEOMAwGA1UE
# AxMFVXNlcnMxFjAUBgNVBAMTDUFkbWluaXN0cmF0b3IwggEiMA0GCSqGSIb3DQEB
# AQUAA4IBDwAwggEKAoIBAQCNq7s560Wz2Q/s2pZ3sN2r1u0ldKPpGlhhJnzdJMra
# kHKybnUbRB76TY5VBN6t3FDrBMN7qV31gWKn5GHveppDS6gZHVJGQNEcAREpaGgy
# tewEkpmyY7toNSdXn7ydvlqql1AGGu2kGNFA5jEaOqHfm4Nw+Mt0EBfkXXKjSWB5
# 6+0a44feZiAfaGnNUbDq/5P8zgPvnNnrOuKRuagjPy3AehDElk19fDK9ZKOMzu4S
# 11QbPS8Pppc9hOi956d/HysPdKfaCC7UFBlrMagRAOi7M4MDS3JB4heZ5iBcEIBZ
# l7QY6m2NH103YDZ1xUl2cobo196XCiUObCIpZQzbliYPAgMBAAGjggKEMIICgDA9
# BgkrBgEEAYI3FQcEMDAuBiYrBgEEAYI3FQiD9+NKhIacS4eBnT+Gz8FFhKz9TEeB
# vf4ZhaODBgIBZAIBBTATBgNVHSUEDDAKBggrBgEFBQcDAzAOBgNVHQ8BAf8EBAMC
# B4AwGwYJKwYBBAGCNxUKBA4wDDAKBggrBgEFBQcDAzAdBgNVHQ4EFgQU162YALpI
# MdSWjsWIwbV0i4A8gk0wHwYDVR0jBBgwFoAUKVmuscbhxWcRNj/GnF+rJD3Fdwcw
# gcoGA1UdHwSBwjCBvzCBvKCBuaCBtoaBs2xkYXA6Ly8vQ049Q0NSVCxDTj1GT1NB
# VU1FTERDMDEsQ049Q0RQLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNl
# cnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9QUJJTyxEQz1vcmcsREM9YXU/Y2Vy
# dGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3Ry
# aWJ1dGlvblBvaW50MIG5BggrBgEFBQcBAQSBrDCBqTCBpgYIKwYBBQUHMAKGgZls
# ZGFwOi8vL0NOPUNDUlQsQ049QUlBLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2Vz
# LENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9QUJJTyxEQz1vcmcsREM9
# YXU/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNlcnRpZmljYXRpb25B
# dXRob3JpdHkwNAYDVR0RBC0wK6ApBgorBgEEAYI3FAIDoBsMGUFkbWluaXN0cmF0
# b3JAQUJJTy5vcmcuYXUwDQYJKoZIhvcNAQELBQADggEBAFh89pk6ZQf/o99v1yip
# YpDd1FO3R8aRJIOCVAIrkcY/lWngUPzCftxU3qRMwltFLn7qHIApi1U3H7MAvvBG
# GLvEkJUVI1tXg9NqowwLSggPhtzRH/T/G404UL3c3wRFOqm3ctj66FfqIY2JJRds
# UeX6divBXz6SRYfMko+Yedu7xoab/Uz7FHgQ37NZb6Jn+iqanrty88stDSnSy0Zv
# EvnZkUx1BY3ObVUPht4U/SWYS/O2QoK7AOO2SJMOBHIFDB+nlrB4bKwfAe50bGfG
# x4cGstq3EpBRpHh79A3mFhvjOYrCHMkuo+TKeBD8lKbzatq26rhKYnlskWPH8092
# tu0xggIGMIICAgIBATBlME4xEjAQBgoJkiaJk/IsZAEZFgJhdTETMBEGCgmSJomT
# 8ixkARkWA29yZzEUMBIGCgmSJomT8ixkARkWBEFCSU8xDTALBgNVBAMTBENDUlQC
# Ex8AAAACl4ZS50N+EF8AAAAAAAIwCQYFKw4DAhoFAKB4MBgGCisGAQQBgjcCAQwx
# CjAIoAKAAKECgAAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGC
# NwIBCzEOMAwGCisGAQQBgjcCARUwIwYJKoZIhvcNAQkEMRYEFE+U0chPm0A85QbB
# 2F+TKYw2RRDwMA0GCSqGSIb3DQEBAQUABIIBAEE/8hUVhVSemFxKA5jaa2LCVlcG
# QW2WDawI9BGBIY2kCGFbwma6z/Wij14SvhSntExYxD9fJA/WzV/7yv4ALWpYeF6s
# 3fPg+ikdHwkb1Y15Dk+i+BrvAwYgxL+3DeqDNBosystE3SSV/ntVEhxnNlGxppXF
# y/1GdpTcgeWkyjjcNDoP2fKIyaJh06tl0J7lrzYQsPxtGpYNFpb4BGHX778h/t2x
# 74GlwEcwin6sLlPHrl3I/ys5QEbn+Pmwf/37eo4DNP9OEtHQCetWztPlSqltauwe
# xln94y5aniYK2rYMFWvsULDWBP3xXK26CRqyaxNDwKIxPvL8GozX6jMzjmA=
# SIG # End signature block
|
Set-SPAdUserEmailAddressInformation.ps1 | ADFSConfigurationTools-1.0.0.1 |
Function Set-SPADUserEmailAddressInformation {
# .ExternalHelp .\Set-SPADUserEmailAddressInformation.xml
[CmdletBinding(SupportsShouldProcess)]
param(
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true,ParameterSetName="ByUserName")]
[String]$UserName,
[parameter(ValueFromPipeline=$False,ValueFromPipelineByPropertyName=$true,Mandatory=$true,ParameterSetName="ByOU")]
[String]$SearchBase,
[parameter(ValueFromPipeline=$false,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[String]$NewSMTPDomain,
[parameter(ValueFromPipeline=$False,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[String]$CurrentSMTPDomain,
[switch]$EnableCurrentSMTPAlias,
[switch]$ForceUpdateIfEmpty
)
BEGIN{
Write-Verbose "[$((get-date).TimeOfDay.ToString()) BEGIN ] Starting: $($MyInvocation.MyCommand)"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) BEGIN ] PSVersion = $($PSVersionTable.PSVersion)"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) BEGIN ] OS = $((Get-wmiobject win32_OperatingSystem).Caption)"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) BEGIN ] User = $($env:userdomain)\$($env:USERNAME)"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) BEGIN ] Is Admin = $IsAdmin"
Import-module ActiveDirectory -Verbose:$false
}#BEGIN
PROCESS{
TRY{
if($UserName){
$UserInfo = Get-ADUser -Identity $UserName -Properties Name, SamAccountName, EmailAddress, ProxyAddresses
}#EndiIF
elseif($SearchBase){
$UserInfo = Get-ADUser -Filter * -SearchBase $SearchBase -Properties Name, SamAccountName, EmailAddress, ProxyAddresses
}#EndElseIF
foreach ($ADUserInfo in $UserInfo){
if($PSCmdlet.ShouldProcess($($ADUserInfo.SamAccountName))){
#Check UserEmailAddress
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: User $($AdUserInfo.Name) email address"
$PEmailPresent = $False
$CEmailPresent = $False
$OEmailPresent = $False
if($AdUserInfo.EmailAddress -ieq ("$($AdUserInfo.SamAccountName)$($NewSMTPDomain)")){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Skipping: Email address detected $($AdUserInfo.EmailAddress) skipping email address update"
$PEmailPresent = $true
}#END_IFF
elseif($AdUserInfo.EmailAddress -ieq ("$($AdUserInfo.SamAccountName)$($NewSMTPDomain)")){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: Current email address detected $($AdUserInfo.EmailAddress)"
$CEmailPresent = $true
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: email from $($AdUserInfo.EmailAddress) to "$($AdUserInfo.SamAccountName)$($NewSMTPDomain)""
Set-AdUser -Identity $ADUserInfo.SamAccountName -EmailAddress ("$($AdUserInfo.SamAccountName)$($NewSMTPDomain)")
}#End_ElseIF
else{
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: email address detected $($AdUserInfo.EmailAddress)"
$OEmailPresent = $True
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: email from $($AdUserInfo.EmailAddress) to $($AdUserInfo.SamAccountName)$($NewSMTPDomain)"
Set-AdUser -Identity $ADUserInfo.SamAccountName -EmailAddress ("$($AdUserInfo.SamAccountName)$($NewSMTPDomain)")
}#EndElse
#Check if New PrimarySMTP address and proxy address
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: User $($AdUserInfo.Name) for primary Proxy email address"
$PSMTPProxyPresent = $False
$CSMTPProxyPresent = $False
$OSMTPProxyPresent = $False
$NoSMTPProxyPresent = $False
$UpdateUser = $False
if($ForceUpdateIfEmpty.IsPresent -and $($ADUserInfo.ProxyAddresses).count -eq 0){
$NoSMTPProxyPresent = $true
}#END_IF
foreach ($ProxyAttribute in $ADUserInfo.ProxyAddresses){
if($ProxyAttribute.StartsWith("SMTP:")){
if($ProxyAttribute -ieq ("SMTP:$($AdUserInfo.SamAccountName)$($NewSMTPDomain)")){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: New primary SMTP address detected $($ProxyAttribute)"
$PSMTPProxyPresent = $true
}#END_IF
elseif($ProxyAttribute -ieq ("SMTP:$($AdUserInfo.SamAccountName)$($CurrentSMTPDomain)")){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: Current primary SMTP address detected $($ProxyAttribute)"
$CSMTPProxyPresent = $true
}#ElseIF
else{
$OSMTPProxyPresent = $true
}#Else
}#EndIF
}#ForeachProxyAddress
if(($CSMTPProxyPresent -eq $true) -and ($PSMTPProxyPresent -eq $False) -and ($($OSMTPProxyPresent -eq $False))){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Removing: Removing current primary SMTP address SMTP:$($AdUserInfo.SamAccountName)$($CurrentSMTPDomain)"
$ADUserInfo.ProxyAddresses.remove("SMTP:$($AdUserInfo.SamAccountName)$($CurrentSMTPDomain)")
$ADUserInfo.ProxyAddresses.Add("SMTP:$($AdUserInfo.SamAccountName)$($NewSMTPDomain)")
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Removing: Proxy address SMTP:$($AdUserInfo.SamAccountName)$CurrentSMTPDomain"
Set-ADUser -Identity $AdUserInfo.SamAccountName -Remove @{proxyAddresses="SMTP:"+$($AdUserInfo.SamAccountName)+$CurrentSMTPDomain}
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Removing: Proxy address smtp:$($AdUserInfo.SamAccountName)$NewSMTPDomain if exists"
Set-ADUser -Identity $AdUserInfo.SamAccountName -Remove @{proxyAddresses="smtp:"+$($AdUserInfo.SamAccountName)+$NewSMTPDomain} -ErrorAction SilentlyContinue
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Adding: New Primary SMTP address SMTP:$($AdUserInfo.SamAccountName)$($NewSMTPDomain)"
Set-ADUser -Identity $AdUserInfo.SamAccountName -add @{proxyAddresses="SMTP:"+$($AdUserInfo.SamAccountName)+$NewSMTPDomain}
if($EnableCurrentSMTPAlias.IsPresent){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Adding: Current SMTP address smtp:$($AdUserInfo.SamAccountName)$($CurrentSMTPDomain) as alias"
Set-ADUser -Identity $AdUserInfo.SamAccountName -Add @{proxyAddresses="smtp:"+$($AdUserInfo.SamAccountName)+$CurrentSMTPDomain}
}#End_SubIF
}#ENDIF
elseif($NoSMTPProxyPresent -eq $true){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Adding: New primary SMTP address SMTP:$($AdUserInfo.SamAccountName)$($NewSMTPDomain)"
Set-ADUser -Identity $AdUserInfo.SamAccountName -add @{proxyAddresses="SMTP:"+$($AdUserInfo.SamAccountName)+$NewSMTPDomain}
if($EnableCurrentSMTPAlias.IsPresent){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Adding: Current SMTP address smtp:$($AdUserInfo.SamAccountName)$($CurrentSMTPDomain) as alias"
Set-ADUser -Identity $AdUserInfo.SamAccountName -Add @{proxyAddresses="smtp:"+$($AdUserInfo.SamAccountName)+$CurrentSMTPDomain}
}#End_SubIF
}#End_elseIF
elseif(($PSMTPProxyPresent -eq $true) -and ($CSMTPProxyPresent -eq $false) -and ($OSMTPProxyPresent -eq $False)){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Skipping: New primary SMTP address detected SMTP:$($AdUserInfo.SamAccountName)$($NewSMTPDomain)"
$UpdateUser = $False
}#End_elseIF
}#END_IF
}#Foreach
}#TRY
Catch{
$ErrorMessage = $_.Exception.Message
$ErrorMessage
}#Catch
}#PROCESS
}#Function
# SIG # Begin signature block
# MIIIaAYJKoZIhvcNAQcCoIIIWTCCCFUCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUDP+oVxmkIAQx6xZ+RbIMVWSr
# 0L6gggXMMIIFyDCCBLCgAwIBAgITHwAAAAKXhlLnQ34QXwAAAAAAAjANBgkqhkiG
# 9w0BAQsFADBOMRIwEAYKCZImiZPyLGQBGRYCYXUxEzARBgoJkiaJk/IsZAEZFgNv
# cmcxFDASBgoJkiaJk/IsZAEZFgRBQklPMQ0wCwYDVQQDEwRDQ1JUMB4XDTE4MDcy
# MDAzNDczMFoXDTIwMDcyMDAzNTczMFowZzESMBAGCgmSJomT8ixkARkWAmF1MRMw
# EQYKCZImiZPyLGQBGRYDb3JnMRQwEgYKCZImiZPyLGQBGRYEQUJJTzEOMAwGA1UE
# AxMFVXNlcnMxFjAUBgNVBAMTDUFkbWluaXN0cmF0b3IwggEiMA0GCSqGSIb3DQEB
# AQUAA4IBDwAwggEKAoIBAQCNq7s560Wz2Q/s2pZ3sN2r1u0ldKPpGlhhJnzdJMra
# kHKybnUbRB76TY5VBN6t3FDrBMN7qV31gWKn5GHveppDS6gZHVJGQNEcAREpaGgy
# tewEkpmyY7toNSdXn7ydvlqql1AGGu2kGNFA5jEaOqHfm4Nw+Mt0EBfkXXKjSWB5
# 6+0a44feZiAfaGnNUbDq/5P8zgPvnNnrOuKRuagjPy3AehDElk19fDK9ZKOMzu4S
# 11QbPS8Pppc9hOi956d/HysPdKfaCC7UFBlrMagRAOi7M4MDS3JB4heZ5iBcEIBZ
# l7QY6m2NH103YDZ1xUl2cobo196XCiUObCIpZQzbliYPAgMBAAGjggKEMIICgDA9
# BgkrBgEEAYI3FQcEMDAuBiYrBgEEAYI3FQiD9+NKhIacS4eBnT+Gz8FFhKz9TEeB
# vf4ZhaODBgIBZAIBBTATBgNVHSUEDDAKBggrBgEFBQcDAzAOBgNVHQ8BAf8EBAMC
# B4AwGwYJKwYBBAGCNxUKBA4wDDAKBggrBgEFBQcDAzAdBgNVHQ4EFgQU162YALpI
# MdSWjsWIwbV0i4A8gk0wHwYDVR0jBBgwFoAUKVmuscbhxWcRNj/GnF+rJD3Fdwcw
# gcoGA1UdHwSBwjCBvzCBvKCBuaCBtoaBs2xkYXA6Ly8vQ049Q0NSVCxDTj1GT1NB
# VU1FTERDMDEsQ049Q0RQLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNl
# cnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9QUJJTyxEQz1vcmcsREM9YXU/Y2Vy
# dGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3Ry
# aWJ1dGlvblBvaW50MIG5BggrBgEFBQcBAQSBrDCBqTCBpgYIKwYBBQUHMAKGgZls
# ZGFwOi8vL0NOPUNDUlQsQ049QUlBLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2Vz
# LENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9QUJJTyxEQz1vcmcsREM9
# YXU/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNlcnRpZmljYXRpb25B
# dXRob3JpdHkwNAYDVR0RBC0wK6ApBgorBgEEAYI3FAIDoBsMGUFkbWluaXN0cmF0
# b3JAQUJJTy5vcmcuYXUwDQYJKoZIhvcNAQELBQADggEBAFh89pk6ZQf/o99v1yip
# YpDd1FO3R8aRJIOCVAIrkcY/lWngUPzCftxU3qRMwltFLn7qHIApi1U3H7MAvvBG
# GLvEkJUVI1tXg9NqowwLSggPhtzRH/T/G404UL3c3wRFOqm3ctj66FfqIY2JJRds
# UeX6divBXz6SRYfMko+Yedu7xoab/Uz7FHgQ37NZb6Jn+iqanrty88stDSnSy0Zv
# EvnZkUx1BY3ObVUPht4U/SWYS/O2QoK7AOO2SJMOBHIFDB+nlrB4bKwfAe50bGfG
# x4cGstq3EpBRpHh79A3mFhvjOYrCHMkuo+TKeBD8lKbzatq26rhKYnlskWPH8092
# tu0xggIGMIICAgIBATBlME4xEjAQBgoJkiaJk/IsZAEZFgJhdTETMBEGCgmSJomT
# 8ixkARkWA29yZzEUMBIGCgmSJomT8ixkARkWBEFCSU8xDTALBgNVBAMTBENDUlQC
# Ex8AAAACl4ZS50N+EF8AAAAAAAIwCQYFKw4DAhoFAKB4MBgGCisGAQQBgjcCAQwx
# CjAIoAKAAKECgAAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGC
# NwIBCzEOMAwGCisGAQQBgjcCARUwIwYJKoZIhvcNAQkEMRYEFAgMcG1XJ3JJcf0J
# JIRluSJc9QpyMA0GCSqGSIb3DQEBAQUABIIBADPN1W+F/kg2bPiyvwVh2To4U21u
# HL+9aBxmoBLBiYKzTijcyrZWAeNwGfT7mf23LERRcU/VjXFef+dP+bDml/o+2tPe
# qXUcYkohRrOogu19Bki9VqZjq8CEsUhDQqdl+fCnFcFFxB+2kSdq0LItxa3ZOc5r
# 0bSF4wI4hM3E8sFujSs65RfJ4mzIMyHNWWsP7DBRKR1zH0nCEvqwQWDUjrq2mNPy
# ei8OL/AmE8rKIfV8wysxSY4gZelrvBy0GKCnrMoYOChggcgbgOCoP6Fa8ygHmpLv
# GQaMZYY+Pxyxt1GsUE28NjxjID0U8gZKq2JHELO0+kgOMyVH3pXGqJtexFc=
# SIG # End signature block
|
Set-AdUserUPNInformation.ps1 | ADFSConfigurationTools-1.0.0.1 | Function Set-AdUserUPNInformation {
[cmdletbinding(supportsshouldprocess)]
param(
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true,ParameterSetName="ByUsername")]
[string]$UserName,
[parameter(ValueFromPipeline=$false,ValueFromPipelineByPropertyName=$true,Mandatory=$true,ParameterSetName="BySearchBase")]
[string]$SearchBase,
[parameter(ValueFromPipeline=$false,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$Domain
)
BEGIN{
}#End Begin
PROCESS{
if($UserName){
$UserInfo = Get-ADUser -Identity $UserName -Properties Name, SamAccountName, EmailAddress, UserPrincipalName
}#EndiIF
elseif($SearchBase){
$UserInfo = Get-ADUser -Filter * -SearchBase $SearchBase -Properties Name, SamAccountName, EmailAddress, UserPrincipalName
}#EndElseIF
foreach($ADUser in $UserInfo){
if($PSCmdlet.ShouldProcess($ADUser.SamAccountName, "Set new domain UPN $($Domain)")){
Set-Aduser -Identity $ADUser.SamAccountName -UserPrincipalName "$($ADUser.SamAccountName)@$($Domain)"
}#EndIF
}#Foreach
}#End Process
END{
#LeftBlank
}#END
}#End Function
# SIG # Begin signature block
# MIIIaAYJKoZIhvcNAQcCoIIIWTCCCFUCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUUzVniZX3y11X2IrfNBgiSdd0
# +9KgggXMMIIFyDCCBLCgAwIBAgITHwAAAAKXhlLnQ34QXwAAAAAAAjANBgkqhkiG
# 9w0BAQsFADBOMRIwEAYKCZImiZPyLGQBGRYCYXUxEzARBgoJkiaJk/IsZAEZFgNv
# cmcxFDASBgoJkiaJk/IsZAEZFgRBQklPMQ0wCwYDVQQDEwRDQ1JUMB4XDTE4MDcy
# MDAzNDczMFoXDTIwMDcyMDAzNTczMFowZzESMBAGCgmSJomT8ixkARkWAmF1MRMw
# EQYKCZImiZPyLGQBGRYDb3JnMRQwEgYKCZImiZPyLGQBGRYEQUJJTzEOMAwGA1UE
# AxMFVXNlcnMxFjAUBgNVBAMTDUFkbWluaXN0cmF0b3IwggEiMA0GCSqGSIb3DQEB
# AQUAA4IBDwAwggEKAoIBAQCNq7s560Wz2Q/s2pZ3sN2r1u0ldKPpGlhhJnzdJMra
# kHKybnUbRB76TY5VBN6t3FDrBMN7qV31gWKn5GHveppDS6gZHVJGQNEcAREpaGgy
# tewEkpmyY7toNSdXn7ydvlqql1AGGu2kGNFA5jEaOqHfm4Nw+Mt0EBfkXXKjSWB5
# 6+0a44feZiAfaGnNUbDq/5P8zgPvnNnrOuKRuagjPy3AehDElk19fDK9ZKOMzu4S
# 11QbPS8Pppc9hOi956d/HysPdKfaCC7UFBlrMagRAOi7M4MDS3JB4heZ5iBcEIBZ
# l7QY6m2NH103YDZ1xUl2cobo196XCiUObCIpZQzbliYPAgMBAAGjggKEMIICgDA9
# BgkrBgEEAYI3FQcEMDAuBiYrBgEEAYI3FQiD9+NKhIacS4eBnT+Gz8FFhKz9TEeB
# vf4ZhaODBgIBZAIBBTATBgNVHSUEDDAKBggrBgEFBQcDAzAOBgNVHQ8BAf8EBAMC
# B4AwGwYJKwYBBAGCNxUKBA4wDDAKBggrBgEFBQcDAzAdBgNVHQ4EFgQU162YALpI
# MdSWjsWIwbV0i4A8gk0wHwYDVR0jBBgwFoAUKVmuscbhxWcRNj/GnF+rJD3Fdwcw
# gcoGA1UdHwSBwjCBvzCBvKCBuaCBtoaBs2xkYXA6Ly8vQ049Q0NSVCxDTj1GT1NB
# VU1FTERDMDEsQ049Q0RQLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNl
# cnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9QUJJTyxEQz1vcmcsREM9YXU/Y2Vy
# dGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3Ry
# aWJ1dGlvblBvaW50MIG5BggrBgEFBQcBAQSBrDCBqTCBpgYIKwYBBQUHMAKGgZls
# ZGFwOi8vL0NOPUNDUlQsQ049QUlBLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2Vz
# LENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9QUJJTyxEQz1vcmcsREM9
# YXU/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNlcnRpZmljYXRpb25B
# dXRob3JpdHkwNAYDVR0RBC0wK6ApBgorBgEEAYI3FAIDoBsMGUFkbWluaXN0cmF0
# b3JAQUJJTy5vcmcuYXUwDQYJKoZIhvcNAQELBQADggEBAFh89pk6ZQf/o99v1yip
# YpDd1FO3R8aRJIOCVAIrkcY/lWngUPzCftxU3qRMwltFLn7qHIApi1U3H7MAvvBG
# GLvEkJUVI1tXg9NqowwLSggPhtzRH/T/G404UL3c3wRFOqm3ctj66FfqIY2JJRds
# UeX6divBXz6SRYfMko+Yedu7xoab/Uz7FHgQ37NZb6Jn+iqanrty88stDSnSy0Zv
# EvnZkUx1BY3ObVUPht4U/SWYS/O2QoK7AOO2SJMOBHIFDB+nlrB4bKwfAe50bGfG
# x4cGstq3EpBRpHh79A3mFhvjOYrCHMkuo+TKeBD8lKbzatq26rhKYnlskWPH8092
# tu0xggIGMIICAgIBATBlME4xEjAQBgoJkiaJk/IsZAEZFgJhdTETMBEGCgmSJomT
# 8ixkARkWA29yZzEUMBIGCgmSJomT8ixkARkWBEFCSU8xDTALBgNVBAMTBENDUlQC
# Ex8AAAACl4ZS50N+EF8AAAAAAAIwCQYFKw4DAhoFAKB4MBgGCisGAQQBgjcCAQwx
# CjAIoAKAAKECgAAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGC
# NwIBCzEOMAwGCisGAQQBgjcCARUwIwYJKoZIhvcNAQkEMRYEFH6fKI+Rz/UyYk9e
# 3ARU+m++FpEpMA0GCSqGSIb3DQEBAQUABIIBAIibzpMidf/lylH9V1pQnjFVyADJ
# E0KycFiO2O8fS2iF4gZaaofo/tQtH/5eeorccM6EOA3gwhavBHZfiq674P6hIDCF
# UHEjtJ3At+fM0YRD+jlYcW6TtHf1H15j2o+RyNMB+ZzDY0pGr9cdzlo8UmCDVJxI
# DQHLFZTRVBppIMiUCzr8SXEX3axQhG1hx2RZcbHWHrEWgvyqj7YBRKuS/jyhPqsx
# X0YLI9XrAkuaqBiA28SOHwwU/q8FPuKL0DuKG1IVkxCvygklvK8VLKmQHi3GBrGW
# tbnogw+qm/KlxpBh8GoJHZPxCzMcanoY+ULHSsoAGGwHqylAFEfVV/TZwkk=
# SIG # End signature block
|
Enable-SPADFSMultiDomainSupport.ps1 | ADFSConfigurationTools-1.0.0.1 |
Function Enable-SPADFSMultiDomainSupport {
# .ExternalHelp .\Enable-SPADFSMultiDomainSupport.xml
[cmdletbinding(SupportsShouldProcess)]
param(
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[String]$PrimaryADFSServer,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[String]$MsolUserName,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[String]$MsolPassword,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[String]$NewDomainToFederate
)
BEGIN{
$SecureCred = New-MsolSecurePassword -UserName $MsolUserName -KeyFile "$PSScriptRoot\keyfile.txt" -PlainTextPassword $MsolPassword -PasswordFile "$PSScriptRoot\SecurePass.txt" -Byte 32 -ErrorAction Stop
$ADFSPSSession = New-PSSession -ComputerName $PrimaryADFSServer
}
PROCESS{
Try{
$NewFederationSupportStatus += @()
$ADFSCurrentFederatedDomainInfo += @()
$MsolCurrentdDomainInfo += @()
$NewFederationStatus = $false
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Enumerating: Active Federated Domains"
$MsolCurrentdDomainInfo = Invoke-Command -Session $ADFSPSSession -ScriptBlock `
{
Connect-MsolService -Credential $Args[0]
Get-MsolDomain
} -ArgumentList $SecureCred -ErrorAction stop
foreach ($Domain in $MsolCurrentdDomainInfo){
$ADFSCurrentFederatedDomainInfo += $Domain | Where-Object {$_.Authentication -eq "Federated"}
}#Foreach_END
foreach ($FDDoman in $ADFSCurrentFederatedDomainInfo){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Information: Domain $($FDDoman.Name) is $($FDDoman.Authentication)"
}#Foreach_END
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Information: Total Federated Domains found $($ADFSCurrentFederatedDomainInfo.count)"
if($PSCmdlet.ShouldContinue("Temporary Service interruptions will occur during ADFS federation of Domain $($NewDomainToFederate)", 'Confirm ?')){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Removing: Removing Relaying PartyTrust on primary ADFS Server $($PrimaryADFSServer)"
Invoke-Command -ComputerName $PrimaryADFSServer -ScriptBlock `
{
Get-AdfsRelyingPartyTrust | Where-Object {$_.Name -eq "Microsoft office 365 Identity Platform"} | Remove-AdfsRelyingPartyTrust
} -ErrorAction Stop
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Remove: Complete"
foreach($FD in $ADFSCurrentFederatedDomainInfo.Name){
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: Existing federated domain to support Multidomain"
$FDDomainUpdate = Invoke-Command -Session $ADFSPSSession -ScriptBlock `
{
Connect-MsolService -Credential $Args[0]
Update-MsolFederatedDomain -DomainName $Args[1] -SupportMultipledomain
} -ArgumentList $SecureCred, $FD -ErrorAction Stop
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: $($FDDomainUpdate) to support Multidomain"
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: $($NewDomainToFederate) as federated domain and enabling Multidomain support"
if($NewFederationStatus -eq $false){
$NewFederationSupportStatus += Invoke-Command -Session $ADFSPSSession -ScriptBlock `
{
Connect-MsolService -Credential $Args[0]
Convert-MsolDomainToFederated -DomainName $Args[1] -SupportMultipledomain
Update-MsolFederatedDomain -domainName $Args[1] -SupportMultipleDomain
Get-Service adfssrv | Restart-Service
} -ArgumentList $SecureCred, $NewDomainToFederate -ErrorAction Continue
}#IF_END
$NewFederationStatus = $true
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Informaton: Status MultiDomain $($NewFederationSupportStatus)"
}#foreach_END
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Informaton: Operation Complete"
}#END_IF
}#Try_END
Catch{
$ErrorMessage = $_.Exception.Message
throw $ErrorMessage
}#Catch_END
}#Process
END{
Write-Verbose "[$((get-date).TimeOfDay.ToString()) END ] ServiceRestart: restarting Adfssrv service on $($PrimaryADFSServer)"
Invoke-Command -Session $ADFSPSSession -ScriptBlock {Get-Service adfssrv | Restart-Service}
Write-Verbose "[$((get-date).TimeOfDay.ToString()) END ] Remove: Removing PSSessions on $($PrimaryADFSServer)"
$ADFSPSSession | Remove-PSSession
}
}#End_Function
# SIG # Begin signature block
# MIIIaAYJKoZIhvcNAQcCoIIIWTCCCFUCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUkJ+CYIx0kQhR9bGL9FDkJJ9q
# hSagggXMMIIFyDCCBLCgAwIBAgITHwAAAAKXhlLnQ34QXwAAAAAAAjANBgkqhkiG
# 9w0BAQsFADBOMRIwEAYKCZImiZPyLGQBGRYCYXUxEzARBgoJkiaJk/IsZAEZFgNv
# cmcxFDASBgoJkiaJk/IsZAEZFgRBQklPMQ0wCwYDVQQDEwRDQ1JUMB4XDTE4MDcy
# MDAzNDczMFoXDTIwMDcyMDAzNTczMFowZzESMBAGCgmSJomT8ixkARkWAmF1MRMw
# EQYKCZImiZPyLGQBGRYDb3JnMRQwEgYKCZImiZPyLGQBGRYEQUJJTzEOMAwGA1UE
# AxMFVXNlcnMxFjAUBgNVBAMTDUFkbWluaXN0cmF0b3IwggEiMA0GCSqGSIb3DQEB
# AQUAA4IBDwAwggEKAoIBAQCNq7s560Wz2Q/s2pZ3sN2r1u0ldKPpGlhhJnzdJMra
# kHKybnUbRB76TY5VBN6t3FDrBMN7qV31gWKn5GHveppDS6gZHVJGQNEcAREpaGgy
# tewEkpmyY7toNSdXn7ydvlqql1AGGu2kGNFA5jEaOqHfm4Nw+Mt0EBfkXXKjSWB5
# 6+0a44feZiAfaGnNUbDq/5P8zgPvnNnrOuKRuagjPy3AehDElk19fDK9ZKOMzu4S
# 11QbPS8Pppc9hOi956d/HysPdKfaCC7UFBlrMagRAOi7M4MDS3JB4heZ5iBcEIBZ
# l7QY6m2NH103YDZ1xUl2cobo196XCiUObCIpZQzbliYPAgMBAAGjggKEMIICgDA9
# BgkrBgEEAYI3FQcEMDAuBiYrBgEEAYI3FQiD9+NKhIacS4eBnT+Gz8FFhKz9TEeB
# vf4ZhaODBgIBZAIBBTATBgNVHSUEDDAKBggrBgEFBQcDAzAOBgNVHQ8BAf8EBAMC
# B4AwGwYJKwYBBAGCNxUKBA4wDDAKBggrBgEFBQcDAzAdBgNVHQ4EFgQU162YALpI
# MdSWjsWIwbV0i4A8gk0wHwYDVR0jBBgwFoAUKVmuscbhxWcRNj/GnF+rJD3Fdwcw
# gcoGA1UdHwSBwjCBvzCBvKCBuaCBtoaBs2xkYXA6Ly8vQ049Q0NSVCxDTj1GT1NB
# VU1FTERDMDEsQ049Q0RQLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNl
# cnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9QUJJTyxEQz1vcmcsREM9YXU/Y2Vy
# dGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3Ry
# aWJ1dGlvblBvaW50MIG5BggrBgEFBQcBAQSBrDCBqTCBpgYIKwYBBQUHMAKGgZls
# ZGFwOi8vL0NOPUNDUlQsQ049QUlBLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2Vz
# LENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9QUJJTyxEQz1vcmcsREM9
# YXU/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNlcnRpZmljYXRpb25B
# dXRob3JpdHkwNAYDVR0RBC0wK6ApBgorBgEEAYI3FAIDoBsMGUFkbWluaXN0cmF0
# b3JAQUJJTy5vcmcuYXUwDQYJKoZIhvcNAQELBQADggEBAFh89pk6ZQf/o99v1yip
# YpDd1FO3R8aRJIOCVAIrkcY/lWngUPzCftxU3qRMwltFLn7qHIApi1U3H7MAvvBG
# GLvEkJUVI1tXg9NqowwLSggPhtzRH/T/G404UL3c3wRFOqm3ctj66FfqIY2JJRds
# UeX6divBXz6SRYfMko+Yedu7xoab/Uz7FHgQ37NZb6Jn+iqanrty88stDSnSy0Zv
# EvnZkUx1BY3ObVUPht4U/SWYS/O2QoK7AOO2SJMOBHIFDB+nlrB4bKwfAe50bGfG
# x4cGstq3EpBRpHh79A3mFhvjOYrCHMkuo+TKeBD8lKbzatq26rhKYnlskWPH8092
# tu0xggIGMIICAgIBATBlME4xEjAQBgoJkiaJk/IsZAEZFgJhdTETMBEGCgmSJomT
# 8ixkARkWA29yZzEUMBIGCgmSJomT8ixkARkWBEFCSU8xDTALBgNVBAMTBENDUlQC
# Ex8AAAACl4ZS50N+EF8AAAAAAAIwCQYFKw4DAhoFAKB4MBgGCisGAQQBgjcCAQwx
# CjAIoAKAAKECgAAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGC
# NwIBCzEOMAwGCisGAQQBgjcCARUwIwYJKoZIhvcNAQkEMRYEFFIxM6njO/96AZeV
# k7J5a3VKzAeiMA0GCSqGSIb3DQEBAQUABIIBADq6zIGH9PjmAlO3TmcK3fZzB5nc
# yxjgwz3+zcQ4F/U5tt9zA5fy/ZnSqogcDBMLBdV8fEjcJvr3GrIBTZC/UVKfbTXP
# 9ytVxLS1QelmwG+gMmkR4yM2Lbti1wlRO7EB94FLxtcq7OuwGK4hv97u/wyKbh1D
# sMJCW1sSj9yyoj1FIt5WWdIvY1XipRet+Y3xxFgRjeRnBL+CGIcDhOCs9/aSpvnF
# o/BOXyAYFrMINXtSAGQVKgfT9wn6EuWJ0wTLIIlqDav+hPV8mdiiAfy4LqGtLl4S
# k46yOSqPV0GsUA+YbeCOdLgIPQNR1xsraeWp90qeYY0hCAQArbHQYJfhakc=
# SIG # End signature block
|
ADFSConfigurationTools.psm1 | ADFSConfigurationTools-1.0.0.1 | . $psScriptroot\public\Enable-SPADFSMultiDomainSupport.ps1
. $psScriptroot\public\New-MsolSecurePassword.ps1
. $psScriptroot\public\Set-AdUserUPNInformation.ps1
. $psScriptroot\public\Set-SPAdUserEmailAddressInformation.ps1
. $psScriptroot\public\Start-AdDCSync.ps1
. $psScriptroot\public\Update-SPADFSUrlEndpoint.ps1
. $psScriptroot\public\Update-SPADFSWebApplicationProxyURL.ps1
. $psScriptroot\public\Update-SPAduserUPNFederatedInformation.ps1 |
Update-SPADFSWebApplicationProxyURL.ps1 | ADFSConfigurationTools-1.0.0.1 | Function Update-SPADFSWebApplicationProxyURL {
# .ExternalHelp .\Update-SPADFSWebApplicationProxyURL.xml
param(
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$NewFederatedDomainURL,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$CurrentFederatedDomainURL,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$WebApplicationProxyHostName,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$DomainUsername,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$DomainPassword,
[parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[string]$CertificateThumbprint,
[parameter(ValueFromPipeline=$false,ValueFromPipelineByPropertyName=$true,Mandatory=$true)]
[ValidateScript( {Test-Path $_ -PathType Container})]
[string]$LogFilePath
)
BEGIN{
try{
$DomainCred = New-MsolSecurePassword -UserName $DomainUsername -KeyFile "$LogFilePath\Domainkeyfile.txt" -PlainTextPassword $DomainPassword -PasswordFile "$LogFilePath\DomainSecurePass.txt" -Byte 32 -ErrorAction Stop
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Opening: Powershell Session to $($WebApplicationProxyHostName)"
$ADFSPSSession = New-PSSession -ComputerName $WebApplicationProxyHostName -ErrorAction Stop
}
Catch{
$ErrorMessage = $_.Exception.Message
$ErrorMessage
}
}#BEGIN_END
PROCESS{
try{
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Installing: New WebApplication proxy settings"
$URL1 = "netsh http delete sslcert hostnameport=$($CurrentFederatedDomainURL):443"
$URL2 = "netsh http delete sslcert hostnameport=$($CurrentFederatedDomainURL):49443"
$RemoveSSLCerts = Invoke-Command -Session $ADFSPSSession -ScriptBlock {
& cmd /c $args[0]
& cmd /c $args[1]
& cmd /c netsh http delete cache
} -ArgumentList $URL1, $URL2 -ErrorAction Stop
$InsWebAppProxy = Invoke-Command -Session $ADFSPSSession -ScriptBlock {
Set-WebApplicationProxySslCertificate -Thumbprint $args[0]
Install-WebApplicationProxy -CertificateThumbprint $Args[0] -FederationServiceName $Args[1] -FederationServiceTrustCredential $args[2]
} -ArgumentList $CertificateThumbprint, $NewFederatedDomainURL, $DomainCred -ErrorAction Stop
Write-Verbose "[$((get-date).TimeOfDay.ToString()) PROCESS ] Updating: WebApplicationProxyConfiguraion"
Invoke-Command -Session $ADFSPSSession -ScriptBlock {
Set-WebApplicationProxyConfiguration -ADFSUrl "https://$($Args[0])/adfs/ls" -OAuthAuthenticationURL "https://$($Args[0])/adfs/oauth2/authorize"
} -ArgumentList $NewFederatedDomainURL, $DomainCred
$CurrentWebApps = Get-WebApplicationProxyConfiguration
$CurrentWebApps | Tee-Object -FilePath "$($logFilePath)\WebApplicationConfigurations_$($date).log" -Append
Get-Service adfssrv | Restart-Service
}#Try_END
Catch{
$ErrorMessage = $_.Exception.Message
$ErrorMessage
}#Catch_END
}#PROCESS_END
END{
Write-Verbose "[$((get-date).TimeOfDay.ToString()) END ] Remove: Removing PSSessions on $($PrimaryADFSServer)"
$ADFSPSSession | Remove-PSSession
}#END
}#Function
# SIG # Begin signature block
# MIIIaAYJKoZIhvcNAQcCoIIIWTCCCFUCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQU2Zr8ncXcaqZqHN9gxrsOmazk
# 0tCgggXMMIIFyDCCBLCgAwIBAgITHwAAAAKXhlLnQ34QXwAAAAAAAjANBgkqhkiG
# 9w0BAQsFADBOMRIwEAYKCZImiZPyLGQBGRYCYXUxEzARBgoJkiaJk/IsZAEZFgNv
# cmcxFDASBgoJkiaJk/IsZAEZFgRBQklPMQ0wCwYDVQQDEwRDQ1JUMB4XDTE4MDcy
# MDAzNDczMFoXDTIwMDcyMDAzNTczMFowZzESMBAGCgmSJomT8ixkARkWAmF1MRMw
# EQYKCZImiZPyLGQBGRYDb3JnMRQwEgYKCZImiZPyLGQBGRYEQUJJTzEOMAwGA1UE
# AxMFVXNlcnMxFjAUBgNVBAMTDUFkbWluaXN0cmF0b3IwggEiMA0GCSqGSIb3DQEB
# AQUAA4IBDwAwggEKAoIBAQCNq7s560Wz2Q/s2pZ3sN2r1u0ldKPpGlhhJnzdJMra
# kHKybnUbRB76TY5VBN6t3FDrBMN7qV31gWKn5GHveppDS6gZHVJGQNEcAREpaGgy
# tewEkpmyY7toNSdXn7ydvlqql1AGGu2kGNFA5jEaOqHfm4Nw+Mt0EBfkXXKjSWB5
# 6+0a44feZiAfaGnNUbDq/5P8zgPvnNnrOuKRuagjPy3AehDElk19fDK9ZKOMzu4S
# 11QbPS8Pppc9hOi956d/HysPdKfaCC7UFBlrMagRAOi7M4MDS3JB4heZ5iBcEIBZ
# l7QY6m2NH103YDZ1xUl2cobo196XCiUObCIpZQzbliYPAgMBAAGjggKEMIICgDA9
# BgkrBgEEAYI3FQcEMDAuBiYrBgEEAYI3FQiD9+NKhIacS4eBnT+Gz8FFhKz9TEeB
# vf4ZhaODBgIBZAIBBTATBgNVHSUEDDAKBggrBgEFBQcDAzAOBgNVHQ8BAf8EBAMC
# B4AwGwYJKwYBBAGCNxUKBA4wDDAKBggrBgEFBQcDAzAdBgNVHQ4EFgQU162YALpI
# MdSWjsWIwbV0i4A8gk0wHwYDVR0jBBgwFoAUKVmuscbhxWcRNj/GnF+rJD3Fdwcw
# gcoGA1UdHwSBwjCBvzCBvKCBuaCBtoaBs2xkYXA6Ly8vQ049Q0NSVCxDTj1GT1NB
# VU1FTERDMDEsQ049Q0RQLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNl
# cnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9QUJJTyxEQz1vcmcsREM9YXU/Y2Vy
# dGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3Ry
# aWJ1dGlvblBvaW50MIG5BggrBgEFBQcBAQSBrDCBqTCBpgYIKwYBBQUHMAKGgZls
# ZGFwOi8vL0NOPUNDUlQsQ049QUlBLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2Vz
# LENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9QUJJTyxEQz1vcmcsREM9
# YXU/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNlcnRpZmljYXRpb25B
# dXRob3JpdHkwNAYDVR0RBC0wK6ApBgorBgEEAYI3FAIDoBsMGUFkbWluaXN0cmF0
# b3JAQUJJTy5vcmcuYXUwDQYJKoZIhvcNAQELBQADggEBAFh89pk6ZQf/o99v1yip
# YpDd1FO3R8aRJIOCVAIrkcY/lWngUPzCftxU3qRMwltFLn7qHIApi1U3H7MAvvBG
# GLvEkJUVI1tXg9NqowwLSggPhtzRH/T/G404UL3c3wRFOqm3ctj66FfqIY2JJRds
# UeX6divBXz6SRYfMko+Yedu7xoab/Uz7FHgQ37NZb6Jn+iqanrty88stDSnSy0Zv
# EvnZkUx1BY3ObVUPht4U/SWYS/O2QoK7AOO2SJMOBHIFDB+nlrB4bKwfAe50bGfG
# x4cGstq3EpBRpHh79A3mFhvjOYrCHMkuo+TKeBD8lKbzatq26rhKYnlskWPH8092
# tu0xggIGMIICAgIBATBlME4xEjAQBgoJkiaJk/IsZAEZFgJhdTETMBEGCgmSJomT
# 8ixkARkWA29yZzEUMBIGCgmSJomT8ixkARkWBEFCSU8xDTALBgNVBAMTBENDUlQC
# Ex8AAAACl4ZS50N+EF8AAAAAAAIwCQYFKw4DAhoFAKB4MBgGCisGAQQBgjcCAQwx
# CjAIoAKAAKECgAAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGC
# NwIBCzEOMAwGCisGAQQBgjcCARUwIwYJKoZIhvcNAQkEMRYEFE36KrOTHchetIXK
# Xjiz4oxxNt4kMA0GCSqGSIb3DQEBAQUABIIBAEqG1IgXZqbH4hKTJNzVjYE00pFg
# PLXchSkRlBYeIxJLBZdlSUW7gETtSr4TqmczvvJA+l4EZjgg5GRV89jue0sXJYLh
# lb8zYLGPSavpai+YxxwWJEd/ts0lyEBp0Dpah0fJ3uzE2og1leiH0plowovQfyA4
# 2gHbvvn0h/9W+a2Sn4lEZTgYGTpu51dWEvNBG9ju/YCJCUh95GIy6EkLLhnOs0qZ
# CnFufmYrUFo70dmrgzmaxA19C/zfdiNxxC+SUfp2MNWsWuQbn4He3rhLsvx3gO2U
# Rwrubm19L053Wdl/pOuUr3AenOzxh28agQE+KD3hfAi913pw1LVzD+quE2g=
# SIG # End signature block
|
ADFSConfigurationTools.psd1 | ADFSConfigurationTools-1.0.0.1 | #
# Module manifest for module 'PSGet_ADFSConfigurationTools'
#
# Generated by: Shihan Pietersz
#
# Generated on: 2/08/2018
#
@{
# Script module or binary module file associated with this manifest.
RootModule = ".\ADFSConfigurationTools.psm1"
# Version number of this module.
ModuleVersion = '1.0.0.1'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = 'a3a786b4-0081-4393-be70-7d614fdff4e3'
# Author of this module
Author = 'Shihan Pietersz'
# Company or vendor of this module
CompanyName = 'Shihan Pietersz'
# Copyright statement for this module
Copyright = '2018, Shihan Pietersz All Rights Reserved'
# Description of the functionality provided by this module
Description = 'ADFS Configuration Management and Update'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = '*'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'ADFS,ADFSTools,ADFSConfiguration,ADFSEndpoint,URLUpdate,URL,URLUpdate,EmailAddressUpdate,SMTPAddressUpdate'
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
# ProjectUri = ''
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
# External dependent modules of this module
# ExternalModuleDependencies = ''
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
HelperUtilities.Test.ps1 | ADFSDiagnostics-3.0.2 | # Determine our script root
$parent = Split-Path $PSScriptRoot -Parent
$script:root = Split-Path $parent -Parent
# Load module via definition
Import-Module $script:root\ADFSDiagnostics.psd1 -Force
InModuleScope ADFSDiagnostics {
# Shared constants
$sharedError = "Error message"
$sharedErrorException = "System.Management.Automation.RuntimeException: Error message"
Describe "Out-Verbose" {
It "should call write-verbose" {
# Arrange
Mock -CommandName Write-Verbose -MockWith {}
# Act
Out-Verbose
# Assert
Assert-MockCalled Write-Verbose
}
}
Describe "Out-Warning" {
It "should call write-verbose" {
# Arrange
Mock -CommandName Write-Warning -MockWith {}
# Act
Out-Warning
# Assert
Assert-MockCalled Write-Warning
}
}
Describe "Test-RunningRemotely" {
It "is running remotely" {
# Arrange
Mock -CommandName Get-Host -MockWith { return New-Object PSObject -Property @{ "Name" = "ServerRemoteHost" }}
# Act
$ret = Test-RunningRemotely
# Assert
$ret | should beexactly $true
}
It "is not running remotely" {
# Arrange
Mock -CommandName Get-Host -MockWith { return New-Object PSObject -Property @{ "Name" = "ConsoleHost" }}
# Act
$ret = Test-RunningRemotely
# Assert
$ret | should beexactly $false
}
}
Describe "Get-OsVersion" {
It "should return WS2016" {
# Arrange
Mock -CommandName EnvOSVersionWrapper -MockWith {
return New-Object PSObject @{
"Major" = 10
"Minor" = 0
}
}
# Act
$ret = Get-OsVersion
# Assert
$ret | should beexactly WS2016
}
It "should return WS2012R2" {
# Arrange
Mock -CommandName EnvOSVersionWrapper -MockWith {
return New-Object PSObject @{
"Major" = 6
"Minor" = 4
}
}
# Act
$ret = Get-OsVersion
# Assert
$ret | should beexactly WS2012R2
}
It "should return WS2012" {
# Arrange
Mock -CommandName EnvOSVersionWrapper -MockWith {
return New-Object PSObject @{
"Major" = 6
"Minor" = 0
}
}
# Act
$ret = Get-OsVersion
# Assert
$ret | should beexactly WS2012
}
It "should return Unknown" {
# Arrange
Mock -CommandName EnvOSVersionWrapper -MockWith {
return New-Object PSObject @{
"Major" = 0
"Minor" = 0
}
}
# Act
$ret = Get-OsVersion
# Assert
$ret | should beexactly Unknown
}
}
Describe "Get-ServiceState" {
It "returns the service status" {
# Arrange
Mock -CommandName Get-Service -MockWith { return New-Object PSObject -Property @{"Status" = "Running"} }
# Act
$ret = Get-ServiceState("test")
# Assert
$ret | should beexactly "Running"
}
It "returns null when it cannot find the service" {
# Arrange
Mock -CommandName Get-Service -MockWith { return $null }
# Act
$ret = Get-ServiceState("test")
# Assert
$ret | should beexactly $null
}
}
Describe "IsAdfsServiceRunning" {
It "should return true" {
# Arrange
Mock -CommandName Get-ServiceState -MockWith { return "Running" }
# Act
$ret = IsAdfsServiceRunning
# Assert
$ret | should beexactly $true
}
It "should return false" {
# Arrange
Mock -CommandName Get-ServiceState -MockWith { return "Stopped" }
# Act
$ret = IsAdfsServiceRunning
# Assert
$ret | should beexactly $false
}
}
Describe "IsAdfsProxyServiceRunning" {
It "should return true" {
# Arrange
Mock -CommandName Get-ServiceState -MockWith { return "Running" }
# Act
$ret = IsAdfsProxyServiceRunning
# Assert
$ret | should beexactly $true
}
It "should return false" {
# Arrange
Mock -CommandName Get-ServiceState -MockWith { return "Stopped" }
# Act
$ret = IsAdfsProxyServiceRunning
# Assert
$ret | should beexactly $false
}
}
Describe "GetSslBindings" {
$_output = @(
"",
" SSL Certificate bindings:",
" -------------------------",
"",
" Hostname:port : sts.aadtesting.info:443",
" Certificate Hash : be22839cfff71bab0b118b69b0c8a2e33f02f04d",
" Application ID : {5d89a20c-beab-4389-9447-324788eb944a}",
" Certificate Store Name : MY",
" Verify Client Certificate Revocation : Enabled",
" Verify Revocation Using Cached Client Certificate Only : Disabled",
" Usage Check : Enabled",
" Revocation Freshness Time : 0",
" URL Retrieval Timeout : 0",
" Ctl Identifier : (null)",
" Ctl Store Name : AdfsTrustedDevices",
" DS Mapper Usage : Disabled",
" Negotiate Client Certificate : Disabled",
" Reject Connections : Disabled",
" Disable HTTP2 : Not Set",
"",
" ip:port : 0.0.0.0:443",
" Certificate Hash : be22839cfff71bab0b118b69b0c8a2e33f02f04d",
" Application ID : {5d89a20c-beab-4389-9447-324788eb944a}",
" Certificate Store Name : MY",
" Verify Client Certificate Revocation : Enabled",
" Verify Revocation Using Cached Client Certificate Only : Disabled",
" Usage Check : Enabled",
" Revocation Freshness Time : 0",
" URL Retrieval Timeout : 0",
" Ctl Identifier : (null)",
" Ctl Store Name : AdfsTrustedDevices",
" DS Mapper Usage : Disabled",
" Negotiate Client Certificate : Disabled",
' Reject Connections : Disabled',
" Disable HTTP2 : Not Set");
It "should return the correct SSL bindings" {
# Arrange
Mock -CommandName NetshHttpShowSslcert -MockWith { return $_output }
# Act
$bindings = GetSslBindings
# Assert
$bindings."sts.aadtesting.info:443" | should not beexactly $null
$hostbinding = $bindings."sts.aadtesting.info:443"
$hostbinding.Thumbprint | should beexactly "be22839cfff71bab0b118b69b0c8a2e33f02f04d"
$hostbinding."Application ID" | should beexactly "{5d89a20c-beab-4389-9447-324788eb944a}"
$hostbinding."Ctl Store Name" | should beexactly "AdfsTrustedDevices"
$bindings."0.0.0.0:443" | should not beexactly $null
$ipbinding = $bindings."0.0.0.0:443"
$ipbinding.Thumbprint | should beexactly "be22839cfff71bab0b118b69b0c8a2e33f02f04d"
$ipbinding."Application ID" | should beexactly "{5d89a20c-beab-4389-9447-324788eb944a}"
$ipbinding."Ctl Store Name" | should beexactly "AdfsTrustedDevices"
}
}
Describe "IsSslBindingValid" {
BeforeAll {
$_hostnamePort = "sts.contoso.com:443"
$_thumbprint = "be22839cfff71bab0b118b69b0c8a2e33f02f04d"
}
It "should pass" {
# Arrange
$testResult = New-Object TestResult -ArgumentList "Test"
$bindings = @{
$_hostnamePort = @{
"Thumbprint" = $_thumbprint
"Ctl Store Name" = $ctlStoreName
}
}
# Act
$ret = IsSslBindingValid -Bindings $bindings -BindingIpPortOrHostnamePort $_hostnamePort -CertificateThumbprint $_thumbprint -VerifyCtlStoreName $true
# Assert
$ret.IsValid | should beexactly $true
}
It "should fail because binding could not be found" {
# Arrange
$testResult = New-Object TestResult -ArgumentList "Test"
$bindings = @{ }
# Act
$ret = IsSslBindingValid -Bindings $bindings -BindingIpPortOrHostnamePort $_hostnamePort -CertificateThumbprint $_thumbprint -VerifyCtlStoreName $true
# Assert
$ret.IsValid | should beexactly $false
$ret.Detail | should beexactly "The following SSL certificate binding could not be found $_hostnamePort."
}
It "should fail because thumbprint does not match" {
# Arrange
$testResult = New-Object TestResult -ArgumentList "Test"
$badThumbprint = "600f909203f1ba82bfcdeb41383fa1ce2b7fb8b2"
$bindings = @{
$_hostnamePort = @{
"Thumbprint" = $badThumbprint
"Ctl Store Name" = $ctlStoreName
}
}
# Act
$ret = IsSslBindingValid -Bindings $bindings -BindingIpPortOrHostnamePort $_hostnamePort -CertificateThumbprint $_thumbprint -VerifyCtlStoreName $true
# Assert
$ret.IsValid | should beexactly $false
$ret.Detail | should beexactly "The following SSL certificate binding $_hostnamePort did not match the AD FS SSL thumbprint: $_thumbprint."
}
It "should fail because ctl store name does not match" {
# Arrange
$testResult = New-Object TestResult -ArgumentList "Test"
$bindings = @{
$_hostnamePort = @{
"Thumbprint" = $_thumbprint
"Ctl Store Name" = "BadStoreName"
}
}
# Act
$ret = IsSslBindingValid -Bindings $bindings -BindingIpPortOrHostnamePort $_hostnamePort -CertificateThumbprint $_thumbprint -VerifyCtlStoreName $true
# Assert
$ret.IsValid | should beexactly $false
$ret.Detail | should beexactly "The following SSL certificate binding $_hostnamePort did not have the correct Ctl Store Name: AdfsTrustedDevices."
}
}
Describe "IsUserPrincipalNameFormat" {
It "should return true" {
# Arrange
$username = "[email protected]"
# Act
$ret = IsUserPrincipalNameFormat($username)
# Assert
$ret | should beexactly $true
}
It "should return false" {
# Arrange
$username = "admin"
# Act
$ret = IsUserPrincipalNameFormat($username)
# Assert
$ret | should beexactly $false
}
It "should return false because username is empty" {
# Arrange
$username = "admin"
# Act
$ret = IsUserPrincipalNameFormat ""
# Assert
$ret | should beexactly $false
}
}
Describe "CheckRegistryKeyExist" {
It "should return true" {
# Arrange
Mock -CommandName Get-Item -MockWith { return $true }
# Act
$ret = CheckRegistryKeyExist "testpath"
# Assert
$ret | should beexactly $true
}
It "should return false" {
# Arrange
Mock -CommandName Get-Item -MockWith { return $null }
# Act
$ret = CheckRegistryKeyExist "testpath"
# Assert
$ret | should beexactly $false
}
}
Describe "IsTlsVersionEnabled" {
It "should return true" {
# Arrange
Mock -CommandName CheckRegistryKeyExist -MockWith { return $false }
# Act
$ret = IsTlsVersionEnabled "1.0"
# Assert
$ret | should beexactly $true
}
It "should return false" {
# Arrange
Mock -CommandName CheckRegistryKeyExist -MockWith { return $true }
Mock -CommandName IsTlsVersionEnabledInternal -MockWith { return $false }
# Act
$ret = IsTlsVersionEnabled "1.0"
# Assert
$ret | should beexactly $false
}
}
Describe "IsTlsVersionEnabledInternal" {
It "should return true" {
# Arrange
Mock -CommandName Get-Item -MockWith { return $null }
Mock -CommandName GetValueFromRegistryKey -MockWith { return 1 } -ParameterFilter { $name -eq "Enabled" }
Mock -CommandName GetValueFromRegistryKey -MockWith { return 0 } -ParameterFilter { $name -eq "DisabledByDefault" }
# Act
$ret = IsTlsVersionEnabledInternal "testpath"
# Assert
$ret | should beexactly $true
}
It "should return false" {
# Arrange
Mock -CommandName Get-Item -MockWith { return $null }
Mock -CommandName GetValueFromRegistryKey -MockWith { return 0 } -ParameterFilter { $name -eq "Enabled" }
Mock -CommandName GetValueFromRegistryKey -MockWith { return 1 } -ParameterFilter { $name -eq "DisabledByDefault" }
# Act
$ret = IsTlsVersionEnabledInternal "testpath"
# Assert
$ret | should beexactly $false
}
}
Describe "IsServerTimeInSyncWithReliableTimeServer" {
It "should return true" {
# Arrange
$utc = (New-Object -TypeName DateTime -ArgumentList (1970, 1, 1))
$now = (Get-Date).ToUniversalTime()
$diff = $now - $utc
$val = $diff.TotalMilliseconds * 1000
Mock -CommandName Invoke-WebRequest -MockWith { return @{"Content" = "<timestamp time=`"$val`"/>" } }
# Act
$ret = IsServerTimeInSyncWithReliableTimeServer
# Assert
$ret | should beexactly $true
}
It "should return false" {
# Arrange
$utc = (New-Object -TypeName DateTime -ArgumentList (1970, 1, 1))
$now = (Get-Date).ToUniversalTime().AddSeconds(301)
$diff = $now - $utc
$val = $diff.TotalMilliseconds * 1000
Mock -CommandName Invoke-WebRequest -MockWith { return @{"Content" = "<timestamp time=`"$val`"/>" } }
# Act
$ret = IsServerTimeInSyncWithReliableTimeServer
# Assert
$ret | should beexactly $false
}
}
Describe "VerifyCertificatesArePresent" {
It "should return the missing certificates" {
# Arrange
$primaryCerts = @("Cert1", "Cert2", "Cert3")
$localCerts = @("Cert1")
Mock -CommandName GetCertificatesFromAdfsTrustedDevices -MockWith { return $localCerts }
# Act
$ret = VerifyCertificatesArePresent $primaryCerts
# Assert
("Cert2", "Cert3") | ForEach-Object {
$ret | should contain $_
}
}
}
} |
ADFSDiagnostics.psd1 | ADFSDiagnostics-3.0.2 | #
# Module manifest for module 'ADFSDiagnostics'
#
# Generated by: Microsoft
#
# Generated on: 3/12/2018
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'ADFSDiagnostics.psm1'
# Version number of this module.
ModuleVersion = '3.0.2'
# ID used to uniquely identify this module
GUID = '0e11c20c-9654-470e-83b1-aada1873bb30'
# Author of this module
Author = 'Microsoft'
# Company or vendor of this module
CompanyName = 'Microsoft'
# Copyright statement for this module
Copyright = '(c) 2018 Microsoft. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This module provides cmdlets that can be used to perform various tests on AD FS and WAP servers. The tests can help ensure that the AD FS / WAP service are up and running. Using the cmdlets in the module, you can root cause a service level issue faster.'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '4.0'
# Functions to export from this module
FunctionsToExport = '*'
# Cmdlets to export from this module
CmdletsToExport = '*'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module
AliasesToExport = '*'
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = @('ADFS', 'WAP', 'ADFSDiagnostics', 'Troubleshooting')
# A URL to the license for this module.
LicenseUri = 'https://github.com/Microsoft/adfsManagementTools/blob/master/LICENSE'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/Microsoft/adfsManagementTools'
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
HelpInfoURI = 'https://github.com/Microsoft/adfsManagementTools/tree/master/diagnosticsModule'
}
|
ADFSDiagnostics.psm1 | ADFSDiagnostics-3.0.2 | #Requires -Version 4
#Requires -RunAsAdministrator
<#
.SYNOPSIS
Contains data gathering, health checks, and additional utilities for AD FS server deployments.
.DESCRIPTION
Version: 3.0.2
ADFSDiagnostics.psm1 is a Windows PowerShell module for diagnosing issues with ADFS
.DISCLAIMER
THIS CODE AND INFORMATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF
ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A
PARTICULAR PURPOSE.
Copyright (c) Microsoft Corporation. All rights reserved.
#>
$Script:ModuleVersion = "3.0.2"
Function Write-DeprecationNotice
{
Write-Host "This module has been deprecated, please use ADFSToolbox." -BackgroundColor DarkYellow -ForegroundColor Black
Write-Host "You can find more information at https://github.com/Microsoft/adfsToolbox" -BackgroundColor DarkYellow -ForegroundColor Black
}
Write-DeprecationNotice
#Get public and private function definition files.
Write-Debug "Importing public and private functions"
$Public = @(Get-ChildItem -Path $PSScriptRoot\Public\*.ps1 -ErrorAction SilentlyContinue)
$Private = @(Get-ChildItem -Path $PSScriptRoot\Private\*.ps1 -ErrorAction SilentlyContinue)
#Dot source the files
foreach ($import in @($Public + $Private))
{
try
{
. $import.fullname
}
catch
{
Write-Error -Message "Failed to import script $($import.fullname): $_"
}
}
Export-ModuleMember -Function $Public.Basename |
Receive-AdfsServerTrace.ps1 | ADFSDiagnostics-3.0.2 | <#
.SYNOPSIS
Combines and sorts all the AD FS events generated given an activity ID from background jobs
.DESCRIPTION
The Receive-AdfsServerTrace them combines and sorts the results of each background job created with Start-AdfsServerTrace.
If the jobs have not completed, the commandlet will wait until completion of all jobs.
At the end, the jobs will be removed
.PARAMETER Jobs
Background jobs generated with the Start-AdfsServerTrace cmdlet
.EXAMPLE
$jobs = Start-AdfsServerTrace -ActivityId 00000000-0000-0000-9701-0080000000df -ComputerName @("ADFSSRV1","ADFSSRV2")
Get Admin and Audits for activity ID 00000000-0000-0000-9701-0080000000df on Servers ADFSSRV1 and ADFSSRV2
On a regular basis, check how many have completed and how many are running
$jobs | Get-Job -IncludeChildJob | Group-Object State
At any point, receive the jobs
$results = Receive-AdfsServerTrace -Jobs $jobs
.NOTES
The cmdlet sorts the events based on event timestamp first, then the source of the event (Audit, Admin, and Debug), and then the sequencing within the event source the event came from.
#>
Function Receive-AdfsServerTrace
{
Write-DeprecationNotice
} |
Get-AdfsServerTrace.ps1 | ADFSDiagnostics-3.0.2 | <#
.SYNOPSIS
Retrieves all the AD FS events generated given an Activity ID ID accross different computers
.DESCRIPTION
The Get-ADFSActivityIdRecords cmdlet queries all computers' event logs for the activity ID supplied in parallel, and them combines and sorts the results.
This cmdlet works in AD FS 2.0 and later.
.PARAMETER ActivityId
Activity ID to search for. This typically comes from an AD FS error page.
.PARAMETER ComputerName
It is an array of computers, which represents the AD FS servers to try. If omitted, the local machine will be used
.PARAMETER OutHtmlFilePath
If supplied, the results will be generated in an html table format, saved in the path specified and opened in the internet browser.
.EXAMPLE
Get-AdfsServerTrace -ActivityId 00000000-0000-0000-9701-0080000000df -ComputerName @("ADFSSRV1","ADFSSRV2")
Get Admin and Audits for activity ID 00000000-0000-0000-9701-0080000000df on Servers ADFSSRV1 and ADFSSRV2
.EXAMPLE
Get-AdfsServerTrace -ActivityId 00000000-0000-0000-9701-0080000000df -ComputerName (Get-Content .\Servers.txt)
Get Admin and Audits for activity ID 00000000-0000-0000-9701-0080000000df from servers in a text file
.EXAMPLE
Get-AdfsServerTrace -ActivityId 00000000-0000-0000-9701-0080000000df -IncludeDebug -ComputerName @("ADFSSRV1","ADFSSRV2")
Get Admin and Audits for activity ID 00000000-0000-0000-9701-0080000000df on Server ADFSSRV1 and ADFSSRV2, including debug traces
.EXAMPLE
Get-AdfsServerTrace -ActivityId 00000000-0000-0000-9701-0080000000df -IncludeDebug -ComputerName @("ADFSSRV1","ADFSSRV2") -OutHtmlFilePath ".\ActivityIdReport.htm"
Get Admin and Audits for activity ID 00000000-0000-0000-9701-0080000000df on Server ADFSSRV1 and ADFSSRV2, including debug traces and save the result in an HTML file.
.NOTES
You need to run this function using an account that has permissions to read the event logs in all computers supplied.
This is typically achieved having the account be part of the "Event Log Readers" Local Security Group.
The computers supplied also should have firewall rules configured to allow remote readings.
#>
Function Get-AdfsServerTrace
{
Write-DeprecationNotice
} |
TestUtilities.ps1 | ADFSDiagnostics-3.0.2 | Function CreateTestResultFromPSObject($obj)
{
$testResult = New-Object TestResult -ArgumentList($obj.Name);
$testResult.Result = $obj.Result;
$testResult.Detail = $obj.Detail;
$testResult.Output = $obj.Output;
$testResult.ExceptionMessage = $obj.ExceptionMessage;
$testResult.Exception = $obj.Exception;
return $testResult;
}
Function Create-NotRunOnSecondaryTestResult
{
param(
[string] $testName
)
$testResult = New-Object TestResult -ArgumentList($testName)
$testResult.Result = [ResultType]::NotRun;
$testResult.Detail = "This check runs only on Primary Nodes."
return $testResult
}
Function Create-ErrorExceptionTestResult
{
param(
[string]
$testName,
[Exception]
$exception
)
$testResult = New-Object TestResult -ArgumentList($testName);
$testResult.Result = [ResultType]::Error;
$testResult.ExceptionMessage = $exception.Message;
$testResult.Exception = $exception.ToString();
return $testResult;
}
Function Invoke-TestFunctions
{
param(
[string]
$role,
[array]
$functionsToRun,
$functionArguments
)
$results = @()
$totalFunctions = $functionsToRun.Count
$functionCount = 0
foreach ($function in $functionsToRun)
{
$functionCount++
$percent = 100 * $functionCount / $totalFunctions
Write-Progress -Activity "Executing Tests for $role" -Status $function -PercentComplete $percent
$result = Invoke-Expression $function
$results = $results + $result
}
return $results
}
Function TestAdfsSTSHealth()
{
Param
(
$verifyO365 = $true,
[string[]]
$adfsServers = $null
)
$functionArguments = @{"adfsServers" = $adfsServers};
$role = Get-ADFSRole
if ($role -ne $adfsRoleSTS)
{
return
}
# Determine ADFS Version
$ADFSVersion = Get-AdfsVersion
Import-ADFSAdminModule
#force refresh of ADFS Properties
try
{
$props = Retrieve-AdfsProperties -force
}
catch
{
#do nothing, other than prevent the error record to go to the pipeline
}
$functionsToRun = @( `
"TestIsAdfsRunning", `
"TestIsWidRunning", `
"TestPingFederationMetadata", `
"TestSslBindings", `
"Test-AdfsCertificates", `
"TestADFSDNSHostAlias", `
"TestADFSDuplicateSPN", `
"TestServiceAccountProperties", `
"TestAppPoolIDMatchesServiceID", `
"TestComputerNameEqFarmName", `
"TestSSLUsingADFSPort", `
"TestSSLCertSubjectContainsADFSFarmName", `
"TestAdfsAuditPolicyEnabled", `
"TestAdfsRequestToken", `
"TestTrustedDevicesCertificateStore", `
"TestAdfsPatches", `
"TestServicePrincipalName", `
"TestTLSMismatch");
if (($adfsServers -eq $null) -or ($adfsServers.Count -eq 0))
{
$functionsToRun += "TestProxyTrustPropagation";
$functionsToRun += "TestTimeSync";
}
else
{
$functionsToRun += "TestProxyTrustPropagation -adfsServers `$functionArguments.adfsServers";
$functionsToRun += "TestTimeSync -adfsServers `$functionArguments.adfsServers";
}
if ($verifyO365 -eq $true)
{
$functionsToRun = $functionsToRun + @( `
"TestOffice365Endpoints", `
"TestADFSO365RelyingParty", `
"TestNtlmOnlySupportedClientAtProxyEnabled");
}
return Invoke-TestFunctions -role $adfsRoleSTS -functionsToRun $functionsToRun -functionArguments $functionArguments;
}
Function TryTestAdfsSTSHealthOnFarmNodes()
{
Param(
$verifyO365 = $true,
[string[]]
$adfsServers = $null,
[switch]
$local = $false
)
Out-Verbose "Attempting to run AD FS STS health checks farm wide.";
if (($adfsServers -eq $null -or $adfsServers.Count -eq 0) -and (-not ($local)))
{
Out-Verbose "Detected that no farm information was provided.";
$osVersion = Get-OsVersion;
$isPrimary = IsAdfsSyncPrimaryRole;
if ($osVersion -eq [OSVersion]::WS2016 -and $isPrimary)
{
$adfsServers = @();
Write-Host "Detected OS as Windows Server 2016, attempting to run health checks across all of your AD FS servers in your farm.";
$nodes = (Get-AdfsFarmInformation).FarmNodes;
foreach ($server in $nodes)
{
# We skip adding the node that corresponds to this server.
if ($server.FQDN -like ([System.Net.Dns]::GetHostByName(($env:computerName))).HostName)
{
continue;
}
$adfsServers += $server
}
Out-Verbose "Detected the following servers in the farm: $adfsServers";
}
}
else
{
# We filter out this computer's name and FQDN
$adfsServers = $adfsServers | Where-Object { ($_ -notlike [System.Net.Dns]::GetHostByName(($env:computerName)).HostName) -and ($_ -notlike $env:COMPUTERNAME) };
}
$results = @();
Write-Host "Running the health checks on the local machine.";
$result = TestAdfsSTSHealth -verifyO365 $verifyO365 -verifyTrustCerts $verifyTrustCerts -adfsServers $adfsServers;
foreach($test in $result)
{
$test.ComputerName = "Localhost";
}
$results += $result;
if (($adfsServers -ne $null -and $adfsServers.Count -ne 0) -and (-not ($local)))
{
Write-Host "Running health checks on other servers in farm."
$Private = @(Get-ChildItem -Path $PSScriptRoot\*.ps1 -ErrorAction SilentlyContinue);
$Public = @(Get-ChildItem -Path $PSScriptRoot\..\Public\*.ps1 -ErrorAction SilentlyContinue);
$AllFunctionFiles = $Private + $Public;
$commonFunctions = (Get-Command $AllFunctionFiles).ScriptContents;
$commonFunctions = $commonFunctions -join [Environment]::NewLine;
foreach ($server in $adfsServers)
{
Write-Host "Running health checks on $server.";
$session = New-PSSession -ComputerName $server -ErrorAction SilentlyContinue;
if ($session -eq $null)
{
Out-Warning "There was a problem connecting to $server, skipping this server."
continue;
}
$deserializedResult = Invoke-Command -Session $session -ArgumentList $commonFunctions -ScriptBlock {
param($commonFunctions)
Invoke-Expression $commonFunctions;
return TestAdfsSTSHealth;
}
$serializedResult = @();
foreach($obj in $deserializedResult)
{
$newObj = CreateTestResultFromPSObject $obj;
$newObj.ComputerName = $server;
$serializedResult += $newObj;
}
$results += $serializedResult;
if ($session)
{
Remove-PSSession $Session
}
}
}
Write-Host "Successfully completed all health checks.";
return New-Object TestResultsContainer -ArgumentList(, $results);
}
Function TestAdfsProxyHealth()
{
Param(
[string]
$sslThumbprint
)
$functionArguments = @{"AdfsSslThumbprint" = $sslThumbprint};
$functionsToRun = @( `
"TestIsAdfsRunning", `
"TestIsAdfsProxyRunning", `
"TestSTSReachableFromProxy", `
"TestNoNonSelfSignedCertificatesInRootStore", `
"TestTLSMismatch", `
"TestTimeSync");
if ([string]::IsNullOrWhiteSpace($sslThumbprint))
{
$functionsToRun += "TestProxySslBindings";
}
else
{
$functionsToRun += "TestProxySslBindings -AdfsSslThumbprint `$functionArguments.AdfsSslThumbprint";
}
$results = Invoke-TestFunctions -role "Proxy" -functionsToRun $functionsToRun -functionArguments $functionArguments;
foreach($test in $result)
{
$test.ComputerName = "Localhost";
}
Write-Host "Successfully completed all health checks.";
return New-Object TestResultsContainer -ArgumentList(, $results);
} |
ADFSDiagnostics.Test.ps1 | ADFSDiagnostics-3.0.2 | # Determine our script root
$root = Split-Path $PSScriptRoot -Parent
# Load module via definition
Import-Module $root\ADFSDiagnostics.psd1 -Force
InModuleScope ADFSDiagnostics {
Describe 'Load ADFSDiagnostics' {
It 'should load ADFSDiagnostics module' {
$ADFSDiagnosticsModule = Get-Module ADFSDiagnostics -all
$ADFSDiagnosticsModule | should be $true
}
}
}
|
Test-AdfsServerToken.ps1 | ADFSDiagnostics-3.0.2 | <#
.SYNOPSIS
Performs a synthetic transaction to get a token against an AD FS farm
.DESCRIPTION
If a credential is provided, then the 2005/usernamemixed Endpoint will be used to get the token.
Otherwise, the 2005/windowstransport endpoint will be used with the windows identity of the logged on user.
The token is returned in XML format. By default this cmdlet will perform three transactions using Tls 1.0, Tls 1.1, and Tls 1.2.
.PARAMETER FederationServer
Federation Server (Farm) host name
.PARAMETER AppliesTo
Identifier of the target relying party
.PARAMETER Credential
Optional Username Credential used to retrieve the token
.PARAMETER TestTls10
Optional switch to specify performing a synthetic transaction using Tls 1.0
.PARAMETER TestTls11
Optional switch to specify performing a synthetic transaction using Tls 1.1
.PARAMETER TestTls12
Optional switch to specify performing a synthetic transaction using Tls 1.2
.EXAMPLE
Test-AdfsServerToken -FederationServer sts.contoso.com -AppliesTo urn:payrollapp
Retrieves a token for the relying party with identifier urn:payrollapp against the farm 'sts.contoso.com' with logged on user windows credentials
.EXAMPLE
Test-AdfsServerToken -FederationServer sts.contoso.com -AppliesTo urn:payrollapp -Credential (Get-Credential)
Retrieves a token for the relying party with identifier urn:payrollapp against the farm 'sts.contoso.com' using a UserName/Password credential
.EXAMPLE
$tokenString = Test-AdfsServerToken -FederationServer sts.contoso.com -AppliesTo urn:payrollapp
$tokenXml = [Xml]$tokenString
$tokenXml.Envelope.Body.RequestSecurityTokenResponse.RequestedSecurityToken.Assertion.AttributeStatement.Attribute | ft
Retrieves a token, and see the claims in the attribute statement in a table format
.EXAMPLE
Test-AdfsServerToken -FederationServer sts.contoso.com -AppliesTo urn:payrollapp -TestTls10 -TestTls11
Perform two synthetic transactions using Tls 1.0 and Tls 1.1 for the relying party with identifier urn:payrollapp against the farm 'sts.contoso.com' with logged on user windows credentials.
.NOTES
If credential parameter is provided, then the 2005/usernamemixed Endpoint needs to be enabled
Otherwise, the 2005/windowstransport endpoint needs to be enabled
#>
Function Test-AdfsServerToken
{
Write-DeprecationNotice
} |
DataTypes.ps1 | ADFSDiagnostics-3.0.2 | ####################################
# TestResult Data type
####################################
Add-Type -AssemblyName System.Web;
Add-Type -AssemblyName System.Collections;
Add-Type -Language CSharp @"
using System;
using System.Collections;
using System.Collections.Generic;
using System.Linq;
using System.Management.Automation;
public class TestResult
{
public string Name;
public string ComputerName;
public ResultType Result;
public string Detail;
public Hashtable Output;
public string ExceptionMessage;
public string Exception;
public TestResult(string name)
{
Name = name;
Result = ResultType.Pass;
}
}
public class TestResultsContainer
{
public List<TestResult> AllTests { get; set; }
public TestResultsContainer()
{
AllTests = new List<TestResult>();
}
public TestResultsContainer(TestResult[] newResults)
{
AllTests = new List<TestResult>();
AllTests.AddRange(newResults);
}
public void Add(TestResult newResult)
{
AllTests.Add(newResult);
}
public void Add(TestResult[] newResults)
{
AllTests.AddRange(newResults);
}
public IEnumerable<TestResult> this[string testName]
{
get { return AllTests.Where(m => m.Name == testName).ToList(); }
}
public IEnumerable<TestResult> GetTestsByComputer(string computerName)
{
return AllTests.Where(m => m.ComputerName == computerName).ToList();
}
public IEnumerable<TestResult> PassedTests
{
get { return AllTests.Where(m => m.Result == ResultType.Pass).ToList(); }
}
public IEnumerable<TestResult> WarningTests
{
get { return AllTests.Where(m => m.Result == ResultType.Warning).ToList(); }
}
public IEnumerable<TestResult> FailedTests
{
get { return AllTests.Where(m => m.Result == ResultType.Fail).ToList(); }
}
public IEnumerable<TestResult> ErrorTests
{
get { return AllTests.Where(m => m.Result == ResultType.Error).ToList(); }
}
public IEnumerable<TestResult> NotRunTests
{
get { return AllTests.Where(m => m.Result == ResultType.NotRun).ToList(); }
}
}
public enum ResultType
{
Pass,
NotRun,
Fail,
Error,
Warning
}
public enum OSVersion
{
WS2012,
WS2012R2,
WS2016,
Unknown
}
"@;
####################################
# AdHealthAgentInformation Data type
####################################
Add-Type -Language CSharp @"
public class AdHealthAgentInformation
{
public string Version;
public string UpdateState;
public string LastUpdateAttemptVersion;
public System.DateTime LastUpdateAttemptTime;
public int NumberOfFailedAttempts;
public string InstallerExitCode;
}
"@; |
Start-AdfsServerTrace.ps1 | ADFSDiagnostics-3.0.2 | <#
.SYNOPSIS
Starts background jobs to search events based on AD FS Activity ID accross different computers
.DESCRIPTION
The Start-AdfsServerTrace cmdlet queries all computers' event logs for the activity ID supplied in parallel as background jobs.
Use the Receive-AdfsServerTrace cmdlet to retrieve and combine the results
This cmdlets works in AD FS 2.0 and later.
.PARAMETER activityId
Activity ID to search for. This typically comes from an AD FS error page.
.PARAMETER ComputerName
It is an array of computers, which represents the AD FS servers to try.
.EXAMPLE
Start-AdfsServerTrace -ActivityId 00000000-0000-0000-9701-0080000000df -ComputerName @("ADFSSRV1","ADFSSRV2")
Get Admin and Audits for activity ID 00000000-0000-0000-9701-0080000000df on Servers ADFSSRV1 and ADFSSRV2
.EXAMPLE
Start-AdfsServerTrace -ActivityId 00000000-0000-0000-9701-0080000000df -ComputerName (Get-Content .\Servers.txt)
Get Admin and Audits for activity ID 00000000-0000-0000-9701-0080000000df from servers in a text file
.EXAMPLE
Start-AdfsServerTrace -ActivityId 00000000-0000-0000-9701-0080000000df -IncludeDebug -ComputerName @("ADFSSRV1","ADFSSRV2")
Get Admin and Audits for activity ID 00000000-0000-0000-9701-0080000000df on Server ADFSSRV1 and ADFSSRV2, including debug traces
.NOTES
You need to run this function using an account that has permissions to read the event logs in all computers supplied.
This is typically achieved having the account be part of the "Event Log Readers" Local Security Group.
The computers supplied also should have firewall rules configured to allow remote readings.
#>
Function Start-AdfsServerTrace
{
Write-DeprecationNotice
} |
CommonHealthChecks.ps1 | ADFSDiagnostics-3.0.2 | # ADFS Service State
Function TestIsAdfsRunning()
{
$testName = "IsAdfsRunning"
$serviceStateOutputKey = "ADFSServiceState"
try
{
$adfsServiceStateTestResult = New-Object TestResult -ArgumentList($testName);
$adfsServiceState = (Get-WmiObject win32_service | Where-Object {$_.name -eq "adfssrv"}).State
If ($adfsServiceState -ne "Running")
{
$adfsServiceStateTestResult.Result = [ResultType]::Fail;
$adfsServiceStateTestResult.Detail = "Current State of adfssrv is: $adfsServiceState";
}
$adfsServiceStateTestResult.Output = @{$serviceStateOutputKey = $adfsServiceState}
return $adfsServiceStateTestResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestTLSMismatch
{
$testName = "TestTLSMismatch";
try
{
$testResult = New-Object TestResult -ArgumentList ($testName)
$tls10Enabled = IsTlsVersionEnabled("1.0");
$tls11Enabled = IsTlsVersionEnabled("1.1");
$tls12Enabled = IsTlsVersionEnabled("1.2");
# If all TLS versions are enabled then there shouldn't be a mismatch between ADFS and WAP.
if ($tls10Enabled -and $tls11Enabled -and $tls12Enabled)
{
return $testResult;
}
$str = "{0}{1}{2}" -f [int]$tls10Enabled, [int]$tls11Enabled, [int]$tls12Enabled;
switch ($str)
{
"000"
{
Out-Verbose "All TLS versions are disabled"
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "Detected that all TLS versions are disabled. This will cause problems between your STS and Proxy servers. Fix this by enabling the correct TLS version.";
}
"001"
{
$message = "Detected that only TLS 1.2 is enabled. Ensure that this is also enabled on your other STS and Proxy servers.";
Out-Warning $message;
$testResult.Detail = $message;
$testResult.Result = [ResultType]::Warning;
}
"010"
{
$message = "Detected that only TLS 1.1 is enabled. Ensure that this is also enabled on your other STS and Proxy servers.";
Out-Warning $message;
$testResult.Detail = $message;
$testResult.Result = [ResultType]::Warning;
}
"100"
{
$message = "Detected that only TLS 1.0 is enabled. Ensure that this is also enabled on your other STS and Proxy servers.";
Out-Warning $message;
$testResult.Detail = $message;
$testResult.Result = [ResultType]::Warning;
}
}
return $testResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception;
}
}
Function TestAdfsEventLogs
{
$testName = "TestAdfsEventLogs";
Out-Verbose "Running test to check event logs for event ids known to be associated with WAP issues."
try
{
$testResult = New-Object TestResult -ArgumentList ($testName);
$adfsVersion = Get-AdfsVersion;
if($adfsVersion -eq $null)
{
throw "Unable to determine AD FS version."
}
$pastPeriod = (Get-Date).AddDays(-7);
if ($adfsVersion -eq $adfs2x)
{
$logName = "AD FS 2.0/Admin";
}
else
{
$logName = "AD FS/Admin";
}
Out-Verbose "Event log name = $logName";
$role = Get-AdfsRole;
switch ($role)
{
$adfsRoleSTS
{
# These are the event IDs for events on AD FS that are known to be related to WAP problems.
$id = @(276);
}
$adfsRoleProxy
{
# These are the event IDs for events on WAP that are known to be related to WAP problems.
$id = @(224, 393, 394);
}
default
{
throw "Unable to determine server role."
}
}
Out-Verbose "Checking event IDs = $id";
$events = Get-WinEvent -FilterHashTable @{LogName = $logName; StartTime = $pastPeriod; ID = $id} -ErrorAction SilentlyContinue;
if ($events -ne $null -and $events.Count -ne 0)
{
Out-Verbose "Found events that indicate a problem with WAP and AD FS."
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "There were events found in the AD FS event logs that may be causing issues with the AD FS and WAP trust. Check the output for more details."
$testResult.Output = @{"Events" = $events};
}
return $testResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception;
}
}
Function TestTimeSync
{
Param(
[string[]]
$adfsServers = $null
)
Out-Verbose "Checking time synchronization."
$testName = "TestTimeSync";
try
{
$testResult = New-Object TestResult -ArgumentList ($testName);
if (Test-RunningRemotely)
{
$testResult.Detail = "This test does not need to run remotely.";
$testResult.Result = [ResultType]::NotRun;
return $testResult;
}
$role = Get-AdfsRole;
switch ($role)
{
$adfsRoleSTS
{
Out-Verbose "Detected that the current server is an ADFS server.";
if ($adfsServers -eq $null -or $adfsServers.Count -eq 0)
{
Out-Verbose "No farm information was provided. Only checking time synchronization with the local server and reliable time server."
if (!(IsServerTimeInSyncWithReliableTimeServer))
{
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "This server's time is out of sync with reliable time server. Check and correct any time synchronization issues."
}
}
else
{
Out-Verbose "Detected that farm information was available, checking time synchronization across multiple servers.";
$serversNotInSync = @();
Out-Verbose "Checking localhost";
if (!(IsServerTimeInSyncWithReliableTimeServer))
{
$serversNotInSync += "Localhost";
}
foreach ($server in $adfsServers)
{
$session = New-PSSession -ComputerName $server -ErrorAction SilentlyContinue;
if ($session -eq $null)
{
Out-Warning "There was a problem connecting to $server, skipping this server."
continue;
}
Out-Verbose "Checking $server";
$Private = @(Get-ChildItem -Path $PSScriptRoot\*.ps1 -ErrorAction SilentlyContinue);
$commonFunctions = (Get-Command $Private).ScriptContents;
$commonFunctions = $commonFunctions -join [Environment]::NewLine;
$isInSync = Invoke-Command -Session $session -ArgumentList $commonFunctions -ScriptBlock {
Param(
$commonFunctions
)
Invoke-Expression $commonFunctions;
return IsServerTimeInSyncWithReliableTimeServer;
}
if (!$isInSync)
{
$serversNotInSync += $server;
}
Remove-PSSession $session
}
if ($serversNotInSync.Count -ne 0)
{
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "Some of the servers in your AD FS farm were out of sync with reliable time server. Check the output for a list of servers."
$testResult.Output = @{ "ServersOutOfSync" = $serversNotInSync; }
}
}
}
$adfsRoleProxy
{
Out-Verbose "Detected that the current server is a WAP server.";
if (!(IsServerTimeInSyncWithReliableTimeServer))
{
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "This server's time is out of sync with reliable time server. Check and correct any time synchronization issues."
}
}
default
{
throw "Unable to determine server role."
}
}
return $testResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception;
}
} |
Test-AdfsServerHealthSingleCheck.ps1 | ADFSDiagnostics-3.0.2 | Function Test-AdfsServerHealthSingleCheck
{
Write-DeprecationNotice
} |
Set-ADFSDiagTestMode.ps1 | ADFSDiagnostics-3.0.2 | #for testability
$testMode = $false
Function Set-ADFSDiagTestMode
{
Write-DeprecationNotice
} |
AdfsProxyHealthChecks.ps1 | ADFSDiagnostics-3.0.2 | Function TestIsAdfsProxyRunning
{
$testName = "TestIsAdfsProxyRunning";
$serviceStateOutputKey = "ADFSProxyServiceState";
$testResult = New-Object TestResult -ArgumentList($testName);
try
{
$adfsProxyServiceState = Get-ServiceState($adfsProxyServiceName);
if ($adfsProxyServiceState -ne "Running")
{
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "Current state of $adfsProxyServiceName is: $adfsProxyServiceState";
}
$testResult.Output = @{$serviceStateOutputKey = $adfsProxyServiceState};
return $testResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestSTSReachableFromProxy()
{
$testName = "STSReachableFromProxy"
$exceptionKey = "STSReachableFromProxyException"
try
{
$mexUrlTestResult = New-Object TestResult -ArgumentList($testName);
$mexUrlTestResult.Output = @{$exceptionKey = "NONE"}
$proxyInfo = gwmi -Class ProxyService -Namespace root\ADFS
$stsHost = $proxyInfo.HostName + ":" + $proxyInfo.HostHttpsPort
$mexUrl = "https://" + $stsHost + "/adfs/services/trust/mex";
$webClient = New-Object net.WebClient;
try
{
$data = $webClient.DownloadData($mexUrl);
#If the mex is successfully downloaded from proxy, then the test is deemed succesful
}
catch [Net.WebException]
{
$exceptionEncoded = [System.Web.HttpUtility]::HtmlEncode($_.Exception.ToString());
$mexUrlTestResult.Result = [ResultType]::Fail;
$mexUrlTestResult.Detail = $exceptionEncoded;
$mexUrlTestResult.Output.Set_Item($exceptionKey, $exceptionEncoded)
}
return $mexUrlTestResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestNoNonSelfSignedCertificatesInRootStore
{
$testName = "TestNoNonSelfSignedCertificateInRootStore";
$testResult = New-Object TestResult -ArgumentList($testName)
$certificateOutputKey = "NonSelfSignedCertificates";
try
{
$nonSelfSignedCertificates = Get-ChildItem Cert:\LocalMachine\root -Recurse | Where-Object {$_.Issuer -ne $_.Subject} | Select-Object FriendlyName, Issuer, Subject, Thumbprint;
if ($nonSelfSignedCertificates.Count -ne 0)
{
$testResult.Detail = "There were non-self-signed certificates found in the root store. Move them to the intermediate store.";
$testResult.Result = [ResultType]::Fail;
$testResult.Output = @{$certificateOutputKey = $nonSelfSignedCertificates};
}
return $testResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestProxySslBindings
{
Param(
[Parameter(Mandatory = $true)]
[string]
$AdfsSslThumbprint
)
$testName = "TestProxySslBindings";
$testResult = New-Object TestResult -ArgumentList($testName);
Out-Verbose "Parameter AdfsSslThumbprint = $AdfsSslThumbprint";
try
{
$bindings = GetSslBindings;
Out-Verbose "Attempting to get federation service name.";
$proxyInfo = Get-WmiObject -Class ProxyService -Namespace root\ADFS
$federationServiceName = $proxyInfo.HostName;
Out-Verbose "Retrieved federation service name: $federationServiceName.";
$adfsPort = $proxyInfo.HostHttpsPort;
$tlsPort = $proxyInfo.TlsClientPort;
Out-Verbose "Retrieved ADFS Port: $adfsPort TLS Port: $tlsPort";
$erroneousBindings = @{}
# Expected SSL bindings
Out-Verbose "Attempting to validate expected SSL bindings."
$ret = IsSslBindingValid -Bindings $bindings -BindingIpPortOrHostnamePort $($federationServiceName + ":" + $adfsPort) -CertificateThumbprint $AdfsSslThumbprint
if (!($ret.IsValid))
{
$erroneousBindings[$($federationServiceName + ":" + $adfsPort)] = $ret["Detail"];
}
$bindings.Remove($($federationServiceName + ":" + $adfsPort));
$ret = IsSslBindingValid -Bindings $bindings -BindingIpPortOrHostnamePort $($federationServiceName + ":" + $tlsPort) -CertificateThumbprint $AdfsSslThumbprint -VerifyCtlStoreName $false;
if (!($ret.IsValid))
{
$erroneousBindings[$($federationServiceName + ":" + $tlsPort)] = $ret["Detail"];
}
$bindings.Remove($($federationServiceName + ":" + $tlsPort));
# Check custom bindings that match the AD FS Application Id
foreach ($key in $bindings.Keys)
{
if ($bindings[$key]["Application ID"] -eq $adfsApplicationId)
{
Out-Verbose "Checking custom SSL certificate binding $key.";
# We can only validate the Thumbprint here since we do not know which ip/hostname port this binding is for.
$ret = IsSslBindingValid -Bindings $bindings -BindingIpPortOrHostnamePort $key -CertificateThumbprint $AdfsSslThumbprint -VerifyCtlStoreName $false;
if (!($ret.IsValid))
{
$erroneousBindings[$key] = $ret["Detail"];
}
}
}
if ($erroneousBindings.Count -ne 0)
{
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "There were SSL bindings found that were incorrect. Check the output for more detail.";
$testResult.Output = @{"ErroneousBindings" = $erroneousBindings};
}
return $testResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
|
build.ps1 | ADFSDiagnostics-3.0.2 | [cmdletbinding()]
param(
[string[]]$Task = 'default', # This task is defined in psakeBuild. We are just setting a default here.
[switch]
$CodeCoverage = $false
)
# Verify that we have PackageManagement module installed
if (!(Get-Command Install-Module))
{
throw 'PackageManagement is not installed. You need V5 or https://www.microsoft.com/en-us/download/details.aspx?id=51451'
}
# Verify that our testing utilities are installed.
if (!(Get-Module -Name Pester -ListAvailable))
{
Install-Module -Name Pester
}
if (!(Get-Module -Name psake -ListAvailable))
{
Install-Module -Name Psake
}
if (!(Get-Module -Name PSScriptAnalyzer -ListAvailable))
{
Install-Module -Name PSScriptAnalyzer
}
# Run our test
Invoke-psake -buildFile "$PSScriptRoot\psakeBuild.ps1" -taskList $Task -Verbose:$VerbosePreference -parameters @{"CodeCoverage" = $CodeCoverage}
|
CertificateUtilities.ps1 | ADFSDiagnostics-3.0.2 | Function Create-CertCheckName
{
param(
[string]
$certType,
[string]
$checkName,
[bool]
$isPrimary = $true
)
$primaryOrSecondary = "Secondary"
if ($isPrimary)
{
$primaryOrSecondary = "Primary"
}
return "Test-Certificate-{0}-{1}-{2}" -f $certType, $primaryOrSecondary, $checkName
}
Function Create-CertificateCheckResult
{
param (
[System.Security.Cryptography.X509Certificates.X509Certificate2]
$cert,
[string]
$testName,
[ResultType]
$result,
[Parameter(Mandatory = $false)]
[string]
$detail = $null
)
$testResult = New-Object TestResult -ArgumentList($testName)
$testResult.Result = $result
$testResult.Detail = $detail
if ($cert)
{
$testResult.Output = @{$tpKey = $cert.Thumbprint}
}
return $testResult
}
function Verify-IsCertExpired
{
param (
[System.Security.Cryptography.X509Certificates.X509Certificate2]
$cert
)
return ($cert.NotAfter - (Get-Date)).TotalDays -le 0
}
function Verify-IsCertSelfSigned
{
param (
[System.Security.Cryptography.X509Certificates.X509Certificate2]
$cert
)
return $cert.Subject -eq $cert.IssuerName.Name
}
function Generate-NotRunResults
{
param(
[string]
$certificateType,
[string]
$notRunReason,
[bool]
$isPrimary = $true
)
$results = @()
$results += Test-CertificateAvailable -adfsCertificate $null -certificateType $certType -isPrimary $isPrimary -notRunReason $notRunReason
$results += Test-CertificateSelfSigned -cert $null -certificateType $certType -isPrimary $isPrimary -notRunReason $notRunReason
$results += Test-CertificateHasPrivateKey -cert $null -certificateType $certType -isPrimary $isPrimary -notRunReason $notRunReason -storeName "" -storeLocation ""
$results += Test-CertificateExpired -cert $null -certificateType $certType -isPrimary $isPrimary -notRunReason $notRunReason
$results += Test-CertificateCRL -cert $null -certificateType $certType -isPrimary $isPrimary -notRunReason $notRunReason
$results += Test-CertificateAboutToExpire -cert $null -certificateType $certType -isPrimary $isPrimary -notRunReason $notRunReason
return $results
}
Function Get-AdfsCertificateList([switch] $RemovePrivateKey)
{
$adfsCertificateCollection = @()
$adfsTokenCerts = Get-AdfsCertificate
foreach ($adfsTokenCert in $adfsTokenCerts)
{
$certToAdd = new-Object PSObject
if ($RemovePrivateKey)
{
$tokenCert = GetNormalizedCert $adfsTokenCert.Certificate
}
else
{
$tokenCert = $adfsTokenCert.Certificate
}
$certToAdd | Add-Member -NotePropertyName "Certificate" -NotePropertyValue $tokenCert
$certToAdd | Add-Member -NotePropertyName "CertificateType" -NotePropertyValue $adfsTokenCert.CertificateType
$certToAdd | Add-Member -NotePropertyName "IsPrimary" -NotePropertyValue $adfsTokenCert.IsPrimary
$certToAdd | Add-Member -NotePropertyName "StoreName" -NotePropertyValue $adfsTokenCert.StoreName
$certToAdd | Add-Member -NotePropertyName "StoreLocation" -NotePropertyValue $adfsTokenCert.StoreLocation
$certToAdd | Add-Member -NotePropertyName "Thumbprint" -NotePropertyValue $adfsTokenCert.Thumbprint
$adfsCertificateCollection += $certToAdd
}
$adfsSslBinding = GetSslBinding
$sslCertToAdd = new-Object PSObject
if ($RemovePrivateKey)
{
$sslCert = GetNormalizedCert $adfsSslBinding.Certificate
}
else
{
$sslCert = $adfsSslBinding.Certificate
}
$sslCertToAdd | Add-Member -NotePropertyName "Certificate" -NotePropertyValue $sslCert
$sslCertToAdd | Add-Member -NotePropertyName "CertificateType" -NotePropertyValue "SSL"
$sslCertToAdd | Add-Member -NotePropertyName "IsPrimary" -NotePropertyValue $true
$sslCertToAdd | Add-Member -NotePropertyName "StoreName" -NotePropertyValue ([System.Security.Cryptography.X509Certificates.StoreName]::My)
$sslCertToAdd | Add-Member -NotePropertyName "StoreLocation" -NotePropertyValue ([System.Security.Cryptography.X509Certificates.StoreLocation]::LocalMachine)
$sslCertToAdd | Add-Member -NotePropertyName "Thumbprint" -NotePropertyValue ($adfsSslBinding.Thumbprint)
$adfsCertificateCollection += $sslCertToAdd
return $adfsCertificateCollection
}
Function Get-AdfsCertificatesToTest()
{
$endpoints = Get-AdfsEndpoint | where {$_.SecurityMode -eq 'Message' -and $_.Enabled -eq $true -and $_.AddressPath -ne '/adfs/services/trusttcp/windows'}
$skipCommCert = ($endpoints -eq $null)
$adfsCertificateCollection = Get-AdfsCertificateList
if ($skipCommCert)
{
$adfsCertificateCollection = $adfsCertificateCollection | where {$_.CertificateType -ne "Service-Communications"}
}
return $adfsCertificateCollection
}
Function GetNormalizedCert([System.Security.Cryptography.X509Certificates.X509Certificate2]$cert)
{
if ($null -eq $cert)
{
return $null
}
$publicCertPortionBytes = [Byte[]]$cert.Export([System.Security.Cryptography.X509Certificates.X509ContentType]::Cert)
$certToReturn = New-Object -Type System.Security.Cryptography.X509Certificates.X509Certificate2
$certToReturn.Import($publicCertPortionBytes)
return $certToReturn
}
function VerifyCertificateCRL($cert, $revocationCheckSetting)
{
if ( $null -eq $cert )
{
return $null
}
$certSubject = $cert.Subject
$isSelfSigned = $certSubject -eq $cert.IssuerName.Name
if ($isSelfSigned)
{
#mark the test as passing for self-signed certificates
$result = new-Object -TypeName PSObject
$result | Add-Member -MemberType NoteProperty -Name Subject -Value $cert.Subject
$result | Add-Member -MemberType NoteProperty -Name IsSelfSigned -Value $isSelfSigned
$result | Add-Member -MemberType NoteProperty -Name Thumbprint -Value $cert.Thumbprint
$result | Add-Member -MemberType NoteProperty -Name VerifyResult -Value "N/A"
$result | Add-Member -MemberType NoteProperty -Name ChainBuildResult -Value @()
$result | Add-Member -MemberType NoteProperty -Name ChainStatus -Value $true
return $result
}
$chainBuildResult = $true
$chainStatus = $null
$verifyResult = $cert.Verify()
#If set to none, ADFS will not even check this so ... scrap the results
#to avoid surfacing noise to the user
if ($revocationCheckSetting -ne "None")
{
$chain = New-Object System.Security.Cryptography.X509Certificates.X509Chain
$chain.ChainPolicy.UrlRetrievalTimeout = New-TimeSpan -Seconds 10
$chain.ChainPolicy.VerificationFlags = "AllowUnknownCertificateAuthority"
switch ($revocationCheckSetting)
{
"CheckEndCert"
{
$chain.ChainPolicy.RevocationFlag = "EndCertificateOnly"
$chain.ChainPolicy.RevocationMode = "Online"
}
"CheckEndCertCacheOnly"
{
$chain.ChainPolicy.RevocationFlag = "EndCertificateOnly"
$chain.ChainPolicy.RevocationMode = "Offline"
}
"CheckChain"
{
$chain.ChainPolicy.RevocationFlag = "EntireChain"
$chain.ChainPolicy.RevocationMode = "Online"
}
"CheckChainCacheOnly"
{
$chain.ChainPolicy.RevocationFlag = "EntireChain"
$chain.ChainPolicy.RevocationMode = "Offline"
}
"CheckChainExcludeRoot"
{
$chain.ChainPolicy.RevocationFlag = "ExcludeRoot"
$chain.ChainPolicy.RevocationMode = "Online"
}
"CheckChainExcludeRootCacheOnly"
{
$chain.ChainPolicy.RevocationFlag = "ExcludeRoot"
$chain.ChainPolicy.RevocationMode = "Offline"
}
default
{
$chain.ChainPolicy.RevocationFlag = "EntireChain"
$chain.ChainPolicy.RevocationMode = "Online"
}
}
$chainBuildResult = $chain.Build($cert)
$chainStatus = $chain.ChainStatus
}
$certSubject = $cert.Subject
$isSelfSigned = $certSubject -eq $cert.IssuerName.Name
$result = new-Object -TypeName PSObject
$result | Add-Member -MemberType NoteProperty -Name Subject -Value $cert.Subject
$result | Add-Member -MemberType NoteProperty -Name IsSelfSigned -Value $isSelfSigned
$result | Add-Member -MemberType NoteProperty -Name Thumbprint -Value $cert.Thumbprint
$result | Add-Member -MemberType NoteProperty -Name VerifyResult -Value $verifyResult
$result | Add-Member -MemberType NoteProperty -Name ChainBuildResult -Value $chainBuildResult
$result | Add-Member -MemberType NoteProperty -Name ChainStatus -Value $chainStatus
return $result
} |
AdfsHealthChecks.Test.ps1 | ADFSDiagnostics-3.0.2 | # Determine our script root
$parent = Split-Path $PSScriptRoot -Parent
$script:root = Split-Path $parent -Parent
# Load module via definition
Import-Module $script:root\ADFSDiagnostics.psd1 -Force
InModuleScope ADFSDiagnostics {
# Shared constants
$sharedError = "Error message"
$sharedErrorException = "System.Management.Automation.RuntimeException: Error message"
Describe "TestTrustedDevicesCertificateStore" {
It "should pass" {
# Arrange
Mock -CommandName Get-Item -MockWith { return New-Object PSObject -Property @{
"StoreNames" = @{"AdfsTrustedDevices" = $true}
}}
# Act
$ret = TestTrustedDevicesCertificateStore
# Assert
$ret.Result | should beexactly Pass
}
It "should fail" {
# Arrange
Mock -CommandName Get-Item -MockWith { return New-Object PSObject -Property @{
"StoreNames" = @{}
}}
# Act
$ret = TestTrustedDevicesCertificateStore
# Assert
$ret.Result | should beexactly Fail
$ret.Detail | should beexactly "The AdfsTrustedDevices certificate store does not exist."
}
It "should error" {
Mock -CommandName Get-Item -MockWith { throw $sharedError }
# Act
$ret = TestTrustedDevicesCertificateStore
# Assert
$ret.Result | should beexactly Error
$ret.ExceptionMessage | should beexactly $sharedError
$ret.Exception | should beexactly $sharedErrorException
}
}
Describe "TestAdfsPatches" {
It "should pass" {
# Arrange
Mock -CommandName Get-OsVersion -MockWith { return [OSVersion]::WS2012R2 }
Mock -CommandName Get-HotFix -MockWith { return $true }
# Act
$ret = TestAdfsPatches
# Assert
$ret.Result | should beexactly Pass
}
It "should fail" {
# Arrange
Mock -CommandName Get-OsVersion -MockWith { return [OSVersion]::WS2012R2 }
Mock -CommandName Get-HotFix -MockWith { return $false }
# Act
$ret = TestAdfsPatches
# Assert
$ret.Result | should beexactly Fail
$ret.Detail | should beexactly "There were missing patches that are not installed."
$ret.Output.MissingAdfsPatches | should not benullorempty
}
It "should not run" {
# Arrange
Mock -CommandName Get-OsVersion -MockWith { return [OSVersion]::WS2016 }
# Act
$ret = TestAdfsPatches
# Assert
$ret.Result | should beexactly NotRun
}
It "should error" {
# Arrange
Mock -CommandName Get-OsVersion -MockWith { throw $sharedError }
# Act
$ret = TestAdfsPatches
# Assert
$ret.Result | should beexactly Error
$ret.ExceptionMessage | should beexactly $sharedError
$ret.Exception | should beexactly $sharedErrorException
}
}
Describe "TestServicePrincipalName" {
BeforeAll {
$_upnServiceAccount = "[email protected]"
$_samServiceAccount = "contoso\aadcsvc"
$_path = "CN=aadcsvc,CN=Managed Service Accounts,DC=contoso,DC=com"
$_fullPath = "LDAP://$_path"
$_incorrectLdapPath = "LDAP://CN=badAccount,CN=Managed Service Accounts,DC=contoso,DC=com"
$_hostname = "sts.contoso.com"
}
Context "should pass" {
BeforeAll {
Mock -CommandName Test-RunningOnAdfsSecondaryServer -MockWith { return $false }
Mock -CommandName IsLocalUser -MockWith { return $false }
Mock -CommandName IsAdfsServiceRunning -MockWith { return $true }
Mock -CommandName GetObjectsFromAD -MockWith { return New-Object PSObject -Property @{ "Path" = $_fullPath } }
Mock -CommandName Retrieve-AdfsProperties -MockWith { return New-Object PSObject -Property @{ "Hostname" = $_hostname }}
Mock -CommandName Invoke-Expression -MockWith { return @("Existing SPN found!", $_path) } -ParameterFilter { $Command -eq "setspn -f -q HOST/$_hostname"}
Mock -CommandName Invoke-Expression -MockWith { return @("Existing SPN found!", $_path) } -ParameterFilter { $Command -eq "setspn -f -q HTTP/$_hostname"}
}
It "should pass when service account is in UPN format" {
# Arrange
Mock -CommandName Get-WmiObject -MockWith { return New-Object PSObject -Property @{ "StartName" = $_upnServiceAccount; "Name" = $adfsServiceName } }
# Act
$ret = TestServicePrincipalName
# Assert
$ret.Result | should beexactly Pass
}
It "should pass when service account is in SAM format" {
# Arrange
Mock -CommandName Get-WmiObject -MockWith { return New-Object PSObject -Property @{ "StartName" = $_samServiceAccount; "Name" = $adfsServiceName } }
# Act
$ret = TestServicePrincipalName
# Assert
$ret.Result | should beexactly Pass
}
It "should pass when no HTTP SPN is found" {
# Arrange
Mock -CommandName Invoke-Expression -MockWith { return @("No such SPN found.") } -ParameterFilter { $Command -eq "setspn -f -q HTTP/$_hostname"}
Mock -CommandName Get-WmiObject -MockWith { return New-Object PSObject -Property @{ "StartName" = $_upnServiceAccount; "Name" = $adfsServiceName } }
# Act
$ret = TestServicePrincipalName
# Assert
$ret.Result | should beexactly Pass
}
}
Context "should fail" {
BeforeAll {
Mock -CommandName Test-RunningOnAdfsSecondaryServer -MockWith { return $false }
Mock -CommandName IsLocalUser -MockWith { return $false }
Mock -CommandName IsAdfsServiceRunning -MockWith { return $true }
Mock -CommandName GetObjectsFromAD -MockWith { return New-Object PSObject -Property @{ "Path" = $_fullPath } }
Mock -CommandName Retrieve-AdfsProperties -MockWith { return New-Object PSObject -Property @{ "Hostname" = $_hostname }}
Mock -CommandName Get-WmiObject -MockWith { return New-Object PSObject -Property @{ "StartName" = $_upnServiceAccount; "Name" = $adfsServiceName } }
}
It "when no HOST SPN is found" {
# Arrange
Mock -CommandName Invoke-Expression -MockWith { return ("No such SPN found.") } -ParameterFilter { $Command -eq "setspn -f -q HOST/$_hostname"}
# Act
$ret = TestServicePrincipalName
# Assert
$ret.Result | should beexactly Fail
$ret.Detail | should beexactly "No such SPN was found for $_hostname"
}
It "when HOST SPN resolved service account does not match" {
# Arrange
Mock -CommandName Invoke-Expression -MockWith { return ("Existing SPN found!" + [Environment]::NewLine + "$_incorrectLdapPath") } -ParameterFilter { $Command -eq "setspn -f -q HOST/$_hostname"}
# Act
$ret = TestServicePrincipalName
# Assert
$ret.Result | should beexactly Fail
$ret.Detail | should beexactly "An existing SPN was found for HOST/$_hostname but it did not resolve to the ADFS service account."
}
It "when HTTP SPN resolved service account does not match" {
# Arrange
Mock -CommandName Invoke-Expression -MockWith { return ("Existing SPN found!" + [Environment]::NewLine + "$_path") } -ParameterFilter { $Command -eq "setspn -f -q HOST/$_hostname"}
Mock -CommandName Invoke-Expression -MockWith { return ("Existing SPN found!" + [Environment]::NewLine + "$_incorrectLdapPath") } -ParameterFilter { $Command -eq "setspn -f -q HTTP/$_hostname"}
# Act
$ret = TestServicePrincipalName
# Assert
$ret.Result | should beexactly Fail
$ret.Detail | should beexactly "An existing SPN was found for HTTP/$_hostname but it did not resolve to the ADFS service account."
}
}
Context "should not run" {
It "when on secondary server" {
# Arrange
Mock -CommandName Test-RunningOnAdfsSecondaryServer -MockWith { return $true }
# Act
$ret = TestServicePrincipalName
# Assert
$ret.Result | should beexactly NotRun
$ret.Detail | should beexactly "This check runs only on Primary Nodes."
}
It "when local user" {
# Arrange
Mock -CommandName Test-RunningOnAdfsSecondaryServer -MockWith { return $false }
Mock -CommandName IsLocalUser -MockWith { return $true }
# Act
$ret = TestServicePrincipalName
# Assert
$ret.Result | should beexactly NotRun
$ret.Detail | should beexactly "Current user madpatel is not a domain account. Cannot execute this test"
}
It "when AD FS is not running" {
# Arrange
Mock -CommandName Test-RunningOnAdfsSecondaryServer -MockWith { return $false }
Mock -CommandName IsLocalUser -MockWith { return $false }
Mock -CommandName IsAdfsServiceRunning -MockWith { return $false }
# Act
$ret = TestServicePrincipalName
# Assert
$ret.Result | should beexactly NotRun
$ret.Detail | should beexactly "AD FS service is not running"
}
}
Context "should error" {
BeforeAll {
Mock -CommandName Test-RunningOnAdfsSecondaryServer -MockWith { return $false }
Mock -CommandName IsLocalUser -MockWith { return $false }
Mock -CommandName IsAdfsServiceRunning -MockWith { return $true }
}
It "when service account is empty" {
# Arrange
Mock -CommandName Get-WmiObject -MockWith { return New-Object PSObject -Property @{"Name" = $adfsServiceName; "StartName" = $null}}
# Act
$ret = TestServicePrincipalName
# Assert
$ret.Result | should beexactly Error
$ret.ExceptionMessage | should beexactly "ADFS Service account is null or empty. The WMI configuration is in an inconsistent state"
$ret.Exception | should beexactly "System.Management.Automation.RuntimeException: ADFS Service account is null or empty. The WMI configuration is in an inconsistent state"
}
It "when service account is not in expected SAM format" {
# Arrange
Mock -CommandName Get-WmiObject -MockWith { return New-Object PSObject -Property @{"Name" = $adfsServiceName; "StartName" = "badAccount"}}
# Act
$ret = TestServicePrincipalName
# Assert
$ret.Result | should beexactly Error
$ret.ExceptionMessage | should beexactly "Unexpected value of the service account badAccount. Expected in DOMAIN\\User format"
$ret.Exception | should beexactly "System.Management.Automation.RuntimeException: Unexpected value of the service account badAccount. Expected in DOMAIN\\User format"
}
}
}
Describe "TestProxyTrustPropagation" {
BeforeAll {
$_adfsServers = @("sts1.contoso.com", "sts2.contoso.com", "sts3.contoso.com")
$_primaryCertificates = @("Cert1", "Cert2", "Cert3")
$_missingCertificates = @("Cert2", "Cert3")
# since we have to mock out the remote PSSessions that gets created we just return the a PSSession to localhost
# we create these session before the actual test because once we mock New-PSSession we cannot unmock it
$localPSForPassTest = @()
$localPSForFailTest = @()
for ($i = 0; $i -lt $_adfsServers.Count; $i++)
{
$localPSForPassTest += New-PSSession -ComputerName localhost -ErrorAction Stop
$localPSForFailTest += New-PSSession -ComputerName localhost -ErrorAction Stop
}
}
It "should pass" {
# Arrange
Mock -CommandName Test-RunningOnAdfsSecondaryServer -MockWith { return $false }
Mock -CommandName GetCertificatesFromAdfsTrustedDevices -MockWith { return $_primaryCertificates }
$script:itr = 0
Mock -CommandName New-PSSession -MockWith {
$session = $localPSForPassTest[$script:itr]
$script:itr += 1
return $session
}
# Since we get all of the functions from the private folder and run Invoke-Expression on them; that replaces the function's mock with the original function.
# We avoid this by setting the invoke expression within this script block to do nothing.
Mock Invoke-Command {
Return $ScriptBlock.InvokeWithContext(@{"Invoke-Expression" = {}; "VerifyCertificatesArePresent" = { return @() }}, @())
}
# Act
$ret = TestProxyTrustPropagation $_adfsServers
# Assert
$ret.Result | should beexactly Pass
}
It "should warn because no AD FS farm information was provided" {
# Arrange
Mock -CommandName Test-RunningOnAdfsSecondaryServer -MockWith { return $false }
Mock -CommandName Out-Warning -MockWith { }
# Act
$ret = TestProxyTrustPropagation
# Assert
Assert-MockCalled Out-Warning
$ret.Result | should beexactly Warning
$ret.Detail | should beexactly "No AD FS farm information was provided. Specify the list of servers in your farm using the -adfsServers flag."
}
It "should warn because it cannot connect to an AD FS server" {
# Arrange
Mock -CommandName Test-RunningOnAdfsSecondaryServer -MockWith { return $false }
Mock -CommandName GetCertificatesFromAdfsTrustedDevices -MockWith { return $_primaryCertificates }
Mock -CommandName New-PSSession -MockWith { $null }
Mock -CommandName Out-Warning -MockWith { }
# Act
$ret = TestProxyTrustPropagation $_adfsServers
# Assert
Assert-MockCalled Out-Warning 3
}
It "should fail" {
# Arrange
Mock -CommandName Test-RunningOnAdfsSecondaryServer -MockWith { return $false }
Mock -CommandName GetCertificatesFromAdfsTrustedDevices -MockWith { return $_primaryCertificates }
$script:itr = 0
Mock -CommandName New-PSSession -MockWith {
$session = $localPSForPassTest[$script:itr]
$script:itr += 1
return $session
}
# Since we get all of the functions from the private folder and run Invoke-Expression on them; that replaces the function's mock with the original function.
# We avoid this by setting the invoke expression within this script block to do nothing.
Mock Invoke-Command {
Return $ScriptBlock.InvokeWithContext(@{"Invoke-Expression" = {}; "VerifyCertificatesArePresent" = { return $_missingCertificates }}, @())
}
# Act
$ret = TestProxyTrustPropagation $_adfsServers
# Assert
$ret.Result | should beexactly Fail
$ret.Detail | should beexactly "There were missing certificates on some of the secondary servers. There may be an issue with proxy trust propogation."\
$_adfsServers | ForEach-Object {
$server = $_
$_missingCertificates | ForEach-Object {
$ret.Output.ErroneousCertificates[$server] | should contain $_
}
}
}
It "should not run when on secondary server" {
# Arrange
Mock -CommandName Test-RunningOnAdfsSecondaryServer -MockWith { return $true }
# Act
$ret = TestProxyTrustPropagation
# Assert
$ret.Result | should beexactly NotRun
$ret.Detail | should beexactly "This check runs only on Primary Nodes."
}
It "should error" {
# Arrange
Mock -CommandName Test-RunningOnAdfsSecondaryServer -MockWith { throw $sharedError }
# Act
$ret = TestProxyTrustPropagation
# Assert
$ret.Result | should beexactly Error
$ret.ExceptionMessage | should beexactly $sharedError
$ret.Exception | should beexactly $sharedErrorException
}
}
} |
Constants.ps1 | ADFSDiagnostics-3.0.2 | ####################################
# Constants
####################################
$adfs3 = "3.0";
$adfs2x = "2.0";
$adfsRoleSTS = "STS";
$adfsRoleProxy = "Proxy";
$tpKey = "Thumbprint";
$sslCertType = "SSL";
$adfsServiceName = "adfssrv";
$adfsProxyServiceName = "appproxysvc";
$ctlStoreName = "AdfsTrustedDevices";
$localMachine = "LocalMachine";
$adfsApplicationId = "{5d89a20c-beab-4389-9447-324788eb944a}";
$TlsPath = "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS {0}";
$TlsServerPath = "{0}\Server";
$TlsClientPath = "{0}\Client";
$timeDifferenceMaximum = 300; #seconds
$Tls10 = [System.Net.SecurityProtocolType]::Tls;
$Tls11 = [System.Net.SecurityProtocolType]::Tls11;
$Tls12 = [System.Net.SecurityProtocolType]::Tls12;
$none = "NONE";
$script:adfsProperties = $null;
$script:isAdfsSyncPrimaryRole = $null;
# Email address regex taken from MSDN: http://msdn.microsoft.com/en-us/library/01escwtf.aspx
$EmailAddressRegex = "^(?("")("".+?(?<!\\)""@)|(([0-9a-z]((\.(?!\.))|[-!#\$%&'\*\+/=\?\^`\{\}\|~\w])*)(?<=[0-9a-z])@))(?(\[)(\[(\d{1,3}\.){3}\d{1,3}\])|(([0-9a-z][-0-9a-z]*[0-9a-z]*\.)+[a-z0-9][\-a-z0-9]{0,22}[a-z0-9]))$";
$AdHealthAgentRegistryKeyPath = "HKLM:\SOFTWARE\Microsoft\AdHealthAgent"
#reference: Microsoft.Agent.Health.AgentUpdater
Add-Type -Language CSharp @"
public static class RegistryValueName
{
public const string TemporaryUpdaterLogPath = "TemporaryUpdaterLogPath";
public const string NumberOfFailedAttempts = "NumFailedAttempts";
public const string LastUpdateAttempt = "LastUpdateAttempt";
public const string LastUpdateAttemptReadable = "LastUpdateAttemptReadable";
public const string VersionOfUpdate = "UpdateVersion";
public const string UpdateState = "UpdateState";
public const string InstallerExitCode = "InstallerExitCode";
public const string CurrentVersion = "Version";
}
"@; |
Get-AdfsSystemInformation.ps1 | ADFSDiagnostics-3.0.2 | <#
.SYNOPSIS
Retrieves overall details of the computer
.DESCRIPTION
The Get-AdfsSystemConfiguration gathers information regarding operating system and hardware
.EXAMPLE
Get-AdfsSystemConfiguration | ConvertTo-Json | Out-File ".\ADFSFarmDetails.txt"
Get the operating system data of the server and save it in JSON format
#>
Function Get-AdfsSystemInformation()
{
Write-DeprecationNotice
} |
AdfsHealthChecks.ps1 | ADFSDiagnostics-3.0.2 | # Windows Internal Database Service State if it is used by ADFS
Function TestIsWidRunning()
{
$testName = "IsWidRunning"
$serviceStateKey = "WIDServiceState"
$serviceStartModeKey = "WIDServiceStartMode"
try
{
$adfsConfigurationDbTestResult = New-Object TestResult -ArgumentList($testName);
$adfsConfigurationDb = (Get-WmiObject -namespace root/ADFS -class SecurityTokenService).Properties["ConfigurationDatabaseConnectionString"].Value;
If ($adfsConfigurationDb.Contains("microsoft##wid") -or $adfsConfigurationDb.Contains("microsoft##ssee"))
{
$widService = (Get-WmiObject win32_service | Where-Object {$_.DisplayName.StartsWith("Windows Internal Database")})
$widServiceState = $widService.State
if ($widServiceState.Count -ne $null -and $widServiceState.Count -gt 1)
{
$widServiceState = $widServiceState[0];
}
If ($widServiceState -ne "Running")
{
$adfsConfigurationDbTestResult.Result = [ResultType]::Fail;
$adfsConfigurationDbTestResult.Detail = "Current State of WID Service is: $widServiceState";
}
$adfsConfigurationDbTestResult.Output = @{$serviceStateKey = $widServiceState; $serviceStartModeKey = $widService.StartMode}
return $adfsConfigurationDbTestResult;
}
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
# Ping Federation metadata page on localhost
Function TestPingFederationMetadata()
{
$testName = "PingFederationMetadata"
$exceptionKey = "PingFedmetadataException"
try
{
$fedmetadataUrlTestResult = New-Object TestResult -ArgumentList($testName);
$fedmetadataUrlTestResult.Output = @{$exceptionKey = "NONE"}
$sslBinding = GetSslBinding
$fedmetadataUrl = "https://" + $sslBinding.HostNamePort + "/federationmetadata/2007-06/federationmetadata.xml";
$webClient = New-Object net.WebClient;
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}
try
{
$data = $webClient.DownloadData($fedmetadataUrl);
}
catch [Net.WebException]
{
$exceptionEncoded = [System.Web.HttpUtility]::HtmlEncode($_.Exception.ToString());
$fedmetadataUrlTestResult.Result = [ResultType]::Fail;
$fedmetadataUrlTestResult.Detail = $exceptionEncoded;
$fedmetadataUrlTestResult.Output.Set_Item($exceptionKey, $exceptionEncoded)
}
return $fedmetadataUrlTestResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestSslBindings()
{
$adfsVersion = Get-AdfsVersion
$testName = "CheckAdfsSslBindings"
$sslBindingsKey = "SSLBindings"
$sslOutputs = @{$sslBindingsKey = $none}
$sslBindingsTestResult = New-Object TestResult -ArgumentList $testName
$isAdfsServiceRunning = IsAdfsServiceRunning;
if (Test-RunningOnAdfsSecondaryServer)
{
return Create-NotRunOnSecondaryTestResult $testName
}
if ($isAdfsServiceRunning -eq $false)
{
$sslBindingsTestResult.Result = [ResultType]::NotRun;
$sslBindingsTestResult.Detail = "AD FS service is not running";
return $sslBindingsTestResult;
}
try
{
if ($adfsVersion -eq $adfs3)
{
$adfsSslBindings = Get-AdfsSslCertificate;
$tlsClientPort = $adfsProperties.TlsClientPort
if (($adfsSslBindings | where {$_.PortNumber -eq $tlsClientPort}).Count -eq 0)
{
$sslBindingsTestDetail += "SSL Binding missing for port $tlsClientPort, Certificate Authentication will fail.`n";
}
$httpsPort = $adfsProperties.HttpsPort
if (($adfsSslBindings | where {$_.PortNumber -eq $httpsPort}).Count -eq 0)
{
$sslBindingsTestDetail += "SSL Binding missing for port $httpsPort, AD FS requests will fail.";
}
$sslOutputs.Set_Item($sslBindingsKey, $adfsSslBindings)
}
else
{
if ($adfsVersion -eq $adfs2x)
{
Import-Module WebAdministration;
#for ADFS 2.0, we need to find the SSL bindings.
$httpsPort = GetHttpsPort
$sslBinding = GetSslBinding
if ($sslBinding -eq $null)
{
$sslBindingsTestDetail += "SSL Binding missing for port " + $httpsPort.ToString() + ", AD FS requests will fail.";
}
else
{
$sslOutputs.Set_Item($sslBindingsKey, $sslBinding)
}
}
}
$sslBindingsTestResult.Output = $sslOutputs
if ($sslBindingsTestDetail)
{
$sslBindingsTestResult.Result = [ResultType]::Fail;
$sslBindingsTestResult.Detail = $sslBindingsTestDetail;
}
return $sslBindingsTestResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
function Test-AdfsCertificates ()
{
$primaryCertificateTypes = @("Service-Communications", "Token-Decrypting", "Token-Signing", "SSL")
$secondaryCerticateTypes = $primaryCertificateTypes | ? {$_ -ne "Service-Communications" -and $_ -ne "SSL"}
$primaryValues = @{$true = $primaryCertificateTypes; $false = $secondaryCerticateTypes}
$results = @()
$notRunTests = $false
$notRunReason = ""
if (-not (IsAdfsServiceRunning))
{
$notRunTests = $true
$notRunReason = "AD FS Service is not running"
}
try
{
if (Test-RunningOnAdfsSecondaryServer)
{
$notRunTests = $true
$notRunReason = "This check does not run on AD FS Secondary Server"
}
}
catch
{
$notRunTests = $true
$notRunReason = "Cannot verify sync status of AD FS Server " + $_.Exception.ToString()
}
if ($notRunTests)
{
foreach ($isPrimary in $primaryValues.Keys)
{
foreach ($certType in $primaryValues.Item($isPrimary))
{
$results += Generate-NotRunResults -certificateType $certType -notRunReason $notRunReason -isPrimary $isPrimary
}
}
return $results
}
$certsToCheck = Get-AdfsCertificatesToTest
foreach ($isPrimary in $primaryValues.Keys)
{
foreach ($certType in $primaryValues.Item($isPrimary))
{
$adfsCerts = @($certsToCheck | where {$_.CertificateType -eq $certType -and $_.IsPrimary -eq $isPrimary})
foreach ($adfsCert in $adfsCerts)
{
if ($null -eq $adfsCert)
{
$results += Generate-NotRunResults -certificateType $certType -notRunReason "Not Testing Certificate of type $certType`nIsPrimary: $isPrimary" -isPrimary $isPrimary
continue
}
#Order Here is Relevant: If NotRunReason gets set, then other tests will inherit that reason, (and won't run)
$notRunReason = ""
$availableResult = Test-CertificateAvailable -adfsCertificate $adfsCert -certificateType $certType -isPrimary $isPrimary
$results += $availableResult
$thumbprint = $adfsCert.Thumbprint
$cert = $adfsCert.Certificate
$storeName = $adfsCert.StoreName
$storeLocation = $adfsCert.StoreLocation
if ([String]::IsNullOrEmpty($notRunReason) -and (($availableResult.Result -eq [ResultType]::Fail) -or ($cert -eq $null)))
{
$notRunReason = "$certType certificate with thumbprint $thumbprint cannot be found."
}
$results += Test-CertificateSelfSigned -cert $cert -certificateType $certType -isPrimary $isPrimary -notRunReason $notRunReason
$results += Test-CertificateHasPrivateKey -cert $cert -certificateType $certType -isPrimary $isPrimary -notRunReason $notRunReason -storeName $storeName -storeLocation $storeLocation
$results += Test-CertificateExpired -cert $cert -certificateType $certType -isPrimary $isPrimary -notRunReason $notRunReason
$results += Test-CertificateCRL -cert $cert -certificateType $certType -isPrimary $isPrimary -notRunReason $notRunReason
if ([String]::IsNullOrEmpty($notRunReason) -and (Verify-IsCertExpired -cert $cert))
{
$notRunReason = "Certificate is already expired."
}
$results += Test-CertificateAboutToExpire -cert $cert -certificateType $certType -isPrimary $isPrimary -notRunReason $notRunReason
}
}
}
return $results
}
Function TestADFSDNSHostAlias
{
$testName = "CheckFarmDNSHostResolution"
$farmNameKey = "FarmName"
$resolvedHostKey = "ResolvedHost"
$serviceAccountKey = "AdfsServiceAccount"
$errorKey = "ErrorMessage"
try
{
if (Test-RunningOnAdfsSecondaryServer)
{
return Create-NotRunOnSecondaryTestResult $testName
}
#Set this as a warning because WIA can succeed if the service account
#has the SPNs for the host the DNS resolves to
$testResult = New-Object TestResult -ArgumentList ($testName)
$isAdfsServiceRunning = IsAdfsServiceRunning
if ($isAdfsServiceRunning -eq $false)
{
$testResult.Result = [ResultType]::NotRun;
$testResult.Detail = "AD FS service is not running";
return $testResult;
}
$farmName = (Retrieve-AdfsProperties).HostName
$serviceAccountName = (Get-WmiObject win32_service | Where-Object {$_.name -eq "adfssrv"}).StartName
$resolutionResult = [System.Net.Dns]::GetHostEntry($farmName)
$resolvedHostName = $resolutionResult.HostName
if ($resolvedHostName -ne $farmName)
{
$testResult.Result = [ResultType]::Fail
$testResult.Detail = "Farm Name '" + $farmName + "' is resolved as host '" + $resolvedHostName + "'. This might break windows integrated authentication scenarios.`n"
$testResult.Detail += "Adfs Service Account: " + $serviceAccountName
}
else
{
$testResult.Result = [ResultType]::Pass
}
$testResult.Output = @{$farmNameKey = $farmName; $resolvedHostKey = $resolvedHostName; $serviceAccountKey = $serviceAccountName}
return $testResult
}
catch [System.Net.Sockets.SocketException]
{
$testResult = New-Object TestResult -ArgumentList($testName);
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "Could not resolve the farm name {0} with exception '{1}'" -f $farmName, $_.Exception.Message;
$testResult.Output = @{$farmNameKey = $farmName; $serviceAccountKey = $serviceAccountName; $errorKey = $_.Exception.ToString()}
return $testResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestADFSDuplicateSPN
{
$testName = "CheckDuplicateSPN"
$farmSPNKey = "ADFSFarmSPN"
$serviceAccountKey = "ServiceAccount"
$spnObjKey = "SpnObjects"
try
{
if (Test-RunningOnAdfsSecondaryServer)
{
return Create-NotRunOnSecondaryTestResult $testName
}
#Verify there are no duplicate Service Principal Names (SPN) for the farm
$testResult = New-Object TestResult -ArgumentList ($testName)
if (IsLocalUser -eq $true)
{
$testResult.Result = [ResultType]::NotRun
$testResult.Detail = "Current user " + $env:USERNAME + " is not a domain account. Cannot execute this test"
return $testResult
}
$isAdfsServiceRunning = IsAdfsServiceRunning
if ($isAdfsServiceRunning -eq $false)
{
$testResult.Result = [ResultType]::NotRun;
$testResult.Detail = "AD FS service is not running";
return $testResult;
}
#Search both the service account and the holder of the SPN in the directory
$adfsServiceAccount = (Get-WmiObject win32_service | Where-Object {$_.name -eq "adfssrv"}).StartName
if ([String]::IsNullOrWhiteSpace($adfsServiceAccount))
{
throw "ADFS Service account is null or empty. The WMI configuration is in an inconsistent state"
}
$serviceAccountParts = $adfsServiceAccount.Split('\\')
if ($serviceAccountParts.Length -ne 2)
{
throw "Unexpected value of the service account $adfsServiceAccount. Expected in DOMAIN\\User format"
}
$serviceAccountDomain = $serviceAccountParts[0]
$serviceSamAccountName = $serviceAccountParts[1]
$farmName = (Retrieve-AdfsProperties).HostName
$farmSPN = "host/" + $farmName
$spnResults = GetObjectsFromAD -domain $serviceAccountDomain -filter "(servicePrincipalName=$farmSPN)"
$svcAcctSearcherResults = GetObjectsFromAD -domain $serviceAccountDomain -filter "(samAccountName=$serviceSamAccountName)"
#root cause: no SPN at all
if (($spnResults -eq $null) -or ($spnResults.Count -eq 0))
{
$testResult.Result = [ResultType]::Fail
$testResult.Detail = "No objects in the directory with SPN $farmSPN are found." + [System.Environment]::NewLine + "AD FS Service Account: " + $adfsServiceAccount
$testResult.Output = @{$farmSPNKey = $farmSPN; $serviceAccountKey = $adfsServiceAccount; $spnObjKey = "NONE"}
return $testResult
}
#root cause: Could not find the service account. This should be very rare
if (($svcAcctSearcherResults -eq $null) -or ($svcAcctSearcherResults.Count -eq 0))
{
$testResult.Result = [ResultType]::Fail
$testResult.Detail = "Did not find the service account $adfsServiceAccount in the directory"
$testResult.Output = @{$farmSPNKey = $farmSPN; $serviceAccountKey = $adfsServiceAccount; $spnObjKey = $spnResults[0].Properties.distinguishedname}
return $testResult
}
if ($svcAcctSearcherResults.Count -ne 1)
{
$testResult.Result = [ResultType]::Fail
$testResult.Detail = = [String]::Format("Did not find 1 result for the service account in the directory. Found={0}", $svcAcctSearcherResults.Count)
$testResult.Output = @{$farmSPNKey = $farmSPN; $serviceAccountKey = $adfsServiceAccount; $spnObjKey = $spnResults[0].Properties.distinguishedname}
return $testResult
}
#root cause: multiple SPN
if ($spnResults.Count -gt 1)
{
$testDetail = "Multiple objects are found in the directory with SPN:" + $farmSPN + [System.Environment]::NewLine + "Objects with SPN: " + [System.Environment]::NewLine
$spnObjects = @()
for ($i = 0; $i -lt $spnResults.Count; $i++)
{
$testDetail += $spnResults[$i].Properties.distinguishedname + [System.Environment]::NewLine
$spnObjects += $spnResults[$i].Properties.distinguishedname
}
$testDetail += "AD FS Service Account: " + $adfsServiceAccount
$testResult.Result = [ResultType]::Fail
$testResult.Detail = $testDetail
$testResult.Output = @{$farmSPNKey = $farmSPN; $serviceAccountKey = $adfsServiceAccount; $spnObjKey = $spnObjects}
return $testResult
}
#root cause: SPN is in the wrong account
if ($spnResults.Count -eq 1)
{
$spnDistinguishedName = $spnResults[0].Properties.distinguishedname
$svcAccountDistinguishedName = $svcAcctSearcherResults[0].Properties.distinguishedname
$spnObjectGuid = [Guid]$spnResults[0].Properties.objectguid.Item(0)
$svcAccountObjectGuid = [Guid]$svcAcctSearcherResults[0].Properties.objectguid.Item(0)
if ($spnObjectGuid -eq $svcAccountObjectGuid)
{
$testResult.Result = [ResultType]::Pass
$testResult.Detail = "Found SPN in object: " + $spnDistinguishedName
$testResult.Output = @{$farmSPNKey = $farmSPN; $serviceAccountKey = $adfsServiceAccount; $spnObjKey = $spnResults[0].Properties.distinguishedname}
return $testResult
}
else
{
$testResult.Result = [ResultType]::Fail
$testResult.Detail = "Found SPN in object: " + $spnDistinguishedName + " but it does not correspond to service account " + $svcAccountDistinguishedName
$testResult.Output = @{$farmSPNKey = $farmSPN; $serviceAccountKey = $adfsServiceAccount; $spnObjKey = $spnResults[0].Properties.distinguishedname}
return $testResult
}
}
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestServiceAccountProperties
{
$testName = "TestServiceAccountProperties"
$testResult = New-Object TestResult -ArgumentList ($testName)
$serviceAcctKey = "AdfsServiceAccount"
$userAcctCtrlKey = "AdfsServiceAccountUserAccountControl"
$acctDisabledKey = "AdfsServiceAccountDisabled"
$acctPwdExpKey = "AdfsServiceAccountPwdExpired"
$acctLockedKey = "AdfsServiceAccountLockedOut"
$testResult.Output = @{`
$serviceAcctKey = $none; `
$userAcctCtrlKey = $none; `
$acctDisabledKey = $none; `
$acctPwdExpKey = $none; `
$acctLockedKey = $none
}
try
{
if (Test-RunningOnAdfsSecondaryServer)
{
return Create-NotRunOnSecondaryTestResult $testName
}
$Adfssrv = get-wmiobject win32_service | where {$_.Name -eq "adfssrv"}
$UserName = ((($Adfssrv.StartName).Split("\"))[1]).ToUpper()
$testResult.Output.Set_Item($serviceAcctKey, $Adfssrv.StartName)
if (($UserName -ne "NETWORKSERVICE") -or ($UserName -ne "NETWORK SERVICE"))
{
$searcher = new-object DirectoryServices.DirectorySearcher([ADSI]"")
$searcher.filter = "(&(objectClass=user)(sAMAccountName=$UserName))"
$founduser = $searcher.findOne()
if (-not $founduser)
{
$testResult.Result = [ResultType]::Fail
$testResult.Detail = "Adfs Service Account: " + $Adfssrv.StartName + "`nNot found in Active Directory"
return $testResult
}
if (-not $founduser.psbase.properties.useraccountcontrol)
{
$testResult.Result = [ResultType]::Fail
$testResult.Detail = "Adfs Service Account: " + $Adfssrv.StartName + "`nHas no useraccountcontrol property"
return $testResult
}
$testResult.Output.Set_Item($userAcctCtrlKey, $founduser.psbase.properties.useraccountcontrol[0])
$accountDisabled = $founduser.psbase.properties.useraccountcontrol[0] -band 0x02
$testResult.Output.Set_Item($acctDisabledKey, $accountDisabled)
$pwExpired = $founduser.psbase.properties.useraccountcontrol[0] -band 0x800000
$testResult.Output.Set_Item($acctPwdExpKey, $pwExpired)
$accountLockedOut = $founduser.psbase.properties.useraccountcontrol[0] -band 0x0010
$testResult.Output.Set_Item($acctLockedKey, $accountLockedOut)
if ($accountDisabled -or $pwExpired -or $accountLockedOut)
{
$accountEnabled = -not $accountDisabled
$testResult.Result = [ResultType]::Fail
$testResult.Detail = "Adfs Service Account: " + $Adfssrv.StartName + "`nPassword Expired:$pwExpired`nAccount Enabled: $accountEnabled`nAccount Locked Out: $accountLockedOut"
return $testResult
}
$testResult.Result = [ResultType]::Pass
return $testResult
}
else
{
$testResult.Result = [ResultType]::NotRun
$testResult.Detail = "ADFS Service Account: " + $Adfssrv.StartName
return $testResult
}
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestAppPoolIDMatchesServiceID()
{
$adfsVersion = Get-AdfsVersion
$testName = "TestAppPoolIDMatchesServiceID"
$testResult = New-Object TestResult -ArgumentList ($testName)
$pipelineModeKey = "AdfsAppPoolPipelineMode"
if ($adfsVersion -ne $adfs2x)
{
$testResult.Result = [ResultType]::NotRun
$testResult.Detail = "Test only to be run on ADFS 2.0"
return $testResult
}
try
{
Push-Location $env:windir\system32\inetsrv -ErrorAction SilentlyContinue
$PipelineMode = .\appcmd list apppool adfsapppool /text:pipelinemode
$testResult.Output = @{$pipelineModeKey = $PipelineMode}
If ($PipelineMode.ToUpper() -eq "INTEGRATED")
{
$testResult.Result = [ResultType]::Pass
return $testResult
}
$testResult.Result = [ResultType]::Fail
$testResult.Detail = "Adfs Pipelinemode: " + $PipelineMode
return $testResult
}
catch [System.Management.Automation.CommandNotFoundException]
{
$testResult.Result = [ResultType]::NotRun
$errStr = "Could not execute appcmd.exe because it could not be found."
$testResult.Detail = $errStr
$testResult.ExceptionMessage = $errStr
return $testResult
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
finally
{
Pop-Location
}
}
Function TestComputerNameEqFarmName
{
$testName = "TestComputerNameEqFarmName"
$testResult = New-Object TestResult -ArgumentList ($testName)
$farmNameKey = "AdfsFarmName"
$compNameKey = "ComputerName"
try
{
if (Test-RunningOnAdfsSecondaryServer)
{
return Create-NotRunOnSecondaryTestResult $testName
}
$computerName = ($env:COMPUTERNAME + "." + $env:USERDNSDOMAIN).ToUpper()
$farmName = ((Retrieve-AdfsProperties).HostName).ToUpper()
$testResult.Output = @{$farmNameKey = $farmName; $compNameKey = $computerName}
if ($computerName -eq $farmName)
{
$testResult.Result = [ResultType]::Fail
$testResult.Detail = "Computer Name: $computerName`nADFS Farm Name: $farmName"
return $testResult
}
$testResult.Result = [ResultType]::Pass
return $testResult
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestSSLUsingADFSPort()
{
$adfsVersion = Get-AdfsVersion
$testName = "TestSSLUsingADFSPort"
$testResult = New-Object TestResult -ArgumentList ($testName)
$sslTpKey = "AdfsSSLCertThumbprint"
$httpsPortKey = "AdfsHttpsPort"
$sslBindingsKey = "AdfsSSLBindings"
$testResult.Output = @{$sslTpKey = $none; $httpsPortKey = $none; $sslBindingsKey = $none}
try
{
if ($adfsVersion -ne $adfs2x)
{
$testResult.Result = [ResultType]::NotRun
$testResult.Detail = "Test only to be run on ADFS 2.0 Machine"
return $testResult
}
if (Test-RunningOnAdfsSecondaryServer)
{
return Create-NotRunOnSecondaryTestResult $testName
}
$httpsPort = (Retrieve-AdfsProperties).HttpsPort
$sslBinding = GetSslBinding
$AdfsCertThumbprint = $sslBinding.Thumbprint
$SSLPortMatch = get-webbinding | where-object {$_.certificateHash -eq $AdfsCertThumbprint} | where-object {$_.bindingInformation.Contains($httpsPort)}
$SSLPortMatchStrs = @()
$SSLPortMatch | foreach { $strs += $_.ToString() }
$testResult.Output.Set_Item($sslTpKey, $AdfsCertThumbprint)
$testResult.Output.Set_Item($httpsPortKey, $httpsPort)
if (($SSLPortMatch | measure).Count -gt 0)
{
$testResult.Output.Set_Item($sslBindingsKey, $SSLPortMatchStrs)
$sslMatches = "SSL Port Matches:`n"
foreach ($sslMatch in $sslPortMatch)
{
if ($sslMatch.ItemXPath.Contains("Default Web Site"))
{
$testResult.Result = [ResultType]::Pass
return $testResult
}
$sslPortMatch += $sslMatch.ItemXPath.Split("'")[1] + "`n"
}
$testResult.Result = [ResultType]::Fail
$testResult.Detail = "SSL Binding with certificate with Thumbprint: $AdfsCertThumbprint and Port: $httpsPort`n" + $sslMatches
return $testResult
}
else
{
$testResult.Result = [ResultType]::Fail
$testResult.Detail = "No SSL Binding for Certificate with Thumbprint: $AdfsCertThumbprint and Port: $httpsPort"
return $testResult
}
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestSSLCertSubjectContainsADFSFarmName()
{
$adfsVersion = Get-AdfsVersion
$testName = "TestSSLCertSubjectContainsADFSFarmName"
$testResult = New-Object TestResult -ArgumentList ($testName)
$farmNameKey = "ADFSFarmName"
$sslTpKey = "SslCertThumbprints"
try
{
if (Test-RunningOnAdfsSecondaryServer)
{
return Create-NotRunOnSecondaryTestResult $testName
}
$sslCertHashes = @()
switch ($adfsVersion)
{
$adfs3
{
foreach ($sslCert in (Get-AdfsSslCertificate))
{
if (-not $sslCertHashes.Contains($sslCert.CertificateHash))
{
$sslCertHashes += $sslCert.CertificateHash
}
}
}
$adfs2x
{
get-website -name "Default Web Site" | get-webbinding | where {-not [String]::IsNullOrEmpty($_.certificateHash)} | foreach { $sslCertHashes += $_.certificateHash}
}
default
{
$testResult.Result = [ResultType]::NotRun
$testResult.Detail = "Invalid ADFS Version"
return $testResult
}
}
$farmName = (Retrieve-AdfsProperties).HostName
$failureOutput = "ADFS Farm Name: $farmName`n"
$testResult.Output = @{$farmNameKey = $farmName; $sslTpKey = $sslCertHashes}
foreach ($thumbprint in $sslCertHashes)
{
$certToCheck = (dir Cert:\LocalMachine\My\$thumbprint)
#check if cert SAN references ADFS Farmname
# if it has an SAN that does not include the ADFS Farmname
# fail the check
$failureOutput += "Thumbprint: $thumbprint`n"
$failureOutput += "Subject: " + $certToCheck.Subject + "`n"
$sanExt = $certToCheck.Extensions | Where-Object {$_.Oid.FriendlyName -match "subject alternative name"}
If (($sanExt | measure-object).Count -gt 0)
{
$failureOutput += "SANs:`n"
$sanObjs = new-object -ComObject X509Enrollment.CX509ExtensionAlternativeNames
$altNamesStr = [System.Convert]::ToBase64String($sanExt.RawData)
$sanObjs.InitializeDecode(1, $altNamesStr)
Foreach ($SAN in $sanObjs.AlternativeNames)
{
$strValue = $SAN.strValue
$searchFilter = $strValue -replace "\*", "[\w-]+"
$searchFilter = "^" + $searchFilter + "$"
if ($farmName -match $searchFilter)
{
$testResult.Result = [ResultType]::Pass
return $testResult
}
$failureOutput += " $strValue`n"
}
}
else
{
if ($certToCheck.Subject)
{
$searchFilter = $certToCheck.Subject.Split(",=")[1]
$searchFilter = $searchFilter -replace "\*", "[\w-]+"
$searchFilter = "^" + $searchFilter + "$"
if ($farmName -match $searchFilter)
{
$testResult.Result = [ResultType]::Pass
return $testResult
}
}
}
}
$testResult.Result = [ResultType]::Fail
$testResult.Detail = $failureOutput
return $testResult
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestAdfsAuditPolicyEnabled
{
$testName = "TestAdfsAuditPolicyEnabled"
$testResult = New-Object TestResult -ArgumentList ($testName)
$auditSettingKey = "MachineAuditPolicy"
$stsAuditSetting = "StsAuditConfig"
$testResult.Output = @{`
$auditSettingKey = $none;
$stsAuditSetting = $none;
}
try
{
$auditPolicy = auditpol /get /subcategory:"{0cce9222-69ae-11d9-bed3-505054503030}" /r | ConvertFrom-Csv
$auditSetting = $auditPolicy."Inclusion Setting"
$testResult.Output.Set_Item($auditSettingKey, $auditSetting);
if ($auditSetting -ne "Success and Failure")
{
$testResult.Result = [ResultType]::Fail
$testResult.Detail = "Audits are not configured for Usage data collection : Expected 'Success and Failure', Actual='$auditSetting'"
}
else
{
#So far, passing if we have the right policy
$testResult.Result = [ResultType]::Pass
}
#and verify the STS audit setting
$role = Get-AdfsRole
if ($role -eq $adfsRoleSTS)
{
$adfsSyncSetting = (Get-ADFSSyncProperties).Role
if (IsAdfsSyncPrimaryRole)
{
$audits = (Retrieve-AdfsProperties).LogLevel | where {$_ -like "*Audits"} | Sort-Object
$auditsStr = ""
foreach ($audit in $audits)
{
$auditsStr = $auditsStr + $audit + ";"
}
$testResult.Output.Set_Item($stsAuditSetting, $auditsStr);
if ($audits.Count -ne 2)
{
$testResult.Result = [ResultType]::Fail
$testResult.Detail = $testResult.Detail + " ADFS Audits are not configured : Expected 'FailureAudits;SuccessAudits', Actual='$auditsStr'"
}
}
else
{
#Did not run on a secondary. Cannot make any assertions on whether this part of the test failed or not
$testResult.Output.Set_Item($stsAuditSetting, "(Cannot get this data from secondary node)");
}
}
else
{
#Not run on an STS
$testResult.Result = [ResultType]::Pass
$testResult.Output.Set_Item($stsAuditSetting, "N/A");
}
return $testResult
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestAdfsRequestToken($retryThreshold = 5, $sleepSeconds = 3)
{
$testName = "TestAdfsRequestToken"
$testResult = New-Object TestResult -ArgumentList ($testName)
$errorKey = "ErrorMessage"
$testResult.Output = @{$errorKey = "NONE"}
$targetEndpointUri = ""
$targetRpId = ""
try
{
$targetRpId = Get-ADFSIdentifier
if ($targetRpId -eq $null)
{
$testResult.Result = [ResultType]::NotRun;
$testResult.Detail = "Could not find the STS identifier"
return $testResult
}
$targetEndpointUri = Get-FirstEnabledWIAEndpointUri
if ($targetEndpointUri -eq $null)
{
$testResult.Result = [ResultType]::NotRun;
$testResult.Detail = "No Windows Integrated Endpoints were enabled. No token requested"
return $testResult
}
}
catch [Exception]
{
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "Unable to initialize token request. Caught Exception: " + $_.Exception.Message;
$testResult.Output.Set_Item($errorKey, $_.Exception.Message)
return $testResult;
}
$exceptionDetail = ""
for ($i = 1; $i -le $retryThreshold; $i++)
{
try
{
$tokenString = ""
#attempt to load first the synthetic transactions library, and fallback to the simpler version
ipmo .\Microsoft.Identity.Health.SyntheticTransactions.dll -ErrorAction SilentlyContinue -ErrorVariable synthTxErrVar
if ($synthTxErrVar -ne $null)
{
[Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}
$sslBinding = GetSslBinding
$tokenString = Test-AdfsServerToken -FederationServer $sslBinding.HostNamePort -AppliesTo $targetRpId
$testResult.Result = [ResultType]::Pass;
}
else
{
$token = Test-AdfsRequestTokenFromSelf -AppliesToRpIdentifier $targetRpId -EndpointUri $targetEndpointUri
$testResult.Result = [ResultType]::Pass;
if ($token -is [System.IdentityModel.Tokens.GenericXmlSecurityToken])
{
$xmlToken = $token -as [System.IdentityModel.Tokens.GenericXmlSecurityToken]
$tokenString = $xmlToken.TokenXml.OuterXml
}
else
{
$tokenString = $token.ToString()
}
}
$testResult.Detail = "Token Received: " + $tokenString + "`nTotal Attempts: $i"
return $testResult;
}
catch [Exception]
{
$exceptionDetail = "Attempt: $i`nLatest Exception caught while requesting token: " + $_.Exception.Message + "`n"
Start-Sleep $sleepSeconds
}
}
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = $exceptionDetail
$testResult.Output.Set_Item($errorKey, $exceptionDetail)
return $testResult;
}
Function TestTrustedDevicesCertificateStore
{
$testName = "TestTrustedDevicesCertificateStore";
Out-Verbose "Checking the AdfsTrustedDevices certificate store.";
$testResult = New-Object TestResult -ArgumentList($testName);
try
{
if ([bool](Get-Item Cert:\LocalMachine).StoreNames["AdfsTrustedDevices"] -ne $true)
{
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "The AdfsTrustedDevices certificate store does not exist.";
}
return $testResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestAdfsPatches
{
Out-Verbose "Testing for required Windows Server patches for AD FS.";
$testName = "TestAdfsPatches";
$patchesOutputKey = "MissingAdfsPatches";
$testResult = New-Object TestResult -ArgumentList($testName);
try
{
$osVersion = Get-OsVersion;
Out-Verbose "Detected OS version as $osVersion.";
if ($osVersion -ne [OSVersion]::WS2012R2)
{
Out-Verbose "AD FS patches are only required for Windows Server 2012 R2";
$testResult.Result = [ResultType]::NotRun;
return $testResult;
}
$patches = @(
@{"PatchId" = "KB2919355"; "PatchLink" = "https://support.microsoft.com/en-us/help/2919355/"},
@{"PatchId" = "KB3000850"; "PatchLink" = "https://support.microsoft.com/en-us/help/3000850/"},
@{"PatchId" = "KB3013769"; "PatchLink" = "https://support.microsoft.com/en-us/help/3013769/"},
@{"PatchId" = "KB3020773"; "PatchLink" = "https://support.microsoft.com/en-us/help/3020773/"}
);
$notinstalled = @();
foreach ($patch in $patches)
{
Out-Verbose "Checking patch $($patch.PatchId)";
$hotfix = Get-HotFix -Id $patch.PatchId -ErrorAction SilentlyContinue;
if (!$hotfix)
{
Out-Verbose "Could not find the following patch: $($patch.PatchId)";
$notinstalled += $patch;
}
}
if ($notinstalled.Count -ne 0)
{
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "There were missing patches that are not installed.";
$testResult.Output = @{$patchesOutputKey = $notinstalled};
}
return $testResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestServicePrincipalName
{
$testName = "TestServicePrincipalName";
Out-Verbose "Checking service principal name."
if (Test-RunningOnAdfsSecondaryServer)
{
return Create-NotRunOnSecondaryTestResult $testName
}
$testResult = New-Object TestResult -ArgumentList($testName);
try
{
if (IsLocalUser -eq $true)
{
$testResult.Result = [ResultType]::NotRun
$testResult.Detail = "Current user " + $env:USERNAME + " is not a domain account. Cannot execute this test"
return $testResult
}
if (!(IsAdfsServiceRunning))
{
$testResult.Result = [ResultType]::NotRun;
$testResult.Detail = "AD FS service is not running";
return $testResult;
}
$adfsServiceAccount = (Get-WmiObject win32_service | Where-Object {$_.name -eq $adfsServiceName}).StartName;
if ([String]::IsNullOrWhiteSpace($adfsServiceAccount))
{
throw "ADFS Service account is null or empty. The WMI configuration is in an inconsistent state";
}
Out-Verbose "Checking format of ADFS service account. $adfsServiceAccount";
if (IsUserPrincipalNameFormat($adfsServiceAccount))
{
Out-Verbose "Detected UPN format.";
$serviceSamAccountParts = $adfsServiceAccount.Split('@');
$serviceSamAccountName = $serviceSamAccountParts[0];
$serviceAccountDomain = $serviceSamAccountParts[1];
}
else
{
$serviceAccountParts = $adfsServiceAccount.Split('\\');
if ($serviceAccountParts.Length -ne 2)
{
throw "Unexpected value of the service account $adfsServiceAccount. Expected in DOMAIN\\User format";
}
$serviceAccountDomain = $serviceAccountParts[0];
$serviceSamAccountName = $serviceAccountParts[1];
}
Out-Verbose "ADFS service account = $serviceSamAccountName";
Out-Verbose "Retrieving LDAP path of service account.";
$svcAccountSearchResults = GetObjectsFromAD -domain $serviceAccountDomain -filter "(samAccountName=$serviceSamAccountName)";
$ldapPath = $svcAccountSearchResults.Path -Replace "^LDAP://", "";
Out-Verbose "Service account LDAP path = $ldapPath";
$farmName = (Retrieve-AdfsProperties).HostName;
Out-Verbose "Checking existence of HOST SPN";
$ret = Invoke-Expression "setspn -f -q HOST/$farmName";
Out-Verbose "SPN query result = $ret";
if ($ret.Contains("No such SPN found."))
{
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "No such SPN was found for $farmName";
return $testResult;
}
elseif ($ret.Contains("Existing SPN found!") -and !$ret.Contains($ldapPath))
{
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "An existing SPN was found for HOST/$farmName but it did not resolve to the ADFS service account.";
return $testResult;
}
Out-Verbose "Successfully checked HOST SPN.";
Out-Verbose "Checking existence of HTTP SPN";
$ret = Invoke-Expression "setspn -f -q HTTP/$farmName";
Out-Verbose "SPN query result = $ret";
if ($ret.Contains("No such SPN found."))
{
# HTTP does not need to resolve.
Out-Verbose "Unable to find HTTP SPN, this does not have to resolve.";
}
elseif ($ret.Contains("Existing SPN found!") -and !$ret.Contains($ldapPath))
{
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "An existing SPN was found for HTTP/$farmName but it did not resolve to the ADFS service account.";
}
return $testResult
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestProxyTrustPropagation
{
Param(
[string[]]
$adfsServers = $null
)
$testName = "TestProxyTrustPropagation";
try
{
$testResult = New-Object TestResult -ArgumentList $testName;
if (Test-RunningOnAdfsSecondaryServer)
{
return Create-NotRunOnSecondaryTestResult $testName;
}
if ($adfsServers -eq $null -or $adfsServers.Count -eq 0)
{
$testResult.Result = [ResultType]::Warning;
$message = "No AD FS farm information was provided. Specify the list of servers in your farm using the -adfsServers flag.";
Out-Warning $message;
$testResult.Detail = $message;
return $testResult;
}
Out-Verbose "Verifying that the proxy trust is propogating between the AD FS servers in the farm.";
Out-Verbose "Farm information: $adfsServers";
$certificatesInPrimaryStore = @(GetCertificatesFromAdfsTrustedDevices);
$ErroneousCertificates = @{};
foreach ($server in $adfsServers)
{
$session = New-PSSession -ComputerName $server -ErrorAction SilentlyContinue;
if ($session -eq $null)
{
Out-Warning "There was a problem connecting to $server, skipping this server."
continue;
}
Out-Verbose "Checking $server";
$def = "`$ctlStoreName = `"$ctlStoreName`"; `$localMachine = `"$localMachine`"; Function VerifyCertificatesArePresent { ${function:VerifyCertificatesArePresent} }; Function GetCertificatesFromAdfsTrustedDevices { ${function:GetCertificatesFromAdfsTrustedDevices} }"
$missingCerts = Invoke-Command -Session $session -ScriptBlock {
param(
$certificatesInPrimaryStore,
$functionDefinition
)
Invoke-Expression $functionDefinition;
return VerifyCertificatesArePresent -certificatesInPrimaryStore $certificatesInPrimaryStore
} -ArgumentList @($certificatesInPrimaryStore, $def)
if ($missingCerts.Count -ne 0)
{
$ErroneousCertificates.Add($server, $missingCerts);
}
if ($session)
{
Remove-PSSession $Session
}
}
if ($ErroneousCertificates.Count -ne 0)
{
$testResult.Result = [ResultType]::Fail;
$testResult.Detail = "There were missing certificates on some of the secondary servers. There may be an issue with proxy trust propogation."
$testResult.Output = @{"ErroneousCertificates" = $ErroneousCertificates};
}
return $testResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception;
}
}
# Check office 365 endpoints
Function TestOffice365Endpoints()
{
$testName = "CheckOffice365Endpoints"
#Keys for strongly typed Result data
$wstrustUsernameKey = "WSTrust2005UsernameMixedEnabled"
$wsTrustUsernameProxyKey = "WSTrust2005UsernameMixedProxyEnabled"
$wsTrustWindowsKey = "WSTrust2005WindowsTransportEnabled"
$wsTrustWindowsProxyKey = "WSTrust2005WindowsTransportProxyEnabled"
$passiveKey = "PassiveEnabled"
$passiveProxyKey = "PassiveProxyEnabled"
try
{
if (Test-RunningOnAdfsSecondaryServer)
{
return Create-NotRunOnSecondaryTestResult $testName
}
$lyncEndpointsTestResult = New-Object TestResult -ArgumentList($testName);
$isAdfsServiceRunning = IsAdfsServiceRunning
if ($isAdfsServiceRunning -eq $false)
{
$lyncEndpointsTestResult.Result = [ResultType]::NotRun;
$lyncEndpointsTestResult.Detail = "AD FS service is not running";
return $lyncEndpointsTestResult;
}
$adfsProperties = Retrieve-AdfsProperties
if ( $null -eq $adfsProperties )
{
$lyncEndpointsTestResult.Result = [ResultType]::Fail;
$lyncEndpointsTestResult.Detail = "Unable to read adfs properties";
return $lyncEndpointsTestResult;
}
$wstrust2005windowstransport = Get-AdfsEndpoint -AddressPath /adfs/services/trust/2005/windowstransport;
$wstrust2005usernamemixed = Get-AdfsEndpoint -AddressPath /adfs/services/trust/2005/usernamemixed;
$passive = Get-AdfsEndpoint -AddressPath /adfs/ls/;
if ($wstrust2005windowstransport.Enabled -eq $false -or $wstrust2005windowstransport.Proxy -eq $false)
{
$lyncEndpointsTestResult.Result = [ResultType]::Fail;
$lyncEndpointsTestResult.Detail = "Lync related endpoint is not configured properly; extranet users can experience authentication failure.`n";
}
if ($wstrust2005usernamemixed.Enabled -eq $false -or $wstrust2005usernamemixed.Proxy -eq $false)
{
$lyncEndpointsTestResult.Result = [ResultType]::Fail;
$lyncEndpointsTestResult.Detail += "Exchange Online related endpoint is not enabled. This will prevent rich clients such as Outlook to connect.`n";
}
if ($passive.Enabled -eq $false)
{
$lyncEndpointsTestResult.Result = [ResultType]::Fail;
$lyncEndpointsTestResult.Detail += "Passive endpoint is not enabled. This will prevent browser-based services such as Sharepoint Online or OWA to fail.`n";
}
if ($lyncEndpointsTestResult.Result -eq [ResultType]::Fail)
{
$lyncEndpointsTestResult.Detail += "Endpoint Status:`n" `
+ $wstrust2005usernamemixed.AddressPath + "`n Enabled: " + $wstrust2005usernamemixed.Enabled + "`n Proxy Enabled: " + $wstrust2005usernamemixed.Proxy + "`n" `
+ $wstrust2005windowstransport.AddressPath + "`n Enabled: " + $wstrust2005windowstransport.Enabled + "`n Proxy Enabled: " + $wstrust2005windowstransport.Proxy + "`n" `
+ $passive.AddressPath + "`n Enabled: " + $passive.Enabled + "`n Proxy Enabled: " + $passive.Proxy + "`n";
}
$lyncEndpointsTestResult.Output = @{`
$wstrustUsernameKey = $wstrust2005usernamemixed.Enabled; `
$wsTrustUsernameProxyKey = $wstrust2005usernamemixed.Proxy; `
$wsTrustWindowsKey = $wstrust2005windowstransport.Enabled; `
$wsTrustWindowsProxyKey = $wstrust2005windowstransport.Proxy; `
$passiveKey = $passive.Enabled; `
$passiveProxyKey = $passive.Proxy
}
return $lyncEndpointsTestResult;
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestADFSO365RelyingParty
{
$testName = "TestADFSO365RelyingParty"
$aadRpId = "urn:federation:MicrosoftOnline"
$rpIdKey = "MicrosoftOnlineRPID"
$rpNameKey = "MicrosoftOnlineRPDisplayName"
$rpEnabledKey = "MicrosoftOnlineRPEnabled"
$rpSignAlgKey = "MicrosoftOnlineRPSignatureAlgorithm"
try
{
if (Test-RunningOnAdfsSecondaryServer)
{
return Create-NotRunOnSecondaryTestResult $testName
}
$testResult = New-Object TestResult -ArgumentList ($testName)
$testResult.Output = @{`
$rpIdKey = $aadRpId ; `
$rpNameKey = $none ; `
$rpEnabledKey = $none ; `
$rpSignAlgKey = $none
}
$isAdfsServiceRunning = IsAdfsServiceRunning
if ($isAdfsServiceRunning -eq $false)
{
$testResult.Result = [ResultType]::NotRun;
$testResult.Detail = "AD FS service is not running";
return $testResult;
}
$aadRpName = "Microsoft Office 365 Identity Platform"
$aadRp = Get-ADFSRelyingPartyTrust -Identifier $aadRpId
if ($aadRp -eq $null)
{
$testResult.Result = [ResultType]::NotRun;
$testResult.Detail = $aadRpName + "Relying Party trust is missing`n";
$testResult.Detail += "Expected Relying Party Identifier: " + $aadRpId;
return $testResult;
}
$aadRpDetail = $false
$testPassed = $true
$testResult.Detail = ""
if (-not $aadRp.Enabled)
{
$testResult.Result = [ResultType]::Fail;
$testResult.Detail += $aadRpName + " Relying Party trust is disabled`n"
$testResult.Detail += "Relying Party Trust Display Name: " + $aadRp.Name + "`n";
$testResult.Detail += "Relying Party Trust Identifier: " + $aadRp.Identifier + "`n";
$aadRpDetail = $true
$testPassed = $false
}
if ($aadRp.SignatureAlgorithm -ne "http://www.w3.org/2001/04/xmldsig-more#rsa-sha256")
{
$testResult.Result = [ResultType]::Fail;
$testResult.Detail += $aadRpName + " Relying Party token signature algorithm is not SHA-256`n";
if (-not $aadRpDetail)
{
$testResult.Detail += "Relying Party Trust Display Name: " + $aadRp.Name + "`n";
$testResult.Detail += "Relying Party Trust Identifier: " + $aadRp.Identifier + "`n";
}
$testResult.Detail += "Relying Party Trust Signature Algorithm: " + $aadRp.SignatureAlgorithm;
$testPassed = $false
}
if ($testPassed)
{
$testResult.Result = [ResultType]::Pass
}
$testResult.Output.Set_Item($rpNameKey, $aadRp.Name)
$testResult.Output.Set_Item($rpEnabledKey, $aadRp.Enabled)
$testResult.Output.Set_Item($rpSignAlgKey, $aadRp.SignatureAlgorithm)
return $testResult
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
Function TestNtlmOnlySupportedClientAtProxyEnabled
{
$testName = "TestNtlmOnlySupportedClientAtProxyEnabled"
$outputKey = "NtlmOnlySupportedClientAtProxy"
try
{
if (Test-RunningOnAdfsSecondaryServer)
{
return Create-NotRunOnSecondaryTestResult $testName
}
$ntlmClientTestResult = New-Object TestResult -ArgumentList($testName);
$isAdfsServiceRunning = IsAdfsServiceRunning
if ($isAdfsServiceRunning -eq $false)
{
$ntlmClientTestResult.Result = [ResultType]::NotRun;
$ntlmClientTestResult.Detail = "AD FS service is not running";
return $ntlmClientTestResult;
}
$adfsProperties = Retrieve-AdfsProperties
if ( $null -eq $adfsProperties )
{
$ntlmClientTestResult.Result = [ResultType]::Fail;
$ntlmClientTestResult.Detail = "Unable to read adfs properties";
$ntlmClientTestResult.Output = @{$outputKey = "NONE"}
return $ntlmClientTestResult;
}
if ($adfsProperties.NtlmOnlySupportedClientAtProxy -eq $false)
{
$ntlmClientTestResult.Result = [ResultType]::Fail;
$ntlmClientTestResult.Detail = "NtlmOnlySupportedClientAtProxy is disabled; extranet users can experience authentication failure.`n";
}
$ntlmClientTestResult.Output = @{$outputKey = $adfsProperties.NtlmOnlySupportedClientAtProxy}
return $ntlmClientTestResult
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
|
Export-AdfsDiagnosticsFile.ps1 | ADFSDiagnostics-3.0.2 | <#
.SYNOPSIS
Gathers and exports diagnostic data into a file. This cmdlet is used with the Diagnostics Analyzer Tool on
the AD FS Help website (https://adfshelp.microsoft.com/DiagnosticsAnalyzer).
.DESCRIPTION
The Export-AdfsDiagnosticsFile cmdlet gathers diagnostic data from the current AD FS server and exports the diagnostic file
required for the AD FS Help Diagnostic Analyzer. This cmdlet works on AD FS 2.0 and later.
.PARAMETER FilePath
String parameter that specifies the location of the exported file. By default, a file will be created in the current folder.
.PARAMETER VerifyTrustCerts
Boolean parameter that will enable additional checks for relying party trust and claims provider trust certificates. It is false by default.
.PARAMETER SslThumbprint
String parameter that corresponds to the thumbprint of the AD FS SSL certificate. This is required for running test cases on proxy servers.
.PARAMETER AdfsServers
Array of fully qualified domain names (FQDN) of all of the AD FS STS servers that you want to run health checks on. For Windows Server 2016 this is automatically populated using Get-AdfsFarmInformation.
By default the tests are already run on the local machine, so it is not necessary include the FQDN of the current machine in this parameter.
.PARAMETER Local
Switch that indicates that you only want to run the health checks on the local machine. This takes precedence over -AdfsServers parameter.
.EXAMPLE
Export-AdfsDiagnosticsFile -verifyTrustCerts:$true
Export a diagnostic file of an AD FS Farm and examine the relying party trust and claims provider trust certificates.
.EXAMPLE
Export-AdfsDiagnosticsFile -adfsServers @("sts1.contoso.com", "sts2.contoso.com", "sts3.contoso.com")
Export a diagnostic file of an AD FS farm by running checks on the following servers: sts1.contoso.com, sts2.contoso.com, sts3.contoso.com. This automatically runs the test on the local machine as well.
.EXAMPLE
Export-AdfsDiagnosticsFile -sslThumbprint c1994504c91dfef663b5ce8dd22d1a44748a6e16
Export a diagnostic file of a WAP server and utilize the provided thumbprint to check SSL bindings.
#>
# the final output format is as follows (in JSON):
# diagnosticData:
# { module1: { cmdlet1.1: results, cmdlet1.2: results, ...},
# module2: { cmdlet2.1: results, ...}
# ...
# }
# where results will be the desired output or an exception message.
Function Export-AdfsDiagnosticsFile()
{
# aggregate parameters for all cmdlets
[CmdletBinding()]
Param
(
[string] $filePath = $null,
[switch] $includeTrusts = $false,
[string] $sslThumbprint = $null,
[string[]] $adfsServers = $null,
[switch] $local = $null
)
Write-DeprecationNotice
}
|
AdfsProxyHealthChecks.Test.ps1 | ADFSDiagnostics-3.0.2 | # Determine our script root
$parent = Split-Path $PSScriptRoot -Parent
$root = Split-Path $parent -Parent
# Load module via definition
Import-Module $root\ADFSDiagnostics.psd1 -Force
InModuleScope ADFSDiagnostics {
# Shared constants
$sharedError = "Error message"
$sharedErrorException = "System.Management.Automation.RuntimeException: Error message"
Describe "TestIsAdfsProxyRunning" {
It "should pass" {
# Arrange
Mock -CommandName Get-ServiceState -MockWith { return "Running" }
# Act
$ret = TestIsAdfsProxyRunning
# Assert
$ret.Result | should beexactly Pass
$ret.Output.ADFSProxyServiceState | should beexactly "Running"
}
It "should fail" {
# Arrange
Mock -CommandName Get-ServiceState -MockWith { return "Stopped" }
# Act
$ret = TestIsAdfsProxyRunning
# Assert
$ret.Result | should beexactly Fail
$ret.Output.ADFSProxyServiceState | should beexactly "Stopped"
}
It "should error" {
# Arrange
Mock -CommandName Get-ServiceState -MockWith { throw $sharedError }
# Act
$ret = TestIsAdfsProxyRunning
# Assert
$ret.Result | should beexactly Error
$ret.ExceptionMessage | should beexactly $sharedError
$ret.Exception | should beexactly $sharedErrorException
}
}
Describe "TestNoNonSelfSignedCertificatesInRootStore" {
It "should pass" {
# Arrange
$subject = "CN=TestContosoCert"
$store = "Cert:\CurrentUser\My"
$cert = New-SelfSignedCertificate -Subject $subject -CertStoreLocation $store
Mock -CommandName Get-ChildItem -MockWith { return @($cert, $cert) }
# Act
$ret = TestNoNonSelfSignedCertificatesInRootStore
$cert | Remove-Item
# Assert
$ret.Result | should beexactly Pass
}
Function CreateMockX509Certificate($issuer, $subject, $friendlyName, $thumbprint)
{
return New-Object -TypeName PSObject -Property @{
"Issuer" = $issuer
"Subject" = $subject
"FriendlyName" = $friendlyName
"Thumbprint" = $thumbprint
}
}
It "should fail" {
# Arrange
$subject = "CN=TestContosoCert"
$friendlyName = "Contoso Cert"
$issuer = "CN=TrustedAuthority"
$secondIssuer = "CN=TrustedAuthority2"
$firstThumbprint = "a909502dd82ae41433e6f83886b00d4277a32a7b"
$secondThumbprint = "32aa840238fba67210b0d779e84923d65403eda8"
$thirdThumbprint = "01a834a8b2289263d50ade7f3a700438b794e2d6"
# Since it is difficult to create an X509 certificate that is not self-signed via PowerShell we will just mock it up using a PSObject
$nonSelfSignedCert = CreateMockX509Certificate $issuer $subject $friendlyName $firstThumbprint
$secondNonSelfSignedCert = CreateMockX509Certificate $secondIssuer $subject $friendlyName $secondThumbprint
$selfSignedCert = CreateMockX509Certificate $issuer $issuer $friendlyName $thirdThumbprint
Mock -CommandName Get-ChildItem -MockWith { return @($nonSelfSignedCert, $selfSignedCert, $selfSignedCert, $secondNonSelfSignedCert) }
# Act
$ret = TestNoNonSelfSignedCertificatesInRootStore
# Assert
$ret.Result | should beexactly Fail
$ret.Detail | should beexactly "There were non-self-signed certificates found in the root store. Move them to the intermediate store."
$ret.Output.NonSelfSignedCertificates.Count | should beexactly 2
$ret.Output.NonSelfSignedCertificates[0].Subject | should beexactly $subject
$ret.Output.NonSelfSignedCertificates[0].Issuer | should beexactly $issuer
$ret.Output.NonSelfSignedCertificates[0].FriendlyName | should beexactly $friendlyName
$ret.Output.NonSelfSignedCertificates[0].Thumbprint | should beexactly $firstThumbprint
$ret.Output.NonSelfSignedCertificates[1].Subject | should beexactly $subject
$ret.Output.NonSelfSignedCertificates[1].Issuer | should beexactly $secondIssuer
$ret.Output.NonSelfSignedCertificates[1].FriendlyName | should beexactly $friendlyName
$ret.Output.NonSelfSignedCertificates[1].Thumbprint | should beexactly $secondThumbprint
}
It "should error" {
# Arrange
Mock -CommandName Get-ChildItem -MockWith { throw $sharedError }
# Act
$ret = TestNoNonSelfSignedCertificatesInRootStore
# Assert
$ret.Result | should beexactly Error
$ret.ExceptionMessage | should beexactly $sharedError
$ret.Exception | should beexactly $sharedErrorException
}
}
Describe "TestProxySslBindings" {
BeforeAll {
$_hostname = "sts.contoso.com"
$_hostHttpsPort = 443
$_hostTlsClientPort = 49443
$_adfsCertificateThumbPrint = "a909502dd82ae41433e6f83886b00d4277a32a7b"
Mock -CommandName Get-WmiObject -MockWith {
return New-Object -TypeName PSObject -Property @{
"HostName" = $_hostname
"HostHttpsPort" = $_hostHttpsPort
"TlsClientPort" = $_hostTlsClientPort
}
}
}
It "should pass" {
# Arrange
Mock -CommandName GetSslBindings -MockWith {
return @{
"CustomBinding" = @{"Application ID" = $adfsApplicationId}
}
}
Mock -CommandName IsSslBindingValid -MockWith {
return @{ "IsValid" = $true }
}
# Act
$ret = TestProxySslBindings $_adfsCertificateThumbPrint
# Assert
$ret.Result | should beexactly Pass
}
It "should fail" {
# Arrange
Mock -CommandName GetSslBindings -MockWith {
return @{
"CustomBinding" = @{"Application ID" = $adfsApplicationId}
}
}
Mock -CommandName IsSslBindingValid -MockWith {
return @{ "IsValid" = $false; "Detail" = $sharedError }
}
# Act
$ret = TestProxySslBindings $_adfsCertificateThumbPrint
# Assert
$ret.Result | should beexactly Fail
(($_hostname + ":" + $_hostHttpsPort), ($_hostname + ":" + $_hostTlsClientPort), "CustomBinding") | ForEach-Object {
$ret.Output.ErroneousBindings[$_] | should beexactly $sharedError
}
}
It "should error" {
# Arrange
Mock -CommandName GetSslBindings -MockWith { throw $sharedError }
# Act
$ret = TestProxySslBindings $_adfsCertificateThumbPrint
# Assert
$ret.Result | should beexactly Error
$ret.ExceptionMessage | should beexactly $sharedError
$ret.Exception | should beexactly $sharedErrorException
}
}
}
|
Test-AdfsServerHealth.ps1 | ADFSDiagnostics-3.0.2 | <#
.SYNOPSIS
Performs applicable health checks on the AD FS server (Proxy or STS)
.DESCRIPTION
The health checks generated by the Test-AdfsServerHealth cmdlet return a container of results with the following properties:
- Name : Mnemonic identifier for the test
- ComputerName: The name of the computer the test was run on
- Result : One value of 'Pass','Fail','NotRun','Error','Warning'
- Detail : Explanation of the 'Fail' and 'NotRun' result. It is typically empty when the check passes.
- Output : Data collected for the specific test. It is a list of Key value pairs
- ExceptionMessage: If the test encountered an exception, this property contains the exception message.
- Exception: If the test encountered an exception, this property contains the exception.
.PARAMETER VerifyO365
Boolean parameter that will enable Office 365 targeted checks. It is true by default.
.PARAMETER VerifyTrustCerts
Boolean parameter that will enable additional checks for relying party trust and claims provider trust certificates. It is false by default.
.PARAMETER SslThumbprint
String parameter that corresponds to the thumbprint of the AD FS SSL certificate. This is required for running test cases on proxy servers.
.PARAMETER AdfsServers
Array of fully qualified domain names (FQDN) of all of the AD FS STS servers that you want to run health checks on. For Windows Server 2016 this is automatically populated using Get-AdfsFarmInformation.
By default the tests are already run on the local machine, so it is not necessary include the FQDN of the current machine in this parameter.
.PARAMETER Local
Switch that indicates that you only want to run the health checks on the local machine. This takes precedence over -AdfsServers parameter.
.EXAMPLE
Test-AdfsServerHealth | Where-Object {$_.Result -ne "Pass"}
Execute test suite and get only the tests that did not pass
.EXAMPLE
Test-AdfsServerHealth -verifyOffice365:$false
Execute test suite in an AD FS farm where Office 365 is not configured
.EXAMPLE
Test-AdfsServerHealth -verifyTrustCerts:$true
Execute test suite in an AD FS farm and examine the relying party trust and claims provider trust certificates
.EXAMPLE
Test-AdfsServerHealth -adfsServers @("sts1.contoso.com", "sts2.contoso.com", "sts3.contoso.com")
Execute test suite in an AD FS farm and run the test on the following servers: ADFS1.contoso.com, ADFS2.contoso.com, ADFS3.contoso.com. This automatically runs the test on the local machine as well.
.EXAMPLE
Test-AdfsServerHealth -sslThumbprint c1994504c91dfef663b5ce8dd22d1a44748a6e16
Execute test suite on a WAP server and utilize the provided thumbprint to check SSL bindings.
.NOTES
Most of the checks require executing AD FS cmdlets. As a result:
1. The most comprehensive analysis occurs when running from the Primary Computer in a Windows Internal Database farm.
2. For secondary computers in a Windows Internal Database farm, the majority of checks will be marked as "NotRun"
3. For a SQL Server farm, all applicable tests will run succesfully.
4. If the AD FS service is stopped, the majority of checks will be returned as 'NotRun'
#>
Function Test-AdfsServerHealth()
{
Write-DeprecationNotice
} |
CommonHealthChecks.Test.ps1 | ADFSDiagnostics-3.0.2 | # Determine our script root
$parent = Split-Path $PSScriptRoot -Parent
$script:root = Split-Path $parent -Parent
# Load module via definition
Import-Module $script:root\ADFSDiagnostics.psd1 -Force
InModuleScope ADFSDiagnostics {
# Shared constants
$sharedError = "Error message"
$sharedErrorException = "System.Management.Automation.RuntimeException: Error message"
Describe "TestTLSMismatch" {
It "should pass because all TLS versions are enabled" {
# Arrange
Mock -CommandName IsTlsVersionEnabled -MockWith { return $true }
# Act
$ret = TestTlsMismatch
# Assert
$ret.Result | should be Pass
}
Context "Specific TLS versions" {
("1.0", "1.1", "1.2") | ForEach-Object {
It "should warn because only TLS $_ is enabled" {
# Arrange
$tlsVersion = $_
Mock -CommandName IsTlsVersionEnabled -MockWith { return $false } -ParameterFilter { $version -ne $tlsVersion }
Mock -CommandName IsTlsVersionEnabled -MockWith { return $true } -ParameterFilter { $version -eq $tlsVersion }
# We mock the warning function to avoid writing to console
Mock -CommandName Out-Warning -MockWith { }
# Act
$ret = TestTLSMismatch
# Assert
$ret.Result | should be Warning
$ret.Detail | should be "Detected that only TLS $tlsVersion is enabled. Ensure that this is also enabled on your other STS and Proxy servers."
Assert-MockCalled Out-Warning
}
}
}
It "should fail because all TLS versions are disabled" {
# Arrange
Mock -CommandName IsTlsVersionEnabled -MockWith { return $false }
# Act
$ret = TestTlsMismatch
# Assert
$ret.Result | should be Fail
$ret.Detail | should be "Detected that all TLS versions are disabled. This will cause problems between your STS and Proxy servers. Fix this by enabling the correct TLS version."
}
It "should error" {
# Arrange
Mock -CommandName IsTlsVersionEnabled -MockWith { throw $sharedError }
# Act
$ret = TestTLSMismatch
# Assert
$ret.Result | should be Error
$ret.ExceptionMessage | should be $sharedError
$ret.Exception | should be $sharedErrorException
}
}
Describe "TestAdfsEventLogs" {
($adfs2x, $adfs3) | ForEach-Object {
Context "AD FS version $_" {
$adfsVersionToTest = $_
Mock -CommandName Get-AdfsVersion -MockWith { return $adfsVersionToTest }
($adfsRoleSTS, $adfsRoleProxy) | ForEach-Object {
Context "server role $_" {
$adfsRoleToTest = $_
Mock -CommandName Get-AdfsRole -MockWith { return "$adfsRoleToTest" }
It "should pass because Get-WinEvent returned null" {
# Arrange
Mock -CommandName Get-WinEvent -MockWith { return $null }
# Act
$ret = TestAdfsEventLogs
# Assert
$ret.Result | should beexactly Pass
}
It "should pass because Get-WinEvent returned an empty array" {
# Arrange
Mock -CommandName Get-WinEvent -MockWith { return @() }
# Act
$ret = TestAdfsEventLogs
# Assert
$ret.Result | should beexactly Pass
}
It "should fail" {
# Arrange
Mock -CommandName Get-WinEvent -MockWith {
return @(New-Object -TypeName PSObject -Property @{
"TimeCreated" = (Get-Date)
"Id" = 270
"LevelDisplayName" = "Error"
"Message" = "The federation server proxy was not able to authenticate to the Federation Service."
})
}
# Act
$ret = TestAdfsEventLogs
# Assert
$ret.Result | should beexactly Fail
$ret.Detail | should beexactly "There were events found in the AD FS event logs that may be causing issues with the AD FS and WAP trust. Check the output for more details."
$ret.Output.Events.Id | should beexactly 270
$ret.Output.Events.LevelDisplayName | should beexactly "Error"
$ret.Output.Events.Message | should beexactly "The federation server proxy was not able to authenticate to the Federation Service."
}
}
}
It "should error because of invalid server role." {
# Arrange
Mock -CommandName Get-AdfsRole -MockWith { return "none" }
# Act
$ret = TestAdfsEventLogs
# Assert
$ret.Result | should beexactly Error
$ret.Exceptionmessage | should beexactly "Unable to determine server role."
$ret.Exception | should beexactly "System.Management.Automation.RuntimeException: Unable to determine server role."
}
}
}
It "should error because invalid AD FS Version" {
# Arrange
Mock -CommandName Get-AdfsVersion -MockWith { return $null }
# Act
$ret = TestAdfsEventLogs
# Assert
$ret.Result | should beexactly Error
$ret.ExceptionMessage | should beexactly "Unable to determine AD FS version."
$ret.Exception | should beexactly "System.Management.Automation.RuntimeException: Unable to determine AD FS version."
}
}
Describe "TestTimeSync" {
Mock -CommandName Test-RunningRemotely -MockWith { return $false }
Context "server role STS" {
Mock -CommandName Get-AdfsRole -MockWith { return $adfsRoleSTS }
Mock -CommandName Out-Warning -MockWith { }
Context "only run locally" {
It "should pass" {
# Arrange
Mock -CommandName IsServerTimeInSyncWithReliableTimeServer -MockWith { return $true }
# Act
$ret = TestTimeSync
# Assert
$ret.Result | should beexactly Pass
}
It "should fail" {
# Arrange
Mock -CommandName IsServerTimeInSyncWithReliableTimeServer -MockWith { return $false }
# Act
$ret = TestTimeSync
# Assert
$ret.Result | should beexactly Fail
$ret.Detail | should beexactly "This server's time is out of sync with reliable time server. Check and correct any time synchronization issues."
}
}
Context "run farm-wide" {
BeforeAll {
$adfsServers = @("sts1.contoso.com", "sts2.contoso.com", "sts3.contoso.com")
# since we have to mock out the remote PSSessions that gets created we just return the a PSSession to localhost
# we create these session before the actual test because once we mock New-PSSession we cannot unmock it
$localPSForPassTest = @()
$localPSForFailTest = @()
for ($i = 0; $i -lt $adfsServers.Count; $i++)
{
$localPSForPassTest += New-PSSession -ComputerName localhost -ErrorAction Stop
$localPSForFailTest += New-PSSession -ComputerName localhost -ErrorAction Stop
}
}
It "should pass" {
# Arrange
Mock -CommandName IsServerTimeInSyncWithReliableTimeServer -MockWith { return $true }
$script:itr = 0
Mock -CommandName New-PSSession -MockWith {
$session = $localPSForPassTest[$itr]
$script:itr += 1
return $session
}
# Since we get all of the functions from the private folder and run Invoke-Expression on them; that replaces the function's mock with the original function.
# We avoid this by setting the invoke expression within this script block to do nothing.
Mock Invoke-Command {
Return $ScriptBlock.InvokeWithContext(@{"Invoke-Expression" = {}}, @())
}
# Act
$ret = TestTimeSync -adfsServers $adfsServers
# Assert
$ret.Result | should beexactly Pass
}
It "should warn because it is unable to connect to remote server" {
# Arrange
Mock -CommandName IsServerTimeInSyncWithReliableTimeServer -MockWith { return $true }
Mock -CommandName New-PSSession -MockWith { return $null }
# Act
TestTimeSync -adfsServers $adfsServers
# Assert
Assert-MockCalled -CommandName Out-Warning -Times 3
}
It "should fail" {
# # Arrange
Mock -CommandName IsServerTimeInSyncWithReliableTimeServer -MockWith { return $false }
$script:itr = 0
Mock -CommandName New-PSSession -MockWith {
$session = $localPSForFailTest[$itr]
$script:itr += 1
return $session
}
# Since we get all of the functions from the private folder and run Invoke-Expression on them this replaces the function's mock with the original function.
# We avoid this by setting the invoke expression within this script block to do nothing.
Mock Invoke-Command {
Return $ScriptBlock.InvokeWithContext(@{"Invoke-Expression" = {}}, @())
}
# # Act
$ret = TestTimeSync -adfsServers $adfsServers
# Assert
$ret.Result | should beexactly Fail
($adfsServers + "Localhost") | ForEach-Object {
$ret.Output.ServersOutOfSync | should contain $_
}
}
}
}
Context "server role Proxy" {
Mock -CommandName Get-AdfsRole -MockWith {
return $adfsRoleProxy
}
It "should pass" {
# Arrange
Mock -CommandName IsServerTimeInSyncWithReliableTimeServer -MockWith { return $true }
# Act
$ret = TestTimeSync
# Assert
$ret.Result | should beexactly Pass
}
It "should fail" {
# Arrange
Mock -CommandName IsServerTimeInSyncWithReliableTimeServer -MockWith { return $false }
# Act
$ret = TestTimeSync
# Assert
$ret.Result | should beexactly Fail
$ret.Detail | should beexactly "This server's time is out of sync with reliable time server. Check and correct any time synchronization issues."
}
}
It "should not run" {
# Arrange
Mock -CommandName Test-RunningRemotely -MockWith { return $true }
# Act
$ret = TestTimeSync
# Assert
$ret.Result | should beexactly NotRun
$ret.Detail | should beexactly "This test does not need to run remotely."
}
It "should error" {
# Arrange
Mock -CommandName Get-AdfsRole -MockWith { return "none" }
Mock -CommandName Test-RunningRemotely -MockWith { return $false }
# Act
$ret = TestTimeSync
# Assert
$ret.Result | should beexactly Error
$ret.ExceptionMessage | should beexactly "Unable to determine server role."
$ret.Exception | should beexactly "System.Management.Automation.RuntimeException: Unable to determine server role."
}
}
} |
Get-AdfsVersionEx.ps1 | ADFSDiagnostics-3.0.2 | Function Get-AdfsVersionEx
{
Write-DeprecationNotice
} |
HelperUtilities.ps1 | ADFSDiagnostics-3.0.2 | Function Out-Verbose
{
Param($out)
Write-Verbose "$((Get-Variable MyInvocation -Scope 1).Value.MyCommand.Name): $out"
}
Function Out-Warning
{
Param($out)
Write-Warning "$((Get-Variable MyInvocation -Scope 1).Value.MyCommand.Name): $out"
}
Function IsAdfsSyncPrimaryRole([switch] $force)
{
if ((IsAdfsServiceRunning) -and (-not $script:adfsSyncRole -or $force))
{
try
{
$stsrole = Get-ADFSSyncProperties | Select-Object -ExpandProperty Role
$script:isAdfsSyncPrimaryRole = $stsrole -eq "PrimaryComputer"
}
catch
{
#Write-Verbose "Could not tell if running on a primary WID sync node. Returning false..."
return $false
}
}
return $script:isAdfsSyncPrimaryRole
}
Function Retrieve-AdfsProperties([switch] $force)
{
if ((IsAdfsServiceRunning) -and (-not $script:adfsProperties -or $force))
{
$isPrimary = IsAdfsSyncPrimaryRole -force $force
if ($isPrimary)
{
$script:adfsProperties = Get-AdfsProperties
}
}
return $script:adfsProperties
}
Function Test-RunningOnAdfsSecondaryServer
{
return -not (IsAdfsSyncPrimaryRole)
}
Function Test-RunningRemotely
{
return (Get-Host).Name -eq "ServerRemoteHost";
}
Function Get-AdfsVersion
{
$OSVersion = [System.Environment]::OSVersion.Version
If ($OSVersion.Major -eq 6)
{
# Windows 2012 R2
If ($OSVersion.Minor -ge 3)
{
return $adfs3;
}
Else
{
#Windows 2012, 2008 R2, 2008
If ($OSVersion.Minor -lt 3)
{
return $adfs2x;
}
}
}
If ($OSVersion.Major -eq 10)
{
# Windows Server 10
If ($OSVersion.Minor -eq 0)
{
return $adfs3;
}
}
return $null
}
Function EnvOSVersionWrapper
{
return [System.Environment]::OSVersion.Version;
}
Function Get-OsVersion
{
$OSVersion = EnvOSVersionWrapper
if (($OSVersion.Major -eq 10) -and ($OSVersion.Minor -eq 0))
{
# Windows Server 2016
return [OSVersion]::WS2016;
}
elseif ($OSVersion.Major -eq 6)
{
# Windows 2012 R2
if ($OSVersion.Minor -ge 3)
{
return [OSVersion]::WS2012R2;
}
elseif ($OSVersion.Minor -lt 3)
{
#Windows 2012
return [OSVersion]::WS2012;
}
}
return [OSVersion]::Unknown;
}
Function Import-ADFSAdminModule()
{
#Used to avoid extra calls to Add-PsSnapin so DFTs function appropriately on WS 2008 R2
if ($testMode)
{
return
}
$OSVersion = [System.Environment]::OSVersion.Version
If ($OSVersion.Major -eq 6)
{
# Windows 2012 R2 and 2012
If ($OSVersion.Minor -ge 2)
{
Import-Module ADFS
}
Else
{
#Windows 2008 R2, 2008
If ($OSVersion.Minor -lt 2)
{
if ( (Get-PSSnapin -Name Microsoft.Adfs.Powershell -ErrorAction SilentlyContinue) -eq $null )
{
Add-PsSnapin Microsoft.Adfs.Powershell
}
}
}
}
}
Function Get-AdfsRole()
{
#ADFS 2012 R2 STS: hklm:\software\microsoft\adfs FSConfigurationStatus = 2
$adfs3StsRegValue = Get-ItemProperty "hklm:\software\microsoft\adfs" -Name FSConfigurationStatus -ErrorAction SilentlyContinue
if ($adfs3StsRegValue.FSConfigurationStatus -eq 2)
{
return $adfsRoleSTS
}
#ADFS 2012 R2 Proxy: hklm:\software\microsoft\adfs ProxyConfigurationStatus = 2
$adfs3ProxyRegValue = Get-ItemProperty "hklm:\software\microsoft\adfs" -Name ProxyConfigurationStatus -ErrorAction SilentlyContinue
if ($adfs3ProxyRegValue.ProxyConfigurationStatus -eq 2)
{
return $adfsRoleProxy
}
#ADFS 2.x STS: HKLM:\Software\Microsoft\ADFS2.0\Components SecurityTokenServer = 1
$adfs2STSRegValue = Get-ItemProperty "hklm:\software\microsoft\ADFS2.0\Components" -Name SecurityTokenServer -ErrorAction SilentlyContinue
if ($adfs2STSRegValue.SecurityTokenServer -eq 1)
{
return $adfsRoleSTS
}
#ADFS 2.x Proxy: HKLM:\Software\Microsoft\ADFS2.0\Components ProxyServer = 1
$adfs2STSRegValue = Get-ItemProperty "hklm:\software\microsoft\ADFS2.0\Components" -Name ProxyServer -ErrorAction SilentlyContinue
if ($adfs2STSRegValue.ProxyServer -eq 1)
{
return $adfsRoleProxy
}
return "none"
}
Function Get-ServiceState($serviceName)
{
return (Get-Service $serviceName -ErrorAction SilentlyContinue).Status
}
Function IsAdfsServiceRunning()
{
$adfsSrv = Get-ServiceState($adfsServiceName)
return $adfsSrv -ne $null -and ($adfsSrv -eq "Running")
}
Function IsAdfsProxyServiceRunning()
{
$adfsSrv = Get-ServiceState($adfsProxyServiceName)
return $adfsSrv -ne $null -and ($adfsSrv -eq "Running")
}
Function GetHttpsPort
{
$stsrole = Get-ADFSSyncProperties | Select-Object -ExpandProperty Role
if (IsAdfsSyncPrimaryRole)
{
return (Retrieve-AdfsProperties).HttpsPort
}
else
{
#TODO: How to find the Https Port in secondaries generically?
return 443;
}
}
Function GetSslBinding()
{
#Get ssl bindings from registry. Due to limitations on the IIS powershell, we cannot use the iis:\sslbindings
#provider
$httpsPort = GetHttpsPort
$adfsVersion = Get-AdfsVersion
if ( $adfsVersion -eq $adfs2x)
{
$portRegExp = "^.*" + ":" + $httpsPort.ToString() + "$";
$bindingRegKeys = dir hklm:\system\currentcontrolset\services\http\parameters\SslBindingInfo -ErrorAction SilentlyContinue | where {$_.Name -match $portRegExp}
if ($bindingRegKeys -eq $null)
{
#no bindings found in the given port. Returning null
return $null
}
else
{
$bindingFound = ($bindingRegKeys)[0];
$bindingProps = $bindingFound | Get-ItemProperty
$name = $bindingFound.PSChildName
$bindingHost = $name.Split(':')[0]
#if the binding is the fallback 0.0.0.0 address, then point to localhost
if ($bindingHost -eq "0.0.0.0")
{
$bindingHost = "localhost"
}
$hostNamePort = $bindingHost.ToString() + ":" + $httpsPort.ToString()
$thumbprintBytes = $bindingProps.SslCertHash;
$thumbprint = ""
$thumbprintBytes | % { $thumbprint = $thumbprint + $_.ToString("X2"); }
$sslCert = dir Cert:\LocalMachine\My\$thumbprint -ErrorAction SilentlyContinue
$result = New-Object PSObject
$result | Add-Member NoteProperty -name "Name" -value $name
$result | Add-Member NoteProperty -name "Host" -value $bindingHost
$result | Add-Member NoteProperty -name "Port" -value $httpsPort
$result | Add-Member NoteProperty -name "HostNamePort" -value $hostNamePort
$result | Add-Member NoteProperty -name "Thumbprint" -value $thumbprint
$result | Add-Member NoteProperty -name "Certificate" -value $sslCert
return $result
}
}
else
{
if ($adfsVersion -eq $adfs3)
{
#select the first binding for the https port found in configuration
$sslBinding = Get-AdfsSslCertificate | Where-Object {$_.PortNumber -eq $httpsPort} | Select-Object -First 1
$thumbprint = $sslBinding.CertificateHash
$sslCert = dir Cert:\LocalMachine\My\$thumbprint -ErrorAction SilentlyContinue
$result = New-Object PSObject
$result | Add-Member NoteProperty -name "Name" -value $sslBinding.HostName
$result | Add-Member NoteProperty -name "Host" -value "localhost"
$result | Add-Member NoteProperty -name "Port" -value $httpsPort
$result | Add-Member NoteProperty -name "HostNamePort" -value ("localhost:" + $httpsPort.ToString());
$result | Add-Member NoteProperty -name "Thumbprint" -value $thumbprint
$result | Add-Member NoteProperty -name "Certificate" -value $sslCert
return $result
}
}
}
Function GetAdfsCertificatesToCheck($primaryFilter)
{
#Skip service communication cert if there are no message security endpoints
$endpoints = Get-AdfsEndpoint | where {$_.SecurityMode -eq 'Message' -and $_.Enabled -eq $true -and $_.AddressPath -ne '/adfs/services/trusttcp/windows'}
$skipCommCert = ($endpoints -eq $null)
#get all certs
$adfsCertificates = Get-AdfsCertificate | where {$_.IsPrimary -eq $primaryFilter}
if ($skipCommCert)
{
$adfsCertificates = $adfsCertificates | where {$_.CertificateType -ne "Service-Communications"}
}
return $adfsCertificates
}
function GetAdHealthAgentRegistryKeyValue($valueName, $defaultValue)
{
$agentRegistryValue = Get-ItemProperty -path $AdHealthAgentRegistryKeyPath -Name $valueName -ErrorAction SilentlyContinue
if ($agentRegistryValue -eq $null)
{
return $defaultValue;
}
else
{
return $agentRegistryValue.$valueName;
}
}
Function IsLocalUser
{
$isLocal = ($env:COMPUTERNAME -eq $env:USERDOMAIN)
return $isLocal
}
Function GetObjectsFromAD ($domain, $filter)
{
Out-Verbose "Domain = $domain, filter = $filter";
$rootDomain = New-Object System.DirectoryServices.DirectoryEntry
$searcher = New-Object System.DirectoryServices.DirectorySearcher $domain
$searcher.SearchRoot = $rootDomain
$searcher.SearchScope = "SubTree"
$props = $searcher.PropertiestoLoad.Add("distinguishedName")
$props = $searcher.PropertiestoLoad.Add("objectGuid")
$searcher.Filter = $filter
return $searcher.FindAll()
}
Function Get-FirstEnabledWIAEndpointUri()
{
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}
$cli = New-Object net.WebClient;
$sslBinding = GetSslBinding
$mexString = $cli.DownloadString("https://" + $sslBinding.HostNamePort + "/adfs/services/trust/mex")
$xmlMex = [xml]$mexString
$wiaendpoint = $xmlMex.definitions.service.port | where {$_.EndpointReference.Address -match "trust/\d+/(windows|kerberos)"} | select -First 1
if ($wiaendpoint -eq $null)
{
return $null
}
else
{
return $wiaendpoint.EndpointReference.Address
}
}
Function Get-ADFSIdentifier
{
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}
$cli = New-Object net.WebClient;
$sslBinding = GetSslBinding
$cli.Encoding = [System.Text.Encoding]::UTF8
$fedmetadataString = $cli.DownloadString("https://" + $sslBinding.HostNamePort + "/federationmetadata/2007-06/federationmetadata.xml")
$fedmetadata = [xml]$fedmetadataString
return $fedmetadata.EntityDescriptor.entityID
}
Function NetshHttpShowSslcert
{
return (netsh http show sslcert)
}
Function GetSslBindings
{
$output = NetshHttpShowSslcert | ForEach-Object {$tok = $_.Split(":"); IF ($tok.Length -gt 1 -and $tok[1].TrimEnd() -ne "" -and $tok[0].StartsWith(" ")) {$_}}
$bindings = @{};
$bindingName = "";
foreach ($bindingLine in $output)
{
$splitLine = $bindingLine.Split(":");
switch -WildCard ($bindingLine.Trim().ToLower())
{
"ip:port*"
{
$bindingName = $splitLine[2].Trim() + ":" + $splitLine[3].Trim();
$bindings[$bindingName] = @{};
}
"hostname:port*"
{
$bindingName = $splitLine[2].Trim() + ":" + $splitLine[3].Trim();
$bindings[$bindingName] = @{};
}
"certificate hash*"
{
$bindings[$bindingName].Add("Thumbprint", $splitLine[1].Trim());
}
"application id*"
{
$bindings[$bindingName].Add("Application ID", $splitLine[1].Trim());
}
"ctl store name*"
{
$bindings[$bindingName].Add("Ctl Store Name", $splitLine[1].Trim());
}
}
}
$bindings;
}
Function IsSslBindingValid
{
Param
(
# The SSL bindings dictionary
[Parameter(Mandatory = $true)]
[Object]
$Bindings,
# The IP port or hostname port
# Format: "127.0.0.0:443" or "localhost:443"
[Parameter(Mandatory = $true)]
[string]
$BindingIpPortOrHostnamePort,
# The thumbprint of the AD FS SSL certificate
[Parameter(Mandatory = $true)]
[string]
$CertificateThumbprint,
# Bool to check for Ctl Store
[Parameter(Mandatory = $false)]
[boolean]
$VerifyCtlStoreName = $true
)
$returnVal = @{}
Out-Verbose "Validating SSL binding for $BindingIpPortOrHostnamePort.";
if (!$Bindings[$BindingIpPortOrHostnamePort])
{
Out-Verbose "Fail: No binding could be found with $BindingIpPortOrHostnamePort";
$returnVal["Detail"] = "The following SSL certificate binding could not be found $BindingIpPortOrHostnamePort.";
$returnVal["IsValid"] = $false;
return $returnVal;
}
$binding = $Bindings[$BindingIpPortOrHostnamePort];
if ($binding["Thumbprint"] -ne $CertificateThumbprint)
{
Out-Verbose "Fail: Not matching thumbprint";
$returnVal["Detail"] = "The following SSL certificate binding $BindingIpPortOrHostnamePort did not match the AD FS SSL thumbprint: $CertificateThumbprint.";
$returnVal["IsValid"] = $false;
return $returnVal;
}
if ($VerifyCtlStoreName -and $binding["Ctl Store Name"] -ne $ctlStoreName)
{
Out-Verbose "Fail: Not matching Ctl store name";
$returnVal["Detail"] = "The following SSL certificate binding $BindingIpPortOrHostnamePort did not have the correct Ctl Store Name: AdfsTrustedDevices.";
$returnVal["IsValid"] = $false;
return $returnVal;
}
Out-Verbose "Successfully validated SSL binding for $BindingIpPortOrHostnamePort.";
$returnVal["IsValid"] = $true;
return $returnVal;
}
Function IsUserPrincipalNameFormat
{
Param
(
[string]
$toValidate
)
if ([string]::IsNullOrEmpty($toValidate))
{
return $false;
}
return $toValidate -Match $EmailAddressRegex;
}
Function CheckRegistryKeyExist($key)
{
return (Get-Item -LiteralPath $key -ErrorAction SilentlyContinue) -ne $null;
}
Function IsTlsVersionEnabled($version)
{
$TlsVersionPath = $TlsPath -f "$version";
Out-Verbose "Checking if TLS $version is enabled";
if (CheckRegistryKeyExist($TlsVersionPath))
{
Out-Verbose "The registry key exists for this TLS version";
$clientPath = $TlsClientPath -f $TlsVersionPath;
$serverPath = $TlsServerPath -f $TlsVersionPath;
if (CheckRegistryKeyExist($clientPath) -and CheckRegistryKeyExist($serverPath))
{
Out-Verbose "Both Client and Server keys exist.";
$clientEnabled = IsTlsVersionEnabledInternal $clientPath;
$serverEnabled = IsTlsVersionEnabledInternal $serverPath
return $clientEnabled -and $serverEnabled;
}
}
else
{
Out-Verbose "The registry key for this TLS version does not exist at $TlsVersionPath";
}
return $true;
}
Function GetValueFromRegistryKey($key, $name)
{
return $key.GetValue($name);
}
Function IsTlsVersionEnabledInternal($path)
{
Out-Verbose "Checking if version is enabled for $path";
$key = Get-Item -LiteralPath $path;
$enabled = GetValueFromRegistryKey $key "Enabled"
$disabledByDefault = GetValueFromRegistryKey $key "DisabledByDefault"
Out-Verbose "Enabled = $enabled";
Out-Verbose "DisabledByDefault = $disabledByDefault";
if (($enabled -ne $null -and $enabled -eq 0) -and ($disabledByDefault -ne $null -and $disabledByDefault -eq 1))
{
Out-Verbose "It is properly disabled";
return $false;
}
Out-Verbose "It is enabled";
return $true;
}
Function IsServerTimeInSyncWithReliableTimeServer
{
Out-Verbose "Comparing server time with reliable time server";
$originalCallback = [System.Net.ServicePointManager]::ServerCertificateValidationCallback;
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = $null;
$originalSecurityProtocol = [Net.ServicePointManager]::SecurityProtocol;
[Net.ServicePointManager]::SecurityProtocol = "tls12, tls11, tls";
$request = Invoke-WebRequest -Uri 'http://nist.time.gov/actualtime.cgi?lzbc=siqm9b' -UseBasicParsing;
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = $originalCallback;
[Net.ServicePointManager]::SecurityProtocol = $originalSecurityProtocol;
$currentRtsTimeUtc = (New-Object -TypeName DateTime -ArgumentList (1970, 1, 1)).AddMilliseconds(([Xml]$request.Content).timestamp.time / 1000);
Out-Verbose "Current reliable time server time UTC $currentRtsTimeUtc";
$currentTimeFromServerUtc = (Get-Date).ToUniversalTime();
Out-Verbose "Current server time UTC $currentTimeFromServerUtc";
$timeDifferenceInSeconds = [int]($currentRtsTimeUtc - $currentTimeFromServerUtc).TotalSeconds;
Out-Verbose "Time difference in seconds $timeDifferenceInSeconds";
if ($timeDifferenceInSeconds -eq $null -or $timeDifferenceInSeconds -lt ($timeDifferenceMaximum * -1) -or $timeDifferenceInSeconds -gt $timeDifferenceMaximum)
{
Out-Verbose "Detected that the time difference between reliable time server and the current server time is greater $timeDifferenceMaximum or less than -$timeDifferenceMaximum";
return $false;
}
return $true;
}
Function GetCertificatesFromAdfsTrustedDevices
{
$store = New-Object System.Security.Cryptography.X509Certificates.X509Store($ctlStoreName, $localMachine);
$store.open("ReadOnly");
return $store.Certificates;
}
Function VerifyCertificatesArePresent($certificatesInPrimaryStore)
{
$certificatesInStore = @(GetCertificatesFromAdfsTrustedDevices);
$missingCerts = @();
foreach ($certificate in $certificatesInPrimaryStore)
{
if (!$certificatesInStore.Contains($certificate))
{
$missingCerts += $certificate;
}
}
return $missingCerts;
}
function GenerateDiagnosticData()
{
Param
(
[switch] $includeTrusts,
[string] $sslThumbprint,
[string[]] $adfsServers,
[switch] $local
)
# configs
# cmdlets to be run and have results output into the diagnostic file
# structured as follows:
# modules = @{module1 = @{cmdlet1.1 = arrayList of arguments,
# cmdlet1.2 = arrayList of arguments, ...}
# module2 = @{cmdlet2.1 = arrayList of arguments, ...}
# ...
# }
# (the arguments will be joined and run with the cmdlet.)
$modules =
@{ADFSDiagnostics =
@{
'Test-AdfsServerHealth' = New-Object System.Collections.ArrayList;
};
};
# version number of the output (updated when the function is changed)
$outputVersion = $Script:ModuleVersion
# end configs
Out-Verbose "Binding each argument to relevant cmdlets"
if ($includeTrusts)
{
$modules['ADFSDiagnostics']['Test-AdfsServerHealth'].Add('-includeTrusts') > $null
}
if ($sslThumbprint)
{
$modules['ADFSDiagnostics']['Test-AdfsServerHealth'].Add(-join('-sslThumbprint ', $sslThumbprint)) > $null
}
if ($adfsServers)
{
$modules['ADFSDiagnostics']['Test-AdfsServerHealth'].Add(-join('-AdfsServers ', $adfsServers)) > $null
}
if ($local)
{
$modules['ADFSDiagnostics']['Test-AdfsServerHealth'].Add('-local') > $null
}
# create aggregate object to store diagnostic output from each cmdlet run
$diagnosticData = New-Object -TypeName PSObject
foreach($module in $modules.keys)
{
$moduleData = New-Object -TypeName PSObject
foreach($cmdlet in (($modules[$module]).keys))
{
# join the arguments together
$args = $modules[$module][$cmdlet]-join -' '
# join the command with the arguments
$cmd = -join($module,'\', $cmdlet, ' ', $args)
# upon success, add the cmdlet results;
# otherwise add the error message
Out-Verbose "Attempting to run cmdlet $cmdlet"
try
{
$res = (Invoke-Expression -Command $cmd)
Add-Member -InputObject $moduleData -MemberType NoteProperty -Name $cmdlet -Value $res
Add-Member -InputObject $diagnosticData -MemberType NoteProperty -Name $module -Value $moduleData
Out-Verbose "Successfully ran cmdlet $cmdlet"
}
catch
{
Write-Error -Message (-join("Error running cmdlet ", $cmd, ": ", $_.Exception.Message))
return $null
}
}
}
# add the cmdlet version to the output
Add-Member -InputObject $diagnosticData -MemberType NoteProperty -Name "Version" -Value $outputVersion
return $diagnosticData
}
function GenerateJSONDiagnosticData()
{
Param
(
[switch] $includeTrusts,
[string] $sslThumbprint,
[string[]] $adfsServers,
[switch] $local
)
# configs
# maximum global JSON depth in the diagnostic file
$jsonDepth = 8
# end configs
Out-Verbose "Generating diagnostic data"
$diagnosticData = GenerateDiagnosticData -includeTrusts:$includeTrusts -sslThumbprint $sslThumbprint -adfsServers $adfsServers -local:$local;
Out-Verbose "Successfully generated diagnostic data"
return ConvertTo-JSON -InputObject $diagnosticData -Depth $jsonDepth
} |
CertificateChecks.ps1 | ADFSDiagnostics-3.0.2 | Function Test-CertificateAvailable
{
param(
$adfsCertificate, # Single element of list Generated by Get-AdfsCertificatesToTest
[string]
$certificateType,
[bool]
$isPrimary = $true,
[string]
$notRunReason
)
$testName = Create-CertCheckName -certType $certificateType -checkName "NotFoundInStore" -isPrimary $isPrimary
if (-not $adfsCertificate -and [String]::IsNullOrEmpty($notRunReason))
{
$notRunReason = "Certificate object is null."
}
if (-not [String]::IsNullOrEmpty($notRunReason))
{
return Create-CertificateCheckResult -cert $null -testName $testName -result NotRun -detail $notRunReason
}
try
{
$thumbprint = $adfsCertificate.Thumbprint
$testResult = New-Object TestResult -ArgumentList($testName)
$testResult.Result = [ResultType]::NotRun;
$testResult.Output = @{$tpKey = $thumbprint}
if ($adfsCertificate.StoreLocation -eq "LocalMachine")
{
$certStore = New-Object System.Security.Cryptography.X509Certificates.X509Store($adfsCertificate.StoreName, `
[System.Security.Cryptography.X509Certificates.StoreLocation]::LocalMachine)
try
{
$certStore.Open("IncludeArchived")
$certSearchResult = $certStore.Certificates | where {$_.Thumbprint -eq $thumbprint}
if (($certSearchResult | measure).Count -eq 0)
{
$testResult.Detail = "$certificateType certificate with thumbprint $thumbprint not found in LocalMachine\{0} store.`n" -f $adfsCertificate.StoreName
$testResult.Result = [ResultType]::Fail
}
else
{
$testResult.Result = [ResultType]::Pass
}
}
catch
{
$testResult.Result = [ResultType]:: NotRun;
$testResult.Detail = "$certificateType certificate with thumbprint $thumbprint encountered exception with message`n" + $_.Exception.Message
}
finally
{
$certStore.Close()
}
}
else
{
$testResult.Result = [ResultType]:: NotRun;
$testResult.Detail = "$certificateType certificate with thumbprint $thumbprint not checked for availability because it is in store: " + $adfsCertificate.StoreLocation
}
return $testResult
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
function Test-CertificateExpired
{
param (
[System.Security.Cryptography.X509Certificates.X509Certificate2]
$cert,
[string]
$certificateType,
[bool]
$isPrimary = $true,
[string]
$notRunReason
)
$checkName = "Expired"
$testName = Create-CertCheckName -certType $certificateType -checkName $checkName -isPrimary $isPrimary
if (-not $cert -and [String]::IsNullOrEmpty($notRunReason))
{
$notRunReason = "Certificate object is null."
}
if (-not [String]::IsNullOrEmpty($notRunReason))
{
return Create-CertificateCheckResult -cert $null -testName $testName -result NotRun -detail $notRunReason
}
try
{
if (Verify-IsCertExpired -cert $cert)
{
$tp = $cert.Thumbprint
$certificateExpiredTestDetail = "$certificateType certificate with thumbprint $tp has expired.`n";
$certificateExpiredTestDetail += "Valid From: " + $cert.NotBefore.ToString() + "`nValid To: " + $cert.NotAfter.ToString();
$certificateExpiredTestDetail += "`nAutoCertificateRollover Enabled: " + (Retrieve-AdfsProperties).AutoCertificateRollover + "`n";
return Create-CertificateCheckResult -cert $cert -testName $testName -result Fail -detail $certificateExpiredTestDetail
}
else
{
return Create-CertificateCheckResult -cert $cert -testName $testName -result Pass
}
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
function Test-CertificateAboutToExpire
{
param (
[System.Security.Cryptography.X509Certificates.X509Certificate2]
$cert,
[string]
$certificateType,
[bool]
$isPrimary = $true,
[string]
$notRunReason
)
$checkName = "AboutToExpire"
$testName = Create-CertCheckName -certType $certificateType -checkName $checkName -isPrimary $isPrimary
$expiryLimitInDays = 90;
if (-not $cert -and [String]::IsNullOrEmpty($notRunReason))
{
$notRunReason = "Certificate object is null."
}
if (-not [String]::IsNullOrEmpty($notRunReason))
{
return Create-CertificateCheckResult -cert $null -testName $testName -result NotRun -detail $notRunReason
}
try
{
$properties = Retrieve-AdfsProperties
if ($properties.AutoCertificateRollover -and ($certificateType -eq "Token-Decrypting" -or $certificateType -eq "Token-Signing"))
{
return Create-CertificateCheckResult -cert $cert -testName $testName -result NotRun -detail "Check Skipped when AutoCertificateRollover is enabled"
}
$expirtyMinusToday = [System.Convert]::ToInt32(($cert.NotAfter - (Get-Date)).TotalDays);
if ($expirtyMinusToday -le $expiryLimitInDays)
{
$tp = $cert.Thumbprint
$certificateAboutToExpireTestDetail = "$certificateType certificate with thumbprint $tp is about to expire in $expirtyMinusToday days.`n"
$certificateAboutToExpireTestDetail += "Valid From: " + $cert.NotBefore.ToString() + "`nValid To: " + $cert.NotAfter.ToString();
$certificateAboutToExpireTestDetail += "`nAutoCertificateRollover Enabled: " + (Retrieve-AdfsProperties).AutoCertificateRollover + "`n";
return Create-CertificateCheckResult -cert $cert -testName $testName -result Fail -detail $certificateAboutToExpireTestDetail
}
else
{
return Create-CertificateCheckResult -cert $cert -testName $testName -result Pass
}
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
function Test-CertificateHasPrivateKey
{
param (
[System.Security.Cryptography.X509Certificates.X509Certificate2]
$cert,
[string]
$certificateType,
[bool]
$isPrimary = $true,
[string]
$storeName,
[string]
$storeLocation,
[string]
$notRunReason
)
$checkName = "PrivateKeyAbsent"
$testName = Create-CertCheckName -certType $certificateType -checkName $checkName -isPrimary $isPrimary
if (-not $cert -and [String]::IsNullOrEmpty($notRunReason))
{
$notRunReason = "Certificate object is null."
}
if (-not [String]::IsNullOrEmpty($notRunReason))
{
return Create-CertificateCheckResult -cert $null -testName $testName -result NotRun -detail $notRunReason
}
try
{
$properties = Retrieve-AdfsProperties
if ($properties.AutoCertificateRollover -and ($certificateType -eq "Token-Decrypting" -or $certificateType -eq "Token-Signing"))
{
return Create-CertificateCheckResult -cert $cert -testName $testName -result NotRun -detail "Check Skipped when AutoCertificateRollover is enabled"
}
#special consideration to the corner case where auto certificate rollover was on, then turned off, leaving behind some certificates in the CU\MY store
#in which case, we cannot ascertain whether the private key is present or not
if ($storeLocation -eq "CurrentUser")
{
return Create-CertificateCheckResult -cert $cert -testName $testName -result NotRun -detail "Check Skipped because the certificate is in the CU\MY store"
}
if ($cert.HasPrivateKey)
{
return Create-CertificateCheckResult -cert $cert -testName $testName -result Pass
}
else
{
$tp = $cert.Thumbprint
$detail = "$certificateType certificate with thumbprint $tp does not have a private key."
return Create-CertificateCheckResult -cert $cert -testName $testName -result Fail -detail $detail
}
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
function Test-CertificateSelfSigned
{
param (
[System.Security.Cryptography.X509Certificates.X509Certificate2]
$cert,
[string]
$certificateType,
[bool]
$isPrimary = $false,
[string]
$notRunReason
)
$checkName = "IsSelfSigned"
$testName = Create-CertCheckName -certType $certificateType -checkName $checkName -isPrimary $isPrimary
if (-not $cert -and [String]::IsNullOrEmpty($notRunReason))
{
$notRunReason = "Certificate object is null."
}
if (-not [String]::IsNullOrEmpty($notRunReason))
{
return Create-CertificateCheckResult -cert $null -testName $testName -result NotRun -detail $notRunReason
}
try
{
$properties = Retrieve-AdfsProperties
if ($properties.AutoCertificateRollover -and ($certificateType -eq "Token-Decrypting" -or $certificateType -eq "Token-Signing"))
{
return Create-CertificateCheckResult -cert $cert -testName $testName -result NotRun -detail "Check Skipped when AutoCertificateRollover is enabled"
}
if (Verify-IsCertSelfSigned $cert)
{
$tp = $cert.Thumbprint
$detail = "$certificateType certificate with thumbprint $tp is self-signed."
return Create-CertificateCheckResult -cert $cert -testName $testName -result Fail -detail $detail
}
else
{
return Create-CertificateCheckResult -cert $cert -testName $testName -result Pass
}
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
}
function Test-CertificateCRL
{
param (
[System.Security.Cryptography.X509Certificates.X509Certificate2]
$cert,
[string]
$certificateType,
[bool]
$isPrimary = $false,
[string]
$notRunReason
)
$checkName = "Revoked"
$chainStatusKey = "ChainStatus"
$testName = Create-CertCheckName -certType $certificateType -checkName $checkName -isPrimary $isPrimary
if (-not $cert -and [String]::IsNullOrEmpty($notRunReason))
{
$notRunReason = "Certificate object is null."
}
if (-not [String]::IsNullOrEmpty($notRunReason))
{
return Create-CertificateCheckResult -cert $null -testName $testName -result NotRun -detail $notRunReason
}
try
{
$crlResult = VerifyCertificateCRL -cert $cert
$passFail = [ResultType]::Pass
if (($crlResult.ChainBuildResult -eq $false) -and ($crlResult.IsSelfSigned -eq $false))
{
$passFail = [ResultType]::Fail
}
$testResult = Create-CertificateCheckResult -cert $cert -testName $testName -result $passFail
$testDetail = "Thumbprint: " + $crlResult.Thumbprint + "`n"
$testResult.Output.Add($chainStatusKey, "NONE")
if ($crlResult.ChainStatus)
{
$testResult.Output.Set_Item($chainStatusKey, $crlResult.ChainStatus)
foreach ($chainStatus in $crlResult.ChainStatus)
{
$testDetail = $testDetail + $chainStatus.Status + "-" + $chainStatus.StatusInformation + [System.Environment]::NewLine
}
}
$testResult.Detail = $testDetail
return $testResult
}
catch [Exception]
{
return Create-ErrorExceptionTestResult $testName $_.Exception
}
} |
Get-AdfsServerConfiguration.ps1 | ADFSDiagnostics-3.0.2 | <#
.SYNOPSIS
Retrieves overall details of the AD FS farm.
.DESCRIPTION
The Get-ADFSServerConfiguration takes a snapshot of the AD FS farm configuration and relevant dependencies.
.PARAMETER IncludeTrusts
When set, the output of the commandlet will include infromation about the Relying Party trusts and Claims Provider Trusts.
.EXAMPLE
Get-AdfsServerConfiguration -IncludeTrusts | ConvertTo-Json | Out-File ".\ADFSFarmDetails.txt"
Gets the snapshot of the configuration of the AD FS farm, and save it in JSON format
.NOTES
When run against a secondary computer on a Windows Internal Database AD FS farm, the result of this commandlet is expected to be significantly reduced.
If an exception occurs when attempting to get a configuration value, the respective property of the returned object will contain the exception message.
#>
Function Get-AdfsServerConfiguration
{
Write-DeprecationNotice
} |
psakeBuild.ps1 | ADFSDiagnostics-3.0.2 | #Requires -Version 4
#Requires -RunAsAdministrator
[cmdletbinding()]
param(
[switch]
$CodeCoverage = $false
)
properties {
$root = $PSScriptRoot
}
# Default task includes Analyzing and Testing of module
task default -depends Analyze, Test
# Analyze by running Invoke-ScriptAnalyzer. Check script against best known practices
task Analyze {
$saResults = Invoke-ScriptAnalyzer -Path "$root\Public" -Severity @('Error', 'Warning') -Recurse -ExcludeRule "PSAvoidUsingWriteHost", "PSUseDeclaredVarsMoreThanAssignments" -Verbose:$false
$saResults += Invoke-ScriptAnalyzer -Path "$root\Private" -Severity @('Error', 'Warning') -Recurse -Verbose:$false
if ($saResults)
{
$saResults | Format-Table
Write-Error -Message 'One or more Script Analyzer errors/warnings where found. Build cannot continue!'
}
}
# Run our test to make sure everything is in line
task Test {
$tests = @(Get-ChildItem -Path $PSScriptRoot\Test\**\*.Test.ps1 -Recurse)
if ($CodeCoverage)
{
$codeCoveragePaths = @()
foreach ($test in $tests)
{
$name = $test.Name -replace ".Test.ps1$", ".ps1"
$directory = $test.Directory.Name
$codeCoveragePath = $PSScriptRoot, $directory, $name -join "\"
if (Test-Path $codeCoveragePath)
{
$codeCoveragePaths += $codeCoveragePath
}
}
$testResults = Invoke-Pester -Path @($tests.FullName) -CodeCoverage @($codeCoveragePaths) -PassThru
}
else
{
$testResults = Invoke-Pester -Path @($tests.FullName) -PassThru
}
if ($testResults.FailedCount -gt 0)
{
$testResults.TestResult | Where-Object { $_.Result -ne "Passed" } | Format-List
Write-Error -Message 'One or more Pester tests failed. Build cannot continue!'
}
} |
ADFSToolbox.psm1 | ADFSToolbox-2.0.17 | #Requires -Version 4
#Requires -RunAsAdministrator
<#
.SYNOPSIS
Contains data gathering, health checks, and additional tools for AD FS server deployments.
.DESCRIPTION
ADFSToolbox is a Windows PowerShell module that contains various tools for managing ADFS
.DISCLAIMER
THIS CODE AND INFORMATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF
ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A
PARTICULAR PURPOSE.
Copyright (c) Microsoft Corporation. All rights reserved.
#>
$ModuleVersion = "2.0.17.0"
$url = "https://adfshelp.microsoft.com/api/DiagnosticsAnalyzerApi/GetVersion"
$oldProtocol = [Net.ServicePointManager]::SecurityProtocol
# We switch to using TLS 1.2
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
try
{
$response = Invoke-WebRequest -URI $url | ConvertFrom-Json
if ($response -ne $ModuleVersion)
{
Write-Host "There is a newer version available. Run 'Update-Module -Name ADFSToolbox' to update to the latest version" -BackgroundColor DarkYellow -ForegroundColor Black
Write-Host "Alternatively, you can download it manually from https://www.powershellgallery.com/packages/ADFSToolbox" -BackgroundColor DarkYellow -ForegroundColor Black
}
else
{
Write-Host "You have the latest version installed!" -BackgroundColor DarkYellow -ForegroundColor Black
}
}
catch
{
Write-Host "Importing ADFSToolbox version $ModuleVersion" -BackgroundColor Yellow -ForegroundColor Black
Write-Host "Unable to check for the latest version, please manually verify that you have the latest version by going to https://www.powershellgallery.com/packages/ADFSToolbox" -BackgroundColor Yellow -ForegroundColor Black
}
finally
{
[Net.ServicePointManager]::SecurityProtocol = $oldProtocol
}
# SIG # Begin signature block
# MIIkWAYJKoZIhvcNAQcCoIIkSTCCJEUCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCTlczvXzKI4zNH
# pk5L3e2VxboEVXuQAeXKcC2EYtQNEaCCDYEwggX/MIID56ADAgECAhMzAAABUZ6N
# j0Bxow5BAAAAAAFRMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMTkwNTAyMjEzNzQ2WhcNMjAwNTAyMjEzNzQ2WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCVWsaGaUcdNB7xVcNmdfZiVBhYFGcn8KMqxgNIvOZWNH9JYQLuhHhmJ5RWISy1
# oey3zTuxqLbkHAdmbeU8NFMo49Pv71MgIS9IG/EtqwOH7upan+lIq6NOcw5fO6Os
# +12R0Q28MzGn+3y7F2mKDnopVu0sEufy453gxz16M8bAw4+QXuv7+fR9WzRJ2CpU
# 62wQKYiFQMfew6Vh5fuPoXloN3k6+Qlz7zgcT4YRmxzx7jMVpP/uvK6sZcBxQ3Wg
# B/WkyXHgxaY19IAzLq2QiPiX2YryiR5EsYBq35BP7U15DlZtpSs2wIYTkkDBxhPJ
# IDJgowZu5GyhHdqrst3OjkSRAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUV4Iarkq57esagu6FUBb270Zijc8w
# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1
# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDU0MTM1MB8GA1UdIwQYMBaAFEhu
# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w
# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3
# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx
# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAWg+A
# rS4Anq7KrogslIQnoMHSXUPr/RqOIhJX+32ObuY3MFvdlRElbSsSJxrRy/OCCZdS
# se+f2AqQ+F/2aYwBDmUQbeMB8n0pYLZnOPifqe78RBH2fVZsvXxyfizbHubWWoUf
# NW/FJlZlLXwJmF3BoL8E2p09K3hagwz/otcKtQ1+Q4+DaOYXWleqJrJUsnHs9UiL
# crVF0leL/Q1V5bshob2OTlZq0qzSdrMDLWdhyrUOxnZ+ojZ7UdTY4VnCuogbZ9Zs
# 9syJbg7ZUS9SVgYkowRsWv5jV4lbqTD+tG4FzhOwcRQwdb6A8zp2Nnd+s7VdCuYF
# sGgI41ucD8oxVfcAMjF9YX5N2s4mltkqnUe3/htVrnxKKDAwSYliaux2L7gKw+bD
# 1kEZ/5ozLRnJ3jjDkomTrPctokY/KaZ1qub0NUnmOKH+3xUK/plWJK8BOQYuU7gK
# YH7Yy9WSKNlP7pKj6i417+3Na/frInjnBkKRCJ/eYTvBH+s5guezpfQWtU4bNo/j
# 8Qw2vpTQ9w7flhH78Rmwd319+YTmhv7TcxDbWlyteaj4RK2wk3pY1oSz2JPE5PNu
# Nmd9Gmf6oePZgy7Ii9JLLq8SnULV7b+IP0UXRY9q+GdRjM2AEX6msZvvPCIoG0aY
# HQu9wZsKEK2jqvWi8/xdeeeSI9FN6K1w4oVQM4Mwggd6MIIFYqADAgECAgphDpDS
# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla
# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT
# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG
# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S
# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz
# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7
# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u
# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33
# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl
# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP
# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB
# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF
# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM
# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ
# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud
# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO
# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0
# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw
# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA
# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY
# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj
# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd
# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ
# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf
# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ
# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j
# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B
# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96
# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7
# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I
# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIWLTCCFikCAQEwgZUwfjELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z
# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAVGejY9AcaMOQQAAAAABUTAN
# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor
# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQge4iEwlXF
# sVjG9tTJY523Gr3tUcg5XW/Vd2rejCbsnmQwQgYKKwYBBAGCNwIBDDE0MDKgFIAS
# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN
# BgkqhkiG9w0BAQEFAASCAQAq7YyQJHxd+5PiXPaCrMyVPjgZKOR64DCj3mrRt/Qj
# hCc5wpWhp+avFLNeblJRk9uQR92MATCbh+2rAJjg6fgEVoJXPHHMaGRQt8JAluAM
# XRmnCX49rYwcUyo5o5Gdu8/7kRgCb44zSDVPgLw93ElEcHPs0UgqHcJtPJ9nf8R7
# FJL4h1MorJHwivtnbKi8RqqO5TidUYR+p3pA7aTSnvot6uYgXDQG0Vjz9W1d5vv0
# ekYCeJjLy+vT3rK5qZtpPE/np7KeGxi/EScwPQgEZXRyRVmW1Ke4XoosexNbwYUd
# Z6xE9VCjwXJO7E0oMl8qH5GiUiCUR71JG3uzKESWqZJcoYITtzCCE7MGCisGAQQB
# gjcDAwExghOjMIITnwYJKoZIhvcNAQcCoIITkDCCE4wCAQMxDzANBglghkgBZQME
# AgEFADCCAVgGCyqGSIb3DQEJEAEEoIIBRwSCAUMwggE/AgEBBgorBgEEAYRZCgMB
# MDEwDQYJYIZIAWUDBAIBBQAEIG3EBbW0oNHMf+BBa/B/j2LBnWHAvAVQ/l0Bw0/F
# sr13AgZd5qyY1+EYEzIwMTkxMjA5MjI1ODM1LjQ1OVowBwIBAYACAfSggdSkgdEw
# gc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsT
# IE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFs
# ZXMgVFNTIEVTTjozMUM1LTMwQkEtN0M5MTElMCMGA1UEAxMcTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgU2VydmljZaCCDx8wggT1MIID3aADAgECAhMzAAAA/gHwtR7/6fmt
# AAAAAAD+MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwMB4XDTE5MDkwNjIwNDEwOFoXDTIwMTIwNDIwNDEwOFowgc4xCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBP
# cGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# MUM1LTMwQkEtN0M5MTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANoD9WTUzS97vJn8
# l8zkMgvpg1qB3gc6aWXpKbfI/RjiJGlDy/6rq6K2Xw6ZmoVL+nJ6OcNXwwCtdCkW
# Hfk/qHwi473GEHhDryoClYKjU45D7At8oIr2kPBp0CitctUwxeMtdx4zYGdjE2yT
# hbxaaCBBK64Dq9sar+bFZpOqxkq9DrqjFnLP2GwbsHVCDVrwWX/liZelv7ZI4N43
# Oz0mvcsxCDTco615V6WPFoAdTYibt/7eef0cpu0E/xAV3SJZbrXHAXntaZA4jM3V
# PgzwxJ3M81G6zxifR+NvzTovZhqd23htX7c5FMvI37aTA6Yz5MD4yERxCpRFho4H
# inNLb7ECAwEAAaOCARswggEXMB0GA1UdDgQWBBT34wsyIMzlZMRVxeNnCCKVvZQS
# 5DAfBgNVHSMEGDAWgBTVYzpcijGQ80N7fEYbxTNoWoVtVTBWBgNVHR8ETzBNMEug
# SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N
# aWNUaW1TdGFQQ0FfMjAxMC0wNy0wMS5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG
# AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Rp
# bVN0YVBDQV8yMDEwLTA3LTAxLmNydDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IBAQBECqTuGKWK/8zwEGdhDUD+k5yi
# 9aBSqcQrtp8MDm1BeNYzFKauvyRewf1ioFsUv9x7MCcEXjSefZl8d+E+k01YplYu
# ucujY3hQlPbYD3E132etJZCby7FTFNv+mJxhe5/73d5ToI8uSrPv9Ju6PUxCr3U0
# NXA6/ZssC027S1o+/eOV+txGJ441+zptdnkocjPcsPt+4aZ+3unCcXdL65ZfdS0j
# j0B2+Puh+E0B/UDroY0gv18ACy0Y2WaTg2yfNoF0jHUWYGANs32uUW2fkBPnyFV2
# Cau/S5y3L4tZFoYrueXAkT43O1n2np4qsrpQLwKEX/M+6wPY6Tn4pH4w5BX2MIIG
# cTCCBFmgAwIBAgIKYQmBKgAAAAAAAjANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzAxMjEzNjU1
# WhcNMjUwNzAxMjE0NjU1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKkdDbx3EYo6IOz8E5f1+n9p
# lGt0VBDVpQoAgoX77XxoSyxfxcPlYcJ2tz5mK1vwFVMnBDEfQRsalR3OCROOfGEw
# WbEwRA/xYIiEVEMM1024OAizQt2TrNZzMFcmgqNFDdDq9UeBzb8kYDJYYEbyWEeG
# MoQedGFnkV+BVLHPk0ySwcSmXdFhE24oxhr5hoC732H8RsEnHSRnEnIaIYqvS2SJ
# UGKxXf13Hz3wV3WsvYpCTUBR0Q+cBj5nf/VmwAOWRH7v0Ev9buWayrGo8noqCjHw
# 2k4GkbaICDXoeByw6ZnNPOcvRLqn9NxkvaQBwSAJk3jN/LzAyURdXhacAQVPIk0C
# AwEAAaOCAeYwggHiMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTVYzpcijGQ
# 80N7fEYbxTNoWoVtVTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8E
# BAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U
# kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j
# b20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmww
# WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBoAYD
# VR0gAQH/BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYI
# KwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0
# AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAAfmiFEN4sbgmD+BcQM9
# naOhIW+z66bM9TG+zwXiqf76V20ZMLPCxWbJat/15/B4vceoniXj+bzta1RXCCtR
# gkQS+7lTjMz0YBKKdsxAQEGb3FwX/1z5Xhc1mCRWS3TvQhDIr79/xn/yN31aPxzy
# mXlKkVIArzgPF/UveYFl2am1a+THzvbKegBvSzBEJCI8z+0DpZaPWSm8tv0E4XCf
# Mkon/VWvL/625Y4zu2JfmttXQOnxzplmkIz/amJ/3cVKC5Em4jnsGUpxY517IW3D
# nKOiPPp/fZZqkHimbdLhnPkd/DjYlPTGpQqWhqS9nhquBEKDuLWAmyI4ILUl5WTs
# 9/S/fmNZJQ96LjlXdqJxqgaKD4kWumGnEcua2A5HmoDF0M2n0O99g/DhO3EJ3110
# mCIIYdqwUB5vvfHhAN/nMQekkzr3ZUd46PioSKv33nJ+YWtvd6mBy6cJrDm77MbL
# 2IK0cs0d9LiFAR6A+xuJKlQ5slvayA1VmXqHczsI5pgt6o3gMy4SKfXAL1QnIffI
# rE7aKLixqduWsqdCosnPGUFN4Ib5KpqjEWYw07t0MkvfY3v1mYovG8chr1m1rtxE
# PJdQcdeh0sVV42neV8HR3jDA/czmTfsNv11P6Z0eGTgvvM9YBS7vDaBQNdrvCScc
# 1bN+NR4Iuto229Nfj950iEkSoYIDrTCCApUCAQEwgf6hgdSkgdEwgc4xCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29m
# dCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT
# TjozMUM1LTMwQkEtN0M5MTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIlCgEBMAkGBSsOAwIaBQADFQACo8hPVvaQ6LVjIHbnMelrc+ecDKCB
# 3jCB26SB2DCB1TELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEp
# MCcGA1UECxMgTWljcm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJzAlBgNV
# BAsTHm5DaXBoZXIgTlRTIEVTTjo0REU5LTBDNUUtM0UwOTErMCkGA1UEAxMiTWlj
# cm9zb2Z0IFRpbWUgU291cmNlIE1hc3RlciBDbG9jazANBgkqhkiG9w0BAQUFAAIF
# AOGYScQwIhgPMjAxOTEyMDkxMjE5MTZaGA8yMDE5MTIxMDEyMTkxNlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA4ZhJxAIBADAHAgEAAgIYODAHAgEAAgIagDAKAgUA
# 4ZmbRAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMBoAowCAIBAAID
# FuNgoQowCAIBAAIDB6EgMA0GCSqGSIb3DQEBBQUAA4IBAQCjTXDI20l1n6CTmIpY
# Pt7kEBajttYkw2HVURPATFbDCtmkNDiZJhFsqjextv/SLcXGiUr33uTeq1OJy+zE
# fZ25IVYaJHxz0LMM652nAmAkptxH3q9jOhFu04EEV7IAjvdYus84hRRAx9unWIFE
# fw3dSWzl2b6XNq0JGn88Lxdfe+wCmXU2/2SoXqDnwPC4177yBoDSoqV5ctRwTVqK
# 9mOjyw589ZqCDicvo4u0MCkE2ESlxNoYaNpdLvkqplxTqRE1APfpZGArO7cN2uwz
# UKwJ0hL2Nrr58aI609CbHnzXOHN9Rl27K4LOBY+1lIlxt9Ar7A/tuTKAXFPaN73A
# V/h6MYIC9TCCAvECAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC
# EzMAAAD+AfC1Hv/p+a0AAAAAAP4wDQYJYIZIAWUDBAIBBQCgggEyMBoGCSqGSIb3
# DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgeqX2dLN8opxwAQHi
# HOkXLS3oMhT/+12NLu75b6xErI8wgeIGCyqGSIb3DQEJEAIMMYHSMIHPMIHMMIGx
# BBQCo8hPVvaQ6LVjIHbnMelrc+ecDDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0
# YW1wIFBDQSAyMDEwAhMzAAAA/gHwtR7/6fmtAAAAAAD+MBYEFJMqFnIuTi9SVZGC
# e6FqcTd2bzlkMA0GCSqGSIb3DQEBCwUABIIBABWYFcYfcuoerf8/E402sYMUxaus
# mYXVWwq938aEaEIZv1AcXyp9N1ZarywRdnmi+Kk6SjslcJhI67b/G/enshL2JSes
# TKp8L7IqxSL1rxeIXyT0mqOpgrGErKd1S5WZfLvu6FKXo8GB3pFsqytDahXG/R35
# O0B4RWEzrryLiE7Jg10aqvk8fD17Tny1YWLHAFAf3oydvWRf7DwLL0+CUR/3FFBr
# OgDJV9wID7MYWOsWnqLF6PVfUed3L8taTJodkIXr9FEUWP/LPYFh4Pd/MRYrDYfG
# At0DTVdeIFuuyqfkS6eyVT+q+sO2D+vWBBdXdIb5owD1ypLFeUSl0aJQuwo=
# SIG # End signature block
|
AdfsTlsModule.psm1 | ADFSToolbox-2.0.17 | #Copyright (c) Microsoft Corporation. All rights reserved.
#Licensed under the MIT License.
<#
.SYNOPSIS
Configures ADFS servers for TLS 1.2 security.
.DESCRIPTION
The Get-ADFSTLSConfiguration cmdlet checks the local server's configuration for TLS and SSL and both writes the results to the console and places the results in a text file for review.
.PARAMETER
This cmdlet takes no parameters.
.EXAMPLE
Get-ADFSTLSConfiguration
.NOTES
Registry items detailed in https://support2.microsoft.com/kb/245030/en-us
Offical doc @ https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/manage-ssl-protocols-in-ad-fs
#>
$global:FormatEnumerationLimit = -1
Function Get-ADFSTLSConfiguration
{
#function to review the current TLS config of the ADFS server and place results to an output file.
#function should return a boolean response for whether only TLS 1.2 is allowed true, else false
Write-host "This cmdlet provides a per server test result of what SSL and TLS settings are currently configured per the local servers registry. Each ADFS server in the farm will need the test ran individually." -ForegroundColor Yellow
$OutputValues = new-object PSObject
$OutputFile = ($pwd.path + '\') + (($env:COMPUTERNAME) + "_ADFS-TLSConfig.txt")
$Time = Get-Date
"ADFS SSL/TLS Configuration" | Out-file -FilePath $OutputFile -Encoding utf8
(get-wmiobject -class win32_computersystem).Name | Out-file -FilePath $OutputFile -Encoding utf8 -Append
$Time | Out-file -FilePath $OutputFile -Encoding utf8 -Append
"**********************************************************" | Out-file -FilePath $OutputFile -Encoding utf8 -Append
#Read current registry config for SSL and TLS settings.
if (Test-path -path Registry::"HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\PCT 1.0\Client")
{$PCT1ClientReg = Get-ItemProperty -Path Registry::"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\PCT 1.0\Client"}
if (Test-path -path Registry::"HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\PCT 1.0\Server")
{$PCT1ServerReg = Get-ItemProperty -Path Registry::"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\PCT 1.0\Server"}
if (Test-path -path Registry::"HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client")
{$SSL2ClientReg = Get-ItemProperty -Path Registry::"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client"}
if (Test-path -path Registry::"HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server")
{$SSL2ServerReg = Get-ItemProperty -Path Registry::"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server"}
if (Test-path -path Registry::"HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Client")
{$SSL3ClientReg = Get-ItemProperty -Path Registry::"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Client"}
if (Test-path -path Registry::"HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server")
{$SSL3ServerReg = Get-ItemProperty -Path Registry::"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server"}
if (Test-path -path Registry::"HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client")
{$TLS1ClientReg = Get-ItemProperty -Path Registry::"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client"}
if (Test-path -path Registry::"HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server")
{$TLS1ServerReg = Get-ItemProperty -Path Registry::"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server"}
if (Test-path -path Registry::"HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Client")
{$TLS11ClientReg = Get-ItemProperty -Path Registry::"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Client"}
if (Test-path -path Registry::"HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server")
{$TLS11ServerReg = Get-ItemProperty -Path Registry::"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server"}
if (Test-path -path Registry::"HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client")
{$TLS12ClientReg = Get-ItemProperty -Path Registry::"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client"}
if (Test-path -path Registry::"HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server")
{$TLS12ServerReg = Get-ItemProperty -Path Registry::"HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server"}
if (($PCT1ClientReg.Enabled -eq 0) -or ($PCT1ClientReg.Enabled -eq $null))
{add-member -inputobject $OutputValues -membertype noteproperty -name "PCT1 Client Setting" -value "Disabled (default)"}
else
{add-member -inputobject $OutputValues -membertype noteproperty -name "PCT1 Client Setting" -value "Enabled (NOT default)"}
if (($PCT1ServerReg.Enabled -eq 0) -or ($PCT1ServerReg.Enabled -eq $null))
{add-member -inputobject $OutputValues -membertype noteproperty -name "PCT1 Server Setting" -value "Disabled (default)"}
else
{add-member -inputobject $OutputValues -membertype noteproperty -name "PCT1 Server Setting" -value "Enabled (NOT default)"}
if (($SSL2ClientReg.Enabled -eq 1) -or ($SSL2ClientReg.Enabled -eq $null))
{add-member -inputobject $OutputValues -membertype noteproperty -name "SSL2 Client Setting" -value "Enabled (default)"}
else
{add-member -inputobject $OutputValues -membertype noteproperty -name "SSL2 Client Setting" -value "Disabled (NOT default)"}
if (($SSL2ServerReg.Enabled -eq 1) -or ($SSL2ServerReg.Enabled -eq $null))
{add-member -inputobject $OutputValues -membertype noteproperty -name "SSL2 Server Setting" -value "Enabled (default)"}
else
{add-member -inputobject $OutputValues -membertype noteproperty -name "SSL2 Server Setting" -value "Disabled (NOT default)"}
if (($SSL3ClientReg.Enabled -eq 1) -or ($SSL3ClientReg.Enabled -eq $null))
{add-member -inputobject $OutputValues -membertype noteproperty -name "SSL3 Client Setting" -value "Enabled (default)"}
else
{add-member -inputobject $OutputValues -membertype noteproperty -name "SSL3 Client Setting" -value "Disabled (NOT default) for POODLE"}
if (($SSL3ServerReg.Enabled -eq 1) -or ($SSL3ServerReg.Enabled -eq $null))
{add-member -inputobject $OutputValues -membertype noteproperty -name "SSL3 Server Setting" -value "Enabled (default) - POODLE still possible"}
else
{add-member -inputobject $OutputValues -membertype noteproperty -name "SSL3 Server Setting" -value "Disabled (NOT Default) for POODLE"}
if (($TLS1ClientReg.Enabled -eq 1) -or ($TLS1ClientReg.Enabled -eq $null))
{add-member -inputobject $OutputValues -membertype noteproperty -name "TLS 1.0 Client Setting" -value "Enabled (default)"}
else
{add-member -inputobject $OutputValues -membertype noteproperty -name "TLS 1.0 Client Setting" -value "Disabled (NOT default)"}
if (($TLS1ServerReg.Enabled -eq 1) -or ($TLS1ServerReg.Enabled -eq $null))
{add-member -inputobject $OutputValues -membertype noteproperty -name "TLS 1.0 Server Setting" -value "Enabled (default)"}
else
{add-member -inputobject $OutputValues -membertype noteproperty -name "TLS 1.0 Server Setting" -value "Disabled (NOT Default)"}
if (($TLS11ClientReg.Enabled -eq 1) -or ($TLS11ClientReg.Enabled -eq $null))
{add-member -inputobject $OutputValues -membertype noteproperty -name "TLS 1.1 Client Setting" -value "Enabled (default)"}
else
{add-member -inputobject $OutputValues -membertype noteproperty -name "TLS 1.1 Client Setting" -value "Disabled (NOT default)"}
if (($TLS11ServerReg.Enabled -eq 1) -or ($TLS11ServerReg.Enabled -eq $null))
{add-member -inputobject $OutputValues -membertype noteproperty -name "TLS 1.1 Server Setting" -value "Enabled (default)"}
else
{add-member -inputobject $OutputValues -membertype noteproperty -name "TLS 1.1 Server Setting" -value "Disabled (NOT Default)"}
if (($TLS12ClientReg.Enabled -eq 1) -or ($TLS12ClientReg.Enabled -eq $null))
{add-member -inputobject $OutputValues -membertype noteproperty -name "TLS 1.2 Client Setting" -value "Enabled (default)"}
else
{add-member -inputobject $OutputValues -membertype noteproperty -name "TLS 1.2 Client Setting" -value "Disabled (NOT default)"}
if (($TLS12ServerReg.Enabled -eq 1) -or ($TLS12ServerReg.Enabled -eq $null))
{add-member -inputobject $OutputValues -membertype noteproperty -name "TLS 1.2 Server Setting" -value "Enabled (default)"}
else
{add-member -inputobject $OutputValues -membertype noteproperty -name "TLS 1.2 Server Setting" -value "Disabled (NOT Default)"}
if ($TLS12ServerReg.enabled -eq 1)
{$TLS1dot2 = $true}
else
{$TLS1dot2 = $false}
$OutputValues | Out-file -FilePath $OutputFile -Encoding utf8 -Append
If ($TLS1dot2 -ne $true)
{
Write-host "The computer" ($env:COMPUTERNAME) "is not configured to use only Transport Layer Security 1.2. Run the Set-ADFSTLSConfiguration cmdlet on this server to use TLS 1.2 only." -BackgroundColor Yellow -ForegroundColor Red
}
If ($TLS1dot2 -eq $true)
{
Write-host "This ADFS server is already enabled for TLS 1.2 only." -ForegroundColor Green
}
}
<#
.SYNOPSIS
Configures ADFS servers for TLS 1.2 security.
.DESCRIPTION
The Set-ADFSTLSConfiguration cmdlet enables TLS 1.2 as client and server (if needed) and turns off TLS SSL, TLS 1.0 and TLS 1.1.
.PARAMETER
This cmdlet takes no parameters.
.EXAMPLE
Set-ADFSTLSConfiguration
.NOTES
Registry items detailed in http://support2.microsoft.com/kb/245030/en-us
Offical doc @ https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/manage-ssl-protocols-in-ad-fs
#>
Function Set-ADFSTLSConfiguration
{
#enable strong crypto for .Net
if (Test-path -path Registry::'HKLM\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v2.0.50727')
{New-ItemProperty -Path Registry::'HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v2.0.50727' -name 'SchUseStrongCrypto' -value '1' -PropertyType 'DWord' -Force | Out-Null}
if (Test-path -path Registry::"HKLM\SOFTWARE\Microsoft\.NetFramework\v4.0.30319")
{New-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\.NetFramework\v4.0.30319' -name 'SchUseStrongCrypto' -value '1' -PropertyType 'DWord' -Force | Out-Null}
Write-Host '.Net Schannel Use Strong Crypto is enabled.' -ForegroundColor Green
#enable TLS 1.2
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'Enabled' -value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force | Out-Null
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'Enabled' -value '1' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force | Out-Null
Write-Host 'TLS 1.2 is enabled.' -ForegroundColor Green
#SSL 2.0
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-Null
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-Null
Write-Host 'SSL 2.0 has been disabled.' -ForegroundColor Green
#disable SSL 3.0
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-Null
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Client' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Client' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Client' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-Null
Write-Host 'SSL 3.0 has been disabled.' -ForegroundColor Green
#disable TLS 1.0
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-Null
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-Null
Write-Host 'TLS 1.0 has been disabled.' -ForegroundColor Green
#disable TLS 1.1
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-Null
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Client' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Client' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force | Out-Null
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Client' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-Null
Write-Host 'TLS 1.1 has been disabled.' -ForegroundColor Green
Write-host 'TLS 1.2 is now the sole SSL/TLS setting allowed on this server.' -ForegroundColor Green
Write-host 'WARNING: The server must be rebooted for the SSL and TLS settings to take effect.' -BackgroundColor Red
}
#Export the appropriate module functions
Export-ModuleMember -Function Get-ADFSTLSConfiguration
Export-ModuleMember -Function Set-ADFSTLSConfiguration
# SIG # Begin signature block
# MIIkWAYJKoZIhvcNAQcCoIIkSTCCJEUCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDn7eKmJSZFF/5H
# 1IoYXqRkXiBCu9VsYMg8p+ufedZRhKCCDYEwggX/MIID56ADAgECAhMzAAABUZ6N
# j0Bxow5BAAAAAAFRMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMTkwNTAyMjEzNzQ2WhcNMjAwNTAyMjEzNzQ2WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCVWsaGaUcdNB7xVcNmdfZiVBhYFGcn8KMqxgNIvOZWNH9JYQLuhHhmJ5RWISy1
# oey3zTuxqLbkHAdmbeU8NFMo49Pv71MgIS9IG/EtqwOH7upan+lIq6NOcw5fO6Os
# +12R0Q28MzGn+3y7F2mKDnopVu0sEufy453gxz16M8bAw4+QXuv7+fR9WzRJ2CpU
# 62wQKYiFQMfew6Vh5fuPoXloN3k6+Qlz7zgcT4YRmxzx7jMVpP/uvK6sZcBxQ3Wg
# B/WkyXHgxaY19IAzLq2QiPiX2YryiR5EsYBq35BP7U15DlZtpSs2wIYTkkDBxhPJ
# IDJgowZu5GyhHdqrst3OjkSRAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUV4Iarkq57esagu6FUBb270Zijc8w
# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1
# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDU0MTM1MB8GA1UdIwQYMBaAFEhu
# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w
# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3
# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx
# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAWg+A
# rS4Anq7KrogslIQnoMHSXUPr/RqOIhJX+32ObuY3MFvdlRElbSsSJxrRy/OCCZdS
# se+f2AqQ+F/2aYwBDmUQbeMB8n0pYLZnOPifqe78RBH2fVZsvXxyfizbHubWWoUf
# NW/FJlZlLXwJmF3BoL8E2p09K3hagwz/otcKtQ1+Q4+DaOYXWleqJrJUsnHs9UiL
# crVF0leL/Q1V5bshob2OTlZq0qzSdrMDLWdhyrUOxnZ+ojZ7UdTY4VnCuogbZ9Zs
# 9syJbg7ZUS9SVgYkowRsWv5jV4lbqTD+tG4FzhOwcRQwdb6A8zp2Nnd+s7VdCuYF
# sGgI41ucD8oxVfcAMjF9YX5N2s4mltkqnUe3/htVrnxKKDAwSYliaux2L7gKw+bD
# 1kEZ/5ozLRnJ3jjDkomTrPctokY/KaZ1qub0NUnmOKH+3xUK/plWJK8BOQYuU7gK
# YH7Yy9WSKNlP7pKj6i417+3Na/frInjnBkKRCJ/eYTvBH+s5guezpfQWtU4bNo/j
# 8Qw2vpTQ9w7flhH78Rmwd319+YTmhv7TcxDbWlyteaj4RK2wk3pY1oSz2JPE5PNu
# Nmd9Gmf6oePZgy7Ii9JLLq8SnULV7b+IP0UXRY9q+GdRjM2AEX6msZvvPCIoG0aY
# HQu9wZsKEK2jqvWi8/xdeeeSI9FN6K1w4oVQM4Mwggd6MIIFYqADAgECAgphDpDS
# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla
# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT
# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG
# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S
# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz
# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7
# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u
# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33
# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl
# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP
# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB
# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF
# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM
# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ
# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud
# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO
# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0
# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw
# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA
# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY
# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj
# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd
# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ
# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf
# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ
# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j
# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B
# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96
# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7
# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I
# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIWLTCCFikCAQEwgZUwfjELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z
# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAVGejY9AcaMOQQAAAAABUTAN
# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor
# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgciUIf0k3
# lm5Gns56a6y72GdCZcxLFIp2d9wYYOn9btMwQgYKKwYBBAGCNwIBDDE0MDKgFIAS
# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN
# BgkqhkiG9w0BAQEFAASCAQA7SCT5DU+GkL21C2kdh3kXa2OHqTrJBDJ3Ita0/k6F
# ek7KFhpVyRysDitP79B/Z9TmeFV/hYZOTT9D6rGKwZTzObg+ZNKmeXFaGLlE/wL2
# twVTD0x5l9EHEaaMUXDztRB2B1JK+WPcpypaRDVnDfNPeKOAs9uLrHk9Di3js7lx
# FpCknCgjNhjnvwuM+NbCzr7PlDBxz3lrP6Ax+OL6EhT0peqz5xpliparuWr1XGY1
# fBhRdNmWcXxhc4MPFK1rlxjiOZVcanBgX7/zdEm3O0/fr0hFEVoshEl/8t0uJ6FR
# OJN26Fg1BNvgOLNDg3OD0xb/SxyZMX+IWyxGPTAdgAYooYITtzCCE7MGCisGAQQB
# gjcDAwExghOjMIITnwYJKoZIhvcNAQcCoIITkDCCE4wCAQMxDzANBglghkgBZQME
# AgEFADCCAVgGCyqGSIb3DQEJEAEEoIIBRwSCAUMwggE/AgEBBgorBgEEAYRZCgMB
# MDEwDQYJYIZIAWUDBAIBBQAEINNqkjeCcRQkz/ffQjmyb3MPogvgnqQPRGWHM8+6
# YEoEAgZd5nWguXIYEzIwMTkxMjA5MjI1ODM1LjU2OFowBwIBAYACAfSggdSkgdEw
# gc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsT
# IE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFs
# ZXMgVFNTIEVTTjpCMUI3LUY2N0YtRkVDMjElMCMGA1UEAxMcTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgU2VydmljZaCCDx8wggT1MIID3aADAgECAhMzAAABA+pOK3i2KieT
# AAAAAAEDMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwMB4XDTE5MDkwNjIwNDExN1oXDTIwMTIwNDIwNDExN1owgc4xCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBP
# cGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpC
# MUI3LUY2N0YtRkVDMjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALCRV96uFMhQPoee
# fQrvxbzOW3Y7LKElUOxYoMR9HW2+DOgS3ECplmsQJZbcXZJ1686/7CV7skdSO95r
# G7k9cnI9tvX4OW0WDRjtcaFOvmDdENyBUYmIf+kuPHwA8Edbzeg7OPkBCtvM5nUJ
# 5xVnQuiT9R5NF9axjwoYkHaIcaj9GWQgW5h+awLofbWyY0rWyXYk8GndPVK3MkT3
# FnFPWLGY6OB2lRMEgpBLw1uKpCUHqp4Fpff5gnvb93EVSliLr11lwfYwEF5RjNDe
# gi9P39MjpnuXGwI2LjGKUsF66VGaVw4rdaUKQlPKJ0P/h/b9LCcVZyBVfwAD/Xap
# Woo2JEsCAwEAAaOCARswggEXMB0GA1UdDgQWBBTiNi2Y/aGPja1lJu2PPODMEW9a
# CDAfBgNVHSMEGDAWgBTVYzpcijGQ80N7fEYbxTNoWoVtVTBWBgNVHR8ETzBNMEug
# SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N
# aWNUaW1TdGFQQ0FfMjAxMC0wNy0wMS5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG
# AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Rp
# bVN0YVBDQV8yMDEwLTA3LTAxLmNydDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IBAQB8Naig5oqAZfKHIUhs99mL2pqt
# Va6yca9TwUyeM9yC/Soduk4CXbtGtn+/j7yMpQldXXFefBh9PIg3bdlLchCtL8RX
# VxdmxDQYcjyxYtEmxCxxS+6EOBfl9I1ouXDj8Aq8wGZZ9PbAraJDeqxgVqd9W/YC
# rC4la3tg4HzF1hot6L0oxNlTnu+RyXmZ7f6f/Vq6KZAZPyaKbI5P6qHBG3REPAgr
# 45+GySpbWAQhZjUNZ9pJ3NcePbuaa8N2xiIJsc9t8/FTSCj1xoiK9q2YvXoA64/h
# kyUIn/fBFY3BD6meMnQCG500ruiAm0GujHYOmZxAbosMOxtLPahmQUkcbQCPMIIG
# cTCCBFmgAwIBAgIKYQmBKgAAAAAAAjANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzAxMjEzNjU1
# WhcNMjUwNzAxMjE0NjU1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKkdDbx3EYo6IOz8E5f1+n9p
# lGt0VBDVpQoAgoX77XxoSyxfxcPlYcJ2tz5mK1vwFVMnBDEfQRsalR3OCROOfGEw
# WbEwRA/xYIiEVEMM1024OAizQt2TrNZzMFcmgqNFDdDq9UeBzb8kYDJYYEbyWEeG
# MoQedGFnkV+BVLHPk0ySwcSmXdFhE24oxhr5hoC732H8RsEnHSRnEnIaIYqvS2SJ
# UGKxXf13Hz3wV3WsvYpCTUBR0Q+cBj5nf/VmwAOWRH7v0Ev9buWayrGo8noqCjHw
# 2k4GkbaICDXoeByw6ZnNPOcvRLqn9NxkvaQBwSAJk3jN/LzAyURdXhacAQVPIk0C
# AwEAAaOCAeYwggHiMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTVYzpcijGQ
# 80N7fEYbxTNoWoVtVTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8E
# BAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U
# kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j
# b20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmww
# WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBoAYD
# VR0gAQH/BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYI
# KwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0
# AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAAfmiFEN4sbgmD+BcQM9
# naOhIW+z66bM9TG+zwXiqf76V20ZMLPCxWbJat/15/B4vceoniXj+bzta1RXCCtR
# gkQS+7lTjMz0YBKKdsxAQEGb3FwX/1z5Xhc1mCRWS3TvQhDIr79/xn/yN31aPxzy
# mXlKkVIArzgPF/UveYFl2am1a+THzvbKegBvSzBEJCI8z+0DpZaPWSm8tv0E4XCf
# Mkon/VWvL/625Y4zu2JfmttXQOnxzplmkIz/amJ/3cVKC5Em4jnsGUpxY517IW3D
# nKOiPPp/fZZqkHimbdLhnPkd/DjYlPTGpQqWhqS9nhquBEKDuLWAmyI4ILUl5WTs
# 9/S/fmNZJQ96LjlXdqJxqgaKD4kWumGnEcua2A5HmoDF0M2n0O99g/DhO3EJ3110
# mCIIYdqwUB5vvfHhAN/nMQekkzr3ZUd46PioSKv33nJ+YWtvd6mBy6cJrDm77MbL
# 2IK0cs0d9LiFAR6A+xuJKlQ5slvayA1VmXqHczsI5pgt6o3gMy4SKfXAL1QnIffI
# rE7aKLixqduWsqdCosnPGUFN4Ib5KpqjEWYw07t0MkvfY3v1mYovG8chr1m1rtxE
# PJdQcdeh0sVV42neV8HR3jDA/czmTfsNv11P6Z0eGTgvvM9YBS7vDaBQNdrvCScc
# 1bN+NR4Iuto229Nfj950iEkSoYIDrTCCApUCAQEwgf6hgdSkgdEwgc4xCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29m
# dCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT
# TjpCMUI3LUY2N0YtRkVDMjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIlCgEBMAkGBSsOAwIaBQADFQBrXDo2eDr68GRJRlXYVs3aqGzas6CB
# 3jCB26SB2DCB1TELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEp
# MCcGA1UECxMgTWljcm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJzAlBgNV
# BAsTHm5DaXBoZXIgTlRTIEVTTjo0REU5LTBDNUUtM0UwOTErMCkGA1UEAxMiTWlj
# cm9zb2Z0IFRpbWUgU291cmNlIE1hc3RlciBDbG9jazANBgkqhkiG9w0BAQUFAAIF
# AOGY+zEwIhgPMjAxOTEyMTAwMDU2MTdaGA8yMDE5MTIxMTAwNTYxN1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA4Zj7MQIBADAHAgEAAgID9TAHAgEAAgIWzTAKAgUA
# 4ZpMsQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMBoAowCAIBAAID
# FuNgoQowCAIBAAIDB6EgMA0GCSqGSIb3DQEBBQUAA4IBAQBjvwYjR1BUsazYvVNo
# 4ZY5SKwsK11l+6RXgHNUMnwCk7x4llQyzaYU5ENRCaNTbLCXQdE8v3+HKh5oB98g
# MnFIvPySkuiauXODrT4MhdkJI+W6QFCOjzkASxKSw21oT2YR/PWbaZE06hnZp/aF
# aHHN3IcmlzadnhOn8lcf/ldtM+MvO8doBXPVvpP4YkOu3DFz8oThyN//nHDJASu8
# 9SB05qerTxkw2xBJZDu76a6bx2LsUBzQVn12tRjG9ZDJIUU/z3i+/WMSkLFy+fZl
# Lj771q9HEOKF2rteyN+w8OvOPpS3Ct+6IvpECBI0ckcLzG06dd1/yj++Ne6w6DQ6
# mMM+MYIC9TCCAvECAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC
# EzMAAAED6k4reLYqJ5MAAAAAAQMwDQYJYIZIAWUDBAIBBQCgggEyMBoGCSqGSIb3
# DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgkcONN1SiooaOz07E
# mg8XRikuvIjJ4kbGB+TdYgg0dtcwgeIGCyqGSIb3DQEJEAIMMYHSMIHPMIHMMIGx
# BBRrXDo2eDr68GRJRlXYVs3aqGzaszCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0
# YW1wIFBDQSAyMDEwAhMzAAABA+pOK3i2KieTAAAAAAEDMBYEFBDtf5u8TSd0Jq5B
# dIk3Fco0cvtnMA0GCSqGSIb3DQEBCwUABIIBAJ+YKU4iGUpA10oRd3vCRUX+zim5
# JytDHjjUMmQeiFukdvsiL1SKmtfz7RfHkXhcOUp7TnL2Uk+5p3U9kAoTrnCGevHc
# LF+8B6fps44G2RyTFEuWJcygZMdY0F/MTzUR8Fy8RJ3sdlUzDOh/dmofnjnjPhMh
# sC7iyKQAbUbL6lOSoMhrEWsLqKW4qEaE5m8gPOthjQF2MxwhsLMTlTKymyoJzgn9
# pLCAFm6C6TpV6xBC5Oi+LlXnsYClEVO5B7kbrvzU7eIdstPJ0vJqNsdEmsH1yOWZ
# OziFPhE1KgMKLPN5uX+/uwv9k2vBcFeFJn9jkV4b4c4e7GeSmFR1V2U3+ro=
# SIG # End signature block
|
AdfsWidSyncModule.psm1 | ADFSToolbox-2.0.17 | function Get-AdfsWidServiceStateSummary
{
$stsWMIObject = (Get-WmiObject -Namespace root\ADFS -Class SecurityTokenService)
#Create SQL Connection
$connection = new-object system.data.SqlClient.SqlConnection($stsWMIObject.ConfigurationDatabaseConnectionString);
$connection.Open()
$query = "SELECT * FROM IdentityServerPolicy.ServiceStateSummary";
$sqlcmd = $connection.CreateCommand();
$sqlcmd.CommandText = $query;
$result = $sqlcmd.ExecuteReader();
$table = new-object "System.Data.DataTable"
$table.Load($result)
$table | ft
}
function Reset-AdfsWidServiceStateSummarySerialNumbers
{
$stsWMIObject = (Get-WmiObject -Namespace root\ADFS -Class SecurityTokenService)
#Create SQL Connection
$connection = new-object system.data.SqlClient.SqlConnection($stsWMIObject.ConfigurationDatabaseConnectionString);
$connection.Open()
$update = "UPDATE IdentityServerPolicy.ServiceStateSummary SET [SerialNumber] = '0'";
$sqlcmd = $connection.CreateCommand();
$sqlcmd.CommandText = $update;
$sqlcmd.CommandTimeout = 600000;
$rowsAffected = $sqlcmd.ExecuteNonQuery()
Write-Host $rowsAffected "rows have been affected by the reset of SerialNumber column"
}
function Invoke-WidSync
{
param (
[Parameter(Mandatory=$false)]
[switch] $Force
)
if ( -not $force )
{
Write-Host "You must use the 'Force' parameter" -ForegroundColor Yellow
return
}
$role = (Get-AdfsSyncProperties).role
$LastSyncStatus = (Get-AdfsSyncProperties).LastSyncStatus
if ($role -eq "SecondaryComputer")
{
if ($LastSyncStatus -eq '0')
{
Write-Host "Resetting the serialnumber column of ServiceStateSummary table to force a full WID sync" -ForegroundColor Green
Write-Host "ServiceStateSummary table content before reset:" -ForegroundColor Green
Get-AdfsWidServiceStateSummary
Write-Host "Resetting the serialnumber of ServiceStateSummary table" -ForegroundColor Green
Reset-AdfsWidServiceStateSummarySerialNumbers
Write-Host "ServiceStateSummary table content after reset:" -ForegroundColor Green
Get-AdfsWidServiceStateSummary
Write-Host "The full sync will occur on this AD FS Secondary server during the next normal sync poll (by default it occurs every 5 minutes)" -ForegroundColor Green
}
else
{
Write-Host "The last sync status was not sucessful. Cannot force WID sync." -ForegroundColor Yellow
}
}
else
{
Write-Host "This AD FS server is not a secondary server. Please run this cmdlet on your secondary server." -ForegroundColor Yellow
}
}
Export-ModuleMember -Function Invoke-WidSync;
# SIG # Begin signature block
# MIIkWAYJKoZIhvcNAQcCoIIkSTCCJEUCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAlrmWtNnTQzUbP
# 8IR3kv6yvmBKVXrc/QR2tDvmQ9i96KCCDYEwggX/MIID56ADAgECAhMzAAABUZ6N
# j0Bxow5BAAAAAAFRMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMTkwNTAyMjEzNzQ2WhcNMjAwNTAyMjEzNzQ2WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCVWsaGaUcdNB7xVcNmdfZiVBhYFGcn8KMqxgNIvOZWNH9JYQLuhHhmJ5RWISy1
# oey3zTuxqLbkHAdmbeU8NFMo49Pv71MgIS9IG/EtqwOH7upan+lIq6NOcw5fO6Os
# +12R0Q28MzGn+3y7F2mKDnopVu0sEufy453gxz16M8bAw4+QXuv7+fR9WzRJ2CpU
# 62wQKYiFQMfew6Vh5fuPoXloN3k6+Qlz7zgcT4YRmxzx7jMVpP/uvK6sZcBxQ3Wg
# B/WkyXHgxaY19IAzLq2QiPiX2YryiR5EsYBq35BP7U15DlZtpSs2wIYTkkDBxhPJ
# IDJgowZu5GyhHdqrst3OjkSRAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUV4Iarkq57esagu6FUBb270Zijc8w
# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1
# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDU0MTM1MB8GA1UdIwQYMBaAFEhu
# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w
# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3
# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx
# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAWg+A
# rS4Anq7KrogslIQnoMHSXUPr/RqOIhJX+32ObuY3MFvdlRElbSsSJxrRy/OCCZdS
# se+f2AqQ+F/2aYwBDmUQbeMB8n0pYLZnOPifqe78RBH2fVZsvXxyfizbHubWWoUf
# NW/FJlZlLXwJmF3BoL8E2p09K3hagwz/otcKtQ1+Q4+DaOYXWleqJrJUsnHs9UiL
# crVF0leL/Q1V5bshob2OTlZq0qzSdrMDLWdhyrUOxnZ+ojZ7UdTY4VnCuogbZ9Zs
# 9syJbg7ZUS9SVgYkowRsWv5jV4lbqTD+tG4FzhOwcRQwdb6A8zp2Nnd+s7VdCuYF
# sGgI41ucD8oxVfcAMjF9YX5N2s4mltkqnUe3/htVrnxKKDAwSYliaux2L7gKw+bD
# 1kEZ/5ozLRnJ3jjDkomTrPctokY/KaZ1qub0NUnmOKH+3xUK/plWJK8BOQYuU7gK
# YH7Yy9WSKNlP7pKj6i417+3Na/frInjnBkKRCJ/eYTvBH+s5guezpfQWtU4bNo/j
# 8Qw2vpTQ9w7flhH78Rmwd319+YTmhv7TcxDbWlyteaj4RK2wk3pY1oSz2JPE5PNu
# Nmd9Gmf6oePZgy7Ii9JLLq8SnULV7b+IP0UXRY9q+GdRjM2AEX6msZvvPCIoG0aY
# HQu9wZsKEK2jqvWi8/xdeeeSI9FN6K1w4oVQM4Mwggd6MIIFYqADAgECAgphDpDS
# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla
# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT
# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG
# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S
# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz
# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7
# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u
# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33
# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl
# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP
# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB
# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF
# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM
# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ
# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud
# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO
# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0
# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw
# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA
# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY
# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj
# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd
# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ
# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf
# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ
# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j
# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B
# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96
# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7
# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I
# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIWLTCCFikCAQEwgZUwfjELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z
# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAVGejY9AcaMOQQAAAAABUTAN
# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor
# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQggsCbLIz2
# 5JGZJbXQDdXIPmvnxw2jXp1DSGTnJZDgJyQwQgYKKwYBBAGCNwIBDDE0MDKgFIAS
# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN
# BgkqhkiG9w0BAQEFAASCAQAXzS0MB7t0quLTHL+64NQIuSOpTe0RqS4ryMYuAM4O
# /sA5zNdcY35zbQG4rqp0PAUXkUhYJP4sd1iWR+1obYRCu2+m/0meBMF3ZdreEgv4
# rmL8YSxTn4QHhvrhvCVZ0KALRJQ4wH/LNIPTEPY9ahduldXPqZTYibvxzUHreGoM
# WfpBw7i72UH6VSK4ijWRJit6QVftSuKDI8eu7rfG/lvRIj94Peb3/+xbAHWK+HXn
# TSPrfDKeAAXMeC6rJnRcGZ1ASYw0yh4EoTXcMSI47QKzRYJzc4FD4mjwCYbIltL0
# VkRQqqx+8/5+d2Ai2sKALA1yHlEXHX8CtPTx88IMLZIfoYITtzCCE7MGCisGAQQB
# gjcDAwExghOjMIITnwYJKoZIhvcNAQcCoIITkDCCE4wCAQMxDzANBglghkgBZQME
# AgEFADCCAVgGCyqGSIb3DQEJEAEEoIIBRwSCAUMwggE/AgEBBgorBgEEAYRZCgMB
# MDEwDQYJYIZIAWUDBAIBBQAEIMc1/J2LQh+AkTYur2Nrj22ih8YeSNLLiJksQjEw
# OMiZAgZd5qvxyqMYEzIwMTkxMjA5MjI1ODQ3Ljg2M1owBwIBAYACAfSggdSkgdEw
# gc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsT
# IE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFs
# ZXMgVFNTIEVTTjpGNTI4LTM3NzctOEE3NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgU2VydmljZaCCDx8wggT1MIID3aADAgECAhMzAAABApFjXMW0Wbk8
# AAAAAAECMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwMB4XDTE5MDkwNjIwNDExNloXDTIwMTIwNDIwNDExNlowgc4xCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBP
# cGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# NTI4LTM3NzctOEE3NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMR9cB7FDTMrBI8h
# /TzUcyyH/WMnyW+TxPx308rF22K65K6d0Cg/VQyr3xtoT+ir0MEhZ/hvXY5sO8F4
# HSu2frknt30PYRTQW0I1gzgNc7TggbcxfY4JcXStqM0/3NGZusiKKDl8UvFV85ir
# GYuiP/b36nqe6T5zk1gVIGHx5nFIdfPyHjsnoWX6gOxfqIDavfFeb/Ak7lKqZAHU
# gdAZU08KCYkVKYLtZbaRyQ2W1/KA7cPfcT17u+r6dJHZNfMqnCWriLZz9sTdkpTn
# QgvBr6LdLJ8b0e24taMX98ySqyenc1bBfoa49rasKev/Ao17wc3sTO1POEkJQzOi
# b6OwiNcCAwEAAaOCARswggEXMB0GA1UdDgQWBBQ/AgaO19V67EZWg1gyCfv3uVC1
# tjAfBgNVHSMEGDAWgBTVYzpcijGQ80N7fEYbxTNoWoVtVTBWBgNVHR8ETzBNMEug
# SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N
# aWNUaW1TdGFQQ0FfMjAxMC0wNy0wMS5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG
# AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Rp
# bVN0YVBDQV8yMDEwLTA3LTAxLmNydDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IBAQCdMoMxXiGN6lYPaFv/uIVhdPr5
# 0PRE0H+4jZwUEOrTU8vJLF7ARizMeK/ZmxczuJPQhm7KSZBJXp+FmrX5jRE+gD7+
# gkPlTaRTiy+A/3jVOFJiPChh17Zxz/fSqtbKlejkG7LJv4Ptg/1u7qVI3bNGge85
# BkDt0xlTUsK8VxA2zGQSq4JfkF5TSPCGHQjmKdgJTfiZadCWQ2j/K5W0QAzPxNhr
# j3QetJp9Dqlr04EiV1IvZNAhY00TUByBGGhTlEclYTCzhGG7Agv2+qGkOv1tmeRj
# qLCETuF3/+WQWjxEzHfjMRsbDfhrcuAlAXZMrJktBr+87FwXNzt/81FwkOOkMIIG
# cTCCBFmgAwIBAgIKYQmBKgAAAAAAAjANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzAxMjEzNjU1
# WhcNMjUwNzAxMjE0NjU1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKkdDbx3EYo6IOz8E5f1+n9p
# lGt0VBDVpQoAgoX77XxoSyxfxcPlYcJ2tz5mK1vwFVMnBDEfQRsalR3OCROOfGEw
# WbEwRA/xYIiEVEMM1024OAizQt2TrNZzMFcmgqNFDdDq9UeBzb8kYDJYYEbyWEeG
# MoQedGFnkV+BVLHPk0ySwcSmXdFhE24oxhr5hoC732H8RsEnHSRnEnIaIYqvS2SJ
# UGKxXf13Hz3wV3WsvYpCTUBR0Q+cBj5nf/VmwAOWRH7v0Ev9buWayrGo8noqCjHw
# 2k4GkbaICDXoeByw6ZnNPOcvRLqn9NxkvaQBwSAJk3jN/LzAyURdXhacAQVPIk0C
# AwEAAaOCAeYwggHiMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTVYzpcijGQ
# 80N7fEYbxTNoWoVtVTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8E
# BAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U
# kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j
# b20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmww
# WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBoAYD
# VR0gAQH/BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYI
# KwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0
# AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAAfmiFEN4sbgmD+BcQM9
# naOhIW+z66bM9TG+zwXiqf76V20ZMLPCxWbJat/15/B4vceoniXj+bzta1RXCCtR
# gkQS+7lTjMz0YBKKdsxAQEGb3FwX/1z5Xhc1mCRWS3TvQhDIr79/xn/yN31aPxzy
# mXlKkVIArzgPF/UveYFl2am1a+THzvbKegBvSzBEJCI8z+0DpZaPWSm8tv0E4XCf
# Mkon/VWvL/625Y4zu2JfmttXQOnxzplmkIz/amJ/3cVKC5Em4jnsGUpxY517IW3D
# nKOiPPp/fZZqkHimbdLhnPkd/DjYlPTGpQqWhqS9nhquBEKDuLWAmyI4ILUl5WTs
# 9/S/fmNZJQ96LjlXdqJxqgaKD4kWumGnEcua2A5HmoDF0M2n0O99g/DhO3EJ3110
# mCIIYdqwUB5vvfHhAN/nMQekkzr3ZUd46PioSKv33nJ+YWtvd6mBy6cJrDm77MbL
# 2IK0cs0d9LiFAR6A+xuJKlQ5slvayA1VmXqHczsI5pgt6o3gMy4SKfXAL1QnIffI
# rE7aKLixqduWsqdCosnPGUFN4Ib5KpqjEWYw07t0MkvfY3v1mYovG8chr1m1rtxE
# PJdQcdeh0sVV42neV8HR3jDA/czmTfsNv11P6Z0eGTgvvM9YBS7vDaBQNdrvCScc
# 1bN+NR4Iuto229Nfj950iEkSoYIDrTCCApUCAQEwgf6hgdSkgdEwgc4xCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29m
# dCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT
# TjpGNTI4LTM3NzctOEE3NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIlCgEBMAkGBSsOAwIaBQADFQAX6b/thBTl/jMeKcc4lhOUcT39r6CB
# 3jCB26SB2DCB1TELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEp
# MCcGA1UECxMgTWljcm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJzAlBgNV
# BAsTHm5DaXBoZXIgTlRTIEVTTjo0REU5LTBDNUUtM0UwOTErMCkGA1UEAxMiTWlj
# cm9zb2Z0IFRpbWUgU291cmNlIE1hc3RlciBDbG9jazANBgkqhkiG9w0BAQUFAAIF
# AOGYSUYwIhgPMjAxOTEyMDkxMjE3MTBaGA8yMDE5MTIxMDEyMTcxMFowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA4ZhJRgIBADAHAgEAAgIOkTAHAgEAAgIawTAKAgUA
# 4ZmaxgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMBoAowCAIBAAID
# FuNgoQowCAIBAAIDB6EgMA0GCSqGSIb3DQEBBQUAA4IBAQCANnSAM69fa6PRBQ2j
# TPbvpJ7/0Px2Zojt4qXeSvtyjhtWawa/ZtDRR+Yp2o9+ozCj8zGEpNRZRxu7BNQt
# Vp66RjmrGXrK6Mz8arJJlB6T5EskNSHl8zjabxV4ANLVcbnc/6D8UsY/jiQNE4yE
# XrW79VzCmjkZr4y2d8xb2C1CKXWfsc7A7RhamaGW92Nj9nqmoPoRuhoqPLvXrWYH
# x1+W8Te4QmlTCeEptG7elUkSJfZyBg5y7mpwLHFutIwjudQ6W3PApJX9dX19Yxb7
# 6bH5iiz3H3TqejFdBYNt/u3/57EMzJ30HWfQxKuqsR2USAox2NYVQUP8AWoKhQGP
# llGxMYIC9TCCAvECAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC
# EzMAAAECkWNcxbRZuTwAAAAAAQIwDQYJYIZIAWUDBAIBBQCgggEyMBoGCSqGSIb3
# DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgrMe2Knay20edEjAM
# 1us2jIuprbap0Hl/v6GW1Itda0gwgeIGCyqGSIb3DQEJEAIMMYHSMIHPMIHMMIGx
# BBQX6b/thBTl/jMeKcc4lhOUcT39rzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0
# YW1wIFBDQSAyMDEwAhMzAAABApFjXMW0Wbk8AAAAAAECMBYEFOGni6NNDXz+pKSM
# RcAD8xLLuut0MA0GCSqGSIb3DQEBCwUABIIBAGGyzfIBf4F9W4r8q+hWSZaSfudo
# 0XwuN9s8r4QzUAnEwkyI0uU69QQRqKAW2qedv1DNCEQfl0WsVXsl67aq9yjY18I+
# tTnl7RQvMUMNZPr4ptXYGwzytIa05GCYXIjqXNyaVulcKJjBk/01JkHjFySLTRlx
# +2fC1e9TuMq+o1uTrckptZaqTxvVK+u+OqPKs59KejqGkH4aB0SWYZBnaOJVAZII
# Rtage/CJH5s7Ujox65p8G2DauE5WKM0iQaTMaFOaXiSsnw5xyQFEw/Vi4naHbnNg
# Ic2W8bZOLhi64o50PrMb3KUkiQCpcdhWNSqI+sQdoQh7LkfzVZjhPImTL98=
# SIG # End signature block
|
ADFSToolbox.psd1 | ADFSToolbox-2.0.17 | #
# Module manifest for module 'PSGet_ADFSToolbox'
#
# Generated by: Microsoft
#
# Generated on: 12/9/2019
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'ADFSToolbox.psm1'
# Version number of this module.
ModuleVersion = '2.0.17.0'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = 'cc5b522e-0f34-4122-bdd6-62a91793137e'
# Author of this module
Author = 'Microsoft'
# Company or vendor of this module
CompanyName = 'Microsoft'
# Copyright statement for this module
Copyright = '(c) 2018 Microsoft. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Contains data gathering, health checks, and additional tools for AD FS server deployments.'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '4.0'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @('diagnosticsModule\AdfsToolbox.PowerShell.dll',
'eventsModule\AdfsEventsModule.psm1',
'widSyncModule\AdfsWidSyncModule.psm1',
'tlsModule\AdfsTlsModule.psm1')
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = 'Enable-ADFSAuditing', 'Disable-ADFSAuditing',
'Write-ADFSEventsSummary', 'Get-AdfsEvents', 'Invoke-WidSync',
'Get-ADFSTLSConfiguration', 'Set-ADFSTLSConfiguration'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-AdfsFarmHealth', 'Get-AdfsServerHealth',
'Export-AdfsDiagnosticsFile', 'Export-AdfsSupportCaseData',
'Get-AdfsFarmConfiguration', 'Get-ProxyFarmConfiguration'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'ADFS','WAP','ADFSDiagnostics','Troubleshooting'
# A URL to the license for this module.
LicenseUri = 'https://github.com/Microsoft/adfsToolbox/blob/master/LICENSE'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/Microsoft/adfsToolbox/'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
HelpInfoURI = 'https://github.com/Microsoft/adfsToolbox/'
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
Test.ServiceAccount.ps1 | ADFSToolbox-2.0.17 | #Define global constants
$script:Service_Account_Name = "newServiceAcct"
function New-ServiceAccount
{
param(
[Parameter(Mandatory=$true,Position=0)]
[string]$username,
[Parameter(Mandatory=$true,Position=1)]
[string]$password
)
Process
{
ipmo ActiveDirectory
$oldLocation = Get-Location
Set-Location AD:
$encryptedPassword = $password | ConvertTo-SecureString -asPlainText -Force
try
{
$userObject = Get-ADUser $userName -ErrorAction SilentlyContinue
}
catch
{
}
if ($userObject -eq $null)
{
New-ADUser -Name $userName
}
Get-ADUser $userName | Set-ADAccountPassword -Reset -NewPassword $encryptedPassword -PassThru
Get-ADUser $userName | Set-ADUser -PasswordNeverExpires $true -PassThru -Description "Password: $password" -Enabled $true
Set-Location $oldLocation
}
}
#####################################################################
####Helper functions related to rule parsing logic###################
#####################################################################
<#
.SYNOPSIS
Class to encapsulate parsing of the ADFS Issuances/Auth rules.
#>
class AdfsRules
{
[System.Collections.ArrayList] hidden $rules
<#
.SYNOPSIS
Constructor
#>
AdfsRules([string]$rawRules)
{
$rulesArray = $this.ParseRules($rawRules)
$this.rules = New-Object "System.Collections.ArrayList"
$this.rules.AddRange($rulesArray)
}
<#
.SYNOPSIS
Utility function to parse the rules and return them as a string[].
#>
[string[]] hidden ParseRules([string]$rawRules)
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : BEGIN"
$allRules = @()
$singleRule = [string]::Empty
$rawRules.Split("`n") | %{
$line = $_.ToString().Trim()
if (-not ([string]::IsNullOrWhiteSpace($line)) )
{
$singleRule += $_ + "`n"
if ($line.StartsWith("=>"))
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Parsed rule:`n$singleRule"
$allRules += $singleRule
$singleRule = [string]::Empty
}
}
}
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : END"
return $allRules
}
[int] NumberOfRules()
{
return $this.rules.Count
}
<#
.SYNOPSIS
Finds the rule by name in the format: @RuleName = "$ruleName". Returns $null if not found.
#>
[string] FindByRuleName([string]$ruleName)
{
$ruleNameSearchString = '@RuleName = "' + $ruleName + '"'
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Search string: $ruleNameSearchString"
foreach ($rule in $this.rules)
{
if ($rule.Contains($ruleNameSearchString))
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Found.`n$rule"
return $rule
}
}
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : NOT FOUND. Returning $null"
return $null;
}
<#
.SYNOPSIS
Replaces the specified old rule with the new one. Returns $true if the old one was found and replaced; $false otherwise.
#>
[bool] ReplaceRule([string]$oldRule, [string]$newRule)
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Trying to replace old rule with new.`n Old Rule:`n$oldRule`n New Rule:`n$newRule"
$idx = $this.FindIndexForRule($oldRule)
if ($idx -ge 0)
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Replacing old rule with new."
$this.rules[$idx] = $newRule
return $true
}
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Old rule is not found so NOT replacing it."
return $false
}
<#
.SYNOPSIS
Removes the specified if found. Returns $true if found; $false otherwise.
#>
[bool] RemoveRule([string]$ruleToRemove)
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Trying to remove rule.`n Rule:`n$ruleToRemove"
$idx = $this.FindIndexForRule($ruleToRemove)
if ($idx -ge 0)
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Removing rule at index: $idx."
$this.rules.RemoveAt($idx)
return $true
}
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Rule is not found so NOT removing it."
return $false
}
<#
.SYNOPSIS
Helper function to find the index of the rule. Returns index if found; -1 otherwise.
#>
[int] FindIndexForRule([string]$ruleToFind)
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Trying to find rule.`n Rule:`n$ruleToFind"
for ($i = 0; $i -lt $this.rules.Count; $i++)
{
$rule = $this.rules[$i]
if ($rule.trim().Equals($ruleToFind.trim()))
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Found at index: $i."
return $i
}
}
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : NOT FOUND. Returning -1"
return -1
}
<#
.SYNOPSIS
Returns all the rules as string.
#>
[string] ToString()
{
return [string]::Join("`n", $this.rules.ToArray())
}
}
# Gets internal ADFS settings by extracting them Get-AdfsProperties
function Get-AdfsInternalSettings()
{
$settings = Get-AdfsProperties
$settingsType = $settings.GetType()
$propInfo = $settingsType.GetProperty("ServiceSettingsData", [System.Reflection.BindingFlags]::Instance -bor [System.Reflection.BindingFlags]::NonPublic)
$internalSettings = $propInfo.GetValue($settings, $null)
return $internalSettings
}
function ValidateRules
{
param
(
[parameter()]
[switch]$CheckNotPresent
)
$Properties = Get-AdfsInternalSettings
$AuthorizationPolicyRules = [AdfsRules]::new($Properties.PolicyStore.AuthorizationPolicy)
$AuthorizationPolicyReadOnlyRules = [AdfsRules]::new($Properties.PolicyStore.AuthorizationPolicyReadOnly)
$SID = (New-Object system.security.principal.NtAccount($Service_Account_Name )).translate([system.security.principal.securityidentifier])
$ServiceAccountRule = "@RuleName = `"Permit Service Account`"`nexists([Type == `"http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid`", Value == `"$SID`"])`n=> issue(Type = `"http://schemas.microsoft.com/authorization/claims/permit`", value = `"true`");`n`n"
$AuthPolicyIndex = $AuthorizationPolicyRules.FindIndexForRule($ServiceAccountRule)
$ReadOnlyIndex = $AuthorizationPolicyReadOnlyRules.FindIndexForRule($ServiceAccountRule)
if($CheckNotPresent)
{
return ($AuthPolicyIndex -eq -1 -and $ReadOnlyIndex -eq -1)
}
return ($AuthPolicyIndex -ne -1 -and $ReadOnlyIndex -ne -1)
}
function Initialize()
{
ipmo .\ServiceAccount.psm1
#[SuppressMessage("Microsoft.Security", "CS002:SecretInNextLine", Justification="Simply a test password not used anywhere")]
New-ServiceAccount -username $script:Service_Account_Name -password "Password"
}
Describe 'Basic functionality of adding and removing service account rule'{
BeforeAll {
Initialize
}
AfterAll {
Remove-ADUser -Identity $script:Service_Account_Name
}
It "[00000]: Add-AdfsServiceAccountRule adds permit rule to ruleset"{
Add-AdfsServiceAccountRule -ServiceAccount $script:Service_Account_Name
ValidateRules | Should Be $true
}
It "[00000]: Add-AdfsServiceAccountRule fails if rule already exists"{
$BeforeProperties = Get-AdfsInternalSettings
$BeforeAuthorizationPolicyRules = [AdfsRules]::new($Properties.PolicyStore.AuthorizationPolicy)
$BeforeAuthorizationPolicyReadOnlyRules = [AdfsRules]::new($Properties.PolicyStore.AuthorizationPolicyReadOnly)
Add-AdfsServiceAccountRule -ServiceAccount $script:Service_Account_Name
$AfterProperties = Get-AdfsInternalSettings
$AfterAuthorizationPolicyRules = [AdfsRules]::new($Properties.PolicyStore.AuthorizationPolicy)
$AfterAuthorizationPolicyReadOnlyRules = [AdfsRules]::new($Properties.PolicyStore.AuthorizationPolicyReadOnly)
$AuthPolicyMatches = $BeforeAuthorizationPolicyRules.NumberOfRules() -eq $AfterAuthorizationPolicyRules.NumberOfRules()
$ReadOnlyMatches = $BeforeAuthorizationPolicyReadOnlyRules.NumberOfRules() -eq $AfterAuthorizationPolicyReadOnlyRules.NumberOfRules()
($AuthPolicyMatches -eq $ReadOnlyMatches) | Should Be $true
}
It "[00000]: Remove-AdfsServiceAccountRule removes permit rule to ruleset"{
Remove-AdfsServiceAccountRule -ServiceAccount $script:Service_Account_Name
ValidateRules -CheckNotPresent | Should Be $true
}
It "[00000]: Remove-AdfsServiceAccountRule does nothing if rule isn't present"{
$BeforeProperties = Get-AdfsInternalSettings
$BeforeAuthorizationPolicyRules = [AdfsRules]::new($Properties.PolicyStore.AuthorizationPolicy)
$BeforeAuthorizationPolicyReadOnlyRules = [AdfsRules]::new($Properties.PolicyStore.AuthorizationPolicyReadOnly)
Remove-AdfsServiceAccountRule -ServiceAccount $script:Service_Account_Name
$AfterProperties = Get-AdfsInternalSettings
$AfterAuthorizationPolicyRules = [AdfsRules]::new($Properties.PolicyStore.AuthorizationPolicy)
$AfterAuthorizationPolicyReadOnlyRules = [AdfsRules]::new($Properties.PolicyStore.AuthorizationPolicyReadOnly)
$AuthPolicyMatches = $BeforeAuthorizationPolicyRules.NumberOfRules() -eq $AfterAuthorizationPolicyRules.NumberOfRules()
$ReadOnlyMatches = $BeforeAuthorizationPolicyReadOnlyRules.NumberOfRules() -eq $AfterAuthorizationPolicyReadOnlyRules.NumberOfRules()
($AuthPolicyMatches -eq $ReadOnlyMatches) | Should Be $true
}
It "[00000]: Add-AdfsServiceAccountRule adds permit rule to ruleset"{
$ErrorThrown = $false
try
{
Add-AdfsServiceAccountRule -ServiceAccount "fakeAccount"
}
catch
{
$ErrorThrown = $true
}
$ErrorThrown | Should Be $true
}
}
# SIG # Begin signature block
# MIIkWAYJKoZIhvcNAQcCoIIkSTCCJEUCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC3n1Y9DcunGw7V
# 0CKrbUhKRsU1tx9P63a8jrrRT657pKCCDYEwggX/MIID56ADAgECAhMzAAABUZ6N
# j0Bxow5BAAAAAAFRMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMTkwNTAyMjEzNzQ2WhcNMjAwNTAyMjEzNzQ2WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCVWsaGaUcdNB7xVcNmdfZiVBhYFGcn8KMqxgNIvOZWNH9JYQLuhHhmJ5RWISy1
# oey3zTuxqLbkHAdmbeU8NFMo49Pv71MgIS9IG/EtqwOH7upan+lIq6NOcw5fO6Os
# +12R0Q28MzGn+3y7F2mKDnopVu0sEufy453gxz16M8bAw4+QXuv7+fR9WzRJ2CpU
# 62wQKYiFQMfew6Vh5fuPoXloN3k6+Qlz7zgcT4YRmxzx7jMVpP/uvK6sZcBxQ3Wg
# B/WkyXHgxaY19IAzLq2QiPiX2YryiR5EsYBq35BP7U15DlZtpSs2wIYTkkDBxhPJ
# IDJgowZu5GyhHdqrst3OjkSRAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUV4Iarkq57esagu6FUBb270Zijc8w
# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1
# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDU0MTM1MB8GA1UdIwQYMBaAFEhu
# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w
# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3
# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx
# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAWg+A
# rS4Anq7KrogslIQnoMHSXUPr/RqOIhJX+32ObuY3MFvdlRElbSsSJxrRy/OCCZdS
# se+f2AqQ+F/2aYwBDmUQbeMB8n0pYLZnOPifqe78RBH2fVZsvXxyfizbHubWWoUf
# NW/FJlZlLXwJmF3BoL8E2p09K3hagwz/otcKtQ1+Q4+DaOYXWleqJrJUsnHs9UiL
# crVF0leL/Q1V5bshob2OTlZq0qzSdrMDLWdhyrUOxnZ+ojZ7UdTY4VnCuogbZ9Zs
# 9syJbg7ZUS9SVgYkowRsWv5jV4lbqTD+tG4FzhOwcRQwdb6A8zp2Nnd+s7VdCuYF
# sGgI41ucD8oxVfcAMjF9YX5N2s4mltkqnUe3/htVrnxKKDAwSYliaux2L7gKw+bD
# 1kEZ/5ozLRnJ3jjDkomTrPctokY/KaZ1qub0NUnmOKH+3xUK/plWJK8BOQYuU7gK
# YH7Yy9WSKNlP7pKj6i417+3Na/frInjnBkKRCJ/eYTvBH+s5guezpfQWtU4bNo/j
# 8Qw2vpTQ9w7flhH78Rmwd319+YTmhv7TcxDbWlyteaj4RK2wk3pY1oSz2JPE5PNu
# Nmd9Gmf6oePZgy7Ii9JLLq8SnULV7b+IP0UXRY9q+GdRjM2AEX6msZvvPCIoG0aY
# HQu9wZsKEK2jqvWi8/xdeeeSI9FN6K1w4oVQM4Mwggd6MIIFYqADAgECAgphDpDS
# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla
# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT
# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG
# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S
# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz
# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7
# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u
# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33
# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl
# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP
# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB
# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF
# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM
# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ
# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud
# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO
# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0
# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw
# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA
# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY
# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj
# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd
# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ
# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf
# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ
# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j
# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B
# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96
# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7
# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I
# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIWLTCCFikCAQEwgZUwfjELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z
# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAVGejY9AcaMOQQAAAAABUTAN
# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor
# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgjJwp2tvp
# EjQ3ffrwNJSNIpyxdU4gV1Ht6a5St0MNBK0wQgYKKwYBBAGCNwIBDDE0MDKgFIAS
# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN
# BgkqhkiG9w0BAQEFAASCAQAxTMQ2JXnZeqwV+BTp5ctVQzetorK73eOW+HrtLClw
# YDuK5YKwAOfOHv6KXNGoORuqWry6akQxxmAeOQsTAYv+LKDSMSkyUtzGRvHIMyIF
# CVHnEWyaC2X5hJA1T1SRsPXzTKjvu/GsxWs2pgKuhN8xhJJcGdvQSap6efb4vmVj
# JWFaqGoxmLpbDvFR4d54muzQKiq5DA5yCJQpWkv9YRs44qTWcSQfA3FlnkfMflYI
# oYoToxaYsv+2ID6GjKF5BjXHZauHi0Xo8G42E/XWhOaJ8xWbryCZpaQ5u7xe8F9z
# iHvPbD3UpvsRzfIKnRzjKdXS2bp6dr1UBB2OHWqB5KmQoYITtzCCE7MGCisGAQQB
# gjcDAwExghOjMIITnwYJKoZIhvcNAQcCoIITkDCCE4wCAQMxDzANBglghkgBZQME
# AgEFADCCAVgGCyqGSIb3DQEJEAEEoIIBRwSCAUMwggE/AgEBBgorBgEEAYRZCgMB
# MDEwDQYJYIZIAWUDBAIBBQAEIK4/W4jgSkx6LoFjEP82Tf+mpVNVNfN7KRhIplfE
# PfzeAgZd5nVBtXkYEzIwMTkxMjA5MjI1ODM1LjQ3NVowBwIBAYACAfSggdSkgdEw
# gc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsT
# IE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFs
# ZXMgVFNTIEVTTjo1ODQ3LUY3NjEtNEY3MDElMCMGA1UEAxMcTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgU2VydmljZaCCDx8wggT1MIID3aADAgECAhMzAAABBQc56lnzVb8q
# AAAAAAEFMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwMB4XDTE5MDkwNjIwNDExOFoXDTIwMTIwNDIwNDExOFowgc4xCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBP
# cGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo1
# ODQ3LUY3NjEtNEY3MDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMwilmNVSItZAaoM
# Ustp4Z+Fz1vELCLwdDH6BxoXlnPYah2EzvWjKNqXq6qdEzxAfGPj24oWZj9JYSGV
# X6yjciuYQdUuayR4RBqKjk/FWBRZGb6wEgmlL0aPAqsY9na5vhJPYn1+7kXFt9OY
# nIHYAvpbtZxJQ43y3K7Pb81EAgjpi6iN0xrqaNVdqYvYBLs8GjUZbg9rhds2ERCg
# Dj+yJLgkZtx8DBUwa/ztuEpqkOqlctsOrotsV0sC/tDt5QeIdLh5xxdE0YCemR2E
# c4ruzU70WqlFlixvH9SmRqjKqJB78kVMD7WR5hmxmBpCqA82kZgPnRIMPJBna+03
# HspWBe0CAwEAAaOCARswggEXMB0GA1UdDgQWBBQ9dBv+uncoTMroNg7LcWf9AjM3
# IjAfBgNVHSMEGDAWgBTVYzpcijGQ80N7fEYbxTNoWoVtVTBWBgNVHR8ETzBNMEug
# SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N
# aWNUaW1TdGFQQ0FfMjAxMC0wNy0wMS5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG
# AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Rp
# bVN0YVBDQV8yMDEwLTA3LTAxLmNydDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IBAQCnzmF3e2sBV+ZUA+Zw4CqczjtN
# tYH1LTJIYb9428h+GBgLRiMIsRmGKJDI55FPCzSUg5Ya/u0zm2vvREbM2jX8LtJB
# p2pDZ1PmxSPsZrosc7Z7Fx3NG9QjB145pW5qPhWmJeeGM8FG7YJU0Zc97V3tnPDt
# 2LzGHYPqihkGOEcuHvIZ/ZkWMGMtwNWOt9ovB3hip58mCDjazwQxShfOxOk+VLQg
# EpZ5f5FsHJw5SFekr2qW8VsFAang364sRXqFobfehU61bCtuG7kXQThQPOwVRpnw
# 4AvIqtpHV0ij5lT7OOmfc1rspSStP/VQVh2dZjChQOb174OYGGp2FSXEiFGfMIIG
# cTCCBFmgAwIBAgIKYQmBKgAAAAAAAjANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzAxMjEzNjU1
# WhcNMjUwNzAxMjE0NjU1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKkdDbx3EYo6IOz8E5f1+n9p
# lGt0VBDVpQoAgoX77XxoSyxfxcPlYcJ2tz5mK1vwFVMnBDEfQRsalR3OCROOfGEw
# WbEwRA/xYIiEVEMM1024OAizQt2TrNZzMFcmgqNFDdDq9UeBzb8kYDJYYEbyWEeG
# MoQedGFnkV+BVLHPk0ySwcSmXdFhE24oxhr5hoC732H8RsEnHSRnEnIaIYqvS2SJ
# UGKxXf13Hz3wV3WsvYpCTUBR0Q+cBj5nf/VmwAOWRH7v0Ev9buWayrGo8noqCjHw
# 2k4GkbaICDXoeByw6ZnNPOcvRLqn9NxkvaQBwSAJk3jN/LzAyURdXhacAQVPIk0C
# AwEAAaOCAeYwggHiMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTVYzpcijGQ
# 80N7fEYbxTNoWoVtVTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8E
# BAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U
# kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j
# b20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmww
# WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBoAYD
# VR0gAQH/BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYI
# KwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0
# AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAAfmiFEN4sbgmD+BcQM9
# naOhIW+z66bM9TG+zwXiqf76V20ZMLPCxWbJat/15/B4vceoniXj+bzta1RXCCtR
# gkQS+7lTjMz0YBKKdsxAQEGb3FwX/1z5Xhc1mCRWS3TvQhDIr79/xn/yN31aPxzy
# mXlKkVIArzgPF/UveYFl2am1a+THzvbKegBvSzBEJCI8z+0DpZaPWSm8tv0E4XCf
# Mkon/VWvL/625Y4zu2JfmttXQOnxzplmkIz/amJ/3cVKC5Em4jnsGUpxY517IW3D
# nKOiPPp/fZZqkHimbdLhnPkd/DjYlPTGpQqWhqS9nhquBEKDuLWAmyI4ILUl5WTs
# 9/S/fmNZJQ96LjlXdqJxqgaKD4kWumGnEcua2A5HmoDF0M2n0O99g/DhO3EJ3110
# mCIIYdqwUB5vvfHhAN/nMQekkzr3ZUd46PioSKv33nJ+YWtvd6mBy6cJrDm77MbL
# 2IK0cs0d9LiFAR6A+xuJKlQ5slvayA1VmXqHczsI5pgt6o3gMy4SKfXAL1QnIffI
# rE7aKLixqduWsqdCosnPGUFN4Ib5KpqjEWYw07t0MkvfY3v1mYovG8chr1m1rtxE
# PJdQcdeh0sVV42neV8HR3jDA/czmTfsNv11P6Z0eGTgvvM9YBS7vDaBQNdrvCScc
# 1bN+NR4Iuto229Nfj950iEkSoYIDrTCCApUCAQEwgf6hgdSkgdEwgc4xCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29m
# dCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT
# Tjo1ODQ3LUY3NjEtNEY3MDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIlCgEBMAkGBSsOAwIaBQADFQDSeZzsyIfY+vTHfefXdmDhGVX2qqCB
# 3jCB26SB2DCB1TELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEp
# MCcGA1UECxMgTWljcm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJzAlBgNV
# BAsTHm5DaXBoZXIgTlRTIEVTTjo0REU5LTBDNUUtM0UwOTErMCkGA1UEAxMiTWlj
# cm9zb2Z0IFRpbWUgU291cmNlIE1hc3RlciBDbG9jazANBgkqhkiG9w0BAQUFAAIF
# AOGY+1YwIhgPMjAxOTEyMTAwMDU2NTRaGA8yMDE5MTIxMTAwNTY1NFowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA4Zj7VgIBADAHAgEAAgIDtjAHAgEAAgIXxDAKAgUA
# 4ZpM1gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMBoAowCAIBAAID
# FuNgoQowCAIBAAIDB6EgMA0GCSqGSIb3DQEBBQUAA4IBAQA1OjOSoL52/mVa1iir
# Z5DzXMGdA8OPmrAUOEz+QDvCQDnBLGKSTRBIxc+Yp6P2SesnwVzsLfpI/VE1StGJ
# 02DNlegzLjwEZu5wfVyVul78Ha1kdhKdOxAScRGM63JtxH6aq2zapHOeZ5jy7XbZ
# vbCV8NwvWcVfpaviZ1XAbFyQ3h/L/Xs06Ww7m2XgcI2foDW6Qro08PZaHtlFdzDJ
# +ZwwCJB7KwBqZEyduRB1wa4OztsVGsdW5u/hmihmKzPrzTfee21B+Ig0YgK3zAkm
# tku+5PyXQfoi79JeeCvpNgjNGi5kqirJmXL0rGFQr+8qjricxOVIo6+NWwekfSWs
# pAh2MYIC9TCCAvECAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC
# EzMAAAEFBznqWfNVvyoAAAAAAQUwDQYJYIZIAWUDBAIBBQCgggEyMBoGCSqGSIb3
# DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgG76Mpo4ik5mSM5i1
# pEPY/YRrLh17iKDXP2/19Ky3wPUwgeIGCyqGSIb3DQEJEAIMMYHSMIHPMIHMMIGx
# BBTSeZzsyIfY+vTHfefXdmDhGVX2qjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0
# YW1wIFBDQSAyMDEwAhMzAAABBQc56lnzVb8qAAAAAAEFMBYEFLrkAHXdzGsJ36wg
# gQCuRvgsHtkYMA0GCSqGSIb3DQEBCwUABIIBAKWz6nJoX/ksLZQMarwmaMhgb7/+
# YT2vCG0rVfT+/2+aDMRPmaSo+XAWnCUOegBukS2iLNG7d/34ZRMS4Ew5DbzH+ucC
# aR0b3MGIsgbThaXsRQ3003w4+Ha5c76v3crbrch7i0N1qtUVsTWYFU2WjxzaANkh
# Gw7HjsaFrNGhOdmrfHo/aoh7cn/0TcKDvzMOKECRTZ7+DgL2XrP5ptdjq7/lKpVY
# PB31fMk7NY9sfic3G+KXTnvPzcCMT7kt5vXuJVhrcnqyqMJCuq3nxi/pZGNAgNiJ
# vF+7cH7ouO36N2X39DExP52UvnVF6ZN+PxTLP7uHTjUL7+2u5/91KU4pYkQ=
# SIG # End signature block
|
AdfsEventsModule.psm1 | ADFSToolbox-2.0.17 | # Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License.
# ----------------------------------------------------
#
# Global Constants
#
# ----------------------------------------------------
$script:CONST_ADFS_ADMIN = "AD FS"
$script:CONST_ADFS_AUDIT = "AD FS Auditing"
$script:CONST_ADFS_DEBUG = "AD FS Tracing"
$script:CONST_SECURITY_LOG = "security"
$script:CONST_ADMIN_LOG = "AD FS/Admin"
$script:CONST_DEBUG_LOG = "AD FS Tracing/Debug"
$script:CONST_LOG_PARAM_SECURITY = "security"
$script:CONST_LOG_PARAM_ADMIN = "admin"
$script:CONST_LOG_PARAM_DEBUG = "debug"
$script:CONST_AUDITS_TO_AGGREGATE = @( 299, 324, 403, 404, 412)
$script:CONST_AUDITS_LINKED = @(500, 501, 502, 503, 510)
$script:CONST_TIMELINE_AUDITS = @(299, 324, 403, 411, 412)
# TODO: PowerShell is not good with JSON objects. Headers should be {}.
$script:REQUEST_OBJ_TEMPLATE = '{"num": 0,"time": "1/1/0001 12:00:00 AM","protocol": "","host": "","method": "","url": "","query": "","useragent": "","server": "","clientip": "","contlen": 0,"headers": [],"tokens": [],"ver": "1.0"}'
$script:RESPONSE_OBJ_TEMPLATE = '{"num": 0,"time": "1/1/0001 12:00:00 AM","result": "","headers": {},"tokens": [],"ver": "1.0"}'
$script:ANALYSIS_OBJ_TEMPLATE = '{"requests": [],"responses": [],"errors": [],"timeline": [],"ver": "1.0"}'
$script:ERROR_OBJ_TEMPLATE = '{"time": "1/1/0001 12:00:00 AM","eventid": 0,"level": "", "message": [],"ver": "1.0"}'
$script:TIMELINE_OBJ_TEMPLATE = '{"time": "","type": "", "tokentype": "", "rp": "","result": "","stage": 0,"ver": "1.0"}'
$script:TOKEN_OBJ_TEMPLATE = '{"num": 0,"type": "","rp": "","user": "","direction": "","claims": [],"oboclaims": [],"actasclaims": [],"ver": "1.0"}'
$script:TIMELINE_INCOMING = "incoming"
$script:TIMELINE_AUTHENTICATION = "authn"
$script:TIMELINE_AUTHORIZATION = "authz"
$script:TIMELINE_ISSUANCE = "issuance"
$script:TIMELINE_SUCCESS = "success"
$script:TIMELINE_FAILURE = "fail"
$script:TOKEN_TYPE_ACCESS = "access_token"
$script:CONST_ADFS_HTTP_PORT = 0
$script:CONST_ADFS_HTTPS_PORT = 0
$script:DidLoadPorts = $false
# ----------------------------------------------------
#
# Helper Functions - Querying
#
# ----------------------------------------------------
function Enable-ADFSAuditing
{
param(
[parameter(Mandatory=$False)]
[string[]]$Server="LocalHost"
)
<#
.SYNOPSIS
This script enables ADFS verbose related events from the security, admin, and debug logs.
.DESCRIPTION
To track ADFS authentication processing there are multiple items which must be enabled on the ADFS server(s). This function provides automation in
enabling those items. Specifically, this function enables ADFS sourced Security events in the Security event log, verbose events in the ADFS Admin log,
and ADFS tracing events in the ADFS Tracing/Debug log.
Note that this function can only run the ADFS properties on remote servers, and not the OS trace log commands.
EXAMPLE
Enable-ADFSAuditing
#>
$cs = get-wmiobject -class win32_computersystem -ComputerName "localhost"
$DomainRole = $cs.domainrole
#Check and add service account to auditing user right if needed
$ADFSService = GWMI Win32_Service -Filter "name = 'adfssrv'" -ComputerName "localhost"
$ADFSServiceAccount = $ADFSService.StartName
$objUser = New-Object System.Security.Principal.NTAccount($ADFSServiceAccount)
$strSID = $objUser.Translate([System.Security.Principal.SecurityIdentifier])
$SvcAcctSID = $strSID.Value
$SecTempPath = $pwd.path + '\SecTempPath'
if((test-path $SecTempPath) -eq $false){$SecPath = New-item -Path $SecTempPath -ItemType Directory}
$SecTempPath = $SecTempPath + "\secpol.cfg"
$SeceditCmd = secedit /export /cfg $SecTempPath
$OldSeSecPriv = Select-string -path $SecTempPath -pattern "SeAuditPrivilege"
$OldSeSecPriv = $OldSeSecPriv.Line
$NewSeSecPriv = $OldSeSecPriv + ",*" + $SvcAcctSID
(gc $SecTempPath).replace($OldSeSecPriv,$NewSeSecPriv) | Out-File -Filepath $SecTempPath
secedit /configure /db c:\windows\security\local.sdb /cfg $SecTempPath /areas SECURITYPOLICY
$RM = rm -force $SecTempPath -confirm:$false -ErrorAction SilentlyContinue
gpupdate /force
#Enable ADFS Tracing log
$ADFSTraceLogName = "AD FS Tracing/Debug"
$ADFSTraceLog = New-Object System.Diagnostics.Eventing.Reader.EventlogConfiguration $ADFSTraceLogName
if($ADFSTraceLog.IsEnabled -ne $true)
{
$ADFSTraceLog.IsEnabled = $true
$ADFSTraceLog.SaveChanges()
}
foreach($Machine in $Server)
{
Try
{
$Session = New-PSSession -ComputerName $Machine
Set-ADFSAuditingRemote -Session $Session -Enable $True
auditpol.exe /set /subcategory:"Application Generated" /failure:enable /success:enable
}
Catch
{
Write-Warning "Error enabling ADFS auditing settings on $Machine. Error: $_"
}
Finally
{
if($Session)
{
Remove-PSSession $Session
}
}
}
Write-Verbose "ADFS auditing is now enabled."
}
function Disable-ADFSAuditing
{
param(
[parameter(Mandatory=$False)]
[string[]]$Server="LocalHost"
)
<#
.SYNOPSIS
This script disables ADFS verbose related events from the security, admin, and debug logs.
.DESCRIPTION
To track ADFS authentication processing there are multiple items which must be enabled on the ADFS server(s). This function provides
automation for disabling those items so that event logs do not fill up.
Note that this function can only run the ADFS properties on remote servers, and not the OS trace log commands.
EXAMPLE
Disable-ADFSAuditing
#>
#Disable ADFS Tracing log
$ADFSTraceLogName = "AD FS Tracing/Debug"
$ADFSTraceLog = New-Object System.Diagnostics.Eventing.Reader.EventlogConfiguration $ADFSTraceLogName
if ($ADFSTraceLog.IsEnabled -ne $false)
{
$ADFSTraceLog.IsEnabled = $false
$ADFSTraceLog.SaveChanges()
}
#Disable security auditing from ADFS
$cs = get-wmiobject -class win32_computersystem -ComputerName "localhost"
$DomainRole = $cs.domainrole
foreach($Machine in $Server)
{
Try
{
$Session = New-PSSession -ComputerName $Machine
Set-ADFSAuditingRemote -Session $Session -Enable $False
auditpol.exe /set /subcategory:"Application Generated" /failure:disable /success:disable
}
Catch
{
Write-Warning "Error disabling ADFS auditing settings on $Machine. Error: $_"
}
Finally
{
if($Session)
{
Remove-PSSession $Session
}
}
}
Write-Verbose "ADFS auditing is now disabled."
}
function Set-ADFSAuditingRemote
{
param(
[Parameter(Mandatory=$True)]
[System.Management.Automation.Runspaces.PSSession]$Session,
[Parameter(Mandatory=$True)]
[bool]$Enable
)
Invoke-Command -Session $Session -ScriptBlock { param($Enable)
$OSVersion = gwmi win32_operatingsystem
[int]$BuildNumber = $OSVersion.BuildNumber
if ( $BuildNumber -le 7601 )
{
Add-PsSnapin Microsoft.Adfs.Powershell -ErrorAction SilentlyContinue
}else
{
Import-Module ADFS -ErrorAction SilentlyContinue
}
$SyncProps = Get-ADFSSyncProperties
if ( $SyncProps.Role -ne 'SecondaryComputer' )
{
if ( $Enable )
{
Set-ADFSProperties -LogLevel @( "FailureAudits", "SuccessAudits", "Warnings", "Verbose", "Errors", "Information")
Set-ADFSProperties -AuditLevel Verbose
}else{
Set-ADFSProperties -LogLevel @( "Warnings", "Errors", "Information" )
}
}
} -ArgumentList $Enable
}
function MakeQuery
{
<#
.DESCRIPTION
Performs a log search query to a remote machine, using remote PowerShell, and Get-WinEvent
#>
param(
[parameter(Mandatory=$True)]
[string]$Query,
[Parameter(Mandatory=$True)]
[string]$Log,
[Parameter(Mandatory=$True)]
[System.Management.Automation.Runspaces.PSSession]$Session,
[parameter(Mandatory=$false)]
[string]$FilePath,
[parameter(Mandatory=$false)]
[bool]$ByTime,
[parameter(Mandatory=$false)]
[DateTime]$Start = (Get-Date),
[parameter(Mandatory=$false)]
[DateTime]$End = (Get-Date),
[parameter(Mandatory=$false)]
[bool]$IncludeLinkedInstances
)
# Get-WinEvent is performed through a remote powershell session to avoid firewall issues that arise from simply passing a computer name to Get-WinEvent
Invoke-Command -Session $Session -ArgumentList $Query, $Log, $script:CONST_ADFS_AUDIT, $script:CONST_AUDITS_TO_AGGREGATE, $script:CONST_AUDITS_LINKED, $IncludeLinkedInstances, $ByTime, $Start, $End, $FilePath -ScriptBlock {
param(
[string]$Query,
[string]$Log,
[string]$providername,
[object]$auditsToAggregate,
[object]$auditsWithInstanceIds,
[bool] $IncludeLinkedInstances,
[bool]$ByTime,
[DateTime]$Start,
[DateTime]$End,
[string]$FilePath)
#
# Perform Get-WinEvent call to collect logs
#
$Result = @()
if ( $FilePath.Length -gt 0 -and !$ByTime)
{
$Result += Get-WinEvent -Path $FilePath -FilterXPath $Query -ErrorAction SilentlyContinue -Oldest
}
elseif ( $ByTime )
{
# Adjust times for zone on specific server
$TimeZone = [System.TimeZoneInfo]::Local
$AdjustedStart = [System.TimeZoneInfo]::ConvertTimeFromUtc($Start, $TimeZone)
$AdjustedEnd = [System.TimeZoneInfo]::ConvertTimeFromUtc($End, $TimeZone)
# Filtering based on time is more robust when using hashtable filters
if($FilePath.Length -gt 0)
{
$Result += Get-WinEvent -FilterHashtable @{Path = $FilePath; providername = $providername; starttime = $AdjustedStart; endtime = $AdjustedEnd} -ErrorAction SilentlyContinue
}
elseif ( $Log -eq "security" )
{
$Result += Get-WinEvent -FilterHashtable @{logname = $Log; providername = $providername; starttime = $AdjustedStart; endtime = $AdjustedEnd} -ErrorAction SilentlyContinue
}
else
{
$Result += Get-WinEvent -FilterHashtable @{logname = $Log; starttime = $AdjustedStart; endtime = $AdjustedEnd} -ErrorAction SilentlyContinue -Oldest
}
}
else
{
$Result += Get-WinEvent -LogName $Log -FilterXPath $Query -ErrorAction SilentlyContinue -Oldest
}
#
# Process results from Get-WinEvent query
#
$instanceIdsToQuery = @{}
foreach ( $Event in $Result | Where { $null -ne $_ } )
{
# Copy over all properties so they remain accessible when remote session terminates
$Properties = @()
foreach ( $Property in $Event.Properties )
{
$Properties += $Property.value
}
$Event | Add-Member RemoteProperties $Properties
if ( $Event.ActivityId )
{
# We have an Activity ID, set the CorrelationID field for consistency
$Event | Add-Member CorrelationID $Event.ActivityId.Guid
}
# If we didn't have an ActivityId, try to extract one manually
if ( (-not $Event.ActivityId) -and $Event.Properties.count -gt 0 )
{
$guidRef = [ref] [System.Guid]::NewGuid()
if ( [System.Guid]::TryParse( $Event.Properties[1].Value, $guidRef ) )
{
$Event | Add-Member CorrelationID $Event.Properties[1].Value
}
}
# If we want to include events that are linked by the instance ID, we need to
# generate a list of instance IDs to query on for the current server
if ( $IncludeLinkedInstances )
{
if ( $auditsToAggregate -contains $Event.Id )
{
# The instance ID in this event should be used to get more data
$instanceID = $Event.Properties[0].Value
$instanceIdsToQuery[$instanceID] = $Event.CorrelationID
}
}
}
#
# If we have instance IDs to collect accross, do that collection now
#
if ( $instanceIdsToQuery.Count -gt 0 )
{
foreach ( $eventID in $auditsWithInstanceIds )
{
if ( $FilePath )
{
$instanceIdResultsRaw = Get-WinEvent -FilterHashtable @{Path= $FilePath; providername = $providername; Id = $eventID } -ErrorAction SilentlyContinue
}
else
{
$instanceIdResultsRaw = Get-WinEvent -FilterHashtable @{logname = $Log; providername = $providername; Id = $eventID } -ErrorAction SilentlyContinue
}
foreach ( $instanceId in $instanceIdsToQuery.Keys )
{
$correlationID = $instanceIdsToQuery[$instanceId]
foreach ( $instanceEvent in $instanceIdResultsRaw)
{
if ( $instanceId -eq $instanceEvent.Properties[0].Value )
{
# We have an event that we want
# Copy data of remote params
$Properties = @()
foreach ( $Property in $instanceEvent.Properties )
{
$Properties += $Property.value
}
$instanceEvent | Add-Member RemoteProperties $Properties
$instanceEvent | Add-Member AdfsInstanceId $instanceEvent.Properties[0].Value
$instanceEvent | Add-Member CorrelationID $correlationID
$Result += $instanceEvent
}
}
}
}
}
return $Result
}
}
function GetSecurityEvents
{
<#
.DESCRIPTION
Perform a query to get the ADFS Security Events
#>
param(
[parameter(Mandatory=$False)]
[string]$CorrID,
[parameter(Mandatory=$True)]
[System.Management.Automation.Runspaces.PSSession]$Session,
[parameter(Mandatory=$false)]
[bool]$ByTime,
[parameter(Mandatory=$false)]
[DateTime]$Start,
[parameter(Mandatory=$false)]
[DateTime]$End,
[parameter(Mandatory=$false)]
[bool]$IncludeLinkedInstances,
[parameter(Mandatory=$false)]
[string]$FilePath
)
$Query = "*[System[Provider[@Name='{0}']]]" -f $script:CONST_ADFS_AUDIT
if($CorrID.Length -gt 0)
{
$Query += " and *[EventData[Data and (Data='{0}')]]" -f $CorrID
}
# Perform the log query
return MakeQuery -Query $Query -Log $script:CONST_SECURITY_LOG -Session $Session -ByTime $ByTime -Start $Start -End $End -IncludeLinkedInstances $IncludeLinkedInstances -FilePath $FilePath
}
function GetAdminEvents
{
<#
.DESCRIPTION
Perform a query to get the ADFS Admin events
#>
param(
[parameter(Mandatory=$False)]
[string]$CorrID,
[parameter(Mandatory=$True)]
[System.Management.Automation.Runspaces.PSSession]$Session,
[parameter(Mandatory=$false)]
[bool]$ByTime,
[parameter(Mandatory=$false)]
[DateTime]$Start,
[parameter(Mandatory=$false)]
[DateTime]$End,
[parameter(Mandatory=$false)]
[string]$FilePath
)
# Default to query all
$Query = "*[System[Provider[@Name='{0}']]]" -f $script:CONST_ADFS_ADMIN
if ( $CorrID.length -gt 0 )
{
$Query += " and *[System[Correlation[@ActivityID='{$CorrID}']]]"
}
return MakeQuery -Query $Query -Log $script:CONST_ADMIN_LOG -Session $Session -ByTime $ByTime -Start $Start -End $End -FilePath $FilePath
}
function GetDebugEvents
{
<#
.DESCRIPTION
Perform a query to get the ADFS Debug logs
#>
param(
[parameter(Mandatory=$False)]
[string]$CorrID,
[parameter(Mandatory=$True)]
[System.Management.Automation.Runspaces.PSSession]$Session,
[parameter(Mandatory=$false)]
[bool]$ByTime,
[parameter(Mandatory=$false)]
[DateTime]$Start,
[parameter(Mandatory=$false)]
[DateTime]$End,
[parameter(Mandatory=$false)]
[string]$FilePath
)
# Default to query all
$Query = "*[System[Provider[@Name='{0}']]]" -f $script:CONST_ADFS_DEBUG
if ( $CorrID.length -gt 0 )
{
$Query += " and *[System[Correlation[@ActivityID='{$CorrID}']]]"
}
return MakeQuery -Query $Query -Log $script:CONST_DEBUG_LOG -Session $Session -ByTime $ByTime -Start $Start -End $End -FilePath $FilePath
}
function QueryDesiredLogs
{
<#
.DESCRIPTION
Query for all logs that were requested from the user input
#>
param(
[parameter(Mandatory=$False)]
[string]$CorrID,
[parameter(Mandatory=$True)]
[System.Management.Automation.Runspaces.PSSession]$Session,
[parameter(Mandatory=$false)]
[bool]$ByTime,
[parameter(Mandatory=$false)]
[DateTime]$Start,
[parameter(Mandatory=$false)]
[DateTime]$End,
[parameter(Mandatory=$false)]
[bool]$IncludeLinkedInstances,
[parameter(Mandatory=$false)]
[string]$FilePath
)
$Events = @()
if ($Logs -contains $script:CONST_LOG_PARAM_SECURITY)
{
$Events += GetSecurityEvents -CorrID $CorrID -Session $Session -ByTime $ByTime -Start $Start -End $End -IncludeLinkedInstances $IncludeLinkedInstances -FilePath $FilePath
}
if ($Logs -contains $script:CONST_LOG_PARAM_DEBUG)
{
$Events += GetDebugEvents -CorrID $CorrID -Session $Session -ByTime $ByTime -Start $Start -End $End -FilePath $FilePath
}
if ($Logs -contains $script:CONST_LOG_PARAM_ADMIN)
{
$Events += GetAdminEvents -CorrID $CorrID -Session $Session -ByTime $ByTime -Start $Start -End $End -FilePath $FilePath
}
return $Events
}
# ----------------------------------------------------
#
# Helper Functions - JSON Management
#
# ----------------------------------------------------
function NewObjectFromTemplate
{
param(
[parameter(Mandatory=$true)]
[string]$Template
)
return $Template | ConvertFrom-Json
}
# ----------------------------------------------------
#
# Helper Functions - Event Processing
#
# ----------------------------------------------------
function Process-HeadersFromEvent
{
param(
[parameter(Mandatory=$true)]
[object]$events
)
$longText = ""
foreach ( $event in $events )
{
if ( $event.Id -eq 510 )
{
# 510 events are generic "LongText" events. When the LongText that's being
# written is header data (from a 403 or 404), then the schema is:
# instanceID : $event.RemoteProperties[0]
# headers_json : $event.RemoteProperties[1...N] (ex. {"Content-Length":"89","Content-Type":"application/x-www-form-urlencoded", etc. } )
for ( $i=1; $i -le $event.RemoteProperties.Count - 1; $i++ )
{
$propValue = $event.RemoteProperties[$i]
if ( $propValue -ne "-")
{
$longText += $propValue
}
}
}
}
return $longText | ConvertFrom-Json
}
function Get-ClaimsFromEvent
{
param(
[parameter(Mandatory=$true)]
[object]$event
)
$keyValuePair = @()
for ($i = 1; $i -lt $event.RemoteProperties.Count - 1; $i += 2)
{
if ($event.RemoteProperties[$i] -ne "-" -and $event.RemoteProperties[$i + 1] -ne "-" )
{
$keyValuePair += @($event.RemoteProperties[$i], $event.RemoteProperties[$i + 1])
}
}
return $keyValuePair
}
function Process-TokensFromEvent
{
param(
[parameter(Mandatory=$true)]
[object]$event,
[parameter(Mandatory=$false)]
[object]$LinkedEvents
)
$allTokens = @()
if ( $event.Id -eq 412 -or $event.Id -eq 324 )
{
$tokenObj = NewObjectFromTemplate -Template $script:TOKEN_OBJ_TEMPLATE
$claims = @()
foreach ( $linkedEvent in $LinkedEvents[$event.RemoteProperties[0]] ) #InstanceID
{
# Get claims out of event
$claims += Get-ClaimsFromEvent -event $linkedEvent
}
$tokenObj.type = $event.RemoteProperties[2]
$tokenObj.rp = $event.RemoteProperties[3]
$tokenObj.direction = "incoming"
$tokenObj.claims = $claims
$allTokens += $tokenObj
}
if ( $event.Id -eq 299 )
{
$tokenObjIn = NewObjectFromTemplate -Template $script:TOKEN_OBJ_TEMPLATE
$tokenObjOut = NewObjectFromTemplate -Template $script:TOKEN_OBJ_TEMPLATE
$claimsIn = @()
$claimsOut = @()
foreach ( $linkedEvent in $LinkedEvents[$event.RemoteProperties[0]] ) #InstanceID
{
if ( $linkedEvent.Id -eq 500 )
{
# Issued claims
$claimsOut += Get-ClaimsFromEvent -event $linkedEvent
}
if ( $linkedEvent.Id -eq 501 )
{
# Caller claims
$claimsIn += Get-ClaimsFromEvent -event $linkedEvent
}
}
$tokenObjOut.rp = $event.RemoteProperties[2]
$tokenObjOut.direction = "outgoing"
$tokenObjIn.claims = $claimsIn
$tokenObjOut.claims = $claimsOut
$allTokens += $tokenObjIn
$allTokens += $tokenObjOut
}
return $allTokens
}
function Generate-ErrorEvent
{
param(
[parameter(Mandatory=$true)]
[object]$event
)
$errorObj = NewObjectFromTemplate -Template $script:ERROR_OBJ_TEMPLATE
$errorObj.time = $event.TimeCreated
$errorObj.eventid = $event.Id
$errorObj.message = $event.Message
$errorObj.level = $event.LevelDisplayName
return $errorObj
}
function Generate-ResponseEvent
{
param(
[parameter(Mandatory=$false)]
[object]$event,
[parameter(Mandatory=$true)]
[int]$requestCount,
[parameter(Mandatory=$false)]
[object]$LinkedEvents
)
$response = NewObjectFromTemplate -Template $script:RESPONSE_OBJ_TEMPLATE
$response.num = $requestCount
# Return an empty response object if we don't have data to use
if ( $event.length -eq 0 )
{
return $response
}
$response.time = $event.RemoteProperties[2] #Datetime
# "{Status code} {status_description}""
$response.result = "{0} {1}" -f $event.RemoteProperties[3], $event.RemoteProperties[4]
$headerEvent = $LinkedEvents[$event.RemoteProperties[0]] #InstanceID
if ( $headerEvent -eq $null )
{
$headerEvent = @{}
}
$headersObj = Process-HeadersFromEvent -events $headerEvent
$response.headers = $headersObj
return $response
}
function Generate-RequestEvent
{
param(
[parameter(Mandatory=$false)]
[object]$event,
[parameter(Mandatory=$true)]
[int]$requestCount,
[parameter(Mandatory=$false)]
[object]$LinkedEvents
)
$currentRequest = NewObjectFromTemplate -Template $script:REQUEST_OBJ_TEMPLATE
$currentRequest.num = $requestCount
# Return an empty request object if we don't have data to use
if ( -not $event )
{
return $currentRequest
}
$currentRequest.time = $event.RemoteProperties[2] #Date
$currentRequest.clientip = $event.RemoteProperties[3] #ClientIP
$currentRequest.method = $event.RemoteProperties[4] #HTTP_Method
$currentRequest.url = $event.RemoteProperties[5] #URL
$currentRequest.query = $event.RemoteProperties[6] #QueryString
$currentRequest.useragent = $event.RemoteProperties[9] #UserAgent
$currentRequest.contlen = $event.RemoteProperties[10] #ContentLength
$currentRequest.server = $event.MachineName
$headerEvent = $LinkedEvents[$event.RemoteProperties[0]] #InstanceID
if ($headerEvent -eq $null )
{
$headerEvent = @{}
}
$headersObj = Process-HeadersFromEvent -events $headerEvent
$currentRequest.headers = $headersObj
# Load the HTTP and HTTPS ports, if we haven't already
# We need these to convert the 'LocalPort' field in the 403 audit
if (-not $script:DidLoadPorts)
{
$script:CONST_ADFS_HTTP_PORT = (Get-AdfsProperties).HttpPort
$script:CONST_ADFS_HTTPS_PORT = (Get-AdfsProperties).HttpsPort
$script:DidLoadPorts = $true
}
if ( $event.RemoteProperties[7] -eq $script:CONST_ADFS_HTTP_PORT)
{
$currentRequest.protocol = "HTTP"
}
if ( $event.RemoteProperties[7] -eq $script:CONST_ADFS_HTTPS_PORT)
{
$currentRequest.protocol = "HTTPS"
}
return $currentRequest
}
function Update-ResponseEvent
{
param(
[parameter(Mandatory=$false)]
[object]$event,
[parameter(Mandatory=$true)]
[object]$responseEvent,
[parameter(Mandatory=$false)]
[object]$LinkedEvents
)
if ( $event.Id -eq 404 )
{
$responseEvent.time = $event.RemoteProperties[2] #Datetime
# "{Status code} {status_description}""
$responseEvent.result = "{0} {1}" -f $event.RemoteProperties[3], $event.RemoteProperties[4]
$headerEvent = $LinkedEvents[$event.RemoteProperties[0]] #InstanceID
if ($headerEvent -eq $null )
{
$headerEvent = @{}
}
$headersObj = Process-HeadersFromEvent -events $headerEvent
$responseEvent.headers = $headersObj
return $responseEvent
}
}
function Update-RequestEvent
{
param(
[parameter(Mandatory=$false)]
[object]$event,
[parameter(Mandatory=$true)]
[object]$requestEvent,
[parameter(Mandatory=$true)]
[int]$requestCount,
[parameter(Mandatory=$false)]
[object]$LinkedEvents
)
if ( $event.Id -eq 403 )
{
$newEvent = Generate-RequestEvent -event $event -requestCount $requestCount -LinkedEvents $LinkedEvents
# Merge tokens
$newEvent.tokens += $requestEvent.tokens
return $newEvent
}
}
function Generate-TimelineEvent
{
param(
[parameter(Mandatory=$true)]
[object]$event
)
$timelineEvent = NewObjectFromTemplate -Template $script:TIMELINE_OBJ_TEMPLATE
$timelineEvent.time = $event.TimeCreated
# 403 - request received
if ( $event.Id -eq 403 )
{
$timelineEvent.type = $script:TIMELINE_INCOMING
$timelineEvent.result = $script:TIMELINE_SUCCESS
return $timelineEvent
}
# 411 - token validation failure
if ( $event.Id -eq 411 )
{
$timelineEvent.type = $script:TIMELINE_AUTHENTICATION
$timelineEvent.result = $script:TIMELINE_FAILURE
$timelineEvent.tokentype = $event.RemoteProperties[1] #Token Type
return $timelineEvent
}
# 412 - authentication success
if ( $event.Id -eq 412 )
{
$timelineEvent.type = $script:TIMELINE_AUTHENTICATION
$timelineEvent.result = $script:TIMELINE_SUCCESS
$timelineEvent.tokentype = $event.RemoteProperties[2] #Token Type
$timelineEvent.rp = $event.RemoteProperties[3] #RP
return $timelineEvent
}
# 324 - authorization failure
if ( $event.Id -eq 324 )
{
$timelineEvent.type = $script:TIMELINE_AUTHORIZATION
$timelineEvent.result = $script:TIMELINE_FAILURE
$timelineEvent.rp = $event.RemoteProperties[3] #RP
return $timelineEvent
}
# 299 - token issuance success
if ( $event.Id -eq 299 )
{
$timelineEvent.type = $script:TIMELINE_ISSUANCE
$timelineEvent.result = $script:TIMELINE_SUCCESS
$timelineEvent.rp = $event.RemoteProperties[2] #RP
$timelineEvent.tokentype = $script:TOKEN_TYPE_ACCESS
return $timelineEvent
}
return $timelineEvent
}
function Process-EventsForAnalysis
{
param(
[parameter(Mandatory=$true)]
[object]$events
)
# TODO: Validate that all events have the same correlation ID, or no correlation ID
# Validate that the events are sorted by time
$events = $events | Sort-Object TimeCreated
$requestCount = 0
$mapRequestNumToObjects = @{}
$allErrors = @()
$allTimeline = @()
$timelineIncomingMarked = $false
$LinkedEvents = @{}
$PreviousRequestStatus = @()
# Do a pre-pass through the events set to generate
# a hashtable of instance IDs to their events
foreach ( $event in $events )
{
if ( $event.AdfsInstanceId )
{
if ( $LinkedEvents.Contains( $event.AdfsInstanceId ) )
{
# Add event to exisiting list
$LinkedEvents[$event.AdfsInstanceId] += $event
}
else
{
# Add instance ID and fist event to hashtable
$LinkedEvents[$event.AdfsInstanceId] = @() + $event
}
}
}
#
# Do a second pass through the events to collect all the data we need for analysis
#
foreach ( $event in $events )
{
# Error or warning. We use 'Level' int to avoid localization issues
if ( ( $event.Level -ge 1 -and $event.Level -le 3 ) -or ( $event.Level -eq 16 ) )
{
$allErrors += Generate-ErrorEvent -event $event
}
# If this event signals a timeline event, generate it
if ( $event.Id -in $script:CONST_TIMELINE_AUDITS)
{
$allTimeline += Generate-TimelineEvent -event $event
}
if ( -not $mapRequestNumToObjects[$requestCount] )
{
# We don't have a request/response pair to work with, so create one now
$currentRequest = Generate-RequestEvent -requestCount $requestCount
$currentResponse = Generate-ResponseEvent -requestCount $requestCount
$mapRequestNumToObjects[$requestCount] = @($currentRequest, $currentResponse)
}
# 411 - token validation failure
if ( $event.Id -eq 411 )
{
# TODO: Use for error
}
# 412 - authentication success or 324 - authorization failure
if ( $event.Id -eq 412 -or $event.Id -eq 324 )
{
# Use this for caller identity on request object
$tokenObj = Process-TokensFromEvent -event $event -LinkedEvents $LinkedEvents
$tokenObj[0].num = $requestCount
$currentRequest = $mapRequestNumToObjects[$requestCount][0]
$currentRequest.tokens += $tokenObj[0]
}
# 299 - token issuance success
if ( $event.Id -eq 299 )
{
$tokenObj = Process-TokensFromEvent -event $event -LinkedEvents $LinkedEvents
$tokenObj[0].num = $requestCount
$tokenObj[1].num = $requestCount
$currentRequest = $mapRequestNumToObjects[$requestCount][0]
$currentRequest.tokens += $tokenObj[0]
$currentResponse = $mapRequestNumToObjects[$requestCount][1]
$currentResponse.tokens += $tokenObj[1]
}
# 403 - request received
if ( $event.Id -eq 403 )
{
# We have a new request, so generate a request/response pair, and store it
if ( $PreviousRequestStatus.Count -gt 0 )
{
# We have a previous request in the pipeline. Finalize that request and generate a new one
$requestCount += 1
$currentRequest = Generate-RequestEvent -event $event -requestCount $requestCount -LinkedEvents $LinkedEvents
$currentResponse = Generate-ResponseEvent -requestCount $requestCount
$mapRequestNumToObjects[$requestCount] = @($currentRequest, $currentResponse)
}
else
{
$currentRequest = $mapRequestNumToObjects[$requestCount][0]
$updatedRequest = Update-RequestEvent -event $event -requestCount $requestCount -requestEvent $currentRequest -LinkedEvents $LinkedEvents
$mapRequestNumToObjects[$requestCount][0] = $updatedRequest
}
$PreviousRequestStatus += 403
}
# 404 - response sent
if ( $event.Id -eq 404 )
{
if ( $PreviousRequestStatus.Count -gt 0 -and $PreviousRequestStatus[-1] -eq 404 )
{
# We have received two 404 events without a 403. We should create a new request/response pair
$requestCount += 1
$currentRequest = Generate-RequestEvent -requestCount $requestCount
$currentResponse = Generate-ResponseEvent -requestCount $requestCount -event $event -LinkedEvents $LinkedEvents
$mapRequestNumToObjects[$requestCount] = @($currentRequest, $currentResponse)
}
else
{
$currentResponse = $mapRequestNumToObjects[$requestCount][1]
$updatedResponse = Update-ResponseEvent -event $event -responseEvent $currentResponse -LinkedEvents $LinkedEvents
$mapRequestNumToObjects[$requestCount][1] = $updatedResponse
}
# We do not mark a request/response pair as complete until we have a new request come in,
# since we sometimes see events after the 404 (token issuance, etc.)
$PreviousRequestStatus += 404
}
}
#
# Generate the complete analysis JSON object
#
$analysisObj = NewObjectFromTemplate -Template $script:ANALYSIS_OBJ_TEMPLATE
$allRequests = @()
$allResponses = @()
foreach ( $requestKey in $mapRequestNumToObjects.keys )
{
$allRequests += $mapRequestNumToObjects[$requestKey][0]
$allResponses += $mapRequestNumToObjects[$requestKey][1]
}
$analysisObj.requests = $allRequests
$analysisObj.responses = $allResponses
$analysisObj.errors = $allErrors
$analysisObj.timeline = $allTimeline
return $analysisObj
}
function AggregateOutputObject
{
param(
[parameter(Mandatory=$true, Position=0)]
[ValidateNotNullOrEmpty()]
[string]$CorrID,
[parameter(Mandatory=$true,Position=1)]
[AllowEmptyCollection()]
[PSObject[]]$Events,
[parameter(Mandatory=$true,Position=2)]
[AllowEmptyCollection()]
[PSObject]$Data)
$Output = New-Object PSObject -Property @{
"CorrelationID" = $CorrID
"Events" = $Events
"AnalysisData" = $Data
}
return $Output
}
# ----------------------------------------------------
#
# Exported Functions
#
# ----------------------------------------------------
function Write-ADFSEventsSummary
{
<#
.DESCRIPTION
This cmdlet consumes a piped-in list of Event objects, and produces a summary table
of the relevant data from the request.
Note: this function should only be used on a list of Event objects that all contain
the same correlation ID (i.e. all of the events are from the same user request)
#>
param(
[parameter(ValueFromPipeline=$True)]
[PSObject]$Events
)
foreach($Event in $Events)
{
$newRow = New-Object PSObject -Property @{
Time = $Event.TimeCreated
Level = $Event.LevelDisplayName
EventID = $Event.Id
Details = $Event.Message
CorrelationID = $Event.CorrelationID
Machine = $Event.MachineName
Log = $Event.LogName
}
Write-Output $newRow
}
}
function Get-AdfsEvents
{
<#
.SYNOPSIS
This script gathers ADFS related events from the security, admin, and debug logs into a single file,
and allows the user to reconstruct the HTTP request/response headers from the logs.
.DESCRIPTION
Given a correlation id, the script will gather all events with the same identifier and reconstruct the request
and response headers if they exist. Using the 'All' option (either with or without headers enabled) will first collect
all correlation ids and proceed to gather the events for each. If start and end times are provided, all events
that fall into that span will be returned. The start and end times will be assumed to be base times. That is, all
time conversions will be based on the UTC of these values.
.EXAMPLE
Get-AdfsEvents -Logs Security, Admin, Debug -CorrelationID 669bced6-d6ae-4e69-889b-09ceb8db78c9 -Server LocalHost, MyServer
.Example
Get-AdfsEvents -CorrelationID 669bced6-d6ae-4e69-889b-09ceb8db78c9 -Headers
.EXAMPLE
Get-AdfsEvents -Logs Admin -All
.EXAMPLE
Get-AdfsEvents -Logs Debug, Security -All -Headers -Server LocalHost, Server1, Server2
.Example
Get-AdfsEvents -Logs Debug -StartTime (Get-Date -Date ("2017-09-14T18:37:26.910168700Z")) -EndTime (Get-Date) -Headers
#>
# Provide either correlation id, 'All' parameter, or time range along with logs to be queried and list of remote servers
[CmdletBinding(DefaultParameterSetName='CorrelationIDParameterSet')]
param(
[parameter(Mandatory=$false, Position=0)]
[ValidateSet("Admin", "Debug", "Security")]
[string[]]$Logs = @("Security","Admin"),
[parameter(Mandatory=$true, Position=1, ParameterSetName="CorrelationIDParameterSet")]
[ValidateNotNullOrEmpty()]
[string]$CorrelationID,
[parameter(Mandatory=$true, Position=1, ParameterSetName="AllEventsSet")]
[switch]$All,
[parameter(Mandatory=$true, Position=1, ParameterSetName="AllEventsByTimeSet")]
[DateTime]$StartTime,
[parameter(Mandatory=$true, Position=2, ParameterSetName="AllEventsByTimeSet")]
[DateTime]$EndTime,
[parameter(Mandatory=$false)]
[switch]$CreateAnalysisData,
[parameter(Mandatory=$false, ValueFromPipeline=$True, ValueFromPipelineByPropertyName=$True)]
[string[]]$Server="LocalHost",
[parameter(Mandatory=$false, ValueFromPipeline=$True, ValueFromPipelineByPropertyName=$True)]
[string]$FilePath,
[parameter(Mandatory=$false, ValueFromPipeline=$True, ValueFromPipelineByPropertyName=$True)]
[PSCredential]$Credential
)
# TODO: Add warning if environment is not Win2016
if ($Server -eq "*")
{
$Server = @()
$nodes = (Get-AdfsFarmInformation).FarmNodes
foreach( $server in $nodes)
{
$Server += $server
}
}
$ServerList = @()
# Validate timing parameters
if ( $StartTime -ne $null -and $EndTime -ne $null )
{
if ( $EndTime -lt $StartTime )
{
$temp = $StartTime
$StartTime = $EndTime
$EndTime = $temp
Write-Warning "The EndTime provided is earlier than the StartTime. Swapping time parameters and continuing."
}
$ByTime = $true
}
else
{
$ByTime = $false
# Set values to prevent binding issues when passing parameters
$StartTime = Get-Date
$EndTime = Get-Date
}
# Validate Correlation ID is a valid GUID
$guidRef = [ref] [System.Guid]::NewGuid()
if ( (!$All -and !$ByTime) -and ($CorrelationID.length -eq 0 -or ![System.Guid]::TryParse( $CorrelationID, $guidRef )) ){
Write-Error "Invalid Correlation ID. Please provide a valid GUID."
Break
}
$Events = @()
# Iterate through each server, and collect the required logs
foreach ( $Machine in $Server )
{
$includeLinks = $false
if ( $CreateAnalysisData )
{
$includeLinks = $true
}
Try
{
$Session = $null
if ( $Credential -eq $null )
{
$Session = New-PSSession -ComputerName $Machine
}
else
{
$Session = New-PSSession -ComputerName $Machine -Credential $Credential
}
$Events += QueryDesiredLogs -CorrID $CorrelationID -Session $Session -ByTime $ByTime -Start $StartTime.ToUniversalTime() -End $EndTime.ToUniversalTime() -IncludeLinkedInstances $includeLinks -FilePath $FilePath
}
Catch
{
Write-Warning "Error collecting events from $Machine. Error: $_"
}
Finally
{
if ( $Session )
{
Remove-PSSession $Session
}
}
}
$EventsByCorrId = @{}
# Collect events by correlation ID, and store in a hashtable
foreach ( $Event in $Events )
{
$ID = [string] $Event.CorrelationID
if(![string]::IsNullOrEmpty($ID) -and $EventsByCorrId.Contains($ID))
{
# Add event to exisiting list
$EventsByCorrId.$ID = $EventsByCorrId.$ID + $Event
}
elseif(![string]::IsNullOrEmpty($ID))
{
# Add correlation ID and fist event to hashtable
$EventsByCorrId.$ID = @() + $Event
}
}
# Note: When we do the correlation ID aggregation, we are dropping any events that do not have a correlation ID set.
# All Admin logs should have a correlation ID, and all audits should either have a correlation ID, or have a separate
# record, which is identical, but contains a correlation ID (we do this for audits that have an instance ID, but no correlation ID)
foreach ( $corrId in $EventsByCorrId.Keys )
{
$eventsData = @()
if ( $EventsByCorrId[$corrId] )
{
$eventsData = $EventsByCorrId[$corrId]
}
$dataObj = @{}
if ( $CreateAnalysisData )
{
$dataObj = Process-EventsForAnalysis -events $eventsData
}
$aggObject = AggregateOutputObject -Data $dataObj -Events $eventsData -CorrID $corrId
Write-Output $aggObject
}
}
#
# Export the appropriate modules
#
Export-ModuleMember -Function Enable-ADFSAuditing
Export-ModuleMember -Function Disable-ADFSAuditing
Export-ModuleMember -Function Get-AdfsEvents
Export-ModuleMember -Function Write-ADFSEventsSummary
# SIG # Begin signature block
# MIIkWAYJKoZIhvcNAQcCoIIkSTCCJEUCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC0dOXsd4rGNVMj
# Z4oUQ+7IDdNTS5yq8mEEWO5D3ge4i6CCDYEwggX/MIID56ADAgECAhMzAAABUZ6N
# j0Bxow5BAAAAAAFRMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMTkwNTAyMjEzNzQ2WhcNMjAwNTAyMjEzNzQ2WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCVWsaGaUcdNB7xVcNmdfZiVBhYFGcn8KMqxgNIvOZWNH9JYQLuhHhmJ5RWISy1
# oey3zTuxqLbkHAdmbeU8NFMo49Pv71MgIS9IG/EtqwOH7upan+lIq6NOcw5fO6Os
# +12R0Q28MzGn+3y7F2mKDnopVu0sEufy453gxz16M8bAw4+QXuv7+fR9WzRJ2CpU
# 62wQKYiFQMfew6Vh5fuPoXloN3k6+Qlz7zgcT4YRmxzx7jMVpP/uvK6sZcBxQ3Wg
# B/WkyXHgxaY19IAzLq2QiPiX2YryiR5EsYBq35BP7U15DlZtpSs2wIYTkkDBxhPJ
# IDJgowZu5GyhHdqrst3OjkSRAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUV4Iarkq57esagu6FUBb270Zijc8w
# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1
# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDU0MTM1MB8GA1UdIwQYMBaAFEhu
# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w
# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3
# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx
# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAWg+A
# rS4Anq7KrogslIQnoMHSXUPr/RqOIhJX+32ObuY3MFvdlRElbSsSJxrRy/OCCZdS
# se+f2AqQ+F/2aYwBDmUQbeMB8n0pYLZnOPifqe78RBH2fVZsvXxyfizbHubWWoUf
# NW/FJlZlLXwJmF3BoL8E2p09K3hagwz/otcKtQ1+Q4+DaOYXWleqJrJUsnHs9UiL
# crVF0leL/Q1V5bshob2OTlZq0qzSdrMDLWdhyrUOxnZ+ojZ7UdTY4VnCuogbZ9Zs
# 9syJbg7ZUS9SVgYkowRsWv5jV4lbqTD+tG4FzhOwcRQwdb6A8zp2Nnd+s7VdCuYF
# sGgI41ucD8oxVfcAMjF9YX5N2s4mltkqnUe3/htVrnxKKDAwSYliaux2L7gKw+bD
# 1kEZ/5ozLRnJ3jjDkomTrPctokY/KaZ1qub0NUnmOKH+3xUK/plWJK8BOQYuU7gK
# YH7Yy9WSKNlP7pKj6i417+3Na/frInjnBkKRCJ/eYTvBH+s5guezpfQWtU4bNo/j
# 8Qw2vpTQ9w7flhH78Rmwd319+YTmhv7TcxDbWlyteaj4RK2wk3pY1oSz2JPE5PNu
# Nmd9Gmf6oePZgy7Ii9JLLq8SnULV7b+IP0UXRY9q+GdRjM2AEX6msZvvPCIoG0aY
# HQu9wZsKEK2jqvWi8/xdeeeSI9FN6K1w4oVQM4Mwggd6MIIFYqADAgECAgphDpDS
# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla
# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT
# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG
# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S
# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz
# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7
# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u
# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33
# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl
# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP
# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB
# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF
# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM
# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ
# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud
# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO
# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0
# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw
# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA
# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY
# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj
# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd
# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ
# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf
# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ
# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j
# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B
# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96
# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7
# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I
# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIWLTCCFikCAQEwgZUwfjELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z
# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAVGejY9AcaMOQQAAAAABUTAN
# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor
# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgGf1IRj/6
# kwd726VTCcS77jMFpXekXhOIyt89qF/Q0I0wQgYKKwYBBAGCNwIBDDE0MDKgFIAS
# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN
# BgkqhkiG9w0BAQEFAASCAQAZJqP1VWMAz5Lm1lD1CI4J4fmWwlftbo0TkhEkBnra
# OF1Wxet1AU+Z7y2DXmfL9nlxJqBpAQFEQbRwaXh1D3RRAhgP4suDCpqree/M8S3J
# 2He6sgYWkrazOcm7+XhaB15iFuQ+PyDabpwj7hgGq2IZkf+meg+EWfH8nnm3MJAv
# t+lBZ/e56MZwwhminJOqcV9eq/tV3lTgWGZQ733yj46Q/3KXBxxMf2GKR9SdXpsU
# siH2iqwM2i962fRbSW7fJwLmwu7njytrAxQe6kH2A5KzvKBalLV1uhp/xFgJFiDE
# EvcAGAqaIvI+WvAeEx2q+KTw4Zp4Y2uauUYS9ZOz1RVVoYITtzCCE7MGCisGAQQB
# gjcDAwExghOjMIITnwYJKoZIhvcNAQcCoIITkDCCE4wCAQMxDzANBglghkgBZQME
# AgEFADCCAVgGCyqGSIb3DQEJEAEEoIIBRwSCAUMwggE/AgEBBgorBgEEAYRZCgMB
# MDEwDQYJYIZIAWUDBAIBBQAEIFHGuNO8JGKP1Ap2xH4gRGJutw1ygjt8a0ylXH7N
# j+4bAgZd5qyY19cYEzIwMTkxMjA5MjI1ODM0LjkwNVowBwIBAYACAfSggdSkgdEw
# gc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsT
# IE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFs
# ZXMgVFNTIEVTTjozMUM1LTMwQkEtN0M5MTElMCMGA1UEAxMcTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgU2VydmljZaCCDx8wggT1MIID3aADAgECAhMzAAAA/gHwtR7/6fmt
# AAAAAAD+MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwMB4XDTE5MDkwNjIwNDEwOFoXDTIwMTIwNDIwNDEwOFowgc4xCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBP
# cGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# MUM1LTMwQkEtN0M5MTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANoD9WTUzS97vJn8
# l8zkMgvpg1qB3gc6aWXpKbfI/RjiJGlDy/6rq6K2Xw6ZmoVL+nJ6OcNXwwCtdCkW
# Hfk/qHwi473GEHhDryoClYKjU45D7At8oIr2kPBp0CitctUwxeMtdx4zYGdjE2yT
# hbxaaCBBK64Dq9sar+bFZpOqxkq9DrqjFnLP2GwbsHVCDVrwWX/liZelv7ZI4N43
# Oz0mvcsxCDTco615V6WPFoAdTYibt/7eef0cpu0E/xAV3SJZbrXHAXntaZA4jM3V
# PgzwxJ3M81G6zxifR+NvzTovZhqd23htX7c5FMvI37aTA6Yz5MD4yERxCpRFho4H
# inNLb7ECAwEAAaOCARswggEXMB0GA1UdDgQWBBT34wsyIMzlZMRVxeNnCCKVvZQS
# 5DAfBgNVHSMEGDAWgBTVYzpcijGQ80N7fEYbxTNoWoVtVTBWBgNVHR8ETzBNMEug
# SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N
# aWNUaW1TdGFQQ0FfMjAxMC0wNy0wMS5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG
# AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Rp
# bVN0YVBDQV8yMDEwLTA3LTAxLmNydDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IBAQBECqTuGKWK/8zwEGdhDUD+k5yi
# 9aBSqcQrtp8MDm1BeNYzFKauvyRewf1ioFsUv9x7MCcEXjSefZl8d+E+k01YplYu
# ucujY3hQlPbYD3E132etJZCby7FTFNv+mJxhe5/73d5ToI8uSrPv9Ju6PUxCr3U0
# NXA6/ZssC027S1o+/eOV+txGJ441+zptdnkocjPcsPt+4aZ+3unCcXdL65ZfdS0j
# j0B2+Puh+E0B/UDroY0gv18ACy0Y2WaTg2yfNoF0jHUWYGANs32uUW2fkBPnyFV2
# Cau/S5y3L4tZFoYrueXAkT43O1n2np4qsrpQLwKEX/M+6wPY6Tn4pH4w5BX2MIIG
# cTCCBFmgAwIBAgIKYQmBKgAAAAAAAjANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzAxMjEzNjU1
# WhcNMjUwNzAxMjE0NjU1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKkdDbx3EYo6IOz8E5f1+n9p
# lGt0VBDVpQoAgoX77XxoSyxfxcPlYcJ2tz5mK1vwFVMnBDEfQRsalR3OCROOfGEw
# WbEwRA/xYIiEVEMM1024OAizQt2TrNZzMFcmgqNFDdDq9UeBzb8kYDJYYEbyWEeG
# MoQedGFnkV+BVLHPk0ySwcSmXdFhE24oxhr5hoC732H8RsEnHSRnEnIaIYqvS2SJ
# UGKxXf13Hz3wV3WsvYpCTUBR0Q+cBj5nf/VmwAOWRH7v0Ev9buWayrGo8noqCjHw
# 2k4GkbaICDXoeByw6ZnNPOcvRLqn9NxkvaQBwSAJk3jN/LzAyURdXhacAQVPIk0C
# AwEAAaOCAeYwggHiMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTVYzpcijGQ
# 80N7fEYbxTNoWoVtVTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8E
# BAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U
# kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j
# b20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmww
# WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBoAYD
# VR0gAQH/BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYI
# KwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0
# AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAAfmiFEN4sbgmD+BcQM9
# naOhIW+z66bM9TG+zwXiqf76V20ZMLPCxWbJat/15/B4vceoniXj+bzta1RXCCtR
# gkQS+7lTjMz0YBKKdsxAQEGb3FwX/1z5Xhc1mCRWS3TvQhDIr79/xn/yN31aPxzy
# mXlKkVIArzgPF/UveYFl2am1a+THzvbKegBvSzBEJCI8z+0DpZaPWSm8tv0E4XCf
# Mkon/VWvL/625Y4zu2JfmttXQOnxzplmkIz/amJ/3cVKC5Em4jnsGUpxY517IW3D
# nKOiPPp/fZZqkHimbdLhnPkd/DjYlPTGpQqWhqS9nhquBEKDuLWAmyI4ILUl5WTs
# 9/S/fmNZJQ96LjlXdqJxqgaKD4kWumGnEcua2A5HmoDF0M2n0O99g/DhO3EJ3110
# mCIIYdqwUB5vvfHhAN/nMQekkzr3ZUd46PioSKv33nJ+YWtvd6mBy6cJrDm77MbL
# 2IK0cs0d9LiFAR6A+xuJKlQ5slvayA1VmXqHczsI5pgt6o3gMy4SKfXAL1QnIffI
# rE7aKLixqduWsqdCosnPGUFN4Ib5KpqjEWYw07t0MkvfY3v1mYovG8chr1m1rtxE
# PJdQcdeh0sVV42neV8HR3jDA/czmTfsNv11P6Z0eGTgvvM9YBS7vDaBQNdrvCScc
# 1bN+NR4Iuto229Nfj950iEkSoYIDrTCCApUCAQEwgf6hgdSkgdEwgc4xCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29m
# dCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT
# TjozMUM1LTMwQkEtN0M5MTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIlCgEBMAkGBSsOAwIaBQADFQACo8hPVvaQ6LVjIHbnMelrc+ecDKCB
# 3jCB26SB2DCB1TELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEp
# MCcGA1UECxMgTWljcm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJzAlBgNV
# BAsTHm5DaXBoZXIgTlRTIEVTTjo0REU5LTBDNUUtM0UwOTErMCkGA1UEAxMiTWlj
# cm9zb2Z0IFRpbWUgU291cmNlIE1hc3RlciBDbG9jazANBgkqhkiG9w0BAQUFAAIF
# AOGYScQwIhgPMjAxOTEyMDkxMjE5MTZaGA8yMDE5MTIxMDEyMTkxNlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA4ZhJxAIBADAHAgEAAgIYODAHAgEAAgIagDAKAgUA
# 4ZmbRAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMBoAowCAIBAAID
# FuNgoQowCAIBAAIDB6EgMA0GCSqGSIb3DQEBBQUAA4IBAQCjTXDI20l1n6CTmIpY
# Pt7kEBajttYkw2HVURPATFbDCtmkNDiZJhFsqjextv/SLcXGiUr33uTeq1OJy+zE
# fZ25IVYaJHxz0LMM652nAmAkptxH3q9jOhFu04EEV7IAjvdYus84hRRAx9unWIFE
# fw3dSWzl2b6XNq0JGn88Lxdfe+wCmXU2/2SoXqDnwPC4177yBoDSoqV5ctRwTVqK
# 9mOjyw589ZqCDicvo4u0MCkE2ESlxNoYaNpdLvkqplxTqRE1APfpZGArO7cN2uwz
# UKwJ0hL2Nrr58aI609CbHnzXOHN9Rl27K4LOBY+1lIlxt9Ar7A/tuTKAXFPaN73A
# V/h6MYIC9TCCAvECAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC
# EzMAAAD+AfC1Hv/p+a0AAAAAAP4wDQYJYIZIAWUDBAIBBQCgggEyMBoGCSqGSIb3
# DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgr/Y0h8BzPP/pyUEr
# B8uzv12VSLGw2tg/BC9fwC5RF74wgeIGCyqGSIb3DQEJEAIMMYHSMIHPMIHMMIGx
# BBQCo8hPVvaQ6LVjIHbnMelrc+ecDDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0
# YW1wIFBDQSAyMDEwAhMzAAAA/gHwtR7/6fmtAAAAAAD+MBYEFJMqFnIuTi9SVZGC
# e6FqcTd2bzlkMA0GCSqGSIb3DQEBCwUABIIBAEow6J3mgXuaID8e4OxKvtdWSqZy
# IFzK3Y4LbbXM7BOXfI5VJJ4MMOt3ReVTA/mW00hhKffWVRG8yvVQIVd5guexG1ms
# CSJPFTEDDlQjNKCRHeqQcfzT19Qrzajbv0VY4wa4pigZzpLa1/1Yf8eINvaOvPMP
# a1zDKqPBNVpQ3+vpmt9kSMT6g9Omup5SMzEMbBy5uMLRzRHYboHpQVicQEu0n/89
# BVZc7J1vyS2WxmC67PdAYTMa0w5TNPVRORq2cuwyBbT14/KvODzgQE8YkFs7JHHo
# VlPfktF7WHe/4xhAgLPg/u2qea9Yg4gkmV4HViX5bzFTr47jjcqSC8dB75E=
# SIG # End signature block
|
Test.AdfsEventsModule.ps1 | ADFSToolbox-2.0.17 | function Initialize()
{
ipmo .\AdfsEventsModule.psm1
Set-AdfsProperties -AuditLevel Verbose
# Try installing an RP. If it already exists, use the existing one
try
{
$authzRules = "=>issue(Type = `"http://schemas.microsoft.com/authorization/claims/permit`", Value = `"true`"); "
$issuanceRules = "x:[]=>issue(claim = x); "
$redirectUrl = "https://adfshelp.microsoft.com/ClaimsXray/TokenResponse"
$samlEndpoint = New-AdfsSamlEndpoint -Binding POST -Protocol SAMLAssertionConsumer -Uri $redirectUrl
Add-ADFSRelyingPartyTrust -Name "ClaimsXray" -Identifier "urn:microsoft:adfs:claimsxray" -IssuanceAuthorizationRules $authzRules -IssuanceTransformRules $issuanceRules -WSFedEndpoint $redirectUrl -SamlEndpoint $samlEndpoint
}
catch
{
}
# Clear any existing logs
}
function Make-Request([string]$Guid){
$farmhost = (Get-AdfsProperties).HostName
$url = "https://" + $farmhost + "/adfs/ls?wa=wsignin1.0&wtrealm=urn:microsoft:adfs:claimsxray"
if ( $Guid )
{
$url = $url + "&client-request-id=" + $Guid
}
Invoke-WebRequest -URI $url
}
function Validate-LogEventCount([object]$logs){
if($logs.Count -gt 0 -and $logs[0].Events.Count -gt 0)
{
return $true
}
return $false
}
Describe 'Basic functionality of Get-AdfsEvents'{
BeforeAll {
Initialize
# Make a few requests for the ByTime tests
$global:startTime = Get-Date
for($i=0; $i -le 5; $i++)
{
Make-Request
}
$global:currentGuid = [guid]::NewGuid()
Make-Request($global:currentGuid.Guid)
# Give the auditing system time to flush the audits to the system
Start-Sleep -Seconds 3
$global:endTime = Get-Date
$securityLogs = "Security"
$global:exportFileName = (pwd).Path + "\SecurityLogs.evtx"
wevtutil.exe export-log $securityLogs $exportFileName /overwrite:true
}
AfterAll {
rm $global:exportFileName
}
It "[00000]: 'All' Flag Returns CorrIDs that are valid guids"{
$logs = Get-AdfsEvents -Logs Security -All
Validate-LogEventCount($logs) | Should -Be $true
$hasInvalidGuid = $false
foreach ( $aggObj in $logs )
{
$guidRef = [ref] [System.Guid]::NewGuid()
$valid = [System.Guid]::TryParse( $aggObj.CorrelationID, $guidRef )
if ( !$valid -or ( $guidRef.Value -ne $aggObj.CorrelationID ) )
{
$hasInvalidGuid = $true
break
}
}
$hasInvalidGuid | Should -Be $false
}
It "[00000]: 'All' Flag Returns Multiple Aggregate Objects, with Multiple Events"{
$logs = Get-AdfsEvents -Logs Security, Admin -All
Validate-LogEventCount($logs) | Should -Be $true
}
It "[00000]: 'All' Flag Returns Aggregate Objects, with Events by correlation ID"{
$logs = Get-AdfsEvents -Logs Security, Admin -All
$hasInvalidId = $false
foreach ( $aggObj in $logs )
{
foreach ( $event in $aggObj.Events )
{
if ( $event.CorrelationID -ne $aggObj.CorrelationID )
{
$hasInvalidId = $true
}
}
}
$hasInvalidId | Should -Be $false
}
It "[00100]: 'All' Flag with FromFile Returns Non-Empty Events List"{
$logs = Get-AdfsEvents -Logs Security -All -FilePath $global:exportFileName
Validate-LogEventCount($logs) | Should -Be $true
}
It "[01000]: 'All' Flag with AnalysisData Returns Analysis Objects"{
$logs = Get-AdfsEvents -Logs Security -All -CreateAnalysisData
$hasInvalidBlob = $false
foreach ( $aggObj in $logs )
{
if ( -not $aggObj.AnalysisData.requests.Count )
{
$hasInvalidBlob = $true
break
}
}
$hasInvalidBlob | Should -Be $false
}
It "[01001]: ByTime with AnalysisData Returns Analysis Objects"{
$logs = Get-AdfsEvents -Logs Security -CreateAnalysisData -StartTime $global:startTime -EndTime $global:endTime
$hasInvalidBlob = $false
foreach ( $aggObj in $logs )
{
if ( -not $aggObj.AnalysisData.requests.Count )
{
$hasInvalidBlob = $true
break
}
}
$hasInvalidBlob | Should -Be $false
}
It "[01001]: ByTime returns Multiple Aggregate Objects, with Multiple Events"{
$logs = Get-AdfsEvents -Logs Security -StartTime $global:startTime -EndTime $global:endTime
Validate-LogEventCount($logs) | Should -Be $true
}
It "[01100]: 'All' Flag with AnalysisData with FromFile Returns Non-Empty Events List"{
$logs = Get-AdfsEvents -Logs Security -All -FilePath $global:exportFileName -CreateAnalysisData
Validate-LogEventCount($logs) | Should -Be $true
}
It "[01101]: ByTime with AnalysisData with FromFile returns Non-Empty Events List"{
$logs = Get-AdfsEvents -Logs Security -FilePath $global:exportFileName -CreateAnalysisData -StartTime $global:startTime -EndTime $global:endTime
Validate-LogEventCount($logs) | Should -Be $true
}
It "[10000]: CorrelationID Call Returns Exactly 1 Aggregate Object"{
$logs = Get-AdfsEvents -Logs Security, Admin, Debug -CorrelationID $global:currentGuid.Guid
# Note: despite the fact that PowerShell should always be giving us a list object out of Get-AdfsEvents, the
# Count and Length calls do not work when there is only 1 entry in the list
$hasAtLeastOne = $false
$hasExactlyOne = $false
if ( $logs[0].CorrelationID )
{
$hasAtLeastOne = $true
}
if ( $hasAtLeastOne -and ( -not $logs[1] ) )
{
$hasExactlyOne = $true
}
$hasExactlyOne | Should -Be $true
}
It "[10000]: CorrelationID Call Returns Non-Empty Events list"{
$logs = Get-AdfsEvents -Logs Security, Admin, Debug -CorrelationID $global:currentGuid.Guid
$logs[0].Events.Count | Should -BeGreaterThan 0
}
It "[10000]: CorrelationID Call Returns Events list with 403 and 404"{
$logs = Get-AdfsEvents -Logs Security, Admin, Debug -CorrelationID $global:currentGuid.Guid
$has403 = $false
$has404 = $false
foreach( $event in $logs.Events )
{
if ( $event.Id -eq 403 )
{
$has403 = $true
}
if ( $event.Id -eq 404 )
{
$has404 = $true
}
}
$hasBoth = $has403 -and $has404
$hasBoth | Should -Be $true
}
It "[10000]: CorrelationID Call Returns Analysis Data With Single Request"{
$logs = Get-AdfsEvents -Logs Security, Admin, Debug -CorrelationID $global:currentGuid.Guid -CreateAnalysisData
$logs.AnalysisData.requests.Count | Should -Be 1
}
It "[10000]: CorrelationID Call Returns Analysis Data With Single Timeline Event"{
$logs = Get-AdfsEvents -Logs Security, Admin, Debug -CorrelationID $global:currentGuid.Guid -CreateAnalysisData
$logs.AnalysisData.timeline.Count | Should -Be 1
$logs.AnalysisData.timeline[0].type | Should -Be "incoming"
}
It "[10100]: CorrelationID Call with FromFile returns Non-Empty Events List"{
$logs = Get-AdfsEvents -Logs Security -CorrelationID $global:currentGuid.Guid -FilePath $global:exportFileName
$logs[0].Events.Count | Should -BeGreaterThan 0
}
It "[10101]: ByTime with CorrelationID is not a valid scenario"{
$invalidScenarioError = $false;
try
{
$logs = Get-AdfsEvents -Logs Security -StartTime $global:startTime -EndTime $global:endTime -CorrelationID $global:currentGuid.Guid
}catch [System.Management.Automation.ParameterBindingException]
{
$invalidScenarioError = $true;
}
$invalidScenarioError | Should -Be $true
}
It "[11100]: CorrelationID Call with AnalysisData with FromFile returns Non-Empty Events List"{
$logs = Get-AdfsEvents -Logs Security -CorrelationID $global:currentGuid.Guid -FilePath $global:exportFileName -CreateAnalysisData
$logs[0].Events.Count | Should -BeGreaterThan 0
}
}
# SIG # Begin signature block
# MIIkWAYJKoZIhvcNAQcCoIIkSTCCJEUCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAxcUHPl6q9IOYV
# mELWSDCXFTk32+pzbsfTEtHdDUmsBKCCDYEwggX/MIID56ADAgECAhMzAAABUZ6N
# j0Bxow5BAAAAAAFRMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMTkwNTAyMjEzNzQ2WhcNMjAwNTAyMjEzNzQ2WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCVWsaGaUcdNB7xVcNmdfZiVBhYFGcn8KMqxgNIvOZWNH9JYQLuhHhmJ5RWISy1
# oey3zTuxqLbkHAdmbeU8NFMo49Pv71MgIS9IG/EtqwOH7upan+lIq6NOcw5fO6Os
# +12R0Q28MzGn+3y7F2mKDnopVu0sEufy453gxz16M8bAw4+QXuv7+fR9WzRJ2CpU
# 62wQKYiFQMfew6Vh5fuPoXloN3k6+Qlz7zgcT4YRmxzx7jMVpP/uvK6sZcBxQ3Wg
# B/WkyXHgxaY19IAzLq2QiPiX2YryiR5EsYBq35BP7U15DlZtpSs2wIYTkkDBxhPJ
# IDJgowZu5GyhHdqrst3OjkSRAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUV4Iarkq57esagu6FUBb270Zijc8w
# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1
# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDU0MTM1MB8GA1UdIwQYMBaAFEhu
# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w
# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3
# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx
# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAWg+A
# rS4Anq7KrogslIQnoMHSXUPr/RqOIhJX+32ObuY3MFvdlRElbSsSJxrRy/OCCZdS
# se+f2AqQ+F/2aYwBDmUQbeMB8n0pYLZnOPifqe78RBH2fVZsvXxyfizbHubWWoUf
# NW/FJlZlLXwJmF3BoL8E2p09K3hagwz/otcKtQ1+Q4+DaOYXWleqJrJUsnHs9UiL
# crVF0leL/Q1V5bshob2OTlZq0qzSdrMDLWdhyrUOxnZ+ojZ7UdTY4VnCuogbZ9Zs
# 9syJbg7ZUS9SVgYkowRsWv5jV4lbqTD+tG4FzhOwcRQwdb6A8zp2Nnd+s7VdCuYF
# sGgI41ucD8oxVfcAMjF9YX5N2s4mltkqnUe3/htVrnxKKDAwSYliaux2L7gKw+bD
# 1kEZ/5ozLRnJ3jjDkomTrPctokY/KaZ1qub0NUnmOKH+3xUK/plWJK8BOQYuU7gK
# YH7Yy9WSKNlP7pKj6i417+3Na/frInjnBkKRCJ/eYTvBH+s5guezpfQWtU4bNo/j
# 8Qw2vpTQ9w7flhH78Rmwd319+YTmhv7TcxDbWlyteaj4RK2wk3pY1oSz2JPE5PNu
# Nmd9Gmf6oePZgy7Ii9JLLq8SnULV7b+IP0UXRY9q+GdRjM2AEX6msZvvPCIoG0aY
# HQu9wZsKEK2jqvWi8/xdeeeSI9FN6K1w4oVQM4Mwggd6MIIFYqADAgECAgphDpDS
# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla
# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT
# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG
# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S
# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz
# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7
# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u
# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33
# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl
# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP
# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB
# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF
# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM
# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ
# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud
# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO
# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0
# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw
# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA
# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY
# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj
# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd
# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ
# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf
# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ
# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j
# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B
# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96
# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7
# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I
# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIWLTCCFikCAQEwgZUwfjELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z
# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAVGejY9AcaMOQQAAAAABUTAN
# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor
# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQg5yMtnfWT
# uNnU//V9+bald7SIFbNDP8M7TE2c/oP4okgwQgYKKwYBBAGCNwIBDDE0MDKgFIAS
# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN
# BgkqhkiG9w0BAQEFAASCAQAzem2LrY899qbe+DA2d14qTA/FwWIEomFnLFX25G4c
# Isx7cywdV6HIwu2WJ9n12UA4pPLPYANTPWHS/izgeFuZ6w7c+6GEQ+WXpcPWVaeQ
# p9cjuNODdgBR4Huh6q4GMEBJwRVzpLFWTQWoUDa/kioGeSu/jznBP8reX0EebPOt
# NnTMvUUK4AiJr+qv9i0/5AKgwDa1hNvlnzwqcrEpP7Sa6r8NM3ImfbnldZ17vyZw
# yDBHNbsYeRs8G9K/aK6gfu0SG1bhQT7hm71zAEEaVyuMoq1i0YIo1BBEhCQqVFm7
# z0ZA/mj9UAS7N9oU7Ur6aYBBaZ0H2PLzs4/rNS/1jr2CoYITtzCCE7MGCisGAQQB
# gjcDAwExghOjMIITnwYJKoZIhvcNAQcCoIITkDCCE4wCAQMxDzANBglghkgBZQME
# AgEFADCCAVgGCyqGSIb3DQEJEAEEoIIBRwSCAUMwggE/AgEBBgorBgEEAYRZCgMB
# MDEwDQYJYIZIAWUDBAIBBQAEIA2n5pKvUB/MUfEWsxpIX0aTUtVqAD84268KUiW9
# yaqaAgZd5tG4rFEYEzIwMTkxMjA5MjI1ODM1LjUwMVowBwIBAYACAfSggdSkgdEw
# gc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsT
# IE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFs
# ZXMgVFNTIEVTTjo3MjhELUM0NUYtRjlFQjElMCMGA1UEAxMcTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgU2VydmljZaCCDx8wggT1MIID3aADAgECAhMzAAABBAkBdQhYhy0p
# AAAAAAEEMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwMB4XDTE5MDkwNjIwNDExOFoXDTIwMTIwNDIwNDExOFowgc4xCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBP
# cGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo3
# MjhELUM0NUYtRjlFQjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMgtB6ARuhhmlpTh
# YPwWgmtO2oNVTTZyHgYQBc3GH/J1w6bhgTcgpNiZnGZe2kv1Abyg7ABSP6ekgpRh
# WpByx5gOeOxpllPXkCxpiMlKFFx++Rnxg0N1YFN2aAsVj9GRMWc3R6hPKtgFMHXU
# LPxji3fu6DTgjfOi2pih5r/O+cp1Oi8KvdT+8p5JlROk1/85nsTggE80CudP/Nhu
# iIrSvmDNKVmOMF3afUWUswVP6v6t9cGjSWG3GMGNZe8FB3VVOL+pNtCbRV83qhQt
# kyIyA8HvGaciAfrXZi/QD5C/vK7XcvoeHbizh7j5lXUD3PiH0ffqHvMp58lsU/Aj
# pqr5ZGcCAwEAAaOCARswggEXMB0GA1UdDgQWBBSY1V7fwkQaDhcBi/GZ08MisOia
# 6jAfBgNVHSMEGDAWgBTVYzpcijGQ80N7fEYbxTNoWoVtVTBWBgNVHR8ETzBNMEug
# SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N
# aWNUaW1TdGFQQ0FfMjAxMC0wNy0wMS5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG
# AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Rp
# bVN0YVBDQV8yMDEwLTA3LTAxLmNydDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IBAQA9FdSzd2l8NAMX17RFeWLhOqnO
# AgyXIjH8tdW1yA94Zdzyn8NeukcjyIL7/Pkj8R7KEtEUL0cfRnds6KITaPBXxlos
# z1i+kMhfd6d4kSgnPWm0qoA14fqxJUM6P5fZfWRGUrtkNJha6N8Id1Ciuyibq7K0
# 3EnTLgli3EX1LXlzBOyyyjM3hDGVxgPk9D7Bw5ikgVju+Yql+tXjjgG/oFw+WJvw
# BN7YunaRV06JKZwsYGPsOYA1qyc8VXBoyeKGFKhI2oThT/P7IM3hCxLNc4fix3sL
# aKe4NZta0rjdssY8Kz+Z4sr8T9daXSFa7kUpKVw5277+0QFCc6bkrHjlKB/lMIIG
# cTCCBFmgAwIBAgIKYQmBKgAAAAAAAjANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzAxMjEzNjU1
# WhcNMjUwNzAxMjE0NjU1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKkdDbx3EYo6IOz8E5f1+n9p
# lGt0VBDVpQoAgoX77XxoSyxfxcPlYcJ2tz5mK1vwFVMnBDEfQRsalR3OCROOfGEw
# WbEwRA/xYIiEVEMM1024OAizQt2TrNZzMFcmgqNFDdDq9UeBzb8kYDJYYEbyWEeG
# MoQedGFnkV+BVLHPk0ySwcSmXdFhE24oxhr5hoC732H8RsEnHSRnEnIaIYqvS2SJ
# UGKxXf13Hz3wV3WsvYpCTUBR0Q+cBj5nf/VmwAOWRH7v0Ev9buWayrGo8noqCjHw
# 2k4GkbaICDXoeByw6ZnNPOcvRLqn9NxkvaQBwSAJk3jN/LzAyURdXhacAQVPIk0C
# AwEAAaOCAeYwggHiMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTVYzpcijGQ
# 80N7fEYbxTNoWoVtVTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8E
# BAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U
# kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j
# b20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmww
# WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBoAYD
# VR0gAQH/BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYI
# KwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0
# AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAAfmiFEN4sbgmD+BcQM9
# naOhIW+z66bM9TG+zwXiqf76V20ZMLPCxWbJat/15/B4vceoniXj+bzta1RXCCtR
# gkQS+7lTjMz0YBKKdsxAQEGb3FwX/1z5Xhc1mCRWS3TvQhDIr79/xn/yN31aPxzy
# mXlKkVIArzgPF/UveYFl2am1a+THzvbKegBvSzBEJCI8z+0DpZaPWSm8tv0E4XCf
# Mkon/VWvL/625Y4zu2JfmttXQOnxzplmkIz/amJ/3cVKC5Em4jnsGUpxY517IW3D
# nKOiPPp/fZZqkHimbdLhnPkd/DjYlPTGpQqWhqS9nhquBEKDuLWAmyI4ILUl5WTs
# 9/S/fmNZJQ96LjlXdqJxqgaKD4kWumGnEcua2A5HmoDF0M2n0O99g/DhO3EJ3110
# mCIIYdqwUB5vvfHhAN/nMQekkzr3ZUd46PioSKv33nJ+YWtvd6mBy6cJrDm77MbL
# 2IK0cs0d9LiFAR6A+xuJKlQ5slvayA1VmXqHczsI5pgt6o3gMy4SKfXAL1QnIffI
# rE7aKLixqduWsqdCosnPGUFN4Ib5KpqjEWYw07t0MkvfY3v1mYovG8chr1m1rtxE
# PJdQcdeh0sVV42neV8HR3jDA/czmTfsNv11P6Z0eGTgvvM9YBS7vDaBQNdrvCScc
# 1bN+NR4Iuto229Nfj950iEkSoYIDrTCCApUCAQEwgf6hgdSkgdEwgc4xCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29m
# dCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT
# Tjo3MjhELUM0NUYtRjlFQjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIlCgEBMAkGBSsOAwIaBQADFQCzRh5/R0jzKEyIVLZzGHgW3BUKfaCB
# 3jCB26SB2DCB1TELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEp
# MCcGA1UECxMgTWljcm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJzAlBgNV
# BAsTHm5DaXBoZXIgTlRTIEVTTjo0REU5LTBDNUUtM0UwOTErMCkGA1UEAxMiTWlj
# cm9zb2Z0IFRpbWUgU291cmNlIE1hc3RlciBDbG9jazANBgkqhkiG9w0BAQUFAAIF
# AOGY+0MwIhgPMjAxOTEyMTAwMDU2MzVaGA8yMDE5MTIxMTAwNTYzNVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA4Zj7QwIBADAHAgEAAgIBzTAHAgEAAgIXFzAKAgUA
# 4ZpMwwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMBoAowCAIBAAID
# FuNgoQowCAIBAAIDB6EgMA0GCSqGSIb3DQEBBQUAA4IBAQAOJEPwZUKcfhh+4TYe
# b/vHcTSGjVku8/bNtTgjyduF+HzhitDKYox2ZudHrXTVl0EDnNT7Z+7yj2GbBV3m
# vG8qXRXs6Z4tbEmuvpL90mKpuq4uqFY8eE8tqihTwQwDnYcj8dHFZfiHYSRNL1pE
# WjuJyFqEzb5/83Ct0wOFuOtKbXlWqiZabZb90jEedZ+qb5JKL5bK5lmVB1RP30uu
# kV6dv0lu726R+xaE4y6AL/nJeE6ej6semQKcMGby28sOjMNnKwLDBAHWrrEk/gAF
# erF8OsV1YM//y6gp3vdFeha4gCORky6xnIKKlsZsNu5JMT0LBGuL2bVUZ6mRlGEe
# XXaaMYIC9TCCAvECAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC
# EzMAAAEECQF1CFiHLSkAAAAAAQQwDQYJYIZIAWUDBAIBBQCgggEyMBoGCSqGSIb3
# DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgoY+8Zz9io2SBV0B9
# Qde6OOVv9Uz9loD4aX55o+Or6qUwgeIGCyqGSIb3DQEJEAIMMYHSMIHPMIHMMIGx
# BBSzRh5/R0jzKEyIVLZzGHgW3BUKfTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0
# YW1wIFBDQSAyMDEwAhMzAAABBAkBdQhYhy0pAAAAAAEEMBYEFOQgGS72XtMkL6Nq
# CPQNShxMvxlTMA0GCSqGSIb3DQEBCwUABIIBAML0sOncPHwmI4iFwdS9bnOuIldE
# YmCNh/2IZCoqYoGJmIDGEEILM9XgkX4rbAVd6a4QrQzChVlAYuSjODoOCeSzXge+
# 17ebssjdum0/EdlvxPCa71NjDKBb7zWIFCZX6JWyadKHB3dw67talQvMncBiIimT
# JFha7TSvSt0tmZFZTPHCTmWJjVDaCXBlYPMvtla9CHyf5vvzBVFJwcG3WmopAnKB
# gzxW4wNaZcUhWZ2jBii+P6oC3kefbW76bgDpnbj+ZQrkE1Wrj8mP43WMSxasRE0n
# hBr2YV4Kts8xX2/S4Q6+lN70HngOOp2odEA7pakXWTGdakMiOGQB+bHj8po=
# SIG # End signature block
|
AdfsServiceAccountModule.psm1 | ADFSToolbox-2.0.17 | # Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License.
#####################################################################
####Helper functions related to rule parsing logic###################
#####################################################################
<#
.SYNOPSIS
Class to encapsulate parsing of the ADFS Issuances/Auth rules.
#>
class AdfsRules
{
[System.Collections.ArrayList] hidden $rules
<#
.SYNOPSIS
Constructor
#>
AdfsRules([string]$rawRules)
{
$rulesArray = $this.ParseRules($rawRules)
$this.rules = New-Object "System.Collections.ArrayList"
$this.rules.AddRange($rulesArray)
}
<#
.SYNOPSIS
Utility function to parse the rules and return them as a string[].
#>
[string[]] hidden ParseRules([string]$rawRules)
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : BEGIN"
$allRules = @()
$singleRule = [string]::Empty
$rawRules.Split("`n") | %{
$line = $_.ToString().Trim()
if (-not ([string]::IsNullOrWhiteSpace($line)) )
{
$singleRule += $_ + "`n"
if ($line.StartsWith("=>"))
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Parsed rule:`n$singleRule"
$allRules += $singleRule
$singleRule = [string]::Empty
}
}
}
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : END"
return $allRules
}
<#
.SYNOPSIS
Finds the rule by name in the format: @RuleName = "$ruleName". Returns $null if not found.
#>
[string] FindByRuleName([string]$ruleName)
{
$ruleNameSearchString = '@RuleName = "' + $ruleName + '"'
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Search string: $ruleNameSearchString"
foreach ($rule in $this.rules)
{
if ($rule.Contains($ruleNameSearchString))
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Found.`n$rule"
return $rule
}
}
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : NOT FOUND. Returning $null"
return $null;
}
<#
.SYNOPSIS
Replaces the specified old rule with the new one. Returns $true if the old one was found and replaced; $false otherwise.
#>
[bool] ReplaceRule([string]$oldRule, [string]$newRule)
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Trying to replace old rule with new.`n Old Rule:`n$oldRule`n New Rule:`n$newRule"
$idx = $this.FindIndexForRule($oldRule)
if ($idx -ge 0)
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Replacing old rule with new."
$this.rules[$idx] = $newRule
return $true
}
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Old rule is not found so NOT replacing it."
return $false
}
<#
.SYNOPSIS
Removes the specified if found. Returns $true if found; $false otherwise.
#>
[bool] RemoveRule([string]$ruleToRemove)
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Trying to remove rule.`n Rule:`n$ruleToRemove"
$idx = $this.FindIndexForRule($ruleToRemove)
if ($idx -ge 0)
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Removing rule at index: $idx."
$this.rules.RemoveAt($idx)
return $true
}
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Rule is not found so NOT removing it."
return $false
}
<#
.SYNOPSIS
Helper function to find the index of the rule. Returns index if found; -1 otherwise.
#>
[int] FindIndexForRule([string]$ruleToFind)
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Trying to find rule.`n Rule:`n$ruleToFind"
for ($i = 0; $i -lt $this.rules.Count; $i++)
{
$rule = $this.rules[$i]
if ($rule.Replace(' ','').trim() -eq $ruleToFind.Replace(' ','').trim())
{
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : Found at index: $i."
return $i
}
}
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand) : NOT FOUND. Returning -1"
return -1
}
<#
.SYNOPSIS
Returns all the rules as string.
#>
[string] ToString()
{
return [string]::Join("`n", $this.rules.ToArray())
}
}
# Helper function - serializes any DataContract object to an XML string
function Get-DataContractSerializedString()
{
[CmdletBinding()]
Param
(
[Parameter(Mandatory = $true, HelpMessage="Any object serializable with the DataContractSerializer")]
[ValidateNotNull()]
$object
)
$serializer = New-Object System.Runtime.Serialization.DataContractSerializer($object.GetType())
$serializedData = $null
try
{
# No simple write to string option, so we have to write to a memory stream
# then read back the bytes...
$stream = New-Object System.IO.MemoryStream
$writer = New-Object System.Xml.XmlTextWriter($stream,[System.Text.Encoding]::UTF8)
$null = $serializer.WriteObject($writer, $object);
$null = $writer.Flush();
# Read back the text we wrote to the memory stream
$reader = New-Object System.IO.StreamReader($stream,[System.Text.Encoding]::UTF8)
$null = $stream.Seek(0, [System.IO.SeekOrigin]::Begin)
$serializedData = $reader.ReadToEnd()
}
finally
{
if ($reader -ne $null)
{
try
{
$reader.Dispose()
}
catch [System.ObjectDisposedException] { }
}
if ($writer -ne $null)
{
try
{
$writer.Dispose()
}
catch [System.ObjectDisposedException] { }
}
if ($stream -ne $null)
{
try
{
$stream.Dispose()
}
catch [System.ObjectDisposedException] { }
}
}
return $serializedData
}
# Gets internal ADFS settings by extracting them Get-AdfsProperties
function Get-AdfsInternalSettings()
{
$settings = Get-AdfsProperties
$settingsType = $settings.GetType()
$propInfo = $settingsType.GetProperty("ServiceSettingsData", [System.Reflection.BindingFlags]::Instance -bor [System.Reflection.BindingFlags]::NonPublic)
$internalSettings = $propInfo.GetValue($settings, $null)
return $internalSettings
}
function IsWID()
{
param
(
[Parameter(Mandatory=$true)]
[string]$ConnectionString
)
if($ConnectionString -match "##wid" -or $ConnectionString -match "##ssee")
{
return $true
}
return $false
}
function Set-AdfsInternalSettings()
{
[CmdletBinding()]
Param
(
[Parameter(Mandatory=$true)]
[string]$SerializedData
)
$doc = new-object Xml
$doc.Load("$env:windir\ADFS\Microsoft.IdentityServer.Servicehost.exe.config")
$connString = $doc.configuration.'microsoft.identityServer.service'.policystore.connectionString
$cli = new-object System.Data.SqlClient.SqlConnection
$cli.ConnectionString = $connString
$cli.Open()
try
{
$cmd = new-object System.Data.SqlClient.SqlCommand
$cmd.CommandText = "update [IdentityServerPolicy].[ServiceSettings] SET ServiceSettingsData=@content,[ServiceSettingsVersion] = [ServiceSettingsVersion] + 1,[LastUpdateTime] = GETDATE()"
$cmd.Parameters.AddWithValue("@content", $SerializedData) | out-null
$cmd.Connection = $cli
$cmd.ExecuteNonQuery()
# Update service state table for WID sync if required
if (IsWid -ConnectionString $connString)
{
$cmd = new-object System.Data.SqlClient.SqlCommand
$cmd.CommandText = "UPDATE [IdentityServerPolicy].[ServiceStateSummary] SET [SerialNumber] = [SerialNumber] + 1,[LastUpdateTime] = GETDATE() WHERE ServiceObjectType='ServiceSettings'"
$cmd.Connection = $cli
$cmd.ExecuteNonQuery()
}
}
finally
{
$cli.CLose()
}
}
Function AddUserRights
{
$RightsFailed = $false
NTRights.Exe -u $NewName +r SeServiceLogonRight | Out-File $LogPath -Append
If (!$?)
{
$RightsFailed = $true
Write-Host "`tFailed to add user rights for $NewName`n`tSee: POST-SAMPLE ITEMS THAT MUST BE EXECUTED MANUALLY" -ForegroundColor "yellow" -NoNewline
($ElapsedTime.Elapsed.ToString())+ "[WARN] Failed to add user rights for ${NewName}: 'Log on as a service', 'Generate security audits'" | Out-File $LogPath -Append
Return $RightsFailed
}
NTRights.Exe -u $NewName +r SeAuditPrivilege | Out-File $LogPath -Append
If (!$?)
{
$RightsFailed = $true
Write-Host "`tFailed to add user rights for $NewName`n`tSee: POST-SAMPLE ITEMS THAT MUST BE EXECUTED MANUALLY" -ForegroundColor "yellow" -NoNewline
($ElapsedTime.Elapsed.ToString())+ "[WARN] Failed to add user rights for ${NewName}: 'Log on as a service', 'Generate security audits'" | Out-File $LogPath -Append
Return $RightsFailed
}
Else
{
GPUpdate /Force | Out-File $LogPath -Append
$RightsFailed = $false
Write-Host "`tSuccess" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] User rights 'Log on as a service', 'Generate security audits' added for $NewName" | Out-File $LogPath -Append
}
Return $RightsFailed
}
# Converts account name to SID
Function ConvertTo-Sid ($Account)
{
$SID = (New-Object system.security.principal.NtAccount($Account)).translate([system.security.principal.securityidentifier])
Return $SID
}
# ACLs a certificate private key
Function Set-CertificateSecurity
{
param([String]$certThumbprint,[String]$NewAccount)
$FailedCertPerms = $false
$certKeyPath = $env:ProgramData + "\Microsoft\Crypto\RSA\MachineKeys\"
$certsCollection = @(dir cert:\ -recurse | ? { $_.Thumbprint -eq $certThumbprint })
$certToSecure = $certsCollection[0]
$uniqueKeyName = $certToSecure.PrivateKey.CspKeyContainerInfo.UniqueKeyContainerName
If ($uniqueKeyname -is [Object])
{
$Acl = Get-Acl $certKeyPath$uniqueKeyName
$Arguments = $NewAccount,"Read","Allow"
$AccessRule = New-Object System.Security.AccessControl.FileSystemAccessRule $Arguments
$Acl.SetAccessRule($AccessRule)
$Acl | Set-Acl $certKeyPath$uniqueKeyName
If (!$?)
{
Write-Host "`t`tFailed to set private key permissions.`n`t`tSee: POST-SAMPLE ITEMS THAT MUST BE EXECUTED MANUALLY" -ForegroundColor "yellow" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [ERROR] Failed setting permissions on key for thumbprint $certThumbprint - Setting the ACL did not succeed" | Out-File $LogPath -Append
$CertPerms = $false
}
Else
{
Write-Host "`t`tSuccess" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] Set permissions on key for thumbprint $certThumbprint" | Out-File $LogPath -Append
$CertPerms = $true
}
}
Else
{
Write-Host "`t`tFailed to set private key permissions.`n`t`tSee: POST-SAMPLE ITEMS THAT MUST BE EXECUTED MANUALLY" -ForegroundColor "yellow" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [ERROR] Failed setting permissions on key for thumbprint $certThumbprint - Unique key container did not exist" | Out-File $LogPath -Append
$CertPerms = $false
}
Return $CertPerms
}
# ACLs the CertificateSharingContainer
Function Set-CertificateSharingContainerSecurity
{
param([String]$NewSID)
$FailedLdap = $false
# Get the new SID as a SID object and create AD Access Rules
$objNewSID = [System.Security.Principal.SecurityIdentifier]$NewSID
$nullGUID = [guid]'00000000-0000-0000-0000-000000000000'
$RuleCreateChild = New-Object System.DirectoryServices.ActiveDirectoryAccessRule($objNewSID,'CreateChild','Allow','All',$nullGUID)
$RuleSelf = New-Object System.DirectoryServices.ActiveDirectoryAccessRule($objNewSID,'Self','Allow','All',$nullGUID)
$RuleWriteProperty = New-Object System.DirectoryServices.ActiveDirectoryAccessRule($objNewSID,'WriteProperty','Allow','All',$nullGUID)
$RuleGenericRead = New-Object System.DirectoryServices.ActiveDirectoryAccessRule($objNewSID,'GenericRead','Allow','All',$nullGUID)
# Get the LDAP object based on the certificate sharing container and add the AD Access Rules to the object
$DN = ($ADFSProperties.CertificateSharingContainer).ToString()
$objLDAP = [ADSI] "LDAP://$DN"
$objLDAP.get_ObjectSecurity().AddAccessRule($RuleCreateChild)
$objLDAP.get_ObjectSecurity().AddAccessRule($RuleSelf)
$objLDAP.get_ObjectSecurity().AddAccessRule($RuleWriteProperty)
$objLDAP.get_ObjectSecurity().AddAccessRule($RuleGenericRead)
# Commit the AD Access rule changes to the LDAP object
$objLDAP.CommitChanges()
If (!$?)
{
Write-Host "`tFailed to set permissions on the Certificate Sharing Container.`n`tSee: POST-SAMPLE ITEMS THAT MUST BE EXECUTED MANUALLY" -ForegroundColor "yellow" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [ERROR] Failed setting permissions on AD cert sharing container: $DN. $NewName needs 'Create Child', 'Write', 'Read'." | Out-File $LogPath -Append
$FailedLdap = $true
}
Else
{
Write-Host "`tSuccess" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] Set permissions on cert sharing container: $DN" | Out-File $LogPath -Append
}
}
# Generates SQL scripts for database and service permissions
Function GenerateSQLScripts
{
# Generate SetPermissions.sql
If (!(Test-Path $env:Temp\ADFSSQLScripts)) { New-Item $env:Temp\ADFSSQLScripts -type directory | Out-Null }
If (Test-Path $env:Temp\ADFSSQLScripts) { Remove-Item $env:Temp\ADFSSQLScripts\* | Out-Null }
Write-Host "`n Generating SQL scripts"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Generating SQL scripts ($env:Temp\ADFSSQLScripts)" | Out-File $LogPath -Append
$WinDir = (Get-ChildItem Env:WinDir).Value
Export-AdfsDeploymentSQLScript -DestinationFolder $env:Temp\ADFSSQLScripts -ServiceAccountName $NewName
If (!$?)
{
Write-Host "`tFailed to generate SQL scripts. Exiting" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] Failed to generate SQL scripts" | Out-File $LogPath -Append
Return $false
}
# Generate UpdateServiceSettings.sql, but not for secondary WID. Secondary SQL never gets to this function
If (!(($Role -eq "SecondaryComputer") -and ($DBMode -eq "WID")))
{
"USE AdfsConfiguration" | Out-File "$env:Temp\ADFSSQLScripts\UpdateServiceSettings.sql"
"SELECT ServiceSettingsData from IdentityServerPolicy.ServiceSettings" | Out-File "$env:Temp\ADFSSQLScripts\UpdateServiceSettings.sql" -append
"UPDATE IdentityServerPolicy.ServiceSettings" | Out-File "$env:Temp\ADFSSQLScripts\UpdateServiceSettings.sql" -append
"SET ServiceSettingsData=REPLACE((SELECT ServiceSettingsData from IdentityServerPolicy.ServiceSettings),'$OldSID','$NewSID')" | Out-File "$env:Temp\ADFSSQLScripts\UpdateServiceSettings.sql" -append
"SELECT ServiceSettingsData from IdentityServerPolicy.ServiceSettings" | Out-File "$env:Temp\ADFSSQLScripts\UpdateServiceSettings.sql" -append
If (!$?)
{
Write-Host "`tFailed to generate UpdateServiceSettings.sql. Exiting" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] Failed to generate UpdateServiceSettings.sql" | Out-File $LogPath -Append
Return $false
}
}
# Clean up the CreateDB.sql file
If (Test-Path "$env:Temp\ADFSSQLScripts\CreateDB.sql")
{
Remove-Item "$env:Temp\ADFSSQLScripts\CreateDB.sql"
}
Return $true
}
# Executes the SQL scripts generated by GenerateSQLScripts
Function ExecuteSQLScripts
{
Start sqlcmd.exe -ArgumentList "-S $SQLHost -i $env:Temp\ADFSSQLScripts\SetPermissions.sql -o $env:Temp\ADFSSQLScripts\SetPermissions.log" -Wait -WindowStyle Hidden | Out-File $LogPath -Append
If (!$?)
{
Write-Host "`tFailed to execute SetPermissions.sql. Exiting" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] Failed to execute SetPermissions.sql" | Out-File $LogPath -Append
Return $false
}
# Execute UpdateServiceSettings.sql, but not for secondary WID. Secondary SQL never gets to this function.
If (!(($Role -eq "SecondaryComputer") -and ($DBMode -eq "WID")))
{
Start sqlcmd.exe -ArgumentList "-S $SQLHost -i $env:Temp\ADFSSQLScripts\UpdateServiceSettings.sql -o $env:Temp\ADFSSQLScripts\UpdateServiceSettings.log" -Wait -WindowStyle Hidden | Out-File $LogPath -Append
If (!$?)
{
Write-Host "`tFailed to execute UpdateServiceSettings.sql. Exiting...." -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] Failed to execute UpdateServiceSettings.sql" | Out-File $LogPath -Append
Return $false
}
}
Return $true
}
function Update-AdfsServiceAccountRule
{
param(
[parameter(Mandatory=$true, Position=1)]
[string]$ServiceAccount,
[parameter(ValueFromPipeline=$True)]
[string[]]$SecondaryServers,
[parameter()]
[switch]$RemoveRule
)
#Validate provided account exists
$User = $ServiceAccount
if($ServiceAccount -match '\\')
{
$Account = $ServiceAccount.Split('\') #Input given in the format domain\user
$User = $Account[1]
}
$IsGmsaAccount = $User.EndsWith("$")
if($IsGmsaAccount -eq $true )
{
$Lookup = Get-ADServiceAccount -Filter {SamAccountName -eq $User}
}
else
{
$Lookup = Get-ADUser -Filter {Name -eq $User}
}
if($Lookup -eq $null)
{
throw "The specified account $User does not exist"
}
#Create rule with new service account
$SID = ConvertTo-Sid($ServiceAccount)
$ServiceAccountRule = "@RuleName = `"Permit Service Account`"`nexists([Type == `"http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid`", Value == `"$SID`"])`n=> issue(Type = `"http://schemas.microsoft.com/authorization/claims/permit`", value = `"true`");`n`n"
$Properties = Get-AdfsInternalSettings
#Backup service settings prior to adding new rule
$BackUpPath = ((Convert-Path .) + "\serviceSettingsData" + "-" + (get-date -f yyyy-MM-dd-hh-mm-ss) + ".xml") -replace '\s',''
Get-DataContractSerializedString -object $Properties | Export-Clixml $BackUpPath
Write-Host ("Backup of current service settings stored at $BackUpPath")
if($RemoveRule)
{
$AuthorizationPolicyRules = [AdfsRules]::new($Properties.PolicyStore.AuthorizationPolicy)
if($AuthorizationPolicyRules.RemoveRule($ServiceAccountRule))
{
Write-Host "Service account $ServiceAccount with SID $SID was removed from the Authorization Policy rule set"
}
else
{
Write-Host "Service account $ServiceAccount with SID $SID was not found in the Authorization Policy rule set"
}
$Properties.PolicyStore.AuthorizationPolicy = $AuthorizationPolicyRules.ToString()
$AuthorizationPolicyReadOnlyRules = [AdfsRules]::new($Properties.PolicyStore.AuthorizationPolicyReadOnly)
if($AuthorizationPolicyReadOnlyRules.RemoveRule($ServiceAccountRule))
{
Write-Host "Service account $ServiceAccount with SID $SID was removed from the Authorization Policy Read Only rule set"
}
else
{
Write-Host "Service account $ServiceAccount with SID $SID was not found in the Authorization Policy Read Only rule set"
}
$Properties.PolicyStore.AuthorizationPolicyReadOnly = $AuthorizationPolicyReadOnlyRules.ToString()
}
else
{
#Check if rule already exists in auth policy
$AuthorizationPolicyRules = [AdfsRules]::new($Properties.PolicyStore.AuthorizationPolicy)
if($AuthorizationPolicyRules.FindIndexForRule($ServiceAccountRule) -ne -1)
{
Write-Host "Service account rule already exists."
return $true
}
Write-Host "Adding rule for service account $ServiceAccount with SID $SID to Authorization Policy and Authorization Policy Read Only rule sets"
$Properties.PolicyStore.AuthorizationPolicy = $Properties.PolicyStore.AuthorizationPolicy + $ServiceAccountRule
$Properties.PolicyStore.AuthorizationPolicyReadOnly = $Properties.PolicyStore.AuthorizationPolicyReadOnly + $ServiceAccountRule
}
try
{
Set-AdfsInternalSettings (Get-DataContractSerializedString -object $Properties) | Out-Null
}
catch
{
Write-Error "There was an error writing to the configuration database"
retun $false
}
$doc = new-object Xml
$doc.Load("$env:windir\ADFS\Microsoft.IdentityServer.Servicehost.exe.config")
$connString = $doc.configuration.'microsoft.identityServer.service'.policystore.connectionString
if((IsWID -ConnectionString $connString) -eq $true)
{
if($SecondaryServers.Count -eq 0)
{
Write-Warning("No list of secondary servers was provided. You must ensure a sync has occurred on all machines before proceeding to change the service account.")
}
#In the case of WID, sync config among all secondary servers
foreach($Server in $SecondaryServers)
{
Invoke-Command -ComputerName $Server -ScriptBlock {
$Date = Get-Date
$Duration = (Get-AdfsSyncProperties).PollDuration
Set-AdfsSyncProperties -PollDuration 1
while((Get-AdfsSyncProperties).LastSyncTime -lt $Date)
{
Start-Sleep 1
}
Set-AdfsSyncProperties -PollDuration $Duration
}
}
}
return $true
}
#Define functions to export
<#
.SYNOPSIS
Module restores the AD FS service settings from a backup generated by either Add-AdfsServiceAccountRule or Remove-AdfsServiceAccountRule
.EXAMPLE
Restore-AdfsSettingsFromBackUp -BackUpPath C:\Users\Administrator\Documents\serviceSettingsData-2018-04-11-12-04-03.xml
#>
function Restore-AdfsSettingsFromBackup
{
[cmdletbinding(SupportsShouldProcess, ConfirmImpact='High')]
param(
[parameter(Mandatory=$true)]
[string]$BackupPath
)
if(-not (Test-Path $BackupPath))
{
Write-Host "The provided path to the backup file was not found."
return $false
}
#Receive user confirmation
if(-not $PSCmdlet.ShouldProcess("A write to the AD FS configuration database will occur", "This script will write directly to the AD FS configuration database. Are you sure you want to proceed?", "Confrim"))
{
Write-Host "Terminating execution of script"
return $false
}
$Properties = Import-Clixml $BackupPath
try
{
Set-AdfsInternalSettings $Properties | Out-Null
}
catch
{
Write-Error "There was an error writing to the configuration database"
return $false
}
return $true
}
<#
.SYNOPSIS
Module adds rule permitting the speciifed service account to the AD FS rule set.
For Windows Server 2016 and later this must be done prior to changing the service account.
Failure to do so will render servers non-functional.
.EXAMPLE
Add-AdfsServiceAccountRule -ServiceAccount newAccount
Add-AdfsServiceAccountRule -ServiceAccoount MyDomain\newAccount
Add-AdfsServiceAccountRule -ServiceAccount newAccount -SecondaryServers server1, server2
#>
function Add-AdfsServiceAccountRule
{
[cmdletbinding(SupportsShouldProcess, ConfirmImpact='High')]
param
(
[parameter(Mandatory=$true, Position=1)]
[string]$ServiceAccount,
[parameter(ValueFromPipeline=$True)]
[string[]]$SecondaryServers
)
#Receive user confirmation
if(-not $PSCmdlet.ShouldProcess("A write to the AD FS configuration database will occur", "This script will write directly to the AD FS configuration database. Are you sure you want to proceed?", "Confrim"))
{
Write-Host "Terminating execution of script"
return $false
}
Update-AdfsServiceAccountRule -ServiceAccount $ServiceAccount -SecondaryServers $SecondaryServers
}
<#
.SYNOPSIS
Module deletes rule permitting the speciifed service account from the AD FS rule set.
This can be used to disable the old service account on Windows Server 2016 and later.
This comand should only be run once the service account has been successfully changed.
.EXAMPLE
Remove-AdfsServiceAccountRule -ServiceAccount newAccount
Remove-AdfsServiceAccountRule -ServiceAccoount MyDomain\newAccount
Remove-AdfsServiceAccountRule -ServiceAccount newAccount -SecondaryServers server1, server2
#>
function Remove-AdfsServiceAccountRule
{
[cmdletbinding(SupportsShouldProcess, ConfirmImpact='High')]
param
(
[parameter(Mandatory=$true, Position=1)]
[string]$ServiceAccount,
[parameter(ValueFromPipeline=$True)]
[string[]]$SecondaryServers
)
#Receive user confirmation
if(-not $PSCmdlet.ShouldProcess("A write to the AD FS configuration database will occur", "This script will write directly to the AD FS configuration database. Are you sure you want to proceed?", "Confrim"))
{
Write-Host "Terminating execution of script"
return $false
}
Update-AdfsServiceAccountRule -ServiceAccount $ServiceAccount -SecondaryServers $SecondaryServers -RemoveRule
}
<#
.SYNOPSIS
Module changes the AD FS service account.
The script must be run locally on all seconodary servers first before running on the primary server.
For Windows Server 2016 and later, Add-AdfsServiceAccountRule should be run prior the execution of this command
.EXAMPLE
Update-AdfsServiceAccount
#>
function Update-AdfsServiceAccount
{
$ErrorActionPreference = "silentlycontinue"
$MachineFQDN = [System.Net.Dns]::GetHostEntry([System.Net.Dns]::GetHostName()).HostName
$MachineDomainSlash = ((((($MachineFQDN).ToString()).Split(".",2)[1])+"\"+((($MachineFQDN).ToString()).Split(".",2)[0])).ToUpper())
#check for Vista, 7, or 8
$OSVersion = [System.Environment]::OSVersion.Version
# Show header, show AS-IS statement, detail sample changes made, prompt if ready to continue
Write-Host "`n IMPORTANT: This sample is provided AS-IS with no warranties and confers no rights." -ForegroundColor "yellow"
Write-Host "`n This sample is intended only for Federation Server farms. If your AD FS 2.x deployment type is Standalone," -ForegroundColor "yellow"
Write-Host " this sample does not apply to your Federation Service." -ForegroundColor "yellow"
Write-Host "`n The following changes will occur as a result of executing this sample:`n`t1. The AD FS service will be stopped"
write-host "`t2. The AD FS database permissions will be altered to allow access for the new account"
Write-Host "`t3. A servicePrincipalName registration will be removed from the old account and registered to the new account"
Write-Host "`t4. The AD FS service and AdfsAppPool identity will be changed to the new account"
Write-Host "`t5. Certificate private key permissions will be modified to allow access for the new account"
Write-Host "`t6. The new account will be allowed user rights: `"Log on as a service`" and `"Generate security audits`""
Write-Host "`n PRE-EXECUTION TASKS" -ForegroundColor "yellow"
Write-Host " 1. Create the new service account in Active Directory" -ForegroundColor "yellow"
Write-Host " 2. Install SQLCmd.exe on each Federation Server in the farm" -ForegroundColor "yellow"
Write-Host "`tSQLCmd.exe requires the SQL Native Client to be installed" -ForegroundColor "yellow"
Write-Host "`tAfter SQLCmd.exe has been installed, all Powershell windows must be" -ForegroundColor "yellow"
Write-Host "`tclosed and re-opened to continue with execution of this sample." -ForegroundColor "yellow"
Write-Host "`n`tDownload both installers from the following location`:`n`thttp://www.microsoft.com/download/en/details.aspx?id=15748" -ForegroundColor "yellow"
Write-Host "`n If you are ready to proceed, type capital C and press Enter to continue: " -NoNewline
$Answer = "notready"
$LogPath = "$pwd\ADFS_Change_Service_Account.log"
$Answer = Read-Host
If ($Answer -cne "C")
{
Write-Host "`tExiting`n" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] Bad selection at the prompt to continue with sample execution" | Out-File $LogPath
exit
}
#write timing info to the log file and start a stopwatch to capture elapsed time
"[START TIME] $(Get-Date)" | Out-File $LogPath
$ElapsedTime = [System.Diagnostics.Stopwatch]::StartNew()
$OpMode1 = "Federation Server"
$OpMode2 = "Final Federation Server"
Write-Host "`n Note: The sample must be executed against each Federation Server in the farm." -ForegroundColor "yellow"
Write-Host " Windows Internal Database (WID) and SQL farms are supported. Before execution can" -ForegroundColor "yellow"
Write-Host " begin, an operating mode must be selected. Careful consideration of the following" -ForegroundColor "yellow"
Write-Host " guidance is necessary to ensure the sample is executed properly on each server." -ForegroundColor "yellow"
Write-Host "`n GUIDANCE FOR SELECTING AN OPERATING MODE:" -ForegroundColor "yellow"
Write-Host "`n WID FARM:`n The sample must be executed on all Secondary servers before execution should" -ForegroundColor "yellow"
Write-Host " occur on the Primary server. The Primary server is the only server with Write access to the" -ForegroundColor "yellow"
Write-Host " configuration database. The Primary server must be used as the 'Final Federation Server'" -ForegroundColor "yellow"
Write-Host "`n Powershell command to determine whether a server is Primary or Secondary:" -ForegroundColor "yellow"
#check for Vista, 7, or 8
$OSVersion = [System.Environment]::OSVersion.Version
If (($OSVersion.Major -lt 6) -or ( ($OSVersion.Major -eq 6) -and ($OSVersion.Minor -lt 3) ))
{
Write-Host "`tExiting`n" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] This script is only applicable on Windows Server 2012 R2 and later" | Out-File $LogPath
exit
}
$feature = Get-WindowsFeature -Name ADFS-Federation
If( ($feature -eq $null) -or ($feature.Installed -eq $false) )
{
Write-Host "`tExiting`n" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] This script is only applicable on a machine where AD FS is already installed" | Out-File $LogPath
exit
}
Write-Host "`tImport-Module ADFS" -ForegroundColor "yellow"
Import-Module ADFS -ErrorAction Stop
Write-Host "`tGet-AdfsSyncProperties" -ForegroundColor "yellow"
Write-Host "`n SQL FARM:`n Any one server in the farm should be selected as the 'Final Federation Server'." -ForegroundColor "yellow"
Write-Host " All servers in a SQL farm have Write access to the configuration database. Execute the sample on all other" -ForegroundColor "yellow"
Write-Host " servers in the farm before executing the sample on the server selected as the 'Final Federation Server'" -ForegroundColor "yellow"
Write-Host "`n Select operating mode:`n`t1 - $OpMode1`n`t2 - $OpMode2"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Getting operating mode" | Out-File $LogPath -Append
While (($Mode -ne 1) -and ($Mode -ne 2))
{
$Mode = Read-Host "`tSelection"
If (($Mode -ne 1) -and ($Mode -ne 2))
{
Write-Host "`t$Mode is not a valid selection" -ForegroundColor "yellow"
}
}
if ($Mode -eq 1)
{
$SelOpMode = $OpMode1
}
else
{
$SelOpMode = $OpMode2
}
Write-Host "`tOperating mode: $SelOpMode" -ForegroundColor "green"
($ElapsedTime.Elapsed.ToString())+" [INFO] Operating mode: $SelOpMode" | Out-File $LogPath -Append
# Check for the AD FS service
Write-Host " Checking the AD FS service"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Checking for service installation (adfssrv)" | Out-File $LogPath -Append
$ADFSInstalled = Get-Service adfssrv
If (!$ADFSInstalled)
{
Write-Host "`tThe AD FS service was not found. Exiting`n" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] adfssrv is not installed" | Out-File $LogPath -Append
Exit
}
Else
{
($ElapsedTime.Elapsed.ToString())+" [INFO] adfssrv is installed" | Out-File $LogPath -Append
# Check to see if adfssrv is running. If stopped, attempt to start. If start fails, exit.
If ($ADFSInstalled.Status -ceq "Stopped")
{
Write-Host "`tThe AD FS service is stopped. Starting the service`n" -ForegroundColor "yellow" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [WARN] adfssrv is stopped. Attempting to start" | Out-File $LogPath -Append
$ADFSInstalled.Start()
$ADFSInstalled.WaitForStatus("Running",[System.TimeSpan]::FromSeconds(25))
If (!$?)
{
Write-Host "`tThe AD FS service could not be started. Exiting" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] adfssrv failed to start" | Out-File $LogPath -Append
Exit
}
}
Else
{
($ElapsedTime.Elapsed.ToString())+" [INFO] adfssrv is running" | Out-File $LogPath -Append
}
Write-Host "`tSuccess" -ForegroundColor "green" -NoNewline
}
# Check if Fed Svc Name equals machine FQDN. This is not supported for farms. Breaks Kerberos.
Write-Host "`n Checking the Federation Service Name"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Checking Federation Service Name" | Out-File $LogPath -Append
$ADFSProperties = Get-ADFSProperties
$FederationServiceName = ((($ADFSProperties.HostName).ToString()).ToUpper())
If ($FederationServiceName -eq $MachineFQDN)
{
Write-Host "`tFederation Service Name: $FederationServiceName`n`tFederation Service Name must not equal the qualified`n`tcomputer name in an AD FS farm." -ForegroundColor "red"
Write-Host "`thttp://social.technet.microsoft.com/wiki/contents/articles/ad-fs-2-0-how-to-change-the-federation-service-name.aspx" -ForegroundColor "gray"
Write-Host "`tExiting`n" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] Federation Service Name: $FederationServiceName equals the qualified computer name. This is not supported in a farm deployment" | Out-File $LogPath -Append
($ElapsedTime.Elapsed.ToString())+" [ERROR] http://social.technet.microsoft.com/wiki/contents/articles/ad-fs-2-0-how-to-change-the-federation-service-name.aspx" | Out-File $LogPath -Append
Exit
}
Else
{
Write-Host "`tSuccess" -ForegroundColor "green"
($ElapsedTime.Elapsed.ToString())+" [INFO] Federation Service Name is OK" | Out-File $LogPath -Append
}
$CredsNotValidated = $true
While ($CredsNotValidated)
{
# Collect creds for new service account
$NewName = "foo"
While (($NewName -match " ") -or ($NewName -match "networkservice") -or ($NewName -match "localsystem") -or (($NewName -notmatch "\\") -and ($NewName -notmatch "`@")))
{
Write-Host " Collecting credentials for the new account"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Collecting new credentials" | Out-File $LogPath -Append
$NewName = (Read-Host "`tUsername (domain\user)").ToUpper()
($ElapsedTime.Elapsed.ToString())+" [INFO] New user name: $NewName" | Out-File $LogPath -Append
If (($NewName -match " ") -or ($NewName -match "networkservice") -or ($NewName -match "localsystem") -or (($NewName -notmatch "\\") -and ($NewName -notmatch "`@")))
{
Write-Host "`t$NewName is not supported. AD FS farms require a domain user account (domain\user)" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] Unsupported new name entry: $NewName. Service account must be domain user" | Out-File $LogPath -Append
}
}
$IsGmsaAccount = $NewName.EndsWith("$")
If($IsGmsaAccount)
{
$NewPassword = $null
}
Else
{
$NewPassword = Read-Host -assecurestring "`tPassword"
}
$objNewCreds = New-Object Management.Automation.PSCredential $NewName, $NewPassword
$NewPassword = $objNewCreds.GetNetworkCredential().Password
# Check for UPN style new name and convert to domain\username for SPN work items
If ($NewName.ToString() -match "`@")
{
$NewName = ((($NewName.Split("`@")[1]).ToString() + "\" + ($NewName.Split("`@")[0]).ToString()).ToUpper())
Write-Host "`n`tUsing $NewName in order to meet SPN requirements" -ForegroundColor "gray"
($ElapsedTime.Elapsed.ToString())+" [INFO] Using $NewName in order to meet SPN requirements" | Out-File $LogPath -Append
}
// Do not validate creds for gMSA
If ($IsGmsaAccount)
{
Write-Host " gMSA account was specified. Skipping credential validation"
$CredsNotValidated = $false
}
Else
{
# Validating credentials
Write-Host " Validating credentials"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Validating credentials" | Out-File $LogPath -Append
$Domain = "LDAP://" + ([ADSI]"").distinguishedName
$DomainObject = New-Object System.DirectoryServices.DirectoryEntry($Domain,$NewName,$NewPassword)
`$DomainObject.Name = `$DomainObject.Name
If ($DomainObject.Name -eq $null)
{
Write-Host "`tFailed credential validation" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] Failed credential validation" | Out-File $LogPath -Append
}
Else
{
Write-Host "`tSuccess" -ForegroundColor "green"
($ElapsedTime.Elapsed.ToString())+" [INFO] Credentials validated" | Out-File $LogPath -Append
$CredsNotValidated = $false
}
}
}
# Getting current identity for the AD FS 2.x Windows Service
Write-Host " Discovering current account name"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Getting old name" | Out-File $LogPath -Append
$ADFSSvc = gwmi win32_service -filter "name='adfssrv'"
If (!$ADFSSvc)
{
Write-Host "`tFailed to get the current account name. Exiting`n" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] Could not get old name from WMI service information for adfssrv" | Out-File $LogPath -Append
exit
}
Else
{
$OldName = ((($ADFSSvc.StartName).ToString()).ToUpper())
Write-Host "`t$OldName" -ForegroundColor "Green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] Old name: $OldName" | Out-File $LogPath -Append
If ($Mode -eq 2)
{
# Check for network service and local system and set a variable to use the domain\computername for SPN work items
If ((($OldName).ToString() -eq "NT AUTHORITY\NETWORK SERVICE") -or (($OldName).ToString() -eq "NT AUTHORITY\LOCAL SYSTEM"))
{
Write-Host "`tUsing $MachineDomainSlash in order to meet SPN requirements" -ForegroundColor "gray"
($ElapsedTime.Elapsed.ToString())+" [INFO] Using $MachineDomainSlash in order to meet SPN requirements" | Out-File $LogPath -Append
$UseMachineFQDN = $true
}
# Check for UPN style old name and convert to domain\username for SPN work items
If ($OldName.ToString() -match "`@")
{
$OldName = ($OldName.Split("`@")[1]).ToString() + "\" + ($OldName.Split("`@")[0]).ToString()
Write-Host "`tUsing $OldName in order to meet SPN requirements" -ForegroundColor "gray"
($ElapsedTime.Elapsed.ToString())+" [INFO] Using $OldName in order to meet SPN requirements" | Out-File $LogPath -Append
}
}
}
####ADD NEEDED MODULES####
$ADFSCertificate = Get-ADFSCertificate
$ADFSSyncProperties = Get-ADFSSyncProperties
$Role = (($ADFSSyncProperties.Role).ToString())
$doc = new-object Xml
$doc.Load("$env:windir\ADFS\Microsoft.IdentityServer.Servicehost.exe.config")
$connString = $doc.configuration.'microsoft.identityServer.service'.policystore.connectionString
####STOP THE AD FS WINDOWS SERVICE####
Write-Host "`n Stopping the AD FS service"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Stopping adfssrv" | Out-File $LogPath -Append
# Stop the AD FS Windows service. No need to check status since Stop-Service does not throw if service is currently stopped.
$ADFSInstalled.Stop()
$ADFSInstalled.WaitForStatus("Stopped",[System.TimeSpan]::FromSeconds(15))
If (!$?)
{
Write-Host "`tThe AD FS service could not be stopped.`n`tExiting`n" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] adfssrv could not be stopped" | Out-File $LogPath -Append
exit
}
Else
{
Write-Host "`tSuccess" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] adfssrv is stopped" | Out-File $LogPath -Append
}
####GETTING THE SQL HOST NAME####
# Getting SQL host name
Write-Host "`n Discovering SQL host"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Discovering SQL host" | Out-File $LogPath -Append
$SQLHost = (($connString.ToString()).split("=")[1]).Split(";")[0]
Write-Host "`t$SQLHost" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] SQL host: $SQLHost" | Out-File $LogPath -Append
####DETECT DATABASE TYPE####
# Detect WID or SQL
Write-Host "`n Detecting database type"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Detecting database type" | Out-File $LogPath -Append
if((IsWid -ConnectionString $connString) -eq $true)
{
$DBMode = "WID"
}
else
{
$DBMode = "SQL"
}
Write-Host "`t$DBMode" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] Database type: $DBMode" | Out-File $LogPath -Append
#check to be sure that the admin isn't attempting a mode that isn't suitable for the current FS's role
If ($DBMode -eq "WID")
{
Write-Host "`n Checking operating mode against server role"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Checking op mode against server role" | Out-File $LogPath -Append
If ((($Mode -eq 2) -and ($Role -eq "SecondaryComputer")) -or (($Mode -eq 1) -and ($Role -eq "PrimaryComputer")))
{
Write-Host "`tError: Operating mode and role mismatch. Operating mode $Mode cannot be executed`n`ton a server with role $Role`n`tAction: Select a valid operating mode for this server.`n`tExiting" -ForegroundColor "Red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] Op mode does not match server role. Mode: $Mode. Role: $Role" | Out-File $LogPath -Append
exit
}
Write-Host "`tSuccess" -ForegroundColor "Green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] Op mode matches server role" | Out-File $LogPath -Append
}
# Detect SQLCmd.exe, but not for secondary SQL
If (!(($Mode -eq 1) -and ($DBMode -eq "SQL")))
{
Write-Host "`n Detecting SQLCmd.exe"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Detecting SQLCMD.exe" | Out-File $LogPath -Append
$SQLCmdPresent = $false
sqlcmd.exe /? | Out-Null
If (!$?)
{
Write-Host "`tSQLCmd.exe was not found`n`tSee: POST-SAMPLE ITEMS THAT MUST BE EXECUTED MANUALLY." -ForegroundColor "yellow" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [WARN] SQLCMD.exe not found. SQL scripts must be manually executed." | Out-File $LogPath -Append
}
Else
{
Write-Host "`tSuccess" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] SQLCMD.exe found" | Out-File $LogPath -Append
$SQLCmdPresent = $true
}
}
####CONVERTING NAMES TO SIDS####
Write-Host "`n Converting $OldName to SID"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Convert $OldName to SID" | Out-File $LogPath -Append
# Get SID for the old account into a variable
$OldSID = ConvertTo-Sid -Account $OldName
If (!$OldSID)
{
Write-Host "`tName to SID translation failed for `"$OldName`".`n`tExiting`n" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] $OldName SID translation failed" | Out-File $LogPath -Append
exit
}
Else
{
Write-Host "`t$OldSID" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] Old SID: $OldSID" | Out-File $LogPath -Append
}
Write-Host "`n Converting $NewName to SID"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Convert $NewName to SID" | Out-File $LogPath -Append
#Get SID for the new account into a variable
$NewSID = ConvertTo-Sid -Account $NewName
If (!$NewSID)
{
Write-Host "`tName to SID translation failed for `"$NewName`".`n`tEnsure that the new service account name is typed correctly. Exiting`n" -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] $NewName SID translation failed" | Out-File $LogPath -Append
exit
}
Else
{
Write-Host "`t$NewSID" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] New SID: $NewSID" | Out-File $LogPath -Append
}
If ($NewSID -eq $OldSID)
{
Write-Host "`n The old and new accounts are the same, do you wish to proceed?" -ForegroundColor "yellow"
$SameAccountAnswer = Read-Host "`t(Y/N)"
If ($SameAccountAnswer -ne "y")
{
Write-Host "`tExiting`n" -ForegroundColor "red"
Exit
}
}
####GENERATE SQL SCRIPTS, BUT NOT FOR SECONDARY SQL####
If (!(($Mode -eq 1) -and ($DBMode -eq "SQL")))
{
$GenerateSQLScripts = GenerateSQLScripts
If (!$GenerateSQLScripts)
{
exit
}
Else
{
Write-Host "`tSuccess" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] SQL scripts generated" | Out-File $LogPath -Append
}
}
####PERFORM ACTIONS FOR SQL DATABASE TYPE####
if (($DBMode -eq "SQL") -and ($Mode -eq 2))
{
Write-Host "`n Does the currently logged on user have administrative access to the AD FS databases within SQL server`?"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Discovering if current user is SQL admin" | Out-File $LogPath -Append
$SQLAnswser = "foo"
while (($SQLAnswer -ne "Y") -and ($SQLAnswer -ne "N"))
{ $SQLAnswer = Read-Host "`t(Y/N)" }
($ElapsedTime.Elapsed.ToString())+" [INFO] SQL admin answer: $SQLAnswer" | Out-File $LogPath -Append
# If the user has permissions in SQL and SQLCmd.exe is present, run the scripts, otherwise, explain how they must perform this step manually.
if (($SQLAnswer -eq "Y") -and ($SQLCmdPresent))
{
Write-Host " Executing SQL scripts"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Executing SQL scripts using SQLCMD.exe" | Out-File $LogPath -Append
$ExecuteSQLScripts = ExecuteSQLScripts
If (!$ExecuteSQLScripts)
{
exit
}
Else
{
Write-Host "`tSuccess" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] SQL scripts executed successfully" | Out-File $LogPath -Append
}
}
else
{
$NeedsSQLWarning = $true
($ElapsedTime.Elapsed.ToString())+" [WARN] Admin must execute SQL scripts manually:" | Out-File $LogPath -Append
($ElapsedTime.Elapsed.ToString())+" [WARN] sqlcmd.exe -S $SQLHost -i $env:Temp\ADFSSQLScripts\SetPermissions.sql -o $env:Temp\ADFSSQLScripts\SetPermissions-output.log,0,True" | Out-File $LogPath -Append
($ElapsedTime.Elapsed.ToString())+" [WARN] sqlcmd.exe -S $SQLHost -i $env:Temp\ADFSSQLScripts\UpdateServiceSettings.sql -o $env:Temp\ADFSSQLScripts\UpdateServiceSettings-output.log,0,True" | Out-File $LogPath -Append
}
}
If ($DBMode -eq "WID")
{
####PERFORM STEPS FOR WID DATABASE TYPE####
# We don't care if they are an admin in SQL Server, so only need to check to see if SQLCmd.exe is installed. Run the scripts, otherwise, explain how they must perform steps manually
if ($SQLCmdPresent)
{
Write-Host "`n Executing SQL scripts"
($ElapsedTime.Elapsed.ToString())+" [INFO] Executing SQL scripts using SQLCMD.exe" | Out-File $LogPath -Append
$ExecuteSQLScripts = ExecuteSQLScripts
If (!$ExecuteSQLScripts)
{
exit
}
Else
{
Write-Host "`tSuccess" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] SQL scripts executed successfully" | Out-File $LogPath -Append
}
}
else
{
$NeedsSQLWarning = $true
}
}
If ($Mode -eq 2)
{
####REMOVE THE SPN FROM THE OLD SERVICE ACCOUNT####
If ($UseMachineFQDN)
{
Write-Host "`n Removing SPN HOST/$FederationServiceName from $MachineDomainSlash"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Removing SPN HOST/$FederationServiceName from $MachineDomainSlash" | Out-File $LogPath -Append
setspn.exe -D HOST/$FederationServiceName $MachineDomainSlash | Out-File $LogPath -Append
If (!$?)
{
Write-Host "`tRemoving SPN failed`n`tSee: POST-SAMPLE ITEMS THAT MUST BE EXECUTED MANUALLY." -ForegroundColor "yellow" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [WARN] Removing SPN failed: HOST/$FederationServiceName from $MachineDomainSlash" | Out-File $LogPath -Append
($ElapsedTime.Elapsed.ToString())+" [WARN] setspn.exe -D HOST/$FederationServiceName $MachineDomainSlash" | Out-File $LogPath -Append
$FailedSpn = $true
}
Else
{
Write-Host "`tSuccess" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] SPN removed: HOST/$FederationServiceName from $MachineDomainSlash" | Out-File $LogPath -Append
}
}
Else
{
Write-Host "`n Removing SPN HOST/$FederationServiceName from $OldName"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Removing SPN HOST/$FederationServiceName from $OldName" | Out-File $LogPath -Append
setspn.exe -D HOST/$FederationServiceName $OldName | Out-File $LogPath -Append
If (!$?)
{
Write-Host "`tRemoving SPN failed`n`tSee: POST-SAMPLE ITEMS THAT MUST BE EXECUTED MANUALLY" -ForegroundColor "yellow" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [WARN] Removing SPN failed: HOST/$FederationServiceName from $OldName" | Out-File $LogPath -Append
($ElapsedTime.Elapsed.ToString())+" [WARN] setspn.exe -D HOST/$FederationServiceName $OldName" | Out-File $LogPath -Append
$FailedSpn = $true
}
Else
{
Write-Host "`tSuccess" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] SPN removed: HOST/$FederationServiceName from $OldName" | Out-File $LogPath -Append
}
}
####ADD THE SPN TO THE NEW SERVICE ACCOUNT####
Write-Host "`n Registering SPN HOST/$FederationServiceName to $NewName"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Registering SPN HOST/$FederationServiceName to $NewName" | Out-File $LogPath -Append
setspn.exe -S HOST/$FederationServiceName $NewName | Out-File $LogPath -Append
If (!$?)
{
Write-Host "`tRegistering SPN failed`n`tSee: POST-SAMPLE ITEMS THAT MUST BE EXECUTED MANUALLY" -ForegroundColor "yellow" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [WARN] Registering SPN failed: HOST/$FederationServiceName to $NewName" | Out-File $LogPath -Append
($ElapsedTime.Elapsed.ToString())+" [WARN] setspn.exe -S HOST/$FederationServiceName $NewName" | Out-File $LogPath -Append
$FailedSpn = $true
}
Else
{
Write-Host "`tSuccess" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] SPN registered: HOST/$FederationServiceName to $NewName" | Out-File $LogPath -Append
}
}
####SET THE IDENTITY OF THE AD FS WINDOWS SERVICE TO THE NEW SERVICE ACCOUNT####
# Setting identity for the AD FS Windows Service to the new service account
Write-Host "`n Setting the AD FS service identity to $NewName"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Setting new service identity for adfssrv to $NewName" | Out-File $LogPath -Append
$ADFSSvc = gwmi win32_service -filter "name='adfssrv'"
If (!$ADFSSvc)
{
Write-Host "`tFailed to get information about the AD FS service." -ForegroundColor "yellow" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [WARN] Failed to get WMI information for adfssrv from WMI" | Out-File $LogPath -Append
}
$ADFSSvc.Change($null,$null,$null,$null,$null,$null,$NewName,$NewPassword,$null,$null,$null) | Out-Null
If (!$?)
{
Write-Host "`tFailed to set the identity of the AD FS service`n`tSee: POST-SAMPLE ITEMS THAT MUST BE EXECUTED MANUALLY" -ForegroundColor "yellow" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [WARN] Failed to set identity for adfssrv to $NewName" | Out-File $LogPath -Append
$FailedServiceIdentity = $true
}
Else
{
Write-Host "`tSuccess" -ForegroundColor "green" -NoNewline
($ElapsedTime.Elapsed.ToString())+" [INFO] Set identity of adfssrv to $NewName" | Out-File $LogPath -Append
}
If ( !$FailedServiceIdentity )
{
# If the service account was gMSA, and you are running on a DC, add service dependency on kdssvc, otherwise remove the dependency on kdssvc
$kdssvc = Get-Service -Name "kdssvc"
If( ( $kdssvc -ne $null ) -and $IsGmsaAccount )
{
Write-Host "`n Setting HTTP/KdsSvc as a service dependency for ADFS Service"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Setting HTTP/KdsSvc as a service dependency for adfssrv" | Out-File $LogPath -Append
Start sc.exe -ArgumentList "config adfssrv depend=HTTP/KdsSvc" -Wait -WindowStyle Hidden | Out-File $LogPath -Append
}
Else
{
Write-Host "`n Adding HTTP as a service dependency for ADFS Service"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Setting HTTP as a service dependency for adfssrv" | Out-File $LogPath -Append
Start sc.exe -ArgumentList "config adfssrv depend=HTTP" -Wait -WindowStyle Hidden | Out-File $LogPath -Append
}
}
####ACL THE CERTIFICATE SHARING CONTAINER FOR THE NEW SERVICE ACCOUNT####
# Only execute if this is the first federation server
if ($Mode -eq 2)
{
# Check if CertificateSharingContainer has a value. If it does, ACL the container for the new service account.
If ($ADFSProperties.CertificateSharingContainer -ne $null)
{
Write-Host "`n Providing $NewName access to the Certificate Sharing Container"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Providing $NewName access to ($ADFSProperties.CertificateSharingContainer).ToString()" | Out-File $LogPath -Append
Set-CertificateSharingContainerSecurity -NewSID $NewSID
}
}
####ADD USER RIGHTS####
Write-Host "`n Adding user rights for $NewName"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Adding user rights for $NewName" | Out-File $LogPath -Append
# Execute for all opmodes
$FailedUserRights = AddUserRights
####START THE AD FS WINDOWS SERVICE####
Write-Host "`n Starting the AD FS service"
($ElapsedTime.Elapsed.ToString())+" [WORK ITEM] Starting adfssrv" | Out-File $LogPath -Append
#check to see if SQL scripts need run. If yes, skip this step
If (($Mode -eq 1) -or $NeedsSQLWarning -or $FailedLdap -or $FailedServiceIdentity -or $FailedServiceStart -or $FailedSpn -or $FailedUserRights)
{
Write-Host "`tSkipped`n`tSee: POST-SAMPLE ITEMS THAT MUST BE EXECUTED MANUALLY" -ForegroundColor "yellow"
($ElapsedTime.Elapsed.ToString())+" [WARN] Skipped starting adfssrv due to post-sample needs" | Out-File $LogPath -Append
$SkipServiceStart = $true
}
Else
{
# Start the AD FS Windows service. No need to check status since Start-Service does not throw if service is currently started.
$ADFSInstalled.Start()
$ADFSInstalled.WaitForStatus("Running",[System.TimeSpan]::FromSeconds(25))
If (!$?)
{
Write-Host "`tFailed: The AD FS service could not be started.`n`tExamine the AD FS 2.0/Admin and AD FS 2.0 Tracing/Debug event logs for details." -ForegroundColor "red"
($ElapsedTime.Elapsed.ToString())+" [ERROR] adfssrv service failed to start. See Admin and Debug logs for details." | Out-File $LogPath -Append
$FailedServiceStart = $true
}
Else
{
Write-Host "`tSuccess" -ForegroundColor "green"
($ElapsedTime.Elapsed.ToString())+" [INFO] adfssrv started" | Out-File $LogPath -Append
}
}
####NOTIFY ABOUT MANUALLY SETTING ITEMS
$NotifyCount = 1
Write-Host "`n`n`n POST-SAMPLE ITEMS THAT MUST BE EXECUTED MANUALLY" -ForegroundColor "yellow"
"`n`n`n POST-SAMPLE ITEMS THAT MUST BE EXECUTED MANUALLY" | Out-File $LogPath -Append
If ($FailedUserRights)
{
Write-Host "`n`n $NotifyCount. You must manually set User Rights Assigment for $NewName" -ForegroundColor "yellow"
Write-Host " to allow `"Generate Security Audits`" and `"Log On As a Service`"." -ForegroundColor "yellow"
Write-Host "`n Steps:`n Start -> Run -> GPEdit.msc -> Computer Configuration -> Windows Settings ->" -ForegroundColor "yellow"
Write-Host " Security Settings -> Local Policies -> User Rights Assignment" -ForegroundColor "yellow"
"`n`n $NotifyCount. You must manually set User Rights Assigment for $NewName" | Out-File $LogPath -Append
" to allow `"Generate Security Audits`" and `"Log On As a Service`"." | Out-File $LogPath -Append
"`n Steps:`n Start -> Run -> GPEdit.msc -> Computer Configuration -> Windows Settings ->" | Out-File $LogPath -Append
" Security Settings -> Local Policies -> User Rights Assignment" | Out-File $LogPath -Append
$NotifyCount += 1
}
If ($FailedLdap)
{
Write-Host "`n`n $NotifyCount. $NewName must have Read, Write, and Create Child permissions to the certificate" -ForegroundColor "yellow"
Write-Host " sharing container in AD. These permissions were not set during execution and must be set manually." -ForegroundColor "yellow"
Write-Host " LDAP path: $DN" -ForegroundColor "yellow"
"`n`n $NotifyCount. $NewName must have Read, Write, and Create Child permissions to the certificate" | Out-File $LogPath -Append
" sharing container in AD. These permissions were not set during execution and must be set manually." | Out-File $LogPath -Append
" LDAP path: $DN" | Out-File $LogPath -Append
$NotifyCount += 1
}
If ($NeedsSQLWarning)
{
If ($DBMode -eq "SQL")
{
Write-Host "`n`n $NotifyCount. Either the currently logged on user does not have appropriate permissions on the SQL Server," -ForegroundColor "yellow"
Write-Host " or SQLCmd.exe was not found on this system. You must provide your SQL DBA with the SetPermissions.sql" -ForegroundColor "yellow"
Write-Host " and UpdateServiceSettings.sql fileslocated in $env:Temp\ADFSSQLScripts." -ForegroundColor "yellow"
Write-Host " The DBA should execute these scripts on the SQL Server where the AD FS" -ForegroundColor "yellow"
Write-Host " Configuration and Artifact databases reside." -ForegroundColor "yellow"
Write-Host "`n Syntax:" -ForegroundColor "yellow"
Write-Host " sqlcmd.exe -S $SQLHost -i $env:Temp\ADFSSQLScripts\SetPermissions.sql" -ForegroundColor "yellow"
Write-Host " -o $env:Temp\ADFSSQLScripts\SetPermissions-output.log" -ForegroundColor "yellow"
Write-Host "`n sqlcmd.exe -S $SQLHost -i $env:Temp\ADFSSQLScripts\UpdateServiceSettings.sql" -ForegroundColor "yellow"
Write-Host " -o $env:Temp\ADFSSQLScripts\UpdateServiceSettings-output.log" -ForegroundColor "yellow"
"`n`n $NotifyCount. Either the currently logged on user does not have appropriate permissions on the SQL Server," | Out-File $LogPath -Append
" or SQLCmd.exe was not found on this system. You must provide your SQL DBA with the SetPermissions.sql" | Out-File $LogPath -Append
" and UpdateServiceSettings.sql fileslocated in $env:Temp\ADFSSQLScripts. The DBA should execute these" | Out-File $LogPath -Append
" scripts on the SQL Server where the AD FS Configuration and Artifact databases reside." | Out-File $LogPath -Append
"`n Syntax:" | Out-File $LogPath -Append
" sqlcmd.exe -S $SQLHost -i $env:Temp\ADFSSQLScripts\SetPermissions.sql -o" | Out-File $LogPath -Append
" $env:Temp\ADFSSQLScripts\SetPermissions-output.log" | Out-File $LogPath -Append
"`n sqlcmd.exe -S $SQLHost -i $env:Temp\ADFSSQLScripts\UpdateServiceSettings.sql -o" | Out-File $LogPath -Append
" $env:Temp\ADFSSQLScripts\UpdateServiceSettings-output.log" | Out-File $LogPath -Append
}
Else
{
Write-Host "`n`n $NotifyCount. SQLCmd.exe was not found on this system. The SQL scripts must be executed" -ForegroundColor "yellow"
Write-Host " manually using either SQL Management Studio or SQLCmd.exe. The scripts currently reside" -ForegroundColor "yellow"
Write-Host " in $env:Temp\ADFSSQLScripts." -ForegroundColor "yellow"
Write-Host "`n Syntax:" -ForegroundColor "yellow"
Write-Host " sqlcmd.exe -S $SQLHost -i $env:Temp\ADFSSQLScripts\SetPermissions.sql" -ForegroundColor "yellow"
Write-Host " -o $env:Temp\ADFSSQLScripts\SetPermissions-output.log" -ForegroundColor "yellow"
Write-Host "`n sqlcmd.exe -S $SQLHost -i $env:Temp\ADFSSQLScripts\UpdateServiceSettings.sql" -ForegroundColor "yellow"
Write-Host " -o $env:Temp\ADFSSQLScripts\UpdateServiceSettings-output.log" -ForegroundColor "yellow"
"`n`n $NotifyCount. Either the currently logged on user does not have appropriate permissions on the SQL Server," | Out-File $LogPath -Append
" or SQLCmd.exe was not found on this system. You must provide your SQL DBA with the SetPermissions.sql" | Out-File $LogPath -Append
" and UpdateServiceSettings.sql fileslocated in $env:Temp\ADFSSQLScripts. The DBA should execute these" | Out-File $LogPath -Append
" scripts on the SQL Server where the AD FS Configuration and Artifact databases reside." | Out-File $LogPath -Append
"`n Syntax:" | Out-File $LogPath -Append
" sqlcmd.exe -S $SQLHost -i $env:Temp\ADFSSQLScripts\SetPermissions.sql -o" | Out-File $LogPath -Append
" $env:Temp\ADFSSQLScripts\SetPermissions-output.log" | Out-File $LogPath -Append
"`n sqlcmd.exe -S $SQLHost -i $env:Temp\ADFSSQLScripts\UpdateServiceSettings.sql -o" | Out-File $LogPath -Append
" $env:Temp\ADFSSQLScripts\UpdateServiceSettings-output.log" | Out-File $LogPath -Append
}
$NotifyCount += 1
}
If ($FailedSpn)
{
Write-Host "`n`n $NotifyCount. $NewName must have the SPN HOST/$FederationServiceName registered.`n SPN registration failed during execution and must be handled manually.`n" -ForegroundColor "yellow"
Write-Host " Syntax:`n setspn -S HOST/$FederationServiceName $NewName" -ForegroundColor "yellow"
"`n`n $NotifyCount. $NewName must have the SPN HOST/$FederationServiceName registered.`n SPN registration failed during execution and must be handled manually.`n" | Out-File $LogPath -Append
" Syntax:`n setspn -S HOST/$FederationServiceName $NewName" | Out-File $LogPath -Append
$NotifyCount += 1
}
If ($FailedServiceIdentity)
{
Write-Host "`n`n $NotifyCount. Failed setting the AD FS service identity to $NewName during execution.`n This must be set manually in the Services console." -ForegroundColor "yellow"
"`n`n $NotifyCount. Failed setting the AD FS service identity to $NewName during execution.`n This must be set manually in the Services console." | Out-File $LogPath -Append
$NotifyCount += 1
}
If ($Mode -eq 1)
{
Write-Host "`n`n $NotifyCount. Operating Mode $Mode was selected for this server, which means this sample must be executed`n in Operating Mode 2 on the final server before the AD FS service is started on this server.`n Once the sample has been run on the final server in Operating Mode 2, return to this server`n to start the AD FS service." -ForegroundColor "yellow"
"`n`n $NotifyCount. Operating Mode $Mode was selected for this server, which means this sample must be executed`n in Operating Mode 2 on the final server before the AD FS service is started on this server.`n Once the sample has been run on the final server in Operating Mode 2, return to this server`n to start the AD FS service." | Out-File $LogPath -Append
$NotifyCount += 1
}
If ($SkipServiceStart)
{
Write-Host "`n`n $NotifyCount. Service start was skipped during execution due to post-sample needs. The service must be manually started.`n`n Syntax:`n net start adfssrv" -ForegroundColor "yellow"
"`n`n $NotifyCount. Service start was skipped during execution due to post-sample needs.`n The service must be manually started." | Out-File $LogPath -Append
$NotifyCount += 1
}
If ($FailedServiceStart)
{
Write-Host "`n`n $NotifyCount. Failed service start during execution.`n The service must be manually started." -ForegroundColor "yellow"
Write-Host " Syntax: net start adfssrv" -ForegroundColor "yellow"
"`n`n $NotifyCount. Failed service start during execution.`n The service must be manually started." | Out-File $LogPath -Append
" Syntax: net start adfssrv" | Out-File $LogPath -Append
$NotifyCount += 1
}
If ($NotifyCount -eq 1)
{
Write-Host "`n No post-sample items" -ForegroundColor "green"
"No post-sample items" | Out-File $LogPath -Append
}
Write-Host "`n`n It is recommended the old service account $OldName be deletd once the service account has been changed on all servers.`n" -ForegroundColor "yellow"
Write-Host "`n`n Sample completed successfully. See ADFS_Change_Service_Account.log in the current directory for detail`n" -ForegroundColor "green"
"[END TIME] $(Get-Date)" | Out-File $LogPath -Append
$ErrorActionPreference = "continue"
}
Export-ModuleMember -Function Add-AdfsServiceAccountRule
Export-ModuleMember -Function Remove-AdfsServiceAccountRule
Export-ModuleMember -Function Update-AdfsServiceAccount
Export-ModuleMember -Function Restore-AdfsSettingsFromBackup
# SIG # Begin signature block
# MIIkWAYJKoZIhvcNAQcCoIIkSTCCJEUCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCADIMyPFxanpDvV
# 9EK5fVDYQ6QY5C03wJnMUQsf6Lh4b6CCDYEwggX/MIID56ADAgECAhMzAAABUZ6N
# j0Bxow5BAAAAAAFRMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMTkwNTAyMjEzNzQ2WhcNMjAwNTAyMjEzNzQ2WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCVWsaGaUcdNB7xVcNmdfZiVBhYFGcn8KMqxgNIvOZWNH9JYQLuhHhmJ5RWISy1
# oey3zTuxqLbkHAdmbeU8NFMo49Pv71MgIS9IG/EtqwOH7upan+lIq6NOcw5fO6Os
# +12R0Q28MzGn+3y7F2mKDnopVu0sEufy453gxz16M8bAw4+QXuv7+fR9WzRJ2CpU
# 62wQKYiFQMfew6Vh5fuPoXloN3k6+Qlz7zgcT4YRmxzx7jMVpP/uvK6sZcBxQ3Wg
# B/WkyXHgxaY19IAzLq2QiPiX2YryiR5EsYBq35BP7U15DlZtpSs2wIYTkkDBxhPJ
# IDJgowZu5GyhHdqrst3OjkSRAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUV4Iarkq57esagu6FUBb270Zijc8w
# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1
# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDU0MTM1MB8GA1UdIwQYMBaAFEhu
# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w
# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3
# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx
# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAWg+A
# rS4Anq7KrogslIQnoMHSXUPr/RqOIhJX+32ObuY3MFvdlRElbSsSJxrRy/OCCZdS
# se+f2AqQ+F/2aYwBDmUQbeMB8n0pYLZnOPifqe78RBH2fVZsvXxyfizbHubWWoUf
# NW/FJlZlLXwJmF3BoL8E2p09K3hagwz/otcKtQ1+Q4+DaOYXWleqJrJUsnHs9UiL
# crVF0leL/Q1V5bshob2OTlZq0qzSdrMDLWdhyrUOxnZ+ojZ7UdTY4VnCuogbZ9Zs
# 9syJbg7ZUS9SVgYkowRsWv5jV4lbqTD+tG4FzhOwcRQwdb6A8zp2Nnd+s7VdCuYF
# sGgI41ucD8oxVfcAMjF9YX5N2s4mltkqnUe3/htVrnxKKDAwSYliaux2L7gKw+bD
# 1kEZ/5ozLRnJ3jjDkomTrPctokY/KaZ1qub0NUnmOKH+3xUK/plWJK8BOQYuU7gK
# YH7Yy9WSKNlP7pKj6i417+3Na/frInjnBkKRCJ/eYTvBH+s5guezpfQWtU4bNo/j
# 8Qw2vpTQ9w7flhH78Rmwd319+YTmhv7TcxDbWlyteaj4RK2wk3pY1oSz2JPE5PNu
# Nmd9Gmf6oePZgy7Ii9JLLq8SnULV7b+IP0UXRY9q+GdRjM2AEX6msZvvPCIoG0aY
# HQu9wZsKEK2jqvWi8/xdeeeSI9FN6K1w4oVQM4Mwggd6MIIFYqADAgECAgphDpDS
# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla
# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT
# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG
# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S
# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz
# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7
# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u
# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33
# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl
# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP
# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB
# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF
# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM
# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ
# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud
# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO
# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0
# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw
# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA
# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY
# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj
# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd
# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ
# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf
# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ
# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j
# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B
# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96
# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7
# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I
# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIWLTCCFikCAQEwgZUwfjELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z
# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAVGejY9AcaMOQQAAAAABUTAN
# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor
# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgIGzL22iP
# /NfeNPyrjgkUUIhrhfFCiXrPNdE304IQqRkwQgYKKwYBBAGCNwIBDDE0MDKgFIAS
# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN
# BgkqhkiG9w0BAQEFAASCAQB7Fsh8Pz4wz53wWvY1WC5b9zpbV2p7CCoJkWBDPpqq
# L1xB+kDTP4e2/3jo1MLjM+isb42KYa3ORqQMDx9f5Wh8RaYdywSWss/B22SntwLE
# j59YpokJwhicQNFU3w2dksf9b9m8SCEMzvlde0/ZabzagRrJVkY0GfjUCs57CkOQ
# KFsB1sN7FXDUSlC34YjK8VSucVT24kpgrovK4n4taLmgO9HYHgivwZsfo23zWWaJ
# mOBuCAjorTBz5D61xnwZs5fQ/OsQmKqLJJwDbzooccltcJgZBBWbJcB4k7VXYE1X
# pWARShNqoCD6Hud6f22OoO+te3vp62gLRGegd7f5ksjIoYITtzCCE7MGCisGAQQB
# gjcDAwExghOjMIITnwYJKoZIhvcNAQcCoIITkDCCE4wCAQMxDzANBglghkgBZQME
# AgEFADCCAVgGCyqGSIb3DQEJEAEEoIIBRwSCAUMwggE/AgEBBgorBgEEAYRZCgMB
# MDEwDQYJYIZIAWUDBAIBBQAEIEkad/cl/je5+DlFuSBdG/1Z0fhKlbz+flSGF5Yl
# S1AAAgZd5pGnrxYYEzIwMTkxMjA5MjI1ODM1LjMwN1owBwIBAYACAfSggdSkgdEw
# gc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsT
# IE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFs
# ZXMgVFNTIEVTTjpCOEVDLTMwQTQtNzE0NDElMCMGA1UEAxMcTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgU2VydmljZaCCDx8wggZxMIIEWaADAgECAgphCYEqAAAAAAACMA0G
# CSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3Jp
# dHkgMjAxMDAeFw0xMDA3MDEyMTM2NTVaFw0yNTA3MDEyMTQ2NTVaMHwxCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m
# dCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
# CgKCAQEAqR0NvHcRijog7PwTl/X6f2mUa3RUENWlCgCChfvtfGhLLF/Fw+Vhwna3
# PmYrW/AVUycEMR9BGxqVHc4JE458YTBZsTBED/FgiIRUQwzXTbg4CLNC3ZOs1nMw
# VyaCo0UN0Or1R4HNvyRgMlhgRvJYR4YyhB50YWeRX4FUsc+TTJLBxKZd0WETbijG
# GvmGgLvfYfxGwScdJGcSchohiq9LZIlQYrFd/XcfPfBXday9ikJNQFHRD5wGPmd/
# 9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaRtogINeh4HLDpmc085y9Euqf03GS9
# pAHBIAmTeM38vMDJRF1eFpwBBU8iTQIDAQABo4IB5jCCAeIwEAYJKwYBBAGCNxUB
# BAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8RhvFM2hahW1VMBkGCSsGAQQBgjcU
# AgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8G
# A1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeG
# RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jv
# b0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH
# MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2Vy
# QXV0XzIwMTAtMDYtMjMuY3J0MIGgBgNVHSABAf8EgZUwgZIwgY8GCSsGAQQBgjcu
# AzCBgTA9BggrBgEFBQcCARYxaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL1BLSS9k
# b2NzL0NQUy9kZWZhdWx0Lmh0bTBABggrBgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwA
# XwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0B
# AQsFAAOCAgEAB+aIUQ3ixuCYP4FxAz2do6Ehb7Prpsz1Mb7PBeKp/vpXbRkws8LF
# Zslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7uVOMzPRgEop2zEBAQZvcXBf/XPle
# FzWYJFZLdO9CEMivv3/Gf/I3fVo/HPKZeUqRUgCvOA8X9S95gWXZqbVr5MfO9sp6
# AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9Va8v/rbljjO7Yl+a21dA6fHOmWaQ
# jP9qYn/dxUoLkSbiOewZSnFjnXshbcOco6I8+n99lmqQeKZt0uGc+R38ONiU9Mal
# CpaGpL2eGq4EQoO4tYCbIjggtSXlZOz39L9+Y1klD3ouOVd2onGqBooPiRa6YacR
# y5rYDkeagMXQzafQ732D8OE7cQnfXXSYIghh2rBQHm+98eEA3+cxB6STOvdlR3jo
# +KhIq/fecn5ha293qYHLpwmsObvsxsvYgrRyzR30uIUBHoD7G4kqVDmyW9rIDVWZ
# eodzOwjmmC3qjeAzLhIp9cAvVCch98isTtoouLGp25ayp0Kiyc8ZQU3ghvkqmqMR
# ZjDTu3QyS99je/WZii8bxyGvWbWu3EQ8l1Bx16HSxVXjad5XwdHeMMD9zOZN+w2/
# XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341Hgi62jbb01+P3nSISRIwggT1MIID
# 3aADAgECAhMzAAAA/UQsoPE1cgSpAAAAAAD9MA0GCSqGSIb3DQEBCwUAMHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTE5MDkwNjIwNDEwN1oXDTIwMTIw
# NDIwNDEwN1owgc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# KTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYD
# VQQLEx1UaGFsZXMgVFNTIEVTTjpCOEVDLTMwQTQtNzE0NDElMCMGA1UEAxMcTWlj
# cm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCASIwDQYJKoZIhvcNAQEBBQADggEP
# ADCCAQoCggEBAKJ0Obmm3DlwImjZvt/JPVLGsjW3p8qQ+fT+YWHBrH0PopNWXPap
# sSbd1+VAhHn9HQslHueP8iEaZFFyrbkey2Uou1e1HDFI/fjPKC4le+9Y1fWR7MOs
# YFB4emREvMppYjnhOtJVbr/r7ojSwqbD0Zj0Bl6mTNAwm7BWLOPlje+dBWwZ0Scu
# +sHNZjPyKMPNmNARxRcviPZezb2OO8vta40WZK8V0wYNTdC30jHGqmly/fFE6UKZ
# hVVGFFuYKJVt7t4N+BR62RKqherSxfVFEOLsSi2u5KY18OJhmCtUtembSgLU/bOT
# w/jNG+qh0PZ6ID3FiL+Eah+LFQHYh5B6iNMCAwEAAaOCARswggEXMB0GA1UdDgQW
# BBRyADoqlGOOSUX8BefT5h5tC0wkAjAfBgNVHSMEGDAWgBTVYzpcijGQ80N7fEYb
# xTNoWoVtVTBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j
# b20vcGtpL2NybC9wcm9kdWN0cy9NaWNUaW1TdGFQQ0FfMjAxMC0wNy0wMS5jcmww
# WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpL2NlcnRzL01pY1RpbVN0YVBDQV8yMDEwLTA3LTAxLmNydDAMBgNV
# HRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IB
# AQBC0Xbt7/UiGBC6gB6lwzWa0LMIM9dDh1LVVKt8G8oauK0rucFj8dvQDkMmPqUg
# mC3yzVvSBoasDarYwdG5fhwe2tvvL7UA89GZ/Ztl0DwV+WljNf3ZLIEyIF6PNGxO
# dmcsayQhKlc5O84ZZV3igKDoxyLi6RKkPvMmyTjo6UsFcRhiBzJuLFw/N5lrx5Ok
# KpafISVIqtC9RYnITW7DN35ZREiBn3YcVlZXk3f1hQzsjQ0KbYjTy8t/2vjm7KM3
# KgNaHrQK/8rMwefkJoNQLrYFhD97asUtqbNeBCZFlhNr4wzwNrw5eqrkWDVCsAsd
# BaSHbVUEEBQtn0eCOnIhl4+noYIDrTCCApUCAQEwgf6hgdSkgdEwgc4xCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29m
# dCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT
# TjpCOEVDLTMwQTQtNzE0NDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIlCgEBMAkGBSsOAwIaBQADFQCiiSSQNxNIGZVj1rXkXaIj+aCPNKCB
# 3jCB26SB2DCB1TELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEp
# MCcGA1UECxMgTWljcm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28xJzAlBgNV
# BAsTHm5DaXBoZXIgTlRTIEVTTjo0REU5LTBDNUUtM0UwOTErMCkGA1UEAxMiTWlj
# cm9zb2Z0IFRpbWUgU291cmNlIE1hc3RlciBDbG9jazANBgkqhkiG9w0BAQUFAAIF
# AOGYLu8wIhgPMjAxOTEyMDkwMjI0NDdaGA8yMDE5MTIxMDAyMjQ0N1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA4Zgu7wIBADAHAgEAAgIIHzAHAgEAAgIaTDAKAgUA
# 4ZmAbwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMBoAowCAIBAAID
# FuNgoQowCAIBAAIDB6EgMA0GCSqGSIb3DQEBBQUAA4IBAQAQUwybPRumdTi2Nl+f
# j7V/HodkOL1sCE7jLO6Uscsr8wNPYwgSaCxD5e6KR5qcXZf5FaSJrMcVNGRSxNjK
# tM/OZ2GD+qvIIhBU0VGiqEPN0QNQ++zmeYDzSwDtzST9H+pPN6YJL00UStrd7n4A
# FyRtGyKkiHv8uguy3EUaF9wLimVBYR/VL0T8PiTlGSBCJnlQpVxRlXxjGQxpIHMF
# JtkztgrSPXg559LTucUty4oWVL1qsoUVax311pBaLRcl+WDUOSpSpROFkoBTi3jH
# jJVI+4AXhfnQVjzUKaw57QHiN/7jHGiHJAx+HaKgAjxjHan0VkHELicbk+ElmZhp
# bnWGMYIC9TCCAvECAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC
# EzMAAAD9RCyg8TVyBKkAAAAAAP0wDQYJYIZIAWUDBAIBBQCgggEyMBoGCSqGSIb3
# DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgo5TxZjAR1yo1cYn9
# c9h2D0bMLkUP/yfI3gt391Ufvk0wgeIGCyqGSIb3DQEJEAIMMYHSMIHPMIHMMIGx
# BBSiiSSQNxNIGZVj1rXkXaIj+aCPNDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0
# YW1wIFBDQSAyMDEwAhMzAAAA/UQsoPE1cgSpAAAAAAD9MBYEFF9FeIAJUYHo8uzD
# v/lkGm7XxANjMA0GCSqGSIb3DQEBCwUABIIBABLcu2hER0NBkamRfWgqzTN9G4Pu
# 7H+Ai5ZiADG8SHzEK9Ia3b/g32aNb6AZfbHC/+m5od5C97DynIA3lgOTJxiFTp1d
# c/JJGDidc8JbVU//T1RNachFYKFmUrlvOYz7Qiep3gNPoS2hIqTR0h+SaBgb6VkQ
# N6efnNVkDnk0zZZW9wKKZc2G9MBe/C7+VWgEbem/CjuriFyow0FTwPjN3MJnSokW
# aBBTEweQIZaH2AR87q31YfrcgFcIoNUM3Tlr/YmrZN+8mWpw87Qfo/VJ9jEQxfKO
# O590AhZUN9aOQQmUwia1CHZLrGldtK15USkfOV+TYMO/5Hyjtt5ITAlH58w=
# SIG # End signature block
|
Set-ADFSTkFticksServer.ps1 | ADFSToolkit-2.3.0 | function Set-ADFSTkFticksServer {
param (
#The DNS name of the F-Ticks server
[Parameter(Mandatory = $true)]
$Server
)
#Check if State config file exists and create it if needed
if (!(Test-Path $Global:ADFSTKPaths.stateConfigFile)) {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText stateconfNewConfFileMissing)
New-ADFSTkStateConfiguration
}
Set-ADFSTkConfiguration -FticksServer $Server -FticksSalt (New-ADFSTkSalt)
Write-ADFSTkLog -Message (Get-ADFSTkLanguageText fticksServerAndSaltUpdated -f $Server) -EventID 302
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDxDf9+G3TFendQ
# i3UAeyBcd15hBRoZ0jzbBkop1lvGZqCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCA29RcmLcvovsA3zxqSZC/b/Glj
# HRYIC1wbesNSozZNbzANBgkqhkiG9w0BAQEFAASCAgB84QZ/mLMPa25uiWV8kdCf
# ZbL34ErTjmJsnXmBAjmQ6tbuK667BirvW3/UMfkTav5HOlLf3gsRicNFvyeGJqAW
# JpTgj+cv9k/Y6TuUT3rlUg4Tn51/pNBLnecXXmjXiZfStSe1VJBLAekL3HAilpDz
# aWYJZR4DsH951tK2hjHLty4uj+tXMHRNPTqcNSzhDFEZ4q+7Qm505XHfmWbp4+fC
# u6utdmOTNmfy4W0eXFuY4BvoOMi97zQWRPlAf8lVhj0bCo7waP35In0c3Yxcu3KO
# lsIu5eJ5Pi07QuyavcrgD3hVSO+UlylUgz3aYgZyhELqEAP2nha41sHav/zQsE0j
# 1PBnU76nOkb+2st0tTHBTl5hNDFKzIvnVyN9OK+hgIogVOqLIeAM3w7oBQfJ4kE0
# N9MbBpbYcKfu/AnKxp1pcUBIFTq8S1yCj6O/EicN36wk6KgQTike/OAXdgkBfQ24
# FmVV/NXYswUqo4E2BzfQu9lfTeBw1NAYORM7VRJfWvHUMumQInzDHtpXWkhvuHVQ
# qI0B7QCct8DCvm7Z/l8Fu/W52lq8CH8Y2Tj+l7nIM/8G6bqT5b96j/iunRStj47z
# YhhbjmFpG0Jqca7f1JWAZ+IEVGbfOX37GBa4+VnWiHnOeQCPeGHLqfWhHozvuFc0
# 4xqGQra3BqD69UeoJl7E2qGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA2MzRa
# MC8GCSqGSIb3DQEJBDEiBCAAa1i5qfgoWteAWxm8YtRvPIXdLvOE9uhMj1I1bXsn
# OjANBgkqhkiG9w0BAQEFAASCAgCAtQjYCXSEjjmeS8Lda65YCZqdwubYRoyMHsLX
# f7v1yDW70pLGomGW47iuzY0Ab5ysLoXwJisFPehN2nJLtCgi41zVk6rpZAV3EJtQ
# QWYZ0wf2YJTieW5P0c3byTaGgeZIG+S9rVHGIEd0fQc786uMrnpjDPGioCzZBX1e
# GfGrYb+hlEb6yxBwpczJeTBdsJWfvRts7e50myw+5NUyqWzDIL4uA80gabUCKCGJ
# lTloK2Nc9vsl6/i5U7MV/D0wr35XobkKlzvbyt7njCoJ5glgwRLnHIK4n2QRnuaq
# F12p/k/60KWbso9z7gK2kr2ORJCsHesn1kXx7zphENMlqtxS1vxDXoOipXZbFOZd
# 7MpwoXqflrufbXkddDU2rQLptLBGux4ny1rDn2owcnmLubnAj2/FiGPsxX+64x4Y
# YXHIn5SMlijbpF5MrV3zZ4KHeMN7PO09VG0MYcxdeIBu2+4DNtIW7ui5It1IXRTy
# vts2GeIZvlMGxFSORV2Kv2ijK6RN4TmuEglL9Qq2jIJPY/Nwcsur6hKYBa/wxhgy
# bqHU2XRoOePy4hp8X+gndyHVzKPvZcAQNxcm73fjEkRmuzvjekylGP1ZulYO1nnK
# CdxqlI5Zh0nm5wMkaoCYhI/M9EOTeFUZLOaSK1+PtP6k5ejfD609J2cpCph2oWXg
# aOw+HA==
# SIG # End signature block
|
Disable-ADFSTkInstitutionConfiguration.ps1 | ADFSToolkit-2.3.0 | function Disable-ADFSTkInstitutionConfiguration {
[CmdletBinding(SupportsShouldProcess = $true)]
param(
[switch]$All
)
#Get all config items and set the enabled to false
$configItems = Get-ADFSTkConfiguration -ConfigFilesOnly
if ($PSBoundParameters.ContainsKey('All') -and $All -ne $false) {
$selectedConfigFiles = $configItems | ? Enabled -eq 'true'
}
else {
$selectedConfigFiles = $configItems | Out-GridView -Title (Get-ADFSTkLanguageText confSelectInstitutionConfigToDisable) -OutputMode Multiple | ? Enabled -eq 'true'
}
if ([string]::IsNullOrEmpty($selectedConfigFiles)) {
Write-ADFSTkHost confNoInstitutionConfigFileSelected
}
else {
foreach ($configItem in $selectedConfigFiles) {
#Don't update the configuration file if -WhatIf is present
if ($PSCmdlet.ShouldProcess("ADFSToolkit configuration file", "Save")) {
try {
Set-ADFSTkInstitutionConfiguration -ConfigurationItem $configItem.ConfigFile -Status 'Disabled'
}
catch {
throw $_
}
}
}
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDN+GQnSrXTwdxT
# +rkmuDBh4n1XFTuj+vKJYXESSJPid6CCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCA149WSUGjuIKTX2oVMTrMVo3M6
# CDQe9O90x99wGg68rjANBgkqhkiG9w0BAQEFAASCAgAoikIgv2h7w9Y6Q5VRVfkH
# O0+sCs2H1fqTm08pp/GJ5NwbORq3H4rYx3TqPF9UdeMhyJEqvj0k896KM9qApp+y
# OSphF3WKBVbH61Oax9/B7zr+kpBkdd6rK38h0sgwWK+sxC6rd8qmxRiEPgXdrcdp
# ripw9Ao2L1r+m4jnbGjb9zx03GgDbJi22Ce+peiym4SUwr1nCxxocvICrY3p6P0Q
# pMnLFppv2XQt1yIoCthJeIBB0+ckt0h0eVJdOISQ3oAco71g+zowGTUaoFWEOKk7
# oH6GEifluyNYWYBoB9wlNwMjikF04pOH59kyY5OyvkGrb7RJ8RafULGDljD7Sa1t
# R7Eznw7Bs1HiVXEQ7loVRLwbQ6lFLHB0wNvSZg3HfL+2AoZGgrZ4YbOh+J0+52ev
# MABrUZSRD3UobiUdt8ml+hhiCh2Ar/ED2A1XLfn/SOY+Od8CTLbXfizc4QE6GI7k
# iuXRJS+PkU+IWvWhegelGU/q5hcdaAHMNO2aBuDZ3Rf5QBAxG6S2brxYaXwZHcSv
# Wt+t2RcGDe93jBkr0BzkP++0OqOvHZMxhf6U/FWCWUIQPO92nMrPayl8PYOm13KZ
# JaxcimM8gOy2Q0yMs+9NZnzh6wK9K0d7dPZyfRb6z4EQXNCJ25NkrU4pOandfSyp
# C65jl2usGcA9tk9S/dBSqaGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA1Mjla
# MC8GCSqGSIb3DQEJBDEiBCCTv5vEK7cwRNbCoOpJcgh0lHyvi+l2SklUxLOqtCUR
# bDANBgkqhkiG9w0BAQEFAASCAgCzFQMCMCZl+z06ixT+rGLkgXNwT5ugGBPxIuhq
# JF6IOF1temFAPCWQ0LyhX+rc4W/B7IOpQzO+coLRu027XMcyqTIwUc+gtEcj/8Wu
# +J20SbT/36GWq93KV6dJD45JHW8NdJHFvc/fMGDyMUox+gLmkVujskjxl2XdHstX
# kdH1K9FghDUkRA8s7toZDNuP3ZRFdjyoLLDjIFXGUDIVB2Z56QYYu0gwrZ9kGjiY
# ej+f54prU21jTqdE7wAu0sgzKktWoDctuM9O+Ia4f0h/tAEayyrmtBlGgruaoeB8
# S850L5hPym+q4sQaYueGfT5Q9r06zRNfgi3k7fKErXXD+v4+wYiIOIQmm9u03sjB
# WSpFlv8foyYLNxFgrZbA+8C+PbIpaRgTC5z8/BAarml/PyvY440WXrClDm9Xmj7G
# g+WWkcVTfeUnbpCv3yapaUAyoNs/Nu61quWeXr6Xt3mhVNpwEO3NqKkPx9uEyhkV
# ukwafKlHo53JrALysx8YV788EyJ/EeiJzWIPB5XTJvfri1YI4RR3ap/kblCG/G7F
# QPz3vTy0UkNB+58Bpx5j3BhGJ3yXxV07XpdtSwVZtztkFVSj8xBeNtSiABES6uCc
# 2CkUhUGflwtWaasrjJiiuHy6hOkUil+j0+FUe3MZB9BH8SXxUuZ0Er5rnRNHeYRU
# +CAJmg==
# SIG # End signature block
|
Add-ADFSTkSPRelyingPartyTrust.ps1 | ADFSToolkit-2.3.0 | function Add-ADFSTkSPRelyingPartyTrust {
param (
[Parameter(Mandatory = $true,
Position = 0)]
$sp
)
$Continue = $true
### EntityId
$entityID = $sp.entityID
$rpParams = @{
Identifier = $sp.entityID
EncryptionCertificateRevocationCheck = 'None'
SigningCertificateRevocationCheck = 'None'
ClaimsProviderName = @("Active Directory")
ErrorAction = 'Stop'
SignatureAlgorithm = Get-ADFSTkSecureHashAlgorithm -sp $sp
SamlResponseSignature = Get-ADFSTkSamlResponseSignature -EntityId $entityID
}
Write-ADFSTkLog (Get-ADFSTkLanguageText addRPAddingRP -f $entityId) -EntryType Information -EventID 41
### Name, DisplayName
$Name = (Split-Path $sp.entityID -NoQualifier).TrimStart('/') -split '/' | select -First 1
#region Token Encryption Certificate
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPGettingEncryptionert)
$CertificateString = ($sp.SPSSODescriptor.KeyDescriptor | ? use -eq "encryption" | select -ExpandProperty KeyInfo).X509Data.X509Certificate
if ($CertificateString -eq $null) {
#Check if any certificates without 'use'. Should we use this?
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPEncryptionCertNotFound)
$CertificateString = ($sp.SPSSODescriptor.KeyDescriptor | ? use -ne "signing" | select -ExpandProperty KeyInfo).X509Data.X509Certificate #or shoud 'use' not be present?
}
if ($CertificateString -ne $null) {
$rpParams.EncryptionCertificate = $null
try {
#May be more certificates!
#If more than one, choose the one with furthest end date.
$CertificateString | % {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPConvertingEncrytionCert)
$EncryptionCertificate = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2
$CertificateBytes = [system.Text.Encoding]::UTF8.GetBytes($_)
$EncryptionCertificate.Import($CertificateBytes)
if ($rpParams.EncryptionCertificate -eq $null) {
$rpParams.EncryptionCertificate = $EncryptionCertificate
}
elseif ($rpParams.EncryptionCertificate.NotAfter -lt $EncryptionCertificate.NotAfter) {
$rpParams.EncryptionCertificate = $EncryptionCertificate
}
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPConvertionEncryptionCertDone)
}
if ($CertificateString -is [Object[]]) {
#Just for logging!
Write-ADFSTkLog (Get-ADFSTkLanguageText addRPMultipleEncryptionCertsFound -f $EncryptionCertificate.Thumbprint) -EntryType Warning -EventID 30
}
}
catch {
Write-ADFSTkLog (Get-ADFSTkLanguageText addRPCouldNotImportEncrytionCert) -EntryType Error -EventID 21
$Continue = $false
}
}
#endregion
#region Token Signing Certificate
#Add all signing certificates if there are more than one
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPGetSigningCert)
#$rpParams.SignatureAlgorithm = "http://www.w3.org/2000/09/xmldsig#rsa-sha1"
$CertificateString = ($sp.SPSSODescriptor.KeyDescriptor | ? use -eq "signing" | select -ExpandProperty KeyInfo).X509Data.X509Certificate
if ($CertificateString -eq $null) {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPSigningCertNotFound)
$CertificateString = ($sp.SPSSODescriptor.KeyDescriptor | ? use -ne "encryption" | select -ExpandProperty KeyInfo).X509Data.X509Certificate #or shoud 'use' not be present?
}
if ($CertificateString -ne $null) {
#foreach insted create $SigningCertificates array
try {
$rpParams.RequestSigningCertificate = @()
$CertificateString | % {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPConvertingSigningCert)
$CertificateBytes = [system.Text.Encoding]::UTF8.GetBytes($_)
$SigningCertificate = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2
$SigningCertificate.Import($CertificateBytes)
$rpParams.RequestSigningCertificate += $SigningCertificate
#if ($SigningCertificate.SignatureAlgorithm.Value -eq '1.2.840.113549.1.1.11') #Check if Signature Algorithm is SHA256
#{
# $rpParams.SignatureAlgorithm = "http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"
#}
}
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPConvertionSigningCertDone)
}
catch {
Write-ADFSTkLog (Get-ADFSTkLanguageText addRPCouldNotImportSigningCert) -EntryType Error -EventID 22
$Continue = $false
}
}
#endregion
#region Get SamlEndpoints
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPGetSamlEndpoints)
$rpParams.SamlEndpoint = @()
$rpParams.SamlEndpoint += $sp.SPSSODescriptor.AssertionConsumerService | % {
if ($_.Binding -eq "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST") {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPHTTPPostFound)
New-ADFSSamlEndpoint -Binding POST -Protocol SAMLAssertionConsumer -Uri $_.Location -Index $_.index
}
elseif ($_.Binding -eq "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact") {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPHTTPArtifactFound)
New-ADFSSamlEndpoint -Binding Artifact -Protocol SAMLAssertionConsumer -Uri $_.Location -Index $_.index
}
elseif ($_.Binding -eq "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect") {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPHTTPRedirectFound)
New-ADFSSamlEndpoint -Binding Redirect -Protocol SAMLAssertionConsumer -Uri $_.Location -Index $_.index
}
else {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPUnhandledEndpointFound -f $_.Binding, $entityID)
}
}
if ($rpParams.SamlEndpoint.Count -eq 0) {
Write-ADFSTkLog (Get-ADFSTkLanguageText addRPNoSamlEndpointsFound) -EntryType Error -EventID 23
$Continue = $false
}
#endregion
#region Get LogoutEndpoints
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPGetLogoutEndpoints)
$rpParams.SamlEndpoint += $sp.SPSSODescriptor.SingleLogoutService | % {
if ($_.Binding -eq "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST") {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPLogoutPostFound)
New-ADFSSamlEndpoint -Binding POST -Protocol SAMLLogout -ResponseUri $_.Location -Uri ("https://{0}/adfs/ls/?wa=wsignout1.0" -f $Settings.configuration.staticValues.ADFSExternalDNS)
}
elseif ($_.Binding -eq "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect") {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPLogoutRedirectFound)
New-ADFSSamlEndpoint -Binding Redirect -Protocol SAMLLogout -ResponseUri $_.Location -Uri ("https://{0}/adfs/ls/?wa=wsignout1.0" -f $Settings.configuration.staticValues.ADFSExternalDNS)
}
}
#endregion
#region Get Issuance Transform Rules from Entity Categories
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPGetEntityCategories)
$EntityCategories = @()
$EntityCategories += $sp.Extensions.EntityAttributes.Attribute | ? Name -eq "http://macedir.org/entity-category" | select -ExpandProperty AttributeValue | % {
if ($_ -is [string]) {
$_
}
elseif ($_ -is [System.Xml.XmlElement]) {
$_."#text"
}
}
# Filter Entity Categories that shouldn't be released together
$filteredEntityCategories = @()
$filteredEntityCategories += foreach ($entityCategory in $EntityCategories) {
if ($entityCategory -eq 'https://refeds.org/category/personalized') {
if (-not ($EntityCategories.Contains('https://refeds.org/category/pseudonymous') -or `
$EntityCategories.Contains('https://refeds.org/category/anonymous'))) {
$entityCategory
}
}
elseif ($entityCategory -eq 'https://refeds.org/category/pseudonymous') {
if (-not $EntityCategories.Contains('https://refeds.org/category/anonymous')) {
$entityCategory
}
}
else {
$entityCategory
}
}
$EntityCategories = $filteredEntityCategories
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPFollowingECFound -f ($EntityCategories -join ','))
if ($ForcedEntityCategories) {
$EntityCategories += $ForcedEntityCategories
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPAddedForcedEC -f ($ForcedEntityCategories -join ','))
}
$subjectIDReq = $sp.Extensions.EntityAttributes.Attribute | ? Name -eq "urn:oasis:names:tc:SAML:profiles:subject-id:req" | Select -First 1 -ExpandProperty AttributeValue
$IssuanceTransformRuleObject = Get-ADFSTkIssuanceTransformRules $EntityCategories -EntityId $entityID `
-RequestedAttribute $sp.SPSSODescriptor.AttributeConsumingService.RequestedAttribute `
-RegistrationAuthority $sp.Extensions.RegistrationInfo.registrationAuthority `
-NameIdFormat $sp.SPSSODescriptor.NameIDFormat `
-SubjectIDReq $subjectIDReq
#endregion
#region Add MFA Access Policy and extra rules if needed
$IssuanceTransformRuleObject.MFARules = Get-ADFSTkMFAConfiguration -EntityId $entityID
if ([string]::IsNullOrEmpty($IssuanceTransformRuleObject.MFARules)) {
$rpParams.IssuanceAuthorizationRules = Get-ADFSTkIssuanceAuthorizationRules -EntityId $entityID
$rpParams.IssuanceTransformRules = $IssuanceTransformRuleObject.Stores + $IssuanceTransformRuleObject.Rules
}
else {
$rpParams.AccessControlPolicyName = 'ADFSTk:Permit everyone and force MFA'
$rpParams.IssuanceTransformRules = $IssuanceTransformRuleObject.Stores + $IssuanceTransformRuleObject.MFARules + $IssuanceTransformRuleObject.Rules
}
#endregion
#region Custom Access Control Policy
$CustomACPName = Get-ADFSTkCustomACPConfiguration -EntityId $entityID
if (![string]::IsNullOrEmpty($CustomACPName))
{
$rpParams.AccessControlPolicyName = $CustomACPName
}
#endregion
if ((Get-ADFSRelyingPartyTrust -Identifier $entityID) -eq $null) {
$NamePrefix = $Settings.configuration.MetadataPrefix
$Sep = $Settings.configuration.MetadataPrefixSeparator
$NameWithPrefix = "$NamePrefix$Sep$Name"
if ((Get-ADFSRelyingPartyTrust -Name $NameWithPrefix) -ne $null) {
$n = 1
Do {
$n++
$NameWithPrefix = "$NamePrefix$Sep$Name ($n)"
}
Until ((Get-ADFSRelyingPartyTrust -Name $NameWithPrefix) -eq $null)
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPRPAlreadyExistsChangingNameTo -f $NameWithPrefix)
}
$rpParams.Name = $NameWithPrefix
if ($Continue) {
try {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText addRPAddingRP -f $entityID)
# Invoking the following command leverages 'splatting' for passing the switches for commands
# for details, see: https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_splatting?view=powershell-6
# (that's what it's @rpParams and not $rpParams)
Add-ADFSRelyingPartyTrust @rpParams
Write-ADFSTkLog (Get-ADFSTkLanguageText addRPSuccefullyAddedRP -f $entityId) -EntryType Information -EventID 42
Add-ADFSTkEntityHash -EntityID $entityId
}
catch {
Write-ADFSTkLog (Get-ADFSTkLanguageText addRPCouldNotAddRP -f $entityId, $_) -EntryType Error -EventID 24
Add-ADFSTkEntityHash -EntityID $entityId
}
}
else {
#There were some error with certificate or endpoints with this SP. Let's only try again if it changes...
Add-ADFSTkEntityHash -EntityID $entityId
}
}
else {
Write-ADFSTkLog (Get-ADFSTkLanguageText addRPRPAlreadyExists -f $entityId) -EntryType Warning -EventID 25
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDPk8tHlyWz4trp
# WsyEBYnZy5zBno7eLYZqahGQGU1pAKCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAb5pZdMOrP4JE8p2WeJTdrRElN
# fxOtXKLLU919uIi/dzANBgkqhkiG9w0BAQEFAASCAgAvRoChDQtVBSrIdFs8wBd9
# yalEhWZ0gx7+vu094vb6EgcLrnHwJun4txCEJjaW1Do1uQHHrlncfen1khIGafy3
# 9ARJzs46Jklokr/uN6Ij7l3GkufDZ9udQ9uiB4811tCwq4vbbclpw5IXSoC7RYwP
# wlRAC0nOF3ApUVFQADIUhvzv4w6b6MO71pF1XD7ZfDmohVOi26O31dh7kXNfeVjv
# 2/Tds3eeLMIkAK4haN9J5preTq8lA2Z4C3f0/NeS1iUapyfAcTWH+YH0X74D7Z5Z
# dmbhb3oe68zuYo6knvF4FyunFuqDXzLsn7JMobADHUAP99F3ECPPGKduveu1xIUq
# AWYVKzjwUFPB6JT7Asb4OxrR4cUEbosy7EDJ3Rf0ejBvS2IcoTlzpdErzx1pOKrh
# Lko6isWVkR0n00uv8SbneLyDMN/DAsdblRa7r/s23mxgjrT1ek/U8qPSHt/SJ12Q
# VHbrdZk/ln+RFgWRAhfiVYmg0R920+2X9fuyvkxq9VUTtVSLD12SouiMVGpF7FMa
# 74w90cXM6Y0LrNcDRstU/7zzyeApeiSY7dorIqq77kcmgL7rETt+h7YQP8YuOg4z
# Uh1z4O+ITpRYRn1P8WVPf6k7qeZ3Clk73wS6fsyj4HVQeqlzDARZe+Apv2WE9/9O
# VmsxfFNVuUklvk1+FppAqqGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjAzMjha
# MC8GCSqGSIb3DQEJBDEiBCAZN+/3DrPQKjxAMAqIDLjelBrVee+TyJPmz8pG4jvp
# OTANBgkqhkiG9w0BAQEFAASCAgBEIPH/WIz9hGc+24Rdbyh3TM30QFdjZXhj8Ptu
# ZIRATw6s03TuyLTGXuh5WP0MMe5iLZNM8F5X4dsNTwTJxGMuDpg+fynK1+E3Xgq+
# CISfQSFgt4Zp1VErCBeG73Oghe4369I9t/k+D0+WOyDlIkLM4ewWLBmbCIrnxHtR
# vZm1drzqtivOyI/rIkbOdZMgWDEc+keyXzB6cOVQZKKfn/5bq6KWtQNmBJGMQhfk
# EE4+yafSRxcts/broyY5yGA8qVRXzXznXdWUAfm14V9/54eRGpmUYQfDVGiq1xKH
# QTCbOg/a8mXXpyF3DV5wuHxJZTdFnmoEn2T1xipmaFR/Idx7vgzmxV9070sVq2FS
# +BoolneiKP3tf/L9wOBsLMYXZ4abDEf82BLm0k3C3yV/lW3+FthSfxNwCahnyA4r
# /d/LqNU9Gp9EGfI/FD8MfcDf7ueHWSzu6FyQe6sCP1IaiaVCcXTJtGjOPYko1Q/X
# 9aFegvmvxI6JwBPdF+621t7P1/3nQk3b3KIohQ2BsPKLWvjvCohH8jbsVhbxexJd
# +MjFx5Z2gLaKMqIttP98rLo8kW4yKv/+cn4fuWTvQG0Al72S+pjO8FZpVPrrKVXt
# WhmMPWf/F3xQLQ5oeh0jVE8SgXvsN2IG0ry4s8owFl+wVrrVv62vadU+c6nhbw91
# zX+9Cg==
# SIG # End signature block
|
Import-ADFSTkMetadata.ps1 | ADFSToolkit-2.3.0 | #Requires -Version 5.1
#Requires -RunAsAdministrator
function Import-ADFSTkMetadata {
[CmdletBinding(DefaultParameterSetName = 'AllSPs',
SupportsShouldProcess = $true)]
param (
[Parameter(ParameterSetName = 'SingleSP',
Mandatory = $true,
ValueFromPipelineByPropertyName = $true,
Position = 0)]
$EntityId,
[Parameter(ParameterSetName = 'SingleSP',
Mandatory = $false,
ValueFromPipelineByPropertyName = $true,
Position = 1)]
$EntityBase,
[string]$ConfigFile,
[string]$LocalMetadataFile,
[string[]]$ForcedEntityCategories,
[Parameter(ParameterSetName = 'AllSPs')]
[switch]
$ProcessWholeMetadata,
[switch]$ForceUpdate,
[Parameter(ParameterSetName = 'AllSPs')]
[switch]
$AddRemoveOnly,
#The time in minutes the chached metadatafile live
[int]
$CacheTime = 15,
#The maximum SPs to add in one run (to prevent throttling). Is used when the script recusrive calls itself
[int]
$MaxSPAdditions = 80,
[switch]$Silent,
[switch]$criticalHealthChecksOnly,
#If this switch is not provided the memory cache will be deleted
[switch]
$PreserveMemoryCache
)
process {
#$CompatibleConfigVersion = "1.3"
#Check if we should avoid deleting memory cache
if (!$PSBoundParameters.ContainsKey('PreserveMemoryCache') -or ($PSBoundParameters.ContainsKey('PreserveMemoryCache') -and $PreserveMemoryCache -eq $false)) {
Remove-ADFSTkCache -AttributeMemoryCache
}
try {
# load configuration file
if (!(Test-Path ( $ConfigFile ))) {
throw (Get-ADFSTkLanguageText cFileDontExist -f $ConfigFile)
}
else {
[xml]$Settings = Get-Content ($ConfigFile)
$Global:ADFSTkCurrentInstitutionConfig = $ConfigFile
}
# set appropriate logging via EventLog mechanisms
if (Verify-ADFSTkEventLogUsage) {
#If we evaluated as true, the eventlog is now set up and we link the WriteADFSTklog to it
Write-ADFSTkLog -SetEventLogName $Settings.configuration.logging.LogName -SetEventLogSource $Settings.configuration.logging.Source
}
else {
# No Event logging is enabled, just this one to a file
Write-ADFSTkLog (Get-ADFSTkLanguageText importEventLogMissingInSettings) -MajorFault
}
#Check against compatible version
#if ([float]$Settings.configuration.ConfigVersion -lt [float]$CompatibleConfigVersion)
#{
# Write-ADFSTkLog (Get-ADFSTkLanguageText importIncompatibleInstitutionConfigVersion -f $Settings.configuration.ConfigVersion, $CompatibleConfigVersion) -MajorFault
#}
if ($PSBoundParameters.ContainsKey('criticalHealthChecksOnly') -and $criticalHealthChecksOnly -ne $false) {
$healthCheckResult = Get-ADFSTkHealth -ConfigFile $ConfigFile -HealthCheckMode CriticalOnly -Silent
}
else {
$healthCheckResult = Get-ADFSTkHealth -ConfigFile $ConfigFile -Silent
}
if ($healthCheckResult -eq $false) {
Write-ADFSTkLog "The Health Check of ADFS Toolkit did not pass! Check earlier log entries to see what's wrong." -MajorFault
}
#region Get static values from configuration file
$mypath = $ExecutionContext.SessionState.Path.GetUnresolvedProviderPathFromPSPath('.\')
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importStarted) -EntryType Information
Write-ADFSTkLog (Get-ADFSTkLanguageText importCurrentPath -f $Global:ADFSTkPaths.modulePath) -EventID 1
#endregion
#region Get SP Hash
if ([string]::IsNullOrEmpty($Settings.configuration.SPHashFile)) {
Write-ADFSTkLog (Get-ADFSTkLanguageText importMissingSPHashFileInConfig -f $ConfigFile) -MajorFault
}
else {
$SPHashFile = Join-Path $Global:ADFSTkPaths.cacheDir $Settings.configuration.SPHashFile
Write-ADFSTkLog (Get-ADFSTkLanguageText importSettingSPHashFileTo -f $SPHashFile) -EventID 2
}
if (Test-Path $SPHashFile) {
try {
$SPHashList = Import-Clixml $SPHashFile
}
catch {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importCouldNotImportSPHashFile)
$SPHashFileItem = Get-ChildItem $SPHashFile
Rename-Item -Path $SPHashFile -NewName ("{0}_{1}.{2}" -f $SPHashFileItem.BaseName, ([guid]::NewGuid()).Guid, $SPHashFileItem.Extension)
$SPHashList = @{}
}
}
else {
$SPHashList = @{}
}
#endregion
#region Getting Metadata
#Cached Metadata file
#$CachedMetadataFile = Join-Path $Settings.configuration.WorkingPath -ChildPath $Settings.configuration.CacheDir | Join-Path -ChildPath $Settings.configuration.MetadataCacheFile
$CachedMetadataFile = Join-Path $Global:ADFSTkPaths.cacheDir $Settings.configuration.MetadataCacheFile
Write-ADFSTkLog (Get-ADFSTkLanguageText importSettingCachedMetadataFile -f $CachedMetadataFile) -EventID 3
if ($LocalMetadataFile) {
try {
$MetadataXML = new-object Xml.XmlDocument
$MetadataXML.PreserveWhitespace = $true
$MetadataXML.Load($LocalMetadataFile)
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importSuccessfullyLoadedLocalMetadataFile) -EntryType Information
}
catch {
Write-ADFSTkLog (Get-ADFSTkLanguageText importCouldNotLoadLocalMetadataFile) -MajorFault -EventID 4
}
}
if ($MetadataXML -eq $null) {
# $UseCachedMetadata = $false
# if (($CacheTime -eq -1 -or $CacheTime -gt 0) -and (Test-Path $CachedMetadataFile)) #CacheTime = -1 allways use cached metadata if exists
# {
# if ($CacheTime -eq -1 -or (Get-ChildItem $CachedMetadataFile).LastWriteTime.AddMinutes($CacheTime) -ge (Get-Date))
# {
# $UseCachedMetadata = $true
# try
# {
# #[xml]$MetadataXML = Get-Content $CachedMetadataFile
# $MetadataXML = new-object Xml.XmlDocument
# $MetadataXML.PreserveWhitespace = $true
# $MetadataXML.Load($CachedMetadataFile)
#
# if ([string]::IsNullOrEmpty($MetadataXML))
# {
# Write-ADFSTkLog (Get-ADFSTkLanguageText importCachedMetadataEmptyDownloading) -EntryType Error -EventID 5
# $UseCachedMetadata = $false
# }
# }
# catch
# {
# Write-ADFSTkLog (Get-ADFSTkLanguageText importCachedMetadataCorruptDownloading) -EntryType Error -EventID 6
# $UseCachedMetadata = $false
# }
# }
# else
# {
# $UseCachedMetadata = $false
# Remove-Item $CachedMetadataFile -Confirm:$false
# }
# }
#
# if (!$UseCachedMetadata)
# {
#
# #Get Metadata URL from config
# if ([string]::IsNullOrEmpty($Settings.configuration.metadataURL))
# {
# $metadataURL = 'https://localhost/metadata.xml' #Just for fallback
# }
# else
# {
# $metadataURL = $Settings.configuration.metadataURL
# }
#
# Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importDownloadingMetadataFrom) -EntryType Information
#
# try
# {
# Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importDownloadingFromTo -f $metadataURL, $CachedMetadataFile) -EntryType Information
#
# $webClient = New-Object System.Net.WebClient
# $webClient.Headers.Add("user-agent", "ADFSToolkit")
# $webClient.DownloadFile($metadataURL, $CachedMetadataFile)
#
# Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importSuccesfullyDownloadedMetadataFrom -f $metadataURL) -EntryType Information
# }
# catch
# {
# Write-ADFSTkLog (Get-ADFSTkLanguageText importCouldNotDownloadMetadataFrom -f $metadataURL) -MajorFault -EventID 7
# }
#
# try
# {
# Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importParsingMetadataXML) -EntryType Information
# $MetadataXML = new-object Xml.XmlDocument
# $MetadataXML.PreserveWhitespace = $true
# $MetadataXML.Load($CachedMetadataFile)
# #$MetadataXML = [xml]$Metadata.Content
# Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importSuccessfullyParsedMetadataXMLFrom -f $metadataURL) -EntryType Information
# }
# catch
# {
# Write-ADFSTkLog (Get-ADFSTkLanguageText importCouldNotParseMetadataFrom -f $metadataURL) -MajorFault -EventID 8
# }
# }
$MetadataXML = Get-ADFSTkMetadata -CacheTime $CacheTime -CachedMetadataFile $CachedMetadataFile -metadataURL $Settings.configuration.metadataURL
}
# Assert that the metadata we are about to process is not zero bytes after all this
if (Test-Path $CachedMetadataFile) {
$MyFileSize = (Get-Item $CachedMetadataFile).length
if ((Get-Item $CachedMetadataFile).length -gt 0kb) {
Write-ADFSTkLog (Get-ADFSTkLanguageText importMetadataFileSize -f $MyFileSize) -EventID 9
}
else {
Write-ADFSTkLog (Get-ADFSTkLanguageText importCachedMetadataFileIsZeroBytes -f $CachedMetadataFile) -EventID 10
}
}
#endregion
#Verify Metadata Signing Cert
if ($Global:ADFSTkSkipMetadataSignatureCheck -ne $true) {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importVerifyingSigningCert) -EntryType Information
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importEnsuringSHA256) -EntryType Information
Update-SHA256AlgXmlDSigSupport
if (Verify-ADFSTkSigningCert $MetadataXML.EntitiesDescriptor.Signature.KeyInfo.X509Data.X509Certificate) {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importSuccessfullyVerifiedMetadataCert) -EntryType Information
}
else {
Write-ADFSTkLog (Get-ADFSTkLanguageText importMetadataCertIncorrect) -MajorFault -EventID 11
}
#Verify Metadata Signature
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importVerifyingMetadataSignature) -EntryType Information
if (Verify-ADFSTkMetadataSignature $MetadataXML) {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importSuccessfullyVerifiedMetadataSignature) -EntryType Information
}
else {
Write-ADFSTkLog (Get-ADFSTkLanguageText importMetadataSignatureFailed) -MajorFault -EventID 12
}
}
#region Read/Create file with
$RawAllSPs = $MetadataXML.EntitiesDescriptor.EntityDescriptor | ? { $_.SPSSODescriptor -ne $null }
$myRawAllSPsCount = $RawALLSps.count
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importTotalNumberOfSPs -f $myRawAllSPsCount)
if ($ProcessWholeMetadata) {
Write-ADFSTkLog (Get-ADFSTkLanguageText importProcessingWholeMetadata) -EntryType Information -EventID 13
$AllSPs = $MetadataXML.EntitiesDescriptor.EntityDescriptor | ? { $_.SPSSODescriptor -ne $null }
$myAllSPsCount = $ALLSPs.count
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importNumberOfSPsAfterFilter -f $myAllSPsCount)
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importCalculatingChanges)
$AllSPs | % {
$SwamidSPs = @()
$SwamidSPsToProcess = @()
} {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText cWorkingWith -f $_.EntityID)
$SwamidSPs += $_.EntityId
if (Check-ADFSTkSPHasChanged $_) {
$SwamidSPsToProcess += $_
}
#else
#{
# Write-ADFSTkVerboseLog "Skipped due to no changes in metadata..."
#}
} {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText cDone)
$n = $SwamidSPsToProcess.Count
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importFoundXNewChangedSPs -f $n)
$batches = [Math]::Ceiling($n / $MaxSPAdditions)
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importBatchCount -f $batches)
if ($n -gt 0) {
if ($batches -gt 1) {
for ($i = 1; $i -le $batches; $i++) {
$ADFSTkModuleBase = Join-Path $Global:ADFSTkPaths.modulePath ADFSToolkit.psm1
Write-ADFSTkLog (Get-ADFSTkLanguageText importWorkingWithBatch -f $i, $batches, $ADFSTkModuleBase) -EventID 14
$runCommand = "-Command & {"
if ($Global:ADFSTkSkipNotSignedHealthCheck -eq $true) {
$runCommand += '$Global:ADFSTkSkipNotSignedHealthCheck = $true;'
}
$runCommand += "Import-ADFSTkMetadata -MaxSPAdditions $MaxSPAdditions -CacheTime -1 -ConfigFile '$ConfigFile'"
if ($PSBoundParameters.ContainsKey("Silent") -and $Silent -ne $false) {
$runCommand += " -Silent"
}
if ($PSBoundParameters.ContainsKey("criticalHealthChecksOnly") -and $criticalHealthChecksOnly -ne $false) {
$runCommand += " -criticalHealthChecksOnly"
}
if ($PSBoundParameters.ContainsKey("ForceUpdate") -and $ForceUpdate -ne $false) {
$runCommand += " -ForceUpdate"
}
if ($PSBoundParameters.ContainsKey("WhatIf") -and $WhatIf -ne $false) {
$runCommand += " -WhatIf"
}
$runCommand += " ;Exit}"
Start-Process -WorkingDirectory $ExecutionContext.SessionState.Path.GetUnresolvedProviderPathFromPSPath('.\') -FilePath "$env:SystemRoot\system32\WindowsPowerShell\v1.0\powershell.exe" -ArgumentList "-NoExit", $runCommand -Wait -NoNewWindow
Write-ADFSTkLog (Get-ADFSTkLanguageText cDone) -EventID 15
}
}
else {
$SwamidSPsToProcess | % {
Processes-ADFSTkRelyingPartyTrust $_
}
}
}
# Checking if any Relying Party Trusts show be removed
$NamePrefix = $Settings.configuration.MetadataPrefix
$Sep = $Settings.configuration.MetadataPrefixSeparator
$FilterString = "$NamePrefix$Sep"
Write-ADFSTkLog (Get-ADFSTkLanguageText importCheckingForRemovedRPsUsingFilter -f $FilterString) -EventID 16
$CurrentSwamidSPs = Get-ADFSRelyingPartyTrust | ? { $_.Name -like "$FilterString*" } | select -ExpandProperty Identifier
if ($CurrentSwamidSPs -eq $null) {
$CurrentSwamidSPs = @()
}
#$RemoveSPs = Compare-ADFSTkObject $CurrentSwamidSPs $SwamidSPs | ? SideIndicator -eq "<=" | select -ExpandProperty InputObject
$CompareSets = Compare-ADFSTkObject -FirstSet $CurrentSwamidSPs -SecondSet $SwamidSPs -CompareType InFirstSetOnly
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importFoundRPsToRemove -f $CompareSets.MembersInCompareSet)
if ($ForceUpdate) {
foreach ($rp in $CompareSets.CompareSet) {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText cRemoving -f $rp)
try {
Remove-ADFSRelyingPartyTrust -TargetIdentifier $rp -Confirm:$false -ErrorAction Stop
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText cDone)
}
catch {
Write-ADFSTkLog (Get-ADFSTkLanguageText cCouldNotRemove -f $rp, $_) -EntryType Error -EventID 17
}
}
Remove-ADFSTkEntityHash -EntityIDs $CompareSets.CompareSet
}
else {
$removeSet = $CompareSets.CompareSet | Get-ADFSTkAnswer -Caption (Get-ADFSTkLanguageText importDoYouWantToRemoveRPsNotInMetadata)
foreach ($rp in $removeSet) {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText cRemoving -f $rp)
try {
Remove-ADFSRelyingPartyTrust -TargetIdentifier $rp -Confirm:$false -ErrorAction Stop
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText cDone)
}
catch {
Write-ADFSTkLog (Get-ADFSTkLanguageText importCouldNotRemove -f $rp, $_) -EntryType Error -EventID 18
}
Remove-ADFSTkEntityHash -EntityIDs $removeSet
}
}
}
}
elseif ($PSBoundParameters.ContainsKey('MaxSPAdditions') -and $MaxSPAdditions -gt 0) {
Write-ADFSTkLog (Get-ADFSTkLanguageText importProcessingXRPs -f $MaxSPAdditions) -EntryType Information -EventID 19
$AllSPsInMetadata = $MetadataXML.EntitiesDescriptor.EntityDescriptor | ? { $_.SPSSODescriptor -ne $null }
$i = 0
$n = 0
$m = $AllSPsInMetadata.Count - 1
$SPsToProcess = @()
do {
if (Check-ADFSTkSPHasChanged $AllSPsInMetadata[$i]) {
$SPsToProcess += $AllSPsInMetadata[$i]
$n++
}
else {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importSkippedNoChanges)
}
$i++
}
until ($n -ge $MaxSPAdditions -or $i -ge $m)
$SPsToProcess | % {
Processes-ADFSTkRelyingPartyTrust $_
}
}
elseif (! ([string]::IsNullOrEmpty($EntityID) ) ) {
#Enter so that SP: N is checked against the can and ask if you want to force update. Insert the hash!
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText cWorkingWith -f $EntityID)
if ([string]::IsNullOrEmpty($EntityBase)) {
$sp = $MetadataXML.EntitiesDescriptor.EntityDescriptor | ? { $_.entityId -eq $EntityId }
}
else {
$sp = $MetadataXML.EntitiesDescriptor.EntityDescriptor | ? { $_.entityId -eq $EntityId -and $_.base -eq $EntityBase }
}
if ($sp.count -gt 1) {
$sp = $sp[0]
Write-ADFSTkLog (Get-ADFSTkLanguageText importMoreThanOneRPWithEntityID -f $EntityId) -EntryType Warning -EventID 29
}
if ([string]::IsNullOrEmpty($sp)) {
Write-ADFSTkLog (Get-ADFSTkLanguageText importNoSPsFound) -MajorFault -EventID 20
}
else {
Processes-ADFSTkRelyingPartyTrust $sp
}
}
else {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importNothingToDo)
}
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText importScriptEnded)
}
Catch {
Throw $_
}
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD11H4a/c+msRHU
# ik3YMZtsmEEWFtsrRPGTiy8+fPkXwqCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAEKRbEuTRPsv7g9UHCQF7/jBV/
# z6/Jp8sJZNOQsrXx9zANBgkqhkiG9w0BAQEFAASCAgBUY0VlXWaPBbKHftjQH0kU
# Y3Z5E038HAeW1BcZPsoJ3Mgcgo4YMMa4PneQVpmkl63mhjV7344BJJAGRt3slHJ2
# ip4OVYsXMkLlH3O3OAJcKdx7ukJgSrvj0dXfVnWR7Prnvjw7JDL+X+ZodF1ezt7e
# 0cYwHsGcPHP/PRtLn1STChXCx0u50e83MaLXMbtRzlNeh7suTd1RS6Hfa+df/uL2
# AMJB+sP7aMx3N/OcEsfWwdg5M5f+1VEa4E+wbfpqViT+WOqJHGzLFa6ITGfYvZ0N
# ER9b+EsaSpjF3LTwTK21/Uk8UteO4vmcnvbELZaIkM9hERIenL09GT8X6hRtBilA
# lXQKjhGPr3oN7lmEHDNfBdQBEOHVLMtv+/xeRT1krLaWyY79aBNXEZZwAyvxmRyv
# zC5V7J0ZIYpMxjbOSeirRMgecRWi+wiBfYfofa5QtdiGhyMLv+nPkZWejwRezHwq
# rRLH0fKd6IoHtCw9cmi7d+1cWI6meY3Tbu4B0z2pakGUpsWLY5mj5xpYMFssa2JR
# 9A810bwqs2MBtAcdaEZAu1CRcLIwslKxs7ZIlaGrjETE+u1X8JIU+jXmnihb01Jj
# Wl3F2C8z+2Z6JJM2DN+8J3/qFm7Z6t3+mdD9WEYpe6GHzblnWPDDEodfrIiFhCkX
# ReDQ0Bqp2Si3cvwk6cL+AaGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA2MDda
# MC8GCSqGSIb3DQEJBDEiBCCj7pqjCXZWcz2BHmPFK+T0+pNw/Fd22i6NRKw/En2g
# wTANBgkqhkiG9w0BAQEFAASCAgCEAC7K8b7stNsIxAH3HgJO9Ix7Fo9GOyiWLgYX
# LqlhvqcgYeyPHh9yYLD9eKQZxCw0sgaVz5wW+T0txYamqaDU79Dj9O1sZWskPnGU
# kuRhXBfYewpq4yTCyz1EXGHIPNRnjeNDDMb0jjYKP0Oo6fTlRfF6sN7kEDkZgLhc
# FyliioT+2qq1kAhLm8cUAAxnHRo/GtkpCk0HPZ+d73l61mLcLJpXAy+ezyRE0VLQ
# FoTlTE9maWZ5HwkEORSfY6w8aOE6RZB6EoVT7bdq+7ut60zrrbDtkQx+7Gzh0Rid
# 1ewlGDOm5YA3j+tjMRZ+3DwbtibOayrpg86qZ5V2r6LYyDcukkMKIg1LbQXdRtYO
# 1VniNnAvRtV3tL1cLs+O6QUwZKVFp1TjN3laCzexh8xr4yLJoobMN/5TR1Vlxtut
# yz/SRQ0p2MBcPAK5XhsrCRGs2CpdHbhH9sZp/CGTAoRkfNpTyjf4aKxs3Cq1ZxSK
# VRjakR8BMbIcP3NjwbVKKOYfZa91uq2320IikkWMfWEz62vijrL2Ms2wXkKK/YHJ
# ja/ZLpIyllt0Yh4enVU+AS7Kk6OEtYltKSVkUS/WzPZlxXJRky+euapHP3RGaSQd
# +p1b8QsxsHWg4Nm33xcNLBYTeP9erm+96KEr0GWHhdm4XVktzb8wcC2wkfmhvqci
# KLwhWQ==
# SIG # End signature block
|
Get-ADFSTkEnhancedRule.ps1 | ADFSToolkit-2.3.0 | function Get-ADFSTkEnhancedRule {
param (
[Parameter(Mandatory = $true, Position = 0)]
$Rule,
[Parameter(Mandatory = $true, Position = 1)]
$EntityId
)
$enhancedRule = $Rule.Rule.Replace("[ReplaceWithSPNameQualifier]", $EntityId)
$currentAttribute = $Settings.configuration.attributes.attribute | ? type -eq $Rule.Attribute
if (-not [string]::IsNullOrEmpty($currentAttribute) `
-and -not [string]::IsNullOrEmpty($currentAttribute.transformvalue)) {
$prepend = ""
$append = ""
$replace = ""
foreach ($transform in $currentAttribute.transformvalue) {
if ($transform.HasAttribute('prepend') `
-and -not [string]::IsNullOrEmpty($transform.prepend)) {
$prepend += $transform.prepend
}
if ($transform.HasAttribute('append') `
-and -not [string]::IsNullOrEmpty($transform.append)) {
$append += $transform.append
}
if ($transform.HasAttribute('regexreplacetext') `
-and -not [string]::IsNullOrEmpty($transform.regexreplacetext)) {
if ($transform.HasAttribute('regexreplacewith')) {
if ([string]::IsNullOrEmpty($replace)) {
$replace = "RegexReplace(c.Value, `"{0}`", `"{1}`")" -f $transform.regexreplacetext, $transform.regexreplacewith
}
else {
$replace = $replace.replace("c.Value", ("RegexReplace(c.Value, `"{0}`", `"{1}`")" -f $transform.regexreplacetext, $transform.regexreplacewith))
}
}
else {
Write-ADFSTkLog (Get-ADFSTkLanguageText rulesReplaceWithAttributeIsMissing -f $currentAttribute.Type)
}
}
}
if ([string]::IsNullOrEmpty($replace)) {
$replace = "c.Value"
}
if (![string]::IsNullOrEmpty($prepend) -and -not [string]::IsNullOrEmpty($append)) {
$enhancedRule = $enhancedRule.replace("c.Value", ("`"{0}`" + $replace + `"{1}`"" -f $prepend, $append))
}
elseif ([string]::IsNullOrEmpty($prepend) -and -not [string]::IsNullOrEmpty($append)) {
$enhancedRule = $enhancedRule.replace("c.Value", ("$replace + `"{0}`"" -f $append))
}
elseif (![string]::IsNullOrEmpty($prepend) -and [string]::IsNullOrEmpty($append)) {
$enhancedRule = $enhancedRule.replace("c.Value", ("`"{0}`" + $replace" -f $prepend))
}
else
{
$enhancedRule = $enhancedRule.replace("c.Value", $replace)
}
}
return $enhancedRule
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCW9TiE4GIqBD4W
# KpTiF2DnP42a3Mmz1rVMLbel7QdyPqCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBaTcKHU7hb6PLsqNQnAFXgZ8mE
# kQT7LKbUIZayyoDAXzANBgkqhkiG9w0BAQEFAASCAgBANGsL7g+GJCcxnN8d4WYz
# +Cdi8j/2cRFWObMpzUgFs/3CEtjJyTj9TFLWOdR0jU1O1YZvRxSrA1JlcY1FE48j
# bmnSpl333t8cll4GfTYpQvyqehlNPTCjtcafgZlDYlRImLNs6qWNsUtuZrprJaZI
# 85u6dzhGqBa4UXb4YdNtv+HJstDCiFWvwAdIrEMg9AmACsJOFWM6e6OfQphvQfVH
# SO/W5HgVXk3VOjrN/+cBIl3qruqvAfuXrdBVtypziQxDCx1oyOINRpJv60vJP7YK
# 0GKJQxLzyQ6AjBzFAgeppF2ipQnm9KPo6ugySMdIh1ZZng5V+zTrhQejCE0EmTcs
# H2Lqd+34iQ35uvnSzrkP0bRe0wrABsahsF3YXDIz7e4BHwTcNA9ujew9aYjLpAkG
# 4CDooElGCInvkmYLLmi5wtbOmEkpbzvAyoN1RDBXoGH/LxeWDsGx2zt9EVnN8frv
# bDrOURHCJ4t/PPcWojvgBDpD7H0KyDUx+FLb5AsDuP/0t9C8LQE8rkrWLMqLSupU
# MRmyA413nWMuaGiefmJqxTvjawhZybR17YViRtXVp5uztXIXhkS53VesU8C3F0mH
# PYowLIS4ppU0D2OgAwQuPq/P4z+xJIkUsuiHSxn2RmifnG6u2YrbjBErjFPqIvHR
# hneU2hclqU63wIhbPDIZRqGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjAzNTZa
# MC8GCSqGSIb3DQEJBDEiBCDIjF2K8MCXgkSJ860d8QBT9T5dQDzo61TYELLEeCVt
# ITANBgkqhkiG9w0BAQEFAASCAgB+PlZ/P4gYmH2ue5ucw2SEm8ua9BQN/L5ouyTO
# A4i3pMMhfMI6XwMqV2Hns4fjJod9X4c4mZ4MeCAiB6FZbR5GVkQ0+Mtn/9GrOfyX
# vJQQp+PxWI1kJgojmuB2mpqwReQxSk9I+X0zINm42iFpB/rsUDBB+eBun84ULbuv
# DzKAsPLqVQhhXO4pLYCGYwXhlvZmcRsaasMJIIBWXtjenY3CMVOnljPEfRFv34h6
# B7kxOR4J6SIqj2390ieBf36MHlQSHHwwn7e7FfslbCYzPyQqc7hZKyHV8bSEe9IL
# xYrsr0jPqJswskMn0vs1eDgWQ5D+LdBOU2QblF9JTMGLpZ8XeTqZHu4XxVrCpqnd
# D4rwDAkq9BkV5GDfeIRVeuh5LBldIfVceutvxZtpqH6uobmZvz1+ctKWKDHgE9sA
# DKUYn3a3jIih5jhMddH2POxD073b1UDreJZjtEAS5ri+kOCPfIUpuVoYErGT/mQU
# mLbsIGWeqjxT1oKn76E2HTuQk0jMag9Fk1HH8UVvngiAoF9hl5fKfwbtdsMnRMEV
# 81BGn0k8fJakCGQmN/WLhINoh68YcYdhJwS7jfMgxuBG3zpeCWMiGyzoJaA2tYcF
# T4lnXuZKt2t2LIu05QwqLb8c0wd0jfWmjSkjeIoQrN7OCfR2DzmDAME5qy7n0E69
# lLAoqA==
# SIG # End signature block
|
Copy-ADFSTkToolRules.ps1 | ADFSToolkit-2.3.0 | function Copy-ADFSTkToolRules {
[CmdletBinding(DefaultParameterSetName = 'CustomTarget')]
param (
#[Parameter(ParameterSetName = 'AllCustom')]
$sourceEntityID,
[Parameter(ParameterSetName = 'CustomTarget')]
$targetEntityID,
[Parameter(ParameterSetName = 'ClaimsXRay')]
[switch]
$ClaimsXRay
)
if (!$PSBoundParameters.ContainsKey("sourceEntityID")) {
$allSPs = Get-ADFSTkToolEntityId -All
$sourceEntityID = $allSPs | Out-GridView -Title (Get-ADFSTkLanguageText toolSelectSource) -PassThru
if ([string]::IsNullOrEmpty($sourceEntityID)) {
Write-ADFSTkLog -Message (Get-ADFSTkLanguageText toolNoSourceSelected) -MajorFault
}
else {
$sourceEntityID = $sourceEntityID.Identifier
}
}
if ($PSCmdlet.ParameterSetName -eq 'ClaimsXRay') {
$targetEntityID = 'urn:microsoft:adfs:claimsxray'
}
else {
if (!$PSBoundParameters.ContainsKey("targetEntityID")) {
if ([string]::IsNullOrEmpty($allSPs)) {
$allSPs = Get-ADFSTkToolEntityId -All
}
$targetEntityID = $allSPs | Out-GridView -Title (Get-ADFSTkLanguageText toolSelectTarget) -PassThru
if ([string]::IsNullOrEmpty($targetEntityID)) {
Write-ADFSTkLog -Message (Get-ADFSTkLanguageText toolNoSourceSelected) -MajorFault
}
else {
$targetEntityID = $targetEntityID.Identifier
}
}
}
$oldIssuanceTransformRules = Get-AdfsRelyingPartyTrust -Identifier $targetEntityID | select -ExpandProperty IssuanceTransformRules
$newIssuanceTransformRules = Get-AdfsRelyingPartyTrust -Identifier $sourceEntityID | select -ExpandProperty IssuanceTransformRules
if (Get-ADFSTkAnswer (Get-ADFSTkLanguageText toolAreYouSure -f $sourceEntityID,$targetEntityID))
{
Get-AdfsRelyingPartyTrust -Identifier $targetEntityID | Set-AdfsRelyingPartyTrust -IssuanceTransformRules $newIssuanceTransformRules
Write-ADFSTkLog -Message (Get-ADFSTkLanguageText toolRulesCopiedFromTo -f $targetEntityID, $sourceEntityID, $oldIssuanceTransformRules, $newIssuanceTransformRules) -EventID 45 -EntryType Information
Write-ADFSTkHost cAllDone -ForegroundColor Green
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAcmCou/OrCMA0g
# BBE+DdpwCp2KiuUi/eT4nJjKdvJKQaCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCB7gsOBasW3uoo7jjgtLnnTz/G3
# B9VjHP4xNMb42H0t+TANBgkqhkiG9w0BAQEFAASCAgCECVBUTw2OJWJQRuPoB0cy
# LdXrfwT7JX3M2R+uUul+tP1Vk/DSR/w1y+/RNTgzJgr/O6MsDuXcrkyXx0357HXk
# VZXyoTnYjGeSxmdcK/JKUYyBb0vk6hCndUk8QHff5Q7ZCJ2V47nnTPv/mI/W6woa
# rLXOkujj6DMQFuWNCMzWJqdJIXfqkRyZSwtFOuDqOj+5coX0gIAiUoCf/Q5bp/al
# r1av5taUqxo/p8x9nmomAXGfOniUjFAUYgvRkypIL8tSp0V1WXQey7BlEohtolPq
# wK0Pv/dV64Ilr6iTp5QSA4wJy19QICm6BRGyVFLzf++iTMGpfQ0UkiXy7qN0W76y
# 7PI85fjiOqStyi8lJmsAuLxl3zOmbCpORzXzGHGSrFBFiqwMPNM1MJBB0WRlvrjF
# 5F7RpeOekt0hChBkPcczjCCgZ9LOefkFBkT8qZwbMmsn8HL6c7FXPdRDtgQxY8O9
# LO8KEJgVq8gXjIBiIy8/20MsGQ+U1uurvwIret4n21gHuZ9UwMPXQRIZRRWFrAqa
# b1Auea49uV5S+hkQtBp1ADW0+sACHvUpctKiOKxjR7hTOcmsiD7PW3O3AxwDBJAF
# QMxjdfjt48F8j4HRvzqfYaKk/PnrjhFSDXm1fr/er1XBjoqine0kY4Jy2oeMiSYz
# raCGMAc00cXLvJAezGvUFaGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA1MjZa
# MC8GCSqGSIb3DQEJBDEiBCCSQoHjUnY74pmU+ZrVDByCI+JyVXCun4LTwqPqPp4i
# VTANBgkqhkiG9w0BAQEFAASCAgBAo9oosOukivexuZ0cUtsVIsuQEato2a77+rrG
# cElb0Fj2iIcH6e28XURuIN050PGuLpskjtcaLGybXAS3klxL90aClgAxUrLpZx/b
# r4zB5cpZ8qxgwAhFZqyJqE6NqXHV8CHouhYo8xIxhm6Vy8SwJEsfkKIdOdo+gP/4
# VtByjwFsNHaPdFpEIHSo4fR6P3dav1KH4H9+rPvTp8egipn0NN0KKsWGdXei2l2E
# zFmuDMg7EOugxjZ+tAgEK4FE9HmOaSv6qoktno0Z5ku6KuiA2SciLo9bUoS8AKbG
# vmkE6ny4Gp0RvSz5SLsvuXj0a2cfzusWV+XQQJHCYqSDsOjT0YHoy14zA/acOqcX
# 7B/5KzEjbFOLh+tqJDwSfM3RuijLr5vZFBGJioizNz13Y/kliOSx1NGAWrCU2ew+
# Ce2su2wysA3PmC65tSxEUZeZ2MqpCMTvm0eahCOq5yfMovopKN3Of6XOjORqVEIJ
# AcYOg92Z3uwj8QChZm+JJDcsENR4qaohaLTdCXoXqsFyGN8hFithLa24OkPJA7aB
# oKtHQFWt3LnOT3l/A1abuCB6LzCxXBmgEHKx4ddXy3fmPRJeU71REeIaFxBt53NN
# w9eHtqyGmaokNuUrpWqrr628vnUaKBBA0ctC2+h5I1bsCmAoXC7pMEfnN2UHweJg
# Nljzbg==
# SIG # End signature block
|
Register-ADFSTkFticksScheduledTask.ps1 | ADFSToolkit-2.3.0 | function Register-ADFSTkFTicksScheduledTask {
[cmdletbinding()]
param ([switch]$Force)
Verify-ADFSTkEventLogUsage -LogName ADFSToolkit -Source 'Invoke-ADFSTkFticks' | Out-Null
#Check for Audit Policy
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText confIsAuditPolicyEnabled)
$auditPolicy = (auditpol.exe /get /category:'Object Access' /r | ConvertFrom-Csv | ? Subcategory -eq 'Application Generated')
if ($auditPolicy.'Inclusion Setting' -ne 'Success and Failure') {
Write-ADFSTkLog -Message (Get-ADFSTkLanguageText confAuditPolicyNeeded) -EventID 311 -EntryType Warning
if (Get-ADFSTkAnswer (Get-ADFSTkLanguageText confEnableAuditPolicyNow) -DefaultYes) {
auditpol.exe /set /subcategory:"Application Generated" /failure:enable /success:enable
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText confAuditPolicyHasBeenEnabled)
}
else {
Write-ADFSTkLog -Message (Get-ADFSTkLanguageText confAuditPolicyAborted) -EventID 320 -MajorFault
}
}
else {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText confAuditPolicyIsEnabled)
}
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText confCheckIfScheduledTaskIsPresent)
$schedTask = Get-ScheduledTask -TaskName (Get-ADFSTkLanguageText confProcessLoginEvents) -TaskPath "\ADFSToolkit\" -ErrorAction SilentlyContinue
if (($PSBoundParameters.ContainsKey('Force') -and $Force -ne $false) `
-and -not [string]::IsNullOrEmpty($schedTask)) {
Write-ADFSTkLog (Get-ADFSTkLanguageText confRemoveScheduledTask)
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText cRemoving -f $schedTask.TaskName)
$schedTask | Unregister-ScheduledTask -Confirm:$false
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText cDone)
$schedTask = $null
}
if ([string]::IsNullOrEmpty($schedTask)) {
Write-ADFSTkLog (Get-ADFSTkLanguageText cCreating -f "F-Ticks Scheduled Task")
$stAction = New-ScheduledTaskAction -Execute 'Powershell.exe' `
-Argument "-NoProfile -WindowStyle Hidden -Command &{Invoke-ADFSTkFticks}"
$stTrigger = New-ScheduledTaskTrigger -Daily -DaysInterval 1 -At (Get-Date)
$stSettings = New-ScheduledTaskSettingsSet -Disable -MultipleInstances IgnoreNew -ExecutionTimeLimit ([timespan]::FromHours(12))
$Task = Register-ScheduledTask -Action $stAction `
-Trigger $stTrigger `
-TaskName (Get-ADFSTkLanguageText confProcessLoginEvents) `
-Description (Get-ADFSTkLanguageText confThisSchedTaskGetsLoginEventsAndSendAsFticks) `
-RunLevel Highest `
-Settings $stSettings `
-TaskPath "\ADFSToolkit\"
$Task.Triggers.Repetition.Duration = ""
$Task.Triggers.Repetition.Interval = "PT10M"
$Task | Set-ScheduledTask -User "$env:USERDOMAIN\$env:USERNAME"
Write-Host " "
Write-ADFSTkLog (Get-ADFSTkLanguageText cDone)
Write-Host (Get-ADFSTkLanguageText confFticksScheduledTaskInfo)
}
else {
Write-Host (Get-ADFSTkLanguageText cAlreadyPresent -f "F-Ticks Scheduled Task")
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDTr2YgAlgkrMZW
# qkRel+e99m/MUC2zaRo8dMt0RQRNvqCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAHiHMagC0fPA0Q5FuO7U+Ogai0
# DG6Oa80NaSrWA0NXXzANBgkqhkiG9w0BAQEFAASCAgCF2kr1YRvxT6UNV63A+jKu
# NVDy7nQCXoZPEMswEto7ncYrlbdtSNtQf9R+bj3SHTFaTodddjUQ46mDNGi6Eba3
# nDaiUGm4Mg0zng7ZUsI/Qe5yHME2pUsSK5tHyfCOBWmSSoWMOk4qOLr/8IOPRoI3
# lgazxZ+zkA5vCTaC2Xmv/kjtThFMpjJ+MKwOW73LRaJ7Q1H3SVxyvCzyWQaE5B5q
# IhXZoodXu0DeqPdO5u0dADO28zim/t6TA3nyF2j6r1QRcRKeteEv9RdALCdOvoYG
# beFeEWAKkz8MJKVm4ee6sdG0xY1GjBGsr6uSerFLJfV3X3k80obFenBU80/BAMyM
# HUt4i6ckg6HgPQs5ngCbMV64LggT2xADGqjhi0UtwadPClSOEmPR3+juAn3tJf4c
# mO/RIfMtn6hdzbs+2nSE9kVvQzuQk6GkbuHfhuNuncUokJt2mQS9Z9d8wBzhfQah
# z5ENxyydj78CaHTGdEVWnjqKVej6KhhEfdm25AuWVQQ9639EvsMvgKcD7YhUcqYf
# KuJI/pSdZS7XzuMMHRJTlMB+MptUuAGB9hig1TcF4IROM5QjJbD9Nx343qLjvh9G
# +D2soOl/sg6TZwcQqy9tAF0EgnRoIy9eP50iMJzw4ZsD5nRWW1b5L9Jk3tzwRxs4
# j/AG8w9ndzl4S7Ca+IKbIaGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA2MjRa
# MC8GCSqGSIb3DQEJBDEiBCDQqjzOOHMCj8yOsmp/oJJ6h/6kxq7+uyn9KuqvZ4Aa
# RjANBgkqhkiG9w0BAQEFAASCAgCDuzA+BAnuEGlwtybtLDN3rGDYl20ExV/hb6uA
# QN0M8RzIKm/BZtGZviEP4cwPRWaG91ZMtGjQlmenjHTY3SD9PW+lFI2rCwnoZQCp
# bQF+/GG2nCLM2okbYWsfVzu8PS2NCzA/SoF7DqzutMY89YjZzCNm6JX0YnydQR4o
# x8Hl+He8uedpCKSoUu99VxbGLXbNdcu6AdjgMYJCuO+DpqanX1WYdGAw9G9z81xj
# ZbubzlTqykMWxRaIC5YYKB6nzolF2PXvPT4TSXxkXA5mCvcG15omAkmMN3bCC5Sa
# CuY66UzRGy1qFzAduQdWOKkT2RU+lKx7I9AtpamQHYS5QBQRNrIzYDVa7o40Zqb6
# IdFBsqP7E6lIBB8nytBNKKISZP6WeIeAWehykPmH3URFwg2+3i6h8h6vw99ev8rv
# xk6T8P17CNJ9oVHfCd1jTk0RGRU+iFi0QCPPQrybHKcRLmhNkTQadJ3KkZOMepGt
# 7Crg+Ia7+iRortK5kxWg9hUVn2+kjtkvrlHUEOVthVhV167yJz+wk7UTfBJ4Npyx
# vxLcG6hlUr1BZgMsgAy9ZRw0u96sulVtDv5Zm2aTqoDJSAu+41LKXsD+TFr4hnzF
# NNNqzrzOmN/bWlZNswC8fWT15GrDQjpPBTPd5GdiT+7NIw9Jka0egbHJtyEh2wMS
# W5/PZw==
# SIG # End signature block
|
Set-ADFSTkStateConfiguration.ps1 | ADFSToolkit-2.3.0 | function Set-ADFSTkStateConfiguration {
[CmdletBinding(SupportsShouldProcess = $true)]
param (
[Parameter(ParameterSetName = "f-ticks")]
$FticksLastRecordId
)
if (!(Test-Path $Global:ADFSTKPaths.stateConfigFile)) {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText stateconfNewConfFileMissing)
New-ADFSTkStateConfiguration
}
try {
[xml]$config = Get-Content $Global:ADFSTKPaths.stateConfigFile
}
catch {
Write-ADFSTkLog (Get-ADFSTkLanguageText stateconfCouldNotParseConfigFile -f $_) -MajorFault
}
#FticksLastRecordId
if ($PSBoundParameters.ContainsKey('FticksLastRecordId')) {
if ($config.Configuration.Fticks.LastRecordId -eq $null) {
Add-ADFSTkXML -NodeName "LastRecordId" -XPathParentNode "Configuration/Fticks" -Value $FticksLastRecordId
}
else {
$OutpuLanguageNode = Select-Xml -Xml $config -XPath "Configuration/Fticks/LastRecordId"
$OutpuLanguageNode.Node.innerText = $FticksLastRecordId
}
}
#Save the configuration file
#Don't save the configuration file if -WhatIf is present
if ($PSCmdlet.ShouldProcess($Global:ADFSTkPaths.stateConfigFile, "Save")) {
try {
$config.Save($Global:ADFSTkPaths.stateConfigFile)
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText mainconfConfigItemAdded)
$Global:ADFSTkConfiguration = Get-ADFSTkConfiguration
}
catch {
throw $_
}
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDCeuZ1kPwZqmYe
# ZeLjROVyp4vU3Z/pWFpSlmhwb8V6PqCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBU7xSsfgJnvH5d72n5/gyObvu/
# QkXTOkLNkBbw9mQ1WDANBgkqhkiG9w0BAQEFAASCAgAlpjF+NE89GgDFVHtDAGoB
# Z0S05rlWYbAookInU2KUpZHUNgDz352vIpRidApDpkEsPPP559C1ZY24f9DGaMX+
# jNkdKfp4j331R0h0zWeSaEapq8vUmxpqgJby0HP9nRF/tPjDJmv1hWEsMXi4OnSS
# 2fketTChesjCxXcAdlS0lILniMSLlG+XJQAdqs3imtIFveVMn0u4Qxt7eHoojr5K
# Vkw8m9/n4t6tE++rfHjoYTuTkOn1QGtjTYbmBJPBRx8Kv22JPGiGCtS477XV9uku
# N2HpQAgU4rFl1jADKLR4f4buWz310++UdzoLtDPjUtZI3Eed8WsWgin89EjYi+Wj
# u+3MsJNLgrQmUxwfNLV0s2ov+FOYUy33qTM20dobl2jYFoCUo6zfQkrP+o/wbFMU
# TiHV5MkwGCc3abaiPAjpySHtf45wZr8Vihi9KIJ8z2Q32h1QKXiRDapK8I+h+Jhx
# NJDyH4Btf0M59JlKLuC4H0xIE2wWunV1Wg9sShDXeRPyRkrAzzSGz5Mng9kmLY0a
# OfTvQ5NCRMDv9G8T7VxPn51Wv4/UNQ+uutEGwmiDIWCdMK0xb+bj0rt5JeqzF9PR
# ZQ8q0IoVVmQdv0czv/Ine0AtCo1cMlJZq8/DSNykLwl2DOzNn+KQ0k+rrg135sHO
# kVtlHUo2lwcBAennEZ+n2qGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA1MDZa
# MC8GCSqGSIb3DQEJBDEiBCAWZO70j5EmY4e0QoxcdlwrdIQI5vRw7DOXwpPNRlEK
# TjANBgkqhkiG9w0BAQEFAASCAgAH9aeqUqiaBeWcmbyAvTPUrXmhfJqc3TcJhLMX
# 8Bx8ZMNI1J8oZ3EpfEp0OnCRY9Zsu1S7wGMyUf0kjqxJfTIcZj451lu1+rGh4nHU
# /l+hhgpq3q5dzJfxxUZvy9bmxtklHhKX+Uc8i8Lc9rozLZbv+mLmAShrC322f0zv
# nwqiJ+CUDhykkq0QiA8IhAFk3oWBgQ2a+skdE4SlGWTIi0iV4QqXEr0B38pNdDrW
# iCaIbYjZoVy+6PxR9VF8iHzPtd+Gd+Wqf5nAdogrB7HRIeS2V+8nRhAWjLfz1f0L
# dp0eGFxM5rGX0dwRCAs9AljGYeZwHkGPv/be+8zcvEzQUj0bNScwwmeFxYt1FFKn
# wq3wk8rjvhb+30iOsC9hxLpyZ55UYEpOLeAWOrSo+xVSaQNYBBf/+IkIBz3sWilf
# iFvqwO3wo7LpVCVzFDAhjL059ID2dIrQ3rk9UR9O68tRNetUMf7pCNKb220d3BgR
# pqA49bcv8tnY4SYTCOK+b9v0rsRsDauT74L8MRlH6sZgot67wg6MM10X0IKeEzeO
# DC/xXdGQ3mmsIHlFSqKFIjh4Rw5FB9jLfmOTy6eU4e22nBBgRPUkfEaHC3pbRq/a
# preD6/TkuVIhemGy51Eb3Px+7SsZOgdxwxhrbpNJaO66bBEyzu/S6sG+2p2rIm1J
# rWwrQQ==
# SIG # End signature block
|
Get-ADFSTkSamlResponseSignature.ps1 | ADFSToolkit-2.3.0 | function Get-ADFSTkSamlResponseSignature {
param (
[Parameter(Mandatory = $false,
ValueFromPipelineByPropertyName = $true,
Position = 0)]
[string]$EntityId
)
if ([string]::IsNullOrEmpty($Global:ADFSTkManualSPSettings)) {
$Global:ADFSTkManualSPSettings = Get-ADFSTkManualSPSettings
}
#Default SamlResponseSignature if nothing overrides it
#Valid SamlResponseSignatures: AssertionOnly, MessageAndAssertion, MessageOnly
$SamlResponseSignature = "AssertionOnly"
#AllSPs
if ($Global:ADFSTkManualSPSettings.ContainsKey('urn:adfstk:allsps') -and `
$Global:ADFSTkManualSPSettings.'urn:adfstk:allsps' -is [System.Collections.Hashtable] -and `
$Global:ADFSTkManualSPSettings.'urn:adfstk:allsps'.ContainsKey('SamlResponseSignature')) {
$SamlResponseSignature = $Global:ADFSTkManualSPSettings.'urn:adfstk:allsps'.SamlResponseSignature
}
#AllEduSPs
if ($EntityId -ne $null) {
#First remove http:// or https://
$entityDNS = $EntityId.ToLower().Replace('http://', '').Replace('https://', '')
#Second get rid of all ending sub paths
$entityDNS = $entityDNS -split '/' | select -First 1
#Last fetch the last two words and join them with a .
#$entityDNS = ($entityDNS -split '\.' | select -Last 2) -join '.'
$settingsDNS = $null
foreach ($setting in $Global:ADFSTkManualSPSettings.Keys) {
if ($setting.StartsWith('urn:adfstk:entityiddnsendswith:')) {
$settingsDNS = $setting -split ':' | select -Last 1
}
}
if ($entityDNS.EndsWith($settingsDNS) -and `
$Global:ADFSTkManualSPSettings."urn:adfstk:entityiddnsendswith:$settingsDNS" -is [System.Collections.Hashtable] -and `
$Global:ADFSTkManualSPSettings."urn:adfstk:entityiddnsendswith:$settingsDNS".ContainsKey('SamlResponseSignature')) {
$SamlResponseSignature = $Global:ADFSTkManualSPSettings."urn:adfstk:entityiddnsendswith:$settingsDNS".SamlResponseSignature
}
#Manual SP
if ($EntityId -ne $null -and `
$Global:ADFSTkManualSPSettings.ContainsKey($EntityId) -and `
$Global:ADFSTkManualSPSettings.$EntityId -is [System.Collections.Hashtable] -and `
$Global:ADFSTkManualSPSettings.$EntityId.ContainsKey('SamlResponseSignature')) {
$SamlResponseSignature = $Global:ADFSTkManualSPSettings.$EntityId.SamlResponseSignature
}
}
$SamlResponseSignature
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC4K2hv7w1ZFMzJ
# Jf/R5HrtljH1w/nXPJKC1R6susRBlqCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBRxcPhtepidSTyhZyu/Z0f1cPZ
# W8W9OSGHcYy9QQ1cIzANBgkqhkiG9w0BAQEFAASCAgAxqDJqureOrZ4bhdBH4bqZ
# 3jEPRr3gsMzTi+YYqsPjP+j7zDn2DQhrxZ7hMNu03dNHoK7G79IgPg7fZvemM3yT
# q2q1mmZmjjA+58tzkiIxOptpSA91AaEyUPZglCnnQ1dcTbR5oYA/S/fdDPxKO5ZO
# wIuMDQGYjZ8mc7pMT5va6IE3PTXoQZvcTt22pt85xAb/UweHvO/J9GfBBe/ZWHV3
# UfE0V48XBcTg8jciyn0l5U7KSqt1aeU2ptC9iz9cK04AKoDsOxVL6By/ywp+1XYs
# OFaqfSzX7pAjqKrIcMDy20hEXHDtBLHROPVZRjKjAcUWTcjLG7bn2sTNxSb5zWDN
# CVGjgDOdgioKODQ9CfBdF83zZtkmqyeHd0jq9zkvi/uO+OdE2e39JW4vAvEv+jhn
# sNGw/J8Pkl+IWXoaFA6ouoZDjwxOVWfGpKLb+dsTl3Tc7+Hmwrzlkhbgrv2CKOPz
# 8xvB/jold2VpWDXp1EAW3SEop5RVjgXlWu4w58ibm2O3aLHsSJIQkVKCzKremsbK
# HgHYfOQYn1ZRBIYryJcSZ/mFfknKjj4OM+VpCzDI0TACd9J7z85u5zBnjqsRTUPM
# LMB0jmI7fdgk5ukNRcGc/WireLITR9j2wj/1j23forpJZZu762lri2inEkrqKypB
# 3H0JZxT31PE0BfnOFdiFy6GCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA0MTha
# MC8GCSqGSIb3DQEJBDEiBCBJ0fl3PrH1Ycruf94x6/QGlj6uMQZp9krJgFn8m/14
# 0TANBgkqhkiG9w0BAQEFAASCAgCp+2R5QBihaBHnYL0X1VsXQ5zYMZqujjKzUVrz
# xB7iVv5o/ftGjO1S/LG2m9phtROM8ncO8gryUfp9oQZwWGl+fVwmqnw8BCA4chg2
# SvPCSftjBP+DmfCiezF393MlWVADeGcIfBlRfZtQHs72FAZ8Zbh4P7ye6+RjEUtk
# uN8zHvMvJKw6lqlbTQoBCEWXZ3Jmky/naMKFxLANTgGavQsBB9KWrZQ8zh97GYQ4
# tIf9H809xHifLTiJ9d42B2gf6gRZ0OopOe4B1mNhC3mrvZcOBgxZpErftQp0bZMZ
# lyIdLu1BiOTa8GubW2HdD3YSh/Aq+NRoIIQ0Spc4PlPTUcbVs/A4zxzAMCnv0948
# QCJfbrFqp71T2OTWKMJpAteVomdbz/JYWnHaZQrx1Du3QQrBlZFmNb8GtKI9pGkx
# nc5NiN6DVi+IpAz2L1OwhokIKOY/gcpxSTxFdirWZZD2FILf1gLXQXff7HSnDfX3
# z4AiISsFF5Nf7bQUXR80xG6/kW7xaf9N5E6PtrpbC1eP+7xUhKyMDAtpno3j1Ord
# +9fGYDLQCV+WzZwDXaopEDys5fTfkSCZ6ytLeO9v3WHH6yiqCkWN6ujRpeHJXraB
# pddiMtM5ypuIU0WZMwafgnDUB/w0H6FZ2EyQr2P/t83zW9FnUJCyBy18/ksaXisr
# R9xi+g==
# SIG # End signature block
|
Get-ADFSTkMFAAdapter.ps1 | ADFSToolkit-2.3.0 |
function Get-ADFSTkMFAAdapter {
param (
[switch]$ReturnAsObject
)
try {
$authProviders = Get-AdfsAuthenticationProvider
}
catch {
Write-ADFSTkHost "Could not retrieve the authentication providers." -MajorFault
}
$nameMFA = "RefedsMFAUsernamePasswordAdapter"
$nameSFA = "RefedsSFAUsernamePasswordAdapter"
$binPath = Join-Path $global:ADFSTkPaths.modulePath Bin
$SourceDll = Join-Path $binPath 'ADFSToolkitAdapters.dll'
$GACMainPath = 'C:\Windows\Microsoft.NET\assembly\GAC_MSIL\ADFSToolkitAdapters'
$GACPath = Get-ChildItem -Path $GACMainPath -Recurse -Filter 'ADFSToolkitAdapters.dll' -ErrorAction SilentlyContinue
if (Test-Path $SourceDll) {
$SourceDllVersion = [Reflection.Assembly]::Load([IO.File]::ReadAllBytes($SourceDll)).GetCustomAttributes("System.Reflection.AssemblyFileVersionAttribute" , $true).Version
}
foreach ($InstalledDll in $GACPath) {
$InstalledDllVersion = [Reflection.Assembly]::Load([IO.File]::ReadAllBytes($InstalledDll.FullName)).GetCustomAttributes("System.Reflection.AssemblyFileVersionAttribute" , $true).Version
}
if ($PSBoundParameters.ContainsKey('ReturnAsObject') -and $ReturnAsObject -ne $false) {
return [PSCustomObject]@{
RefedsMFA = $authProviders.Name.Contains($nameMFA)
RefedsSFA = $authProviders.Name.Contains($nameSFA)
SourceDllVersion = $SourceDllVersion
InstalledDllVersion = $InstalledDllVersion
}
}
else {
if ($authProviders.Name.Contains($nameMFA)) {
Write-ADFSTkHost mfaAdapterPresent -f 'RefedsMFA', 'IS' -ForegroundColor Green
}
else {
Write-ADFSTkHost mfaAdapterPresent -f 'RefedsMFA', 'IS NOT' -ForegroundColor Red
}
if ($authProviders.Name.Contains($nameSFA)) {
Write-ADFSTkHost mfaAdapterPresent -f 'RefedsSFA', 'IS' -ForegroundColor Green
}
else {
Write-ADFSTkHost mfaAdapterPresent -f 'RefedsSFA', 'IS NOT' -ForegroundColor Red
}
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCiiIwL2mIuWmYT
# 0OgaCha7N4H9qZ+EeolPr7+rej8Wd6CCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCATaiS0EuWaafnLb4zecUTcTD0s
# X+698s3xJ1oqTQwDEjANBgkqhkiG9w0BAQEFAASCAgA/uKjjNfms/bap+LaEYZhk
# DcXAILXDQekZBax00BSOb0gjWCQ+u9juszv9hJrFX1CQuVM7Yk1ihFypHfmABp3w
# mhZAMzD6lDnPEoW3pPzun/98zipFpTqsAg28ZhmedI61YdqW6Nsft8aj01ezqYI0
# bWYk7qq66X/ffBoecsmn+L5taeMajGaKRvEt+1wmS+q/NEAa5z9SlGmiVILIvoss
# yuc3C4G78OOitNKZmmNqQnV6mNxfgGBua9jiOLRpyGsoVQxBRoNzK5+l8gXaO4Qj
# 6q25JBKqyF68zoNt/AIOSALxcYhDsH6GIK3ftuT6sybhQhlYQunFRy6AUhBrmkgI
# iMCTtaV2ICuStB0oEPZQRqVs2rNAAX9QrcDYgS6ZA/uoJVezeiI2oCYuy0bJxHWp
# Bk4tHiEr553VbLlF6hO9V177HkpWFpriUnxbNGGvcpuOHReorD94cXygG3ILP5cu
# 2y5mFJtT+nZpe6VOFOgBiX2WQLExiDw5FrGq0a+Ot96Xo+6SUmiWXF6njx859jJw
# 9RUWpTdhs0X/3jfxGFTxIRkmPnTBCgv3b+eMwJARP4J2Pjmr9Oae5nkPHSmcLukV
# Z/Ji+5cbg1SG32Jt4KHWr5CblcHhvM+USXB7r48NZev+aALjkGIYuE0LqoFe53Zb
# E1DFOUDT7wU3HgywtCNtX6GCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA1NDda
# MC8GCSqGSIb3DQEJBDEiBCDs3B5SJfcTFAiZ6Kaswqil7G5A2z5VT4SMygl0KagA
# zjANBgkqhkiG9w0BAQEFAASCAgCNykou8mmVwn9I+41BnkMP3MMydj39HF8S4EFP
# +eeRRIWLsjBKjKowKrneWg4rSO0oCH4CUi4NIgk7DBDJRQF4rqM2QMlnXmRZK36v
# tUQDafDVs8XtKElXXs90rCedq5yxk6Jekox0EiyNVxcjxEK1+rsA/Lfw0pJhAafv
# Kb/1PJ+VpUmba/axhbq1qxQnIoJ60Nb6MHjn4qCdWjcyDP4WX5LhN/rY6I+Eh1SP
# /u/bJFgeUfuxJPKmxYz06iBthND0uoiSNnuNLsDmYpWwx8qUVxMYROFqN1wdVX3h
# 3JDal5MA62/pHVUVUcZLXSO4icHykWmRxVyMc5/OP/ko38Woi8cl+HRH7CB5IOKo
# 3LYVRW72+lX6uvRoFs1148n5XjzREB45Bakg9D7Ad6f/kgNbhC4wq2WpVPXu63kA
# xTBBIeAK6LUROFO44slQmfTK57PXIZrlvdVChd4W4KLWeNf1OmpHMB+nf/G5EK3e
# 1YSNxKxtRcjTaqjEWZKmueG9nYx0Mt+2C0nE1rrXXKHy6976aes6/429gUEz7jtE
# 4MstApkVF8fuQSP0PqKZ7wACYpPa3dbqX2gbaEK1fGsMmbsk+LNTqKXDTJCD/QGi
# MFQvO0bWvMPCICn0a5FYL03KESaZQ52oubfJOf0O/oUv2bNfGnRytsNWkGXzXswQ
# wt7zuw==
# SIG # End signature block
|
Get-ADFSTkStore.ps1 | ADFSToolkit-2.3.0 | function Get-ADFSTkStore {
param(
[switch]$ReturnAsObject
)
$dllName = "ADFSTkStore.dll"
$Name = "ADFSTkStore"
$dllDestination = Join-Path "C:\Windows\adfs" $dllName
$binPath = Join-Path $global:ADFSTkPaths.modulePath Bin
$dllSourceLocation = Join-Path $binPath $dllName
$ADFSTkStore = Get-AdfsAttributeStore -Name $Name
$ADFSTkStoreIsInstalled = ![string]::IsNullOrEmpty($ADFSTkStore)
$ADFSTkStoreDllIsInstalled = Test-Path $dllDestination
$ADFSTkStoreDllSourceExists = Test-Path $dllSourceLocation
if ($ADFSTkStoreDllIsInstalled) {
$InstalledDllVersion = [Reflection.Assembly]::Load([IO.File]::ReadAllBytes($dllDestination)).GetCustomAttributes("System.Reflection.AssemblyFileVersionAttribute" , $true).Version
}
if ($ADFSTkStoreDllSourceExists) {
$SourceDllVersion = [Reflection.Assembly]::Load([IO.File]::ReadAllBytes($dllSourceLocation)).GetCustomAttributes("System.Reflection.AssemblyFileVersionAttribute" , $true).Version
}
if ($PSBoundParameters.ContainsKey("ReturnAsObject") -and $ReturnAsObject -ne $false) {
return @{
Name = $Name
ADFSTkStoreIsInstalled = $ADFSTkStoreIsInstalled
ADFSTkStoreDllIsInstalled = $ADFSTkStoreDllIsInstalled
ADFSTkStoreDllSourceExists = $ADFSTkStoreDllSourceExists
InstalledDllVersion = $InstalledDllVersion
SourceDllVersion = $SourceDllVersion
dllSourceLocation = $dllSourceLocation
dllDestination = $dllDestination
ADFSTkStore = $ADFSTkStore
}
}
else {
if ($ADFSTkStoreIsInstalled -and $ADFSTkStoreDllIsInstalled) {
Write-ADFSTkHost storeIsInstalled -ForegroundColor Green
}
else {
Write-ADFSTkHost storeIsNotInstalled -ForegroundColor Red
}
if ($ADFSTkStoreDllIsInstalled) {
Write-ADFSTkHost storeInstalledDllVersion -f $InstalledDllVersion
}
if ($ADFSTkStoreDllSourceExists) {
Write-ADFSTkHost storeSourceDllVersion -f $SourceDllVersion
}
else {
Write-ADFSTkHost storeDllNotFound
}
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD6NITH4SrSDLRi
# 85VyLPycw9OOeVbbH0yqxNXNSRXje6CCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAsUiOrsJDaUQvJP0gK8Qv7p99V
# QbBwJhuRAqVXY3ZfVjANBgkqhkiG9w0BAQEFAASCAgAAXACI6WeLSLkNo63lycLN
# RhupBYonPv0gel+mNodZd4vQUv6N9fZRAm+htzhq9QHQuLo4KYhi3uBDajrWt44C
# jCKp5Nj96PogmYEhBGqaDupeNcIUqUQVg8jYul8fnwjasI+r5Cu0y4Q6btyG3PCc
# +H2oFpjVy752zLnH4ss5+9ZFTWsBFDDH3uDm6HWkheCgWIlOcAgDjy5rf8jHP4F0
# LRfhaIRiQzanH6M49date6MhNo/l/2mpctSyJLzzS9wAC168YLtqlBrXe/mu21v7
# KkkXD3bNBwZ1RpK4TEnMNYym+Mv+nwelrZHN4MQcXbGcOhgBaOs7dM6ccryTcHz2
# 2RwBa21aa3X1VaIF8G6lOmSJRoeJAU0dMV3iX26lZVQx1VCFjmDf5C9L899CqOpF
# jtOlU+gteEYuTYQkTh5Syj5XIM8RAytiJRKU0cxSfIRE6I+ej8iWpDTZc60wk9KR
# ocNBbQdc/ccutG5diOfOOHeNMMKpjQJ+huyuCUhBBlhJ/0tvoPhQYK9XwN4YA4Z2
# XeSp+PfXPGRgGGC9bq+rD+557xfQYx5HfJj2Esj+AUJRfGBULpbrIHlxtt2KOkwW
# zIOv+ZMmRFSHplmQlhmFyhDYHU0MbhIBualvtB4JjVQhAOv/Hk/iDYMDc9i9SB+m
# vm3CXyBfmPimvPbWR15GAaGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA1NTJa
# MC8GCSqGSIb3DQEJBDEiBCAuAQNvTQ3j0XsQSImb5pFtMKl5XTj5juMyZD8ARbvo
# qjANBgkqhkiG9w0BAQEFAASCAgCJsGn5PUcJjH/xamtpknze8bndMKUdFBlmh3sX
# XvWslAwhdZ3PSWvt92rBQTByjTjG58pVY+VEo2YzsFh/9sYmoDRgbA/yADYXjfUR
# vSLqURwUPAC1gUAofxqqs3Ga+5a5JRoYL6u5EfXkc+DPyTqt7Hlo0JYF43+BBGz0
# C8AiPoCuHN+XqIO7b2DBsN7YeBQwEEzsduAxMiyjAG2/dWRmavA/q5MdPWIlY5Ee
# 0jldAQWWIF6c2PyyisIoSMtq0+hcc2qxfOPybl4sC94Ugx8if3jsmG4TlJDIw54h
# rkBq2lMI44egmWugQje4AHeEit481vjUV5FGbGgbjq1nugAncJK0B+u1wKzXs1f+
# GRGhhXNChsKGHwKDPsGtkiVgdSsGYPeLn7PlbO5/rv2vkxtOc9JfiKHc2mhqk2PK
# vpzFLV8EmJGGbCVNeQ99JYOw1F9VAu842eC6pLBlGVzwXkGIYT6nGjPoUICpLjNT
# /CUjVqYOr79uTEi3Z3mqyo29VbjiK518WrfpCmjisntgyxVvwYfzG/dDHKRpX/1f
# H3grRLxhwlj3r0T6kr7eew1MiI36nXX4AerkISwlBD4fg8eXG+Av2/Upia5w1YtO
# 9jtJ43FmqJwFWSecYwTKsvuKLtj1Ozy3srBppm8W9KED9PQuic8pnjEpEMcR+/mS
# 7VGlhg==
# SIG # End signature block
|
Get-ADFSTkToolSpInfoFromMetadata.ps1 | ADFSToolkit-2.3.0 | function Get-ADFSTkToolSpInfoFromMetadata {
param (
[Parameter(Mandatory = $true,
Position = 0)]
$EntityID,
[ValidateSet('List', 'Object', 'XML')]
$OutputType = 'List'
)
$MetadataXML = Get-ADFSTkMetadata -CacheTime 60
#$RawAllSPs = $MetadataXML.EntitiesDescriptor.EntityDescriptor | ? { $_.SPSSODescriptor -ne $null }
$eid = $MetadataXML.EntitiesDescriptor.EntityDescriptor | ? entityID -eq $EntityID
if (![string]::IsNullOrEmpty($eid) -and ![string]::IsNullOrEmpty($eid.SPSSODescriptor)) {
if ($OutputType -eq 'XML') {
$eid.InnerXML
}
else {
$SigningCertificateString = ($eid.SPSSODescriptor.KeyDescriptor | ? use -eq "signing" | select -ExpandProperty KeyInfo).X509Data.X509Certificate
if ($SigningCertificateString -ne $null) {
try {
$SigningCertificates = @()
$SigningCertificateString | % {
$SigningCertificateBytes = [system.Text.Encoding]::UTF8.GetBytes($_)
$SigningCertificate = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2
$SigningCertificate.Import($SigningCertificateBytes)
$SigningCertificates += $SigningCertificate
}
}
catch {}
}
$EncryptionCertificateString = ($eid.SPSSODescriptor.KeyDescriptor | ? use -ne "encryption" | select -ExpandProperty KeyInfo).X509Data.X509Certificate
if ($EncryptionCertificateString -ne $null) {
try {
$EncryptionCertificates = ""
$EncryptionCertificateString | % {
$EncryptionCertificateBytes = [system.Text.Encoding]::UTF8.GetBytes($_)
$EncryptionCertificate = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2
$EncryptionCertificate.Import($EncryptionCertificateBytes)
if ($EncryptionCertificates -eq $null) {
$EncryptionCertificates = $EncryptionCertificate
}
elseif ($EncryptionCertificates.NotAfter -lt $EncryptionCertificate.NotAfter) {
$EncryptionCertificates = $EncryptionCertificate
}
}
}
catch {}
}
$SamlEndpoints = @()
$validEnpoints = @("urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact", "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect")
$SamlEndpoints += $eid.SPSSODescriptor.AssertionConsumerService | % {
if ($validEnpoints.Contains($_.Binding)) {
$_.Binding
}
}
$spObject = [PSCustomObject]@{
DisplayName = $eid.SPSSODescriptor.Extensions.UIInfo.DisplayName | ? lang -eq 'en' | Select -ExpandProperty '#text'
EntityID = $EntityID
RegistrationAuthority = $eid.Extensions.RegistrationInfo.registrationAuthority
EntityCategories = $eid.Extensions.EntityAttributes.Attribute | ? Name -eq "http://macedir.org/entity-category" | Select -ExpandProperty AttributeValue | Sort
RequestedAttributes = $eid.SPSSODescriptor.AttributeConsumingService.RequestedAttribute.FriendlyName | Sort
NameIdFormat = $eid.SPSSODescriptor.NameIDFormat
SigningCertificates = $SigningCertificates
EncryptionCertificate = $EncryptionCertificate
SamlEndpoints = $SamlEndpoints
SubjectIDReq = $eid.Extensions.EntityAttributes.Attribute | ? Name -eq "urn:oasis:names:tc:SAML:profiles:subject-id:req" | Select -First 1 -ExpandProperty AttributeValue
}
if ($OutputType -eq 'Object') {
return $spObject
}
elseif ($OutputType -eq 'List') {
return $spObject | Select DisplayName, `
EntityID , `
RegistrationAuthority, `
@{Name = 'EntityCategories'; Expression = { $_.EntityCategories -join ',' } } , `
@{Name = 'RequestedAttributes'; Expression = { $_.RequestedAttributes -join ',' } }, `
NameIdFormat, `
@{Name = 'SigningCertificates'; Expression = { $_.SigningCertificates.NotAfter -join ',' } }, `
@{Name = 'EncryptionCertificate'; Expression = { $_.EncryptionCertificate.NotAfter } }, `
@{Name = 'SamlEndpoints'; Expression = { $_.SamlEndpoints } },
@{Name = 'SubjectIDReq'; Expression = { $_.SubjectIDReq } }
}
}
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD65J1MgRjlzE10
# ClNAaXtWQa4u2jK5Q/kxYgMBT/BOr6CCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDGKxFnypAdJMSm/GOfcq0LUmTD
# jIMnQ5sYss/tkNY45jANBgkqhkiG9w0BAQEFAASCAgBGgWlY8m2qZ151UJlCTyI2
# LAwj+R6W6u5pzm9aiNtVDSDzHJuIZfq79uIoRnpBChTGL+VB87rfrvL0tlWPdqSM
# bzzXiKvCg/MQr0qhWhT5yJU4ntrjuKRjbFB3pT0TNfn0aUUi1XZ4aGiM1iWs6ky6
# P7SZJGZFxYXGh9sI5DVlNXYtx7tH3+qwsfWQMylu4JEnYr42tH5w1I1DR+JZL+tm
# MLe0dJPYKQNpeN9URvrh6KYnUEAgT+dRElZqmpiLplblJjQ0quBGtR9Ci8pQ3i1t
# A0co6MNXn9tn1x0lzdE3je4YlPiyo9DKLtL7oGt5VHYyHmo175hVeaNbFcsR2reT
# tLd+jsYuMIn9120iYVITpQMEYHCPEGXpf+/Rg76KUgM22Xr+kNreRBGqXQdVQSSO
# wOxc1V2EmqQYXVIZvBUdFydpx7PqvzaQKWj9FCS5qVwE3MFGENoAwHgQv33R1ys+
# po76kdhSlmE+bC4DfzDuOPrIxDRRowPfiU9QpjRhbAsBwpEhZdm56FOV7DsNZj5p
# 5ZfWI8N2ZXMwHtsRMaufkBBpVTcCeJHUMq98v/twrqJJtfpgtP7CTggQwJs74RKq
# bxJvi3dIc/Tf0EPXMGEn2wT2z+DawMelg8vEwDM4cDN53jv6TnPOKvyHb1HiIjYs
# j2GZOS393CeCo0WqhLnpl6GCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA2MDJa
# MC8GCSqGSIb3DQEJBDEiBCBUXUeaTrO8iCgLvp+3QTdp3tM4QR96RgATlDLNQCpN
# EDANBgkqhkiG9w0BAQEFAASCAgApJUiHbYHzAEgbfS5rs8GvYR5x7fFoQ4wKoBQh
# 8F6Nx+DPnDROTjW0Ud1b67MBCAzvdwZZPagFLp7GqSvel5fv05SJtYYODkMmC13/
# yl3YZO5+SdFzV7j50T4vtF+BMP7wtrM7+GOyVwPdvKNNqc3OuEBqjtEh85116JGZ
# jR6kg+P9aqaUvY1KwS0Y/ziPpPriyVGRNi7pTBM9fJVbcjsfcJQD1uurjfgmInxh
# vTccWqk1bnR1Wv6SCwffpp1JsvKCejh1fZ7NgHK8DrEDpaDjAM6J/Yk63IfOdqe7
# cnAn78ZK/3jqDTzC0vHu5ZKM2RoCcMrNNWQt7c02HtwGAhIit790CVYR6JXlanHW
# yKZjwii/CMnMiSzUv9vEKWXtEsSEB9nvQOpeVAiRqOaSqHLmRt5P9Nic71zZ4Sbd
# TOWBgznApyr/WUwSuMbN0E7lW2MnsUt1lC3PFj78dlLoIvwRcdVtPkRhvW0gixpO
# fSBjMNQrA0XopyI2F5w6pYIRQzGb/teKEECWiLZiWygtSSWCADo5FqiuIylrfsoS
# dmM5rxCjRSaanTtyErNoGGCi/Vc/O4cFJGbSgO+/jzasBSGEUZp1C9afxlsgrO2G
# 8xYMClr/JW8glz82i+GHu5bsMpFgqMBk8ks4wt1Tfn0gUvxz5qWonZn9lHQvmFBn
# i/vq9A==
# SIG # End signature block
|
Check-ADFSTkSPHasChanged.ps1 | ADFSToolkit-2.3.0 | function Check-ADFSTkSPHasChanged {
param (
[Parameter(Mandatory=$true, Position=0)]
$SP
)
#Try to get the cached Entity
try
{
if ($SPHashList.ContainsKey($SP.EntityID))
{
$currentSPHash = New-ADFSTkEntityHash $SP
return $currentSPHash -ne $SPHashList.($SP.EntityID)
}
else
{
return $true #Can't find the cached entity so it has changed
}
}
catch
{
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText processRPCouldNotGetChachedEntity)
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCWQ2Wx8ExLOjF2
# dXCqaivxeJozR85NSncXOWUaoa4GvqCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDWPqcNxgQwC8BvYXHnUeze/Xnh
# q84JzdlqJ6BzkQajijANBgkqhkiG9w0BAQEFAASCAgB0btiktB1kvVk9v1bqBISD
# hSD5c67PEzL0YZClS+ir4P7k30IHRNaf45sEo6T986vPAmVF0M8pie70NEc8VGvR
# kI5waVCgS75HvStAvY1M5GBbzpNg8WLqzKhWFNnPm873Nv4DAsTZsbu2vWumShfp
# YipuIV4w9c7oonJ6vef6fzdsf24XoPxW42AgcwJNbGeJpM0hyS+qEN88W+YJWQdS
# ecP+R7gfojr0IC6G67IjsMlzh4I9OZo4/YFHg4AIEJQt1DQ8XusELylTLnM9xFWE
# dg5UbXBhUIUTDgLIAYm3I/zG6CDJ0GxOQBvCJC8i5ukFzrQFiDfitM4FF7L+Q/Vy
# qLmgMUC8hFdHhMdNhegQNMCzULhIAC3/G/skKQRPgwWpJdA8cVbvaQY7PcxDoXy3
# Nh1bqsi3fPyj8LIG77DHRFpGaZu8S6wpexd0tGBBpuSBw8sidxYo8BE8doC6iHsq
# iU2bOoKW7ZAxI0JN+XhTaDDjmNd/qSf2Oa/+GMVQ2R/VP5nlVqCslhCJed5Rjk0G
# vzYI0TGMIUqmMuZ6wUzSSmSlAQbHkuG5Ji+UKUcYOy8sT+5zjxb6e3EYhHFMz6BI
# EkQykqDRQnkskYtmqQHXAkwwB+FlWdYMqwFcLjuvpuHADC1r+N3mxJP/zFFEtHXi
# gAit+XyGfULk9fndYCs5CqGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjAzMzha
# MC8GCSqGSIb3DQEJBDEiBCCTwJ9hUYLFYQcpxnYfLvkvrwzHJy0TiJ5tVxG6MPED
# tTANBgkqhkiG9w0BAQEFAASCAgBPadTDCFbf5ZEcbojdu68Cu6U4V9krX9OIRRY9
# qBFkYKe8dkVC5nvsKcFo9gCX1oi5nd88CwWY41IPg3sdVI6aN1dJOvbuSRnhlNwD
# +iv0j3ghvVtMg4FLjQa+/gbBCE+HQBZMZ0uzyVirL6s0g9TJB2E9AzvTirYlKFvW
# J2T36/6TyjQG0apqmvDNReyWanIRotU2O7S3ycXJtbxspKALXDGvocjaLA/w1x2i
# YfNVB4eGXyUiLovCH9JT4Q31ueo/BYfRF38Oz+no8ZP8FmVizfaOo9kb1fPk6UmA
# bE3A1nU6mU2+FwZprVq8NXyu0wn2dmJ00OnW9Xv/OMg2/lSON6scu37ueL9X24Rv
# icltENLdleI3RBXARrsDRj2GvkqKZiivVQHZa6+wuAbxfQHnhYvryS4xO7KTbadU
# SGD1TMvrEmwD7fykh2xUDBZ0QbDxJcz56QbbHdrlX8dwThE24NzFb3Tll7JZvRoq
# HcKpuFA5va35BoklnrjOH+vGM2+d29iPVdrEQDZZ+RWr8quTQTM3IYB4dWZkHiN9
# ZHIUjFPKUVBWJisnH8tNo38XdacP5V1TkJtB4218Qa0HCwFrgews2Onu3i670G+s
# b+G2ohcqVRID5CEmAXREx05ud5+JoULAMVHJcEap2pbHDYPomfuiA2B6rT0hetSA
# N6ye6A==
# SIG # End signature block
|
Get-ADFSTkToolIssuanceTransformRules.ps1 | ADFSToolkit-2.3.0 | function Get-ADFSTkToolsIssuanceTransformRules {
param (
[Parameter(Mandatory = $true,
Position = 0)]
$entityId,
[switch]$SelectAttributes
)
$configFiles = Get-ADFSTkConfiguration -ConfigFilesOnly
if ([string]::IsNullOrEmpty($configFiles)) {
Write-ADFSTkHost confNoInstConfFiles -Style Attention
}
elseif ($configFiles -is [Object[]]) {
$configFile = $configFiles | Out-GridView -Title (Get-ADFSTkLanguageText confSelectInstConfFileToHandle) -OutputMode Single
}
else {
$configFile = $configFiles
}
[xml]$settings = Get-Content $configFile.ConfigFile
$rpParams = @{}
if ($PSBoundParameters.ContainsKey('SelectAttributes') -and $SelectAttributes -ne $false) {
$AllAttributes = Import-ADFSTkAllAttributes
$AllTransformRules = Import-ADFSTkAllTransformRules
if (Test-Path $Global:ADFSTkPaths.institutionLocalTransformRulesFile) {
try {
. $Global:ADFSTkPaths.institutionLocalTransformRulesFile
if (Test-Path function:Get-ADFSTkLocalTransformRules) {
$localTransformRules = Get-ADFSTkLocalTransformRules
foreach ($transformRule in $localTransformRules.Keys) {
$AllTransformRules.$transformRule = $localTransformRules.$transformRule
}
}
}
catch {
}
}
$Attributes = $AllTransformRules.Keys | `
Select @{Label = "Attribute"; Expression = { $_ } },
@{Label = "Example"; Expression = {
if ($AllTransformRules.$_.AttributeGroup -eq 'Static attributes') {
$Settings.configuration.staticValues.$_
}
}
} | Sort Attribute | `
Out-GridView -Title "Select one or more attributes to build rules from" -OutputMode Multiple | `
Select -ExpandProperty Attribute
$Attributes | % {
$TransformRules = [Ordered]@{}
} {
if ($AllTransformRules.ContainsKey($_)) {
$TransformRules.$_ = $AllTransformRules.$_
}
}
$IssuanceTransformRulesManualSP = @{}
$IssuanceTransformRulesManualSP[$EntityId] = $TransformRules
$AttributesFromStore = @{}
$IssuanceTransformRules = [Ordered]@{}
if ($EntityId -ne $null -and $IssuanceTransformRulesManualSP.ContainsKey($EntityId)) {
foreach ($Rule in $IssuanceTransformRulesManualSP[$EntityId].Keys) {
if ($IssuanceTransformRulesManualSP[$EntityId][$Rule] -ne $null) {
$IssuanceTransformRules[$Rule] = $IssuanceTransformRulesManualSP[$EntityId][$Rule].Rule.Replace("[ReplaceWithSPNameQualifier]", $EntityId)
foreach ($Attribute in $IssuanceTransformRulesManualSP[$EntityId][$Rule].Attribute) {
$AttributesFromStore[$Attribute] = $AllAttributes[$Attribute]
}
}
}
}
$IssuanceTransformRuleObject = @{
Stores = $null
MFARules = $null
Rules = $IssuanceTransformRules.Values
}
if ($AttributesFromStore.Count -ne $null) {
$IssuanceTransformRuleObject.Stores = Get-ADFSTkStoreRule -Stores $Settings.configuration.storeConfig.stores.store `
-AttributesFromStore $AttributesFromStore `
-EntityId $EntityId
}
}
else {
$MetadataCacheFile = (Join-Path $Global:ADFSTkPaths.cacheDir $settings.configuration.MetadataCacheFile)
$metadataURL = $settings.configuration.metadataURL
if ([string]::IsNullOrEmpty($Global:ADFSTkToolMetadata)) {
$Global:ADFSTkToolMetadata = @{
$MetadataCacheFile = Get-ADFSTkMetadata -CacheTime 60 -CachedMetadataFile $MetadataCacheFile -metadataURL $metadataURL
}
}
elseif (!$Global:ADFSTkToolMetadata.ContainsKey($MetadataCacheFile)) {
$Global:ADFSTkToolMetadata = @{
$MetadataCacheFile = Get-ADFSTkMetadata -CacheTime 60 -CachedMetadataFile $MetadataCacheFile -metadataURL $metadataURL
}
}
$sp = ($Global:ADFSTkToolMetadata.$MetadataCacheFile).EntitiesDescriptor.EntityDescriptor | ? { $_.entityId -eq $entityId }
$EntityCategories = @()
$EntityCategories += $sp.Extensions.EntityAttributes.Attribute | ? Name -eq "http://macedir.org/entity-category" | select -ExpandProperty AttributeValue | % {
if ($_ -is [string]) {
$_
}
elseif ($_ -is [System.Xml.XmlElement]) {
$_."#text"
}
}
# Filter Entity Categories that shouldn't be released together
$filteredEntityCategories = @()
$filteredEntityCategories += foreach ($entityCategory in $EntityCategories) {
if ($entityCategory -eq 'https://refeds.org/category/personalized') {
if (-not ($EntityCategories.Contains('https://refeds.org/category/pseudonymous') -or `
$EntityCategories.Contains('https://refeds.org/category/anonymous'))) {
$entityCategory
}
}
elseif ($entityCategory -eq 'https://refeds.org/category/pseudonymous') {
if (-not $EntityCategories.Contains('https://refeds.org/category/anonymous')) {
$entityCategory
}
}
else {
$entityCategory
}
}
$EntityCategories = $filteredEntityCategories
$subjectIDReq = $sp.Extensions.EntityAttributes.Attribute | ? Name -eq "urn:oasis:names:tc:SAML:profiles:subject-id:req" | Select -First 1 -ExpandProperty AttributeValue
$IssuanceTransformRuleObject = Get-ADFSTkIssuanceTransformRules $EntityCategories -EntityId $entityID `
-RequestedAttribute $sp.SPSSODescriptor.AttributeConsumingService.RequestedAttribute `
-RegistrationAuthority $sp.Extensions.RegistrationInfo.registrationAuthority `
-NameIdFormat $sp.SPSSODescriptor.NameIDFormat `
-SubjectIDReq $subjectIDReq
}
$IssuanceTransformRuleObject.MFARules = Get-ADFSTkMFAConfiguration -EntityId $entityID
if ([string]::IsNullOrEmpty($IssuanceTransformRuleObject.MFARules)) {
$rpParams.IssuanceAuthorizationRules = Get-ADFSTkIssuanceAuthorizationRules -EntityId $entityID
$rpParams.IssuanceTransformRules = $IssuanceTransformRuleObject.Stores + $IssuanceTransformRuleObject.Rules
}
else {
$rpParams.AccessControlPolicyName = 'ADFSTk:Permit everyone and force MFA'
$rpParams.IssuanceTransformRules = $IssuanceTransformRuleObject.Stores + $IssuanceTransformRuleObject.MFARules + $IssuanceTransformRuleObject.Rules
}
#region Custom Access Control Policy
$CustomACPName = Get-ADFSTkCustomACPConfiguration -EntityId $entityID
if (![string]::IsNullOrEmpty($CustomACPName))
{
$rpParams.AccessControlPolicyName = $CustomACPName
}
#endregion
return $rpParams
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC41JtNFV0Oei4F
# ADgg3m8sOJn98TzwnAivBBdIL9KL0aCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBwZ6o8tbQF9hWnWlU/kqBzOLuq
# q/fD1sTEjYyGUAm9lzANBgkqhkiG9w0BAQEFAASCAgB5sVBoy02IMJBwUa4+oaV0
# gLjeL6wJljOCavoYfdxGJ68LfSE0+RmUt1akEWGmLLyl2vfhKKRGGkDD4mKjUvPh
# Ha/wtWK8Mik9bxLSZ7NW7jU/ZnsfhQLyx1fSlOqTVnfJ+bymwDUtSKnbfi6JCmvJ
# Nuce8NB5FWCcabFuvWe5nsqRhEUi7/BIQrxSf+SfVq2mc6rl9bVnPjJdfSAVtKbg
# 3/w38LTEAQUWaUSf2qjfn+NoyI1f3OQqH9n9B/DbNRG3Yd/t1B3da+ACr1RTTV7F
# vnaju6EGQGNw0re+PpCs/66xFsRJvOv7dsCgicGHg+LT37JCRYKWaN+diWaoBipk
# 2k/paTI3sKRZLG8ibzTpsLGxJWCv15AynCRjHzBO1nQXKWThEMcxw/moJKFHM4GB
# VdCcRFMp0+3kpLMTPICidK0TgM4fHGTpK9F8mvO0e9P8XHktQapxEIwRneAWYS/T
# +5ARphzRW6PGufFGYOAn34vET3h9KzsSnUDPlIGHJWOlNWxHzOBMSiwOXuRHurR7
# FNVAr2dj2lBnDTE45jnB4H7B4O9defBzLExi1IqG7vnC5T4/ydecXaj4/HFD2sRP
# uKUVEPDZR30gsyE7ogVAi6Jmwb/M7Dl2GFINkhHgdRFcTBNktkr058PmcQ6jrHHU
# DL+mDgSDYxRgI1oTDDFO3KGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA1NTla
# MC8GCSqGSIb3DQEJBDEiBCBtB/cpRtNU3kfwNbAbhZUbGma6pp9b+6awVzKn11U6
# QTANBgkqhkiG9w0BAQEFAASCAgAjbIZYCsmrgPTdbV90DEPHTc4oadkpENN5nhGk
# xPjNFbStduwtJYQWstgUL3jmIIXXxDnRvWojwUfBq5zeuzsIxuV6OQOWpHBBMoI6
# qdd9wgNRKyYCwIW2ed4TbDanE9pYGzcAf/wz9wdwXtRgZSrIIlv8uclOQ9pUXQi8
# a5oeHR8Arq41LWGmKaweAbJoEvr2br4sKwhLA9uzzSXt3Itndonc/sTPqYZgi1fI
# 7kBJDcNKsPsDaSYN90tcWwHKVt4PXfVsNEyPjzWCIkl5N7kPp6R68u8Do4ZTISTp
# 4de7aVfsH+IO2hLmK4DgcDEaY+wW6rAvEYsKAeiGAVyGzhrh/aIFAWiBWc46ztYq
# RrfZNp2qQQ6M7Oz0/zitUlm0xknkWY+qDso28PNh3e9v5hHTQ0krMOcz0ULho94i
# Jd3XMs1lU0WkN6/RO0Dwhbf7m0fKbdkrn+ZIR0ARlV16PDDxksfjA5S+Y/ba8GlI
# KRolp47SZH/fdOF2p3nLtnUtMS2DxbedVHH5QZ9XlJSIAW/Jv6Vh5dzufpuuZg7A
# tBkKY3/KskER801K2kk1vjRN1pTOUpjVHd2mexg4IKmMijzpqfD4VAl+lDc7Xl20
# rsafW+tVQUfxjIRPmlPfVComIQP+dBxIUf62xPjvuy63BHvcHJ8caw1MGRSOMfoz
# JNBDKA==
# SIG # End signature block
|
Verify-ADFSTkSigningCert.ps1 | ADFSToolkit-2.3.0 | function Verify-ADFSTkSigningCert {
param (
[string]$signingCertString
)
[void][reflection.assembly]::LoadWithPartialName("System.IO")
$memoryStream = new-object System.IO.MemoryStream
$signCertificate = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2
try {
$signCertificateBytes = [system.Text.Encoding]::UTF8.GetBytes($signingCertString)
$signCertificate.Import($signCertificateBytes)
}
catch {
Write-ADFSTkLog (Get-ADFSTkLanguageText importCouldNotConvertSigningSert) -MajorFault
}
$signCertificateHash = Get-FileHash -InputStream ([System.IO.MemoryStream]$signCertificate.RawData)
#Get Signing Certificate Hash from config
if ([string]::IsNullOrEmpty($Settings.configuration.signCertFingerprint))
{
Write-ADFSTkLog (Get-ADFSTkLanguageText importNoCertFingerprintInConfig) -MajorFault
}
else
{
# This string may contain colons from other output like openssl and if it does, we will strip them as the comparison below requires them to be absent
$signCertificateHashCompare = $Settings.configuration.signCertFingerprint -replace ":"
}
Write-ADFSTkLog (Get-ADFSTkLanguageText importComparingCertHashes -f $signCertificateHash.Hash, $signCertificateHashCompare) -EntryType Information
return ($signCertificateHash.Hash -eq $signCertificateHashCompare)
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBE/Gey7rnb4S8k
# 9JgK2s5PrsU7Xrhy3ewHzWBYBqQWiKCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBR0zRLxPYJ5CIOy7fdXW0cIojy
# Sn//bOwknbU/joBxmTANBgkqhkiG9w0BAQEFAASCAgAzUIiekweHBHnrkYxJqe66
# eLukMuoQsnd5l9TUy6bIUPY7R+Be4wXROoA0gn95i05mT6WXAjo9COyGy7E1T74M
# 9DBX6WJmWSLI77khPUf8wQDGUCcU07EhH85tY66NaELJZZDtoJMXx4qRuDnmWna6
# y3OgORqAfQ43PgYLx3pzkGm9e/j/Ui4yY3SAnSLHjIZQ64Gt8YRG76JO0AoRvD6a
# KYwkdDTPHdmD3U35sqjPWR3nIe6jc8GoOEfQ3wxWF/2XBEDt3AMLFTIwiPQLEqQI
# E/nKe9j/CB3Dtwb9y4QyoSFtqv0ubyOhCsmL/XNXa3BwM9Fu3MYoa24M8B5mQXo2
# +kszAT+UgdqO7aqwOP2XOIIk2tLg/B+bAty+Ol/1/reARae5DCo+iAih+5fGvLU8
# 83X87vCZWZTLKWbmqfkbs+Uqh0ZtoTiQ/reh88pg8RkNemo/blK1lTR4/GcSj9F0
# sVGdL4ez0tX4FOiVKrY0A6buWB3KaZ6N/eNRKtHGGllDyhF/rmyjpcyQZAWRcgwS
# 7XASV6jkmZpFoCC+swnLjCUbmLNmkbPXUcnRBbjwfsba7IqlWavPvcyx6qfyEg7o
# B9S/JUbOi5G7vY4bflrd2m4Eytku3TZNEnGWnFUO8KKcEPlOIETks81Ozk44qzuI
# H0FzME2/sFOW+PbS3oVvi6GCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA1MTla
# MC8GCSqGSIb3DQEJBDEiBCDl/a5m0GV1H2GZrvXLtaJtIqSPZ3dzMiZuqgzzFFlS
# 0TANBgkqhkiG9w0BAQEFAASCAgC7+jUgprmNiTCw08KAzrA7wbVp62JLpjEhvfR0
# S4RWD6vThWIe5ykFuHZj9ljLuvhYPUz1KJOQOajaecGR52+s0rwpeZ+LwgaZ6t05
# 5dqOd0driA+ybGVuX5gyEy7QnsTfNCKWDolppYN7LVdH8d9d8klOJjQA/M41TbeI
# jpX9q0ES32qgELQwG8xuszKrH+eEbWBzmh2Phq0kjsBOBaeQfec0uP1qhA93JZz5
# T9qgvtG2uTFm6dKzuQrobWQcB95qM1bWe6/X+hJLC1AwcKN2GYkLD/TXSaKOD1Cu
# wsUrxDQ0XRQJCpalY4flYFQ+BHkRCQOW6hEBqBIo6gkQoqbCGwTmoZvd7Wpt03Um
# HuwblmkZLPBnhVivPkhgD5Z4sd4TvDRQ2d6UsE3jT8q7pMaycy5sPiGMSe8yXx7W
# NQ3UARoS5Vv3KI7WX83At9a5b7+NkKhtEvXtIIUzrCmDmf1j5iD6N+6LC3HYVv9L
# AsUEAO9jjG/df5BZUM2ypx3UV6TOTl/WXcLU/CslTj48Fn4FBmh90hjetDb0Z9sr
# +xAmyV0Y2F2Sc/ArhMJMe5sASDiRTBVB0Mwl0aii6c16N/nfdv1HlrT//m3uVXis
# STs99MyEMuq/IMdQl686J0h/L103BCdW9FMPIbps+MnfYR0/D6MQAjqIDttKtMfX
# 8gKb8w==
# SIG # End signature block
|
Get-ADFSTkInstitutionConfig.ps1 | ADFSToolkit-2.3.0 | function Get-ADFSTkInstitutionConfig {
param (
#The full path to the configuration file
$ConfigFile,
#Return only the path, not the content
[switch]
$PathOnly
)
if (!$PSBoundParameters.ContainsKey('ConfigFile')) {
if ([string]::IsNullOrEmpty($Global:ADFSTkCurrentInstitutionConfig)) {
$ConfigFiles = Get-ADFSTkConfiguration -ConfigFilesOnly | ? Enabled -eq $true | Select -ExpandProperty ConfigFile
if ($ConfigFiles -is [Object[]]) {
$ConfigFile = $ConfigFiles | Out-GridView -Title (Get-ADFSTkLanguageText confChoosenConfigFile) -OutputMode Single
if ([string]::IsNullOrEmpty($ConfigFile)) {
Write-ADFSTkLog -Message (Get-ADFSTkLanguageText confNoConfigFileChosen) -EventID 40 -MajorFault
}
}
elseif ($ConfigFiles -is [PSCustomObject]) {
$ConfigFile = $ConfigFiles
}
elseif ([string]::IsNullOrEmpty($ConfigFiles)) {
Write-ADFSTkLog -Message (Get-ADFSTkLanguageText confNoConfigFile) -EventID 43 -MajorFault
}
}
else {
$ConfigFile = $Global:ADFSTkCurrentInstitutionConfig
}
}
if (!(Test-Path $ConfigFile)) {
Write-ADFSTkLog -Message (Get-ADFSTkLanguageText confChoosenConfigFileNotFound) -EventID 44 -MajorFault
}
if ($PSBoundParameters.ContainsKey('PathOnly') -and $PathOnly -ne $false) {
return $ConfigFile
}
else {
try {
[xml]$Config = Get-Content $ConfigFile
return $Config
}
catch {}
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCDokUhQ/R0AKd8
# LQXhzs8Bze/Xs+E9TMSkfOM/H0iBJKCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAqtxT2nGVIH4tz5l82zsc502Nx
# CVZ4eVGnqBoCWG6yLDANBgkqhkiG9w0BAQEFAASCAgAdVS4Zn1P35DGS0LmMLWKc
# phiGdY7Bnk0Uozc+IA8ctGqDJoiI5EuV2lrCARPBTRNykD5PqyyP220ziOjzHX10
# MjGJMkvkyPl/KPqJ/CoOd0gT/aHM+Ke1AIMCzlmtB88Zr/aVPmZw2r5eL7FFATiZ
# QNy8+Lyjw816W5c73TrjbFZL8xAVmTc8hYgJR4eI8sSjTJJuF6UoKDQO1y8D3IF0
# GKfnz+uvJ49y6icfFdb13epCuT5SYgXqivmkiDYS4nPO0LnTFb2dHmMlgFXosLYq
# etTI9Km9mlwX5YuqzeJ0i6DLX9tMdCNH5P78s4+C5WS6h7BTr/2TWnUj1AcQF7RZ
# MkfuatX+ZAC0Ni9QvTDmXgQ198SN/LYIjAh/hRg5vnq69yQA8+ehwPLzrjSuHzbp
# OsuJjI828FO9Kgt5vaEX4qXm28uqjPXLvhkaN2jOSTWaCNmnhkXYpuCmKvtiN3Qx
# 8HuYabLKjJpeC8q1YGkB93IZV21QDuSIpORmZmHBB+zQ/Fig9nmQsRYUK4GOQi3O
# +EY+CmxfGcThb2h1eBgJBi0wLtahwcakkwF1MqYmkOUa8WYt451vKLJrtzp7futN
# 7l+YK/LcumVkmS2pLbdh7bTh/Z+dKlgJy6qCWRn5X+Dw6eKOigdmHpUURU/Q/ItX
# 5ZAIldrf7KBOBP9wTW9976GCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA0MDFa
# MC8GCSqGSIb3DQEJBDEiBCBZNlwA5YjE3/ZLypM4zJuB7XG7PNY8Suxc2VR7HskT
# MDANBgkqhkiG9w0BAQEFAASCAgBxxP1uZxlKqAPg7AL/LwlOgIbqVwjyWs0B5hhE
# JMhL58YF5EyAxlsJF2uyLw0GKeIzqd30SWFNy3eCsMnz9rKfTFLbNQhSBX1r6COW
# cnZh0mW3uRHxKOK36N1sE/41CnpFfSi9pHdZkRRXzXFkAVfogT26KkBRG9qV0S7J
# AntDIrTUFgBQWeGWIgy5NZPvxwDesGkTxH5aG6lqdg1ZzJ/As6JzFjWrkMHUj5yv
# ZDN8AIxzJEx2tjMohJrrQ/6jRGo4jHQolGSZMT/8NRc45Q00glo2d2v3tme1Nv/D
# SArzF/UZrpCwsNciDOaY8oUoCLod24ul+e0ZOEBWrYiw1VwyYmZeoAWuv0Aj4BAp
# RkdZvqaTIefY4ki2AapKn8ExZCRqq+IVrK+dEsv8v2LuN8RCeiVnRWvRXVjTgGj+
# /Ie06sy1Em2Ds3eyjKvN4g5kzt68F8yj3ZTEjEc6132XFgRLt+Zb1e31NLZMKQOE
# pE3Uxhe9+3zjnqbtM1xMObIY35gBIULIqwwQts0fCXh+s9J2Z3T6iOA9niUlROwz
# BA0s4uoy+yfv9+6o8rwm4DikxZOdiovU4Em4q1EJCAq0p4uLJzg2UtbWzuSSRY54
# u4WohrsOyWbBcZz85SJvAbqIj9bzft2bBuRZWw88boCDdKxmfZ+W1PnZY8mr/ajI
# C8bPMQ==
# SIG # End signature block
|
Get-ADFSTkTransformRuleObjects.ps1 | ADFSToolkit-2.3.0 | function Get-ADFSTkTransformRuleObjects
{
$allTransformRules = Import-ADFSTkAllTransformRules
$transformRuleTypes = foreach ($transformRuleObject in $allTransformRules.Keys)
{
[PSCustomObject]@{
name = $transformRuleObject
attributeGroup = $allTransformRules.$transformRuleObject.AttributeGroup
}
}
foreach ($type in ($transformRuleTypes | Sort attributeGroup | Group attributeGroup))
{
Write-Host $type.Name -ForegroundColor Yellow
$type.Group.name | Sort | % {Write-host " $_"}
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDysnqDM5rK+2rF
# Z8AdAv7CEZ8YQL/ZVpRDPbo3LgHP7qCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCD3fxYxpLwp/DgOjrpuwtW1jrJy
# 4H5bxVcAxaMMAmsX9DANBgkqhkiG9w0BAQEFAASCAgBLTY3m1E+SHzOD0KboR2hq
# lu8ZraFJEceq+IB8mSYF1praf/ZRyx0iMVIM/2OMjoQeNx7/dCWSt0A93Xifbfvp
# /LnPXo63z7HWxjrYDFz9hnqr5QWSocugZmCm183ejfbY95io0vCEsTpfjIxoLtTc
# ernQhVw69DC4y//vngyW69uBuZc2OqHGb3fXH/hz17t4lcIePAQsK243JnRCv5bm
# s8sFfR9Ax/p5cRYZ9pqjbfFTViPrdMcd8sn8Spv5WfVGMseXeh1cSxxD0SYrzYa3
# qrDunoHBFxcEh8M1KEct4D8nc2KXNcDws0J7OhV3DdrMG1MmQ5aFMdSqLF/8Meet
# W6M/r/RxW70+JZtYCZ/bqJgUVPGeA5xHxdjAi3FEZog2FukGTNFyoxVJAosGNBvS
# vfTENCaaLy/JXhUHt+pj18nCIHNc6WnIIkHvivsb5Cd400p4EeEovbB2MXsufqgP
# Ss/2qKM2lakJDFdSEjrLP8USb/QFj7pCGqfCyWFSaIooeKIWPX6bHeiGbp/WfWsT
# DuqpzdEAsrObRNy5f/F+Y9mMH7M0CPB+FCydlw+W6KFYBe+LBbnN3Dt88Pmjvy2O
# mEpIGnXm6G+fCe93OFMGSCu6WiWff9kDPwZ9b7CQrNpZg6qTCjlyWIujEYQL3ypD
# MemMyv88Ouf0kEzcwBTnbaGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA2MDRa
# MC8GCSqGSIb3DQEJBDEiBCDDF0yJ9AkSo8/ST6aVj7Xr6RXrv145c2GCAjMT+O7B
# CDANBgkqhkiG9w0BAQEFAASCAgCQEgs/xDWHtAiNGa9PcZ2yVw1CHjtThHvi5P9O
# /vHzH+C1fbQV5BqLsR1NZET9c1djTT4OfqXyAVIqQpIBZbnrtm1do6M1xJ7iaqNw
# ZBYP4VcLEWbwBS1rbXYU2XqtKW6BLqc3QouxuRzckiObFKfzELDlUFSxD208ifIr
# NmiLxA1dEQNvjsYFxKiClGUEdotEC1Yn49RV+0QfMWm4TT+fkoMWo5wtQvgvDQ2o
# zy1IhP9dXY8m31WLfsJMF92Y/RY5QFBNzyhqdNsDF6s2b0DzPHk4YwuVdadqMu1w
# p+egx/UCd6H2rnAuroG5N8uPlTD/Xo/Xak/UANB838OkSaPEpeOhlkq0gkNeGlmo
# mowoWOzWfXQVmtO0R0VAJu9A/0wnwOu3b+2aUcY1GI8H8HjNPsKsfYOgnD4O3rbJ
# nNSBOPSPsHlxITYO4d8MIUL1CgUWLZ/BMgY/ou3/vh5bBrSXv4vQj1zVVLprOgFY
# UcNhMVE8rIO1a4th3MsEglT/4g0UNxd9akcrXeSNltYNDQYsg27rRlVzFyudUGmy
# JlOOVXiGIO7LwnyHoss/bGwNlWgg9vnxsqV5P+jPyT774Tr+OtpEvCPo0LaF7zWE
# u802WLnvBCn517MUDlG6hUNPFrRdwOQLdcC/dacZWM//5lBV2/Y6ChFugHe0DkmP
# K2ZnPA==
# SIG # End signature block
|
Get-ADFSTkSQL.ps1 | ADFSToolkit-2.3.0 | function Get-ADFSTkSQL {
param (
[parameter(Mandatory = $true)]
[string]$Query,
[parameter(Mandatory = $true)]
[string]$ConnectionString,
[switch]$KeepConnectionAlive
)
if ([string]::IsNullOrEmpty($SQLConnection)) {
$SQLConnection = (New-Object System.Data.SQLClient.SQLConnection)
}
if ($PSBoundParameters.ContainsKey('ConnectionString')) {
if ($ConnectionString -match '"*"') {
$ConnectionString = $ConnectionString.TrimStart('"')
$ConnectionString = $ConnectionString.TrimEnd('"')
}
}
else {
}
if ($SQLConnection.State -ne 'Open') {
$SQLConnection.ConnectionString = $ConnectionString
$SQLConnection.Open()
}
$Command = New-Object System.Data.SQLClient.SQLCommand
$Command.Connection = $SQLConnection
$Command.CommandText = $Query
$adapter = New-Object System.Data.sqlclient.sqlDataAdapter $Command
$dataset = New-Object System.Data.DataSet
$adapter.Fill($dataSet) | Out-Null
$dataset.Tables
if (!$PSBoundParameters.ContainsKey('KeepConnectionAlive') -or ($PSBoundParameters.ContainsKey('KeepConnectionAlive') -and $KeepConnectionAlive -eq $false)) {
$SQLConnection.Close()
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCKKeoLSB5WEfpd
# NNztvLU2+pVz9WrjuTOsZnhV/yom5qCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDTZ4Ga2TgiXqxwT/X5N9BkFD6A
# G3ObfdXSwMEQNX5ZxjANBgkqhkiG9w0BAQEFAASCAgBInHti96mrY3UTuB8fjund
# aFtEH9nPQaHok25hrV1CCiityS1uMlTcgbfSgn2DY5K7bVHNJvPFCA6ryX1Wdlnb
# 48ahH/4fq565IDdFyZRFQByXG6+VuxJuvgndIpOacAL+dBgy4hqbodrBh8fvdYCF
# 6o7a+p2xD7+aclW5YtiUXkcDozTMnPhw8PszxhaivMojFygBWFPfLwVzGfFwyY/f
# o24QmoJKN+ncyoh6De30miCxfkOOZ7ryATUk/WbbfwL/iL+jIUBKPIvTtc9DQ8iA
# f8xDLQ5qeI7dBx0eYFMUe3XnklEWFWzLoi/PnIk61SLwzm95isQ3DMY97/kwglW2
# /J9M4OpgF4F0LxpxUvQPITFvDhQX2vbB8s3t98YxfDhHDgZk7pZoPILzZnx5RvxA
# GKCLc/Ba5KfQz8JK6vk0oL6h+cCx8ilre89VT+W9FV3F8KWOnip2tHdoyt3tHARZ
# nithdNU4VQFzUHulSrHxpfwqLweIwCWszLgTjbHxd1yCerL6l0kFUW8+58Oac+Tr
# GNvoipu1/+4v1XLSc+YPxTB5JbSYgqIYL31vJur8sWhqb8/1GTAhQ9Nr+p7frgn5
# b9FCkWwu0nHzxl8fK5V5Ae15zFFvThOer97dOnTbTv7FuOiIX2XqSlYBmr7ILQjd
# nnq1ZIIidw9ErjQvdfp2LqGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA0MjNa
# MC8GCSqGSIb3DQEJBDEiBCAxI64VEfTHeE6KZ7UBSmEXoSXYWsrPmwt4239HJFQ0
# UDANBgkqhkiG9w0BAQEFAASCAgAFTG08ccdYsOj5ni8kdyur/0pJQfeWYdGENlZK
# 26Q7q5lIdb5j6zx4t/SgRwXLXkJ8uJPof7NByZ/qvh5DHEF0Z13e5fRfMBdJQOvj
# cLo6vlyZToQy1WYRULW0DQXByqicVEFiFREDsupaomdHcAQfs0nF/ghLqKCn8/yP
# 9EXlHIleaqlyW+dYthyptJ6FeUaJ5XKKsyil4tWCD1lxCRl3KMmYuJrsFIXzpdWr
# /eY/e7R+UUYrRtZWMs6bW4GSQA52a4JSxmUScO6wSy7hkAT2or1JL3LruEpYekSL
# 2mZAIS2vx3FitBtTf07lrz0xJYAhelahfRl9DMAu5q8ZNrrpNMoc+sITaT3BZ5yk
# +JQdA0m0CIaD7vodwdGX5Ju6tk0sql1H0RklP28oO73F2kbM7E+Iueu3q/PwefG/
# rjG88beJ2XrJaEfCrDXDf//lFfhaKz3OUvWSJAtDTHepfVDDYNQdHQbQ+czCvbJH
# Itg2Yig3E6b1JAxkO+t4nHpbGuhPcPpXRDx6G8zl8rq9SVFsfpmlLHbes7KQLkhK
# pB31+4X1l5jXWRQkpo9qI/lZ2WU6wkL3yUMUqskyGlgGYxDXqwpiHLlK2+vqEIbK
# Y175fqJmjukBANTIByuorZsFW/vOhgTX5Y/S6S6wh9dbVcHP1Lx9AUL0rIQqc57m
# GrlbCQ==
# SIG # End signature block
|
Get-ADFSTkInstitutionConfigDefaults.ps1 | ADFSToolkit-2.3.0 | function Get-ADFSTkInstitutionConfigDefaults {
param (
[switch]$FederationDefault
)
if ($PSBoundParameters.ContainsKey('FederationDefault') -and $FederationDefault -ne $false) {
$mainConfiguration = Get-ADFSTkConfiguration -ForceCreation
$federationName = $mainConfiguration.Configuration.FederationConfig.Federation.FederationName
$defaultFederationConfig = $null
if (![string]::IsNullOrEmpty($federationName)) {
$defaultFederationConfigDir = Join-Path $Global:ADFSTkPaths.federationDir $federationName
#Check if the federation dir exists and if not, create it
ADFSTk-TestAndCreateDir -Path $defaultFederationConfigDir -PathName "$federationName config directory"
$allDefaultFederationConfigFiles = Get-ChildItem -Path $defaultFederationConfigDir -Filter "*_defaultConfigFile.xml"
if ([string]::IsNullOrEmpty($allDefaultFederationConfigFiles)) {
#No default config files found - Ask if we should download from GIT
Write-ADFSTkHost -WriteLine -AddSpaceAfter
Write-ADFSTkHost confCopyFederationDefaultFolderMessage -Style Info -AddSpaceAfter -f $defaultFederationConfigDir
Read-Host (Get-ADFSTkLanguageText cPressEnterKey) | Out-Null
$allDefaultFederationConfigFiles = Get-ChildItem -Path $defaultFederationConfigDir -Filter "*_defaultConfigFile.xml"
}
if ($allDefaultFederationConfigFiles -eq $null) {
$defaultFederationConfigFile = $null
}
elseif ($allDefaultFederationConfigFiles -is [System.IO.FileSystemInfo]) {
$defaultFederationConfigFile = $allDefaultFederationConfigFiles.FullName
}
elseif ($allDefaultFederationConfigFiles -is [System.Array]) {
$defaultFederationConfigFile = $allDefaultFederationConfigFiles | Out-GridView -Title (Get-ADFSTkLanguageText confSelectDefaultFedConfigFile) -OutputMode Single | Select -ExpandProperty Fullname
}
else {
#We should never be here...
}
if (Test-Path $defaultFederationConfigFile) {
# if (!(Get-ADFSTkAnswer (Get-ADFSTkLanguageText confFederationDefaultConfigNotFoundQuestion -f $federationName) -DefaultYes)) { #Use the ADFSTk default Default Config?!
# Write-ADFSTkLog (Get-ADFSTkLanguageText confFederationDefaultConfigNotFound) -MajorFault
# }
# else {
# #What do we mean by this? = Yes, use the ADFSTk default Default Config - but do we have one?
# }
try {
[xml]$defaultFederationConfig = Get-Content $defaultFederationConfigFile -ErrorAction Stop
}
catch {
Write-ADFSTkLog (Get-ADFSTkLanguageText confCouldNotOpenFederationDefaultConfig -f $defaultFederationConfigFile, $_)
#Ask to download?
}
}
else {
Write-ADFSTkLog (Get-ADFSTkLanguageText confFederationDefaultConfigNotFound -f $defaultFederationConfigFile) #New text
#Ask to download?
}
}
return $defaultFederationConfig
}
else {
$defaultConfigFile = $Global:ADFSTkPaths.defaultConfigFile
if (Test-Path $defaultConfigFile) {
#Try to open default config
try {
[xml]$defaultConfig = Get-Content $defaultConfigFile -ErrorAction Stop
return $defaultConfig
}
catch {
Write-ADFSTkLog (Get-ADFSTkLanguageText confCouldNotOpenDefaultConfig -f $defaultConfigFile, $_) -MajorFault
}
}
else {
Write-ADFSTkLog (Get-ADFSTkLanguageText confDefaultConfigNotFound) -MajorFault #CHeck text!
}
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA0UJwImpfG6nmM
# K19ZFTnc/Ol8W/EdOQXHDTj/QU/vgKCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCCS3DvSpH6XH+hnkw0UgH3P5MJv
# hyU05pMQUJv/g8niQjANBgkqhkiG9w0BAQEFAASCAgAF925Ld4YWkhDmb2h2TrZi
# bXb1eV6sILFoEsUoEeKt6GM2+nuP+HxKs0TbjcyGCYgnm6cVzS4y14Fz2YWScG9k
# 4XYNp24l7Rm5xT4559QjwTyGHYC6pdkWk0/IRg2JNO8/8TvU9ovhcEsf5uQgnQrI
# oE+toO/qQH0Guu3XVQ+jxqB4PEMOcgIrCOPlAFS5QO8b1Af2iqYSRzEd4PGzXWgH
# fnqaamWkt01EC/cQ+sUBKoc6FrrH36/Y8uP1cEj8nzRbg9hdcbgcW8Os7VTJ+OXP
# 4m6KwF3AxgGc4F/uWn5B1tuYDJi/kbolQBBFitLNDU33VrHBMs9lZSVBHdgsQs9d
# vFL1Px70gPimQ3siTDRDLipCpwekt9gx8u3GcAof/BHEv110o6ojPpBwID1I7G+M
# 7PH+du9DHhQ1V/zeLYjUnU9ucsxnD6BUU6BZp3ANOZ6ntibWi12XTXSCECxTcP09
# TIvv6xERszIsj6URRT823EfHSLrpfb9hAZMRsXAXv2wV7ToCcfmsq0vtEwLkqvTH
# l1pZ69wg1qqCFZ9P+JA1cybnzfzoy9hdz0FuUHwZXwftFd99e34VHRwIJ5H/tbiV
# J6f4NQwyoIIYLAg4DMNmdHR4/YVB+hqs5DV8i6rs9SgHs4DbZRsEEJ5phxDEkUqM
# QAFwFYVwwxms9fxQ5EuDeKGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA0MDNa
# MC8GCSqGSIb3DQEJBDEiBCBZyFSr1LYdAMzpbCo6UZCOlOyc3ErSk4kw7CP7jadF
# zTANBgkqhkiG9w0BAQEFAASCAgCwsufOWlsgILQZYwFlmARjOta4sLjfIVTINkld
# jXz1XbHvZOzCnZGDoA1XjWY7Uw7vInMG96DpYO6LV8wWYbqn/T4kZdoTZHnRjggi
# DC/EP4qxlKjbkDF7YR5jq6ochn2cwIBoU8V/IoCzL8AmPZ4rwhG33G/D/+6GasTa
# afjnJSgBUiChvaf4IbTrpP0xx66uWWkZQn4+aOHj/mITpG1zzLpvDiHUVPuw9NsP
# Cm4BPGaAnvlhXGlc2WJNGsfXnxdmKzzYGkrODtr5Dxv4I8/GyJrx4/R8WlofjUmx
# kpDO+LHpiBM55UZlWruXxaQOeGzSQTw1gFGqnqp1NsZ/6L4dxCfYBHt9WaWSqWEQ
# gXibvzULcLarcjAxyqiGTrsD+Lz3V8bdSu3eSsX6szAnpdNs+C6OK049gDzLfZ0k
# oF2IcgFOTHD5wEEDoKZM3hnzttiHE7KmCcn8N4gthFLRr8crIaPaThN13HKvdlux
# MGueE8/DFkKsAESQYvEyyVEFec+8iWA0UECq38ACQLX/TurAIXcGz5M+BydgSPnr
# XiAsdro1UCYcF68zMyZwgJ2wzi1IQ3Zb3wLWxh1J99qm3KfeFYIQpCUnhR+mTh6M
# hKniTDxgqhczMB7MBbh21mLD7ZD8X5M5/hlxwztkc4BIkO0rFwgTjrzXYKuX5q/q
# 3jC2bA==
# SIG # End signature block
|
Set-ADFSTkConfigItem.ps1 | ADFSToolkit-2.3.0 | function Set-ADFSTkConfigItem {
param (
$NewConfig,
$DefaultConfig,
$XPath,
$ExampleValue
)
$defaultConfigPath = Select-Xml -Xml $DefaultConfig -XPath $XPath
$newConfigPath = Select-Xml -Xml $NewConfig -XPath $XPath
Write-Host -ForegroundColor Yellow "$($defaultConfigPath.Node.Name)`: " -NoNewline
Write-ADFSTkHost "defaultConfiguration_$($XPath)" -ForegroundColor Gray -NoNewLine
$DefaultValue = $defaultConfigPath.Node.InnerText
if ([string]::IsNullOrEmpty($DefaultValue))
{
if (![string]::IsNullOrEmpty($ExampleValue))
{
Write-Host -ForegroundColor Gray " ($ExampleValue)" -NoNewline
}
}
else
{
Write-Host -ForegroundColor Yellow " ($DefaultValue)" -NoNewline
}
Write-Host -ForegroundColor Gray "."
do
{
$inputValue = Read-Host (Get-ADFSTkLanguageText cPleaseProvideValueFor -f $defaultConfigPath.Node.Name)
if ([string]::IsNullOrEmpty($inputValue))
{
if (![string]::IsNullOrEmpty($DefaultValue))
{
$inputValue = $DefaultValue
}
else
{
Write-ADFSTkHost cYouHaveToProvideValue -ForegroundColor Yellow
}
}
}
while ([string]::IsNullOrEmpty($inputValue))
# strip carriage returns, tabs, newlines from XML variables
$inputValue = $inputValue -replace "`t|`n|`r",""
$NewConfigPath.Node.InnerText = [string]$inputValue
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCWNZoB1RWxCIfZ
# YwAalQgQ/PtMj2Da6w7gZzogbyXE2qCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDWet5sa+LfkYMeRCKm2VfgMClI
# +fZ31zpx1o6d6HUwsjANBgkqhkiG9w0BAQEFAASCAgAWjfEpv+S0dDO56X1ZrpLc
# tdlMwuFsFmDZ9wqilM5u4hkaYaCl8NaRiFNySmU3xp/SIODOki/cDUIaAnj9MJ3V
# zxRIelNB1vo8OY7BLJFGSp9mP9NJSr+ty7YncyGsh+PNeRjlUMQtn9RK1Z9gNpt0
# nnTYY9ZQVA3ucyMvArLpxjQjgRNxOfUoAx0MzO+ySFUUjw5LRomGBpBxgqYZof05
# /j1fd9guHF4kEG1qAz+LaGwTjpZ/8ushWQSzDkIb7c62BGzFR2J1gWHx/cGL/B8O
# 8su7H1Z+eqlko2O+LtyBstrACyL31WsO0pzN3eR5qhZt1woaEITd1PvtU993zqOv
# fz2We9P9yiuCI6PzV9xAjeGGIPxp6sLavrYKKTp/y6z2Y86MBuufN/G8OAoCPewX
# XaBzz9p08Z+LNWKJMgwXVwwt9lYCafPJ8jwui1U6vbfHz3FbiAotAID1pesya/B2
# k7gkaOBDiUUea4KaZswzp91Pee3ZSRAKh2NDXfqGGYjhwUCUBfzgv+M6uWVI1EDu
# bLDCRkrIfKPmTKmdYdsOp8UGLzpNNe4eYkyYlQwoDXmS/v+BepzWvGbGhIcj23a+
# oQ2NMMIpUGaHEKtDXzj0bZUKpchwxt+iNI0HvWWM7cWHoa3oo9lSoEzYtZawNAyW
# DUwKVfawkrtw0Sd41ksXjqGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA0NTla
# MC8GCSqGSIb3DQEJBDEiBCChjQQ5mx8TFasoxO8QQz1yT5ozuU3AcYlnv5q8OB4i
# FzANBgkqhkiG9w0BAQEFAASCAgBSiTaCmyPhWKNG4KDL78CL/gytPdqSa5TJUjPT
# Lz+96u9wi3qWGt54Kc3R4zQn7fobnwLhIWSxzMv2G1Beke8LZfhCR5aznfyYstz3
# 67YedjaYUeMTbxkYkQAvcOETPwVKwj0zPXUcaihZe1TLaE2cnzjj9+Mo1gCbRJL6
# cR+FG+Hr/40BQXbydV0v4e+LQ/KGaxMhb7FNe0GF8lNcoPedY5/zKf4UuIXLFNGS
# M+3c8C2ekFy8f59JbYtbyFxHjpH9YiABx1vVUa9CjSU0grkPdMwtmgxN9Z0IqOeN
# YliBHBbAUXvC7HAP/J/0WwQwLfkdsSQItPWvIqJPOZ9LyHdHoFPu8MxWNkumUsT1
# eu+slufEgIAc1Yw7hq2pZunTPIU0E6CIZstlxK+bxqaDXC3x6vs6PsthguJNIFHI
# 5mJNm4h8AjhpeZKysue1BUZLigPpre2jXetipOQULBHI2RtF8xnxA2xYxuFG8Uog
# o392GAEc0i9NxqAj0rSMcfZ5BNzGFMS2oB8tWOO0G8geoPFi7Xz4KJRj4N5/pQ57
# D+oPqJdigRZobSqH42OOoWDUV89u4aXlO/4gc59IvQfchf1R8+o0akhj8wpba5vL
# kGaHDuJ2ttoY9HGXPvILvEp4+9QWUQTvyn0R1M/JwZQ7lF2/hK85+Ag0oClqBWqv
# dFSVTQ==
# SIG # End signature block
|
Get-ADFSTkConfiguration.ps1 | ADFSToolkit-2.3.0 | function Get-ADFSTkConfiguration {
param(
[switch]$ConfigFilesOnly,
[switch]$ForceCreation
)
if (!(Test-Path $Global:ADFSTKPaths.mainConfigFile)) {
if ($PSBoundParameters.ContainsKey("ForceCreation") -and $ForceCreation -ne $false) {
#Inform that we need a main config and that we will call that now
Write-ADFSTkHost confNeedMainConfigurationMessage -Style Info
$config = New-ADFSTkConfiguration -Passthru
}
else {
Write-ADFSTkLog (Get-ADFSTkLanguageText mainconfNoConfigFileFound) -MajorFault
}
}
else {
try {
[xml]$config = Get-Content $Global:ADFSTKPaths.mainConfigFile
}
catch {
Write-ADFSTkLog (Get-ADFSTkLanguageText mainconfCouldNotParseConfigFile -f $_) -MajorFault
}
}
if ($PSBoundParameters.ContainsKey('ConfigFilesOnly')) {
if ([string]::IsNullOrEmpty($config.Configuration.ConfigFiles)) {
@()
}
else {
$config.Configuration.ConfigFiles.ConfigFile | % {
$ConfigItems = @()
} {
$ConfigItems += New-Object -TypeName PSCustomObject -Property @{
ConfigFile = $_.'#text'
Enabled = $_.enabled
}
} {
$ConfigItems
}
}
}
else {
return $config
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCUEdqhYDe0D8jN
# C4l+a26TpEep8R3UqW4PymJ7gGWlKaCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCC4jJgUNj++Pdw9SP913BXrKr/8
# iRHmgUpN7f7GuWBymzANBgkqhkiG9w0BAQEFAASCAgAmo0t2S53zBWYEyDEl+sVn
# RuBLqOyy4GmI+lCiSMUIBpEVAaBVNsqPtBfNmCTw31l1ydPFKJw2njwvWyGSG1K2
# N4etahRrqfSNKP+zlZjv3/bzQQ0Dr4d3/M2rx5anxuLEejIrP1Pa+kXD8yKKdMeD
# zYrBfnVS2zWHzqnirW0X44sD10z3/BvwmasS28l8g+ubja8Jp4QxClsz1AetFKg7
# TRhDGgGV046XgIXt+0yBpPfBLaa0l28eEdrH+9vqhdFJsxZZQsYKXMsT0AZSIYG2
# pkDY12CdEoqlFjZ348nGmZizp2Ss+BJajLqTdSGX7yQWt3oriE9XbvSfGsNyzfal
# a0JzE1DBjnZQMzqzcSYwGGlIz4SOFVgR0144RZA+CJ34Pbk3MHFYpCr2HRUb88Ym
# MZ5ckxrufA24B/1IJ9BVabvMAwr2J1p89NHX6laAXcGm1SRvk1qqR2J7xCdNJqGF
# O6h51AE+Rr33M84UrlDFg24YbHRFxCJy+XK5Wdw1voFczWnYPHNUWFAxhlVg92Hy
# 0Gtl44PciFDx2vif618CmjlRWz9r03OZrsdnvfYKbiINhyoUcv8ZToSiX9Aqn+xt
# Upi4rxRU3db3qNQQUXaP6MfmZe5DwXk3rKkzEi6HMPpHN8Sl/wEG6FYmtrrrOrnc
# S4U6ObnwGYTdT+G60+Xt26GCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjAzNDha
# MC8GCSqGSIb3DQEJBDEiBCDglhB9QVwdemUOPwriPKqqTEcnful007sp/2kr1wVm
# PTANBgkqhkiG9w0BAQEFAASCAgBSn8KoE84xj2AUi+Z1sUaELYW74ovYQw7TOY2S
# oXTeuuGoyUQkWiBsivHNRWWrFPdVV4Wt4BpWNknjhrm0DdUU+bc0ddjHDzHB2/uQ
# YTB+SuH8ByK9g8DB5V9rUsD3AgZpqFrBH2MTwxGNGQbANPjIk6tS9SqV01xqx6cp
# E+DJUCkvt/N/8TwhzCROri3rnzACeIaEhLPycGghK5cZeiqWmrJSyaQVukSB2UyZ
# 0a6Gl6fJIYAqYXfehgVV2YM9OU9Pb6xtxtDvvDytaX7zyGNb59Vy1/jEn5D3WNqw
# TVdquobIGmSMHkY89QS/GF2DSiUM9nZMRSDsf6IFq8SuLzbr40VFsh+6QOcBt3Wx
# /RJt79B79wAiweMWl/tRuwqw7Ej9aMCoEVjopyDY79KrjtcTHEFLicJgpvO9qalY
# yEwyz3lmJdtBmix4KylE20vO2hy37qw4oj+n6kh6ehxtRAFfnfi4syQKCDjSWmhK
# 38qFKph+r+CldW7B5t2HPyEfhhICodKYdDp1vhQc3Hu2EZ/GC4GfmwrII5Rpm/Xq
# IKH9mSxMumkLZ7WwF64xaTWHKCe24oQd7gBfDV9hbMhYnG/HhCPOuv8F7T3NMI4b
# nlw0R6Av6e4cuP/dmrOwnlkFk4XAfAUOrQPBkhf8gcsTN2X2HtqrnUxgdkSmWLQ2
# +QXVEA==
# SIG # End signature block
|
Get-ADFSTkToolEntityId.ps1 | ADFSToolkit-2.3.0 | function Get-ADFSTkToolEntityId {
param (
[switch]
$All,
$Search
)
#Figure out the connection string to SQL server
$adfsWMI = gwmi -Namespace root/ADFS -Class SecurityTokenService
$SQLConnectionString = $adfsWMI.ConfigurationDatabaseConnectionString
#Make a String builder to get the initial catalog
$sb = New-Object System.Data.Common.DbConnectionStringBuilder
$sb.set_ConnectionString($SQLConnectionString)
if ($PSBoundParameters.ContainsKey('Search')) {
$sqlCommand = @"
SELECT s.Name AS DisplayName, si.[IdentityData] AS Identifier
FROM [$($sb.'initial catalog')].[IdentityServerPolicy].[Scopes] as s
INNER JOIN [$($sb.'initial catalog')].[IdentityServerPolicy].[ScopeIdentities] AS si
ON si.[ScopeId] = s.ScopeId
WHERE s.Name LIKE '%$Search%' OR si.[IdentityData] LIKE '%$Search%'
ORDER BY s.Name
"@
}
else {
$sqlCommand = @"
SELECT s.Name AS DisplayName, si.[IdentityData] AS Identifier
FROM [$($sb.'initial catalog')].[IdentityServerPolicy].[Scopes] as s
INNER JOIN [$($sb.'initial catalog')].[IdentityServerPolicy].[ScopeIdentities] AS si
ON si.[ScopeId] = s.ScopeId
ORDER BY s.Name
"@
}
$rps = Get-ADFSTkSQL -ConnectionString $SQLConnectionString -Query $sqlCommand
if ($PSBoundParameters.ContainsKey('Search')) {
return $rps.Rows
}
else {
if ($PSBoundParameters.ContainsKey('All') -and $All -ne $false) {
return $rps.Rows
}
else {
$rps.Rows | Out-GridView -Title "Select entityID" -OutputMode Single | select -ExpandProperty Identifier
}
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCOdQO8n1whCCV4
# MgpUSb6lGmHaqC+4Oys+ymxI6PURvqCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCB7wx9A7YJqd1yDOKdLLwA2G5/l
# 7yUH7cTls66LWaIg/jANBgkqhkiG9w0BAQEFAASCAgBZIKxpUp2hZ4i4kYn/8xiV
# rgDs5dd7GjnA+A4ELD6Uh0sIysDPsFh8ApBnHUsm9Eg1WIzuupbDzj4DkJvY0gkG
# Qrl3bmNrhNpFZQE0ZI14ofFx19EYMaKwv1KIH02sMWwGDxROTl/zSdkrR5p+McQP
# 5ZKV1j7JDSoSTAN3Kro2EtM02/uQBob8g1vjfekmQBP7pg3/xOwaOouhUL5uOxng
# 4OhpTgcKdSNzq6+fvOWihWmil+QQ++eh+PuugeEucLVGDtMqgg8pYWn2la9et6pU
# uUqB9XbbzXL1/WO545chCqYC4hjjgwAqbRsLxXxTGb9CIvodySSSG63w1b7MaB36
# iV0QqXwH/mzX5o+xD0lZn0njjb14bjfNge+a5p/qilad+acoKsiYcWgmrqdT5tmL
# Oa+P3CiY9Y6JE7mEfRjS+XC7DsOyb2YnPSH1x5bLFiTqEhmJ1nKw/53LWEnhhKTt
# PpGw3yTsdHevptxlTbnfoC4V5N0b6bQs/YbCFirPmcqCb83SB8HqwOg02BtFh+92
# 3vQfQzXeu3EeMXkXAVyn6ZxC8VwHhFjduBBmsSCJNMSEUsKKzQWi6h7OLH9WB5oz
# rkJfLDoZnlXyXMvmCQ6ZLL5mnxkBJFQH3TMWquj5mC/m3OaUieyuydv0GcctT/qN
# 45byqcgUsvbLVLDi732luaGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA1NTRa
# MC8GCSqGSIb3DQEJBDEiBCCLyQNoXQhnPYCvl2ff83u4A7jvYMpHZH7zecj0iwJM
# QjANBgkqhkiG9w0BAQEFAASCAgBLpKvOtSfsRkS/gCF4zHzvmKUIBYJKXz2P4caV
# 2Zn9YvDqnvUJ+Kk0JmYUEeL7/X2L0ZjrGoEkrGukBsfE7uvxRlXRDwYVUTSXhELh
# i7U1QKUj53kXYHlaa13Z7Ocu53veeZ4G82UF+7y9hLQJbJNJ0W8rBm87/hvp4+1X
# zllShGkcT5QdMZGAFmoi6Z8FF4Pv9J88g8rA80jUNqOGBzNa+8pOd4eLvvSDA9So
# R5/mqBtxqx0BAr6K8wfE+p9ISyRineVbCZE9fDpax16WLIRBNB6RlUH1R/OBm+Sw
# oCiaHWFt3+1ABdVxIidhb8BMGZvW8PWtKno93lN13+1ALB29zpmSN+5nySY6P3U5
# TyMbJGzylIp/sRSmBj4p89PZGr3nWP4glNJUqTaV4RpKLUI/LnpeZB+BdwMozZiO
# QlXvUCnrRSAMc+qAzhIM4g1IR9g32sQN+ctqihVseOLhaeLvgPgaLAum9gPDSBBy
# ru4CZBkNGp/KRHQMa9GDaQgeTrYBJrV0EDWkiBegSFQ8PNO4dtCZi6c/SY8IZjOa
# ZYJv8vXEgzABfHe1b0kt6kUIzGeH6IhwMXXC04wSkQNjJXUgrQCK0xCi0pHHfd9V
# 2iCmH+SAdmu7Y5ZfSkGKnkjp7DaVd2WKZx5bR4+x1EH0a5AqPhGDZoplMdTFKi67
# BnqzBQ==
# SIG # End signature block
|
Sync-ADFSTkAggregates.ps1 | ADFSToolkit-2.3.0 | function Sync-ADFSTkAggregates {
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[switch]$Silent,
[switch]$criticalHealthChecksOnly
)
Write-ADFSTkLog (Get-ADFSTkLanguageText syncStart) -EventID 35
#region Checking configfile
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText syncLookingDefaulLocationFor -f $Global:ADFSTkPaths.mainConfigFile)
try
{
[xml]$config = Get-Content $Global:ADFSTkPaths.mainConfigFile -ErrorAction Stop
}
catch
{
Write-ADFSTkLog (Get-ADFSTkLanguageText syncNoADFSTkConfigFile) -MajorFault
}
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText syncConfigFound)
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText syncCheckingXML)
if([string]::IsNullOrEmpty($config.Configuration))
{
Write-ADFSTkLog (Get-ADFSTkLanguageText syncMissingNode -f 'Configuration') -MajorFault
}
elseif([string]::IsNullOrEmpty($config.Configuration.ConfigFiles))
{
Write-ADFSTkLog (Get-ADFSTkLanguageText syncMissingNode -f 'ConfigFiles') -MajorFault
}
elseif([string]::IsNullOrEmpty($config.Configuration.ConfigFiles.ConfigFile))
{
Write-ADFSTkLog (Get-ADFSTkLanguageText syncMissingNode -f 'ConfigFile') -MajorFault
}
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText syncCheckDoneSuccessfully)
#endregion
#Looping through institution configurations
#and invoking Import-ADFSTkMetadata for each
#configuration file
Write-ADFSTkLog (Get-ADFSTkLanguageText syncFoundConfigFiles -f $config.Configuration.ConfigFiles.ChildNodes.Count) -ForegroundColor Green
foreach ($configFile in $config.Configuration.ConfigFiles.ConfigFile)
{
$Global:ADFSTkCurrentInstitutionConfig = $configFile.'#text'
# set appropriate logging via EventLog mechanisms
[xml]$Settings = Get-Content $configFile.'#text'
$LogName = $Settings.configuration.logging.LogName
$Source = $Settings.configuration.logging.Source
if (Verify-ADFSTkEventLogUsage -LogName $LogName -Source $Source)
{
#If we evaluated as true, the eventlog is now set up and we link the WriteADFSTklog to it
Write-ADFSTkLog -SetEventLogName $LogName -SetEventLogSource $Source
}
else
{
# No Event logging is enabled, just this one to a file
Write-ADFSTkLog (Get-ADFSTkLanguageText importEventLogMissingInSettings) -MajorFault
}
Write-ADFSTkHost -WriteLine
Write-ADFSTkLog (Get-ADFSTkLanguageText cWorkingWith -f $configFile.'#text') -EventID 31
if (Test-Path ($configFile.'#text'))
{
if ($configFile.enabled -eq "true")
{
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText syncInvokingImportADFSTKMetadata -f $configFile.'#text')
#Don't invoke Import-ADFSTkMetadata if -WhatIf is present
if($PSCmdlet.ShouldProcess($configFile.'#text',"Import-ADFSTkMetadata -ProcessWholeMetadata -ForceUpdate -ConfigFile"))
{
$params = @{
ProcessWholeMetadata = $true
ForceUpdate = $true
ConfigFile = $configFile.'#text'
PreserveMemoryCache = $true
}
if ($PSBoundParameters.ContainsKey('Silent') -and $Silent -ne $false)
{
$params.Silent = $true
}
if ($PSBoundParameters.ContainsKey('criticalHealthChecksOnly') -and $criticalHealthChecksOnly -ne $false)
{
$params.criticalHealthChecksOnly = $true
}
try
{
Import-ADFSTkMetadata @params
}
catch
{
$_
}
}
Write-ADFSTkLog (Get-ADFSTkLanguageText syncProcesseDone -f $configFile.'#text') -ForegroundColor Green -EventID 32
}
else
{
Write-ADFSTkLog (Get-ADFSTkLanguageText syncConfigNotEnabledSkipping) -ForegroundColor Yellow -EventID 33
}
}
else
{
Write-Warning (Get-ADFSTkLanguageText syncFileNotFoundSkipping)
}
}
# set appropriate logging via EventLog mechanisms
$LogName = 'ADFSToolkit'
$Source = 'Sync-ADFSTkAggregates'
Write-ADFSTkLog -SetEventLogName $LogName -SetEventLogSource $Source
Write-ADFSTkLog (Get-ADFSTkLanguageText syncFinished) -EventID 34
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAROByzRsrqd1It
# tObCtVKgDvQC/zn84ihDY/pEQdD6TaCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBXSQD6Lpwn74LJ5r8YaOoz0Gsu
# ov1gnEaH+a+ntGZz+TANBgkqhkiG9w0BAQEFAASCAgBFNcsc2DsvlTmcdw0Q+2fP
# 9OcJyEe0dOMAea9pIR6wFkF5P/pzQ55RYJBOlQoGylUmascrkK+/e0JqPtATMa0B
# h8slwIuDN56fngtFixPmPTVFYIP6hAhH3c7xvpGLSrY2ZQP2/Ev56UgtJ1fCjXkG
# FdhxdgW9L1eBtU63NldCBE3Cfld2g746kL3RYrJuO/WE9NGq5DqHZiEepiGv9E5E
# UxScm2gMOn3AjG27L/4+PAX/n7k7DO2oQyogkXX3qXk6bypDlEYLX8lqG9vx+0Fs
# Q0Vurt4o+nsfWt646oovAfT5kJPDl5fSQILPaEgUJ8JefY//YWyDj606MwErRh7Z
# jEVToJNWzp3zoNt25Orec+0eZGGfH9yMtOtaigXCpUIvZFoLCN1iJURxBgV5o6+L
# gp8ZQLzp3eBHpjoaZsBxTWoQLlg5toLTrD7Aem9LjH3vGDlhxgpKWkaKQDOujC4C
# voCI9/8sFimNij3GFd/7mLGa212+HcVeOF8giSMjvkExI3jGBBCYGgSChUBoRfm5
# CzM7tJ5O8iM1hfQCe0QrVSDSQGsLQ1u5gco8+dpobknIC72PVBvAZn/ImHQES0V9
# NYnRYHzr3VRyp3eJyE5RHi8VPlXpAZ5vBFy8WOHgCdPQhCjZGhvDQqG6cWxE70nh
# tzPxhk/7/B/pqD0ZfzqQS6GCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA2Mzda
# MC8GCSqGSIb3DQEJBDEiBCC68YUldBLDG5JKPhE3THCzxzuPmkZvmrRqVwbpEYqn
# oTANBgkqhkiG9w0BAQEFAASCAgAffq/qmxlh8UWWkIfcTmTOQ/AElMAfBpGAF8w2
# 81tWv0jKJYU4nJbzjSAzf4mAOZmCnKk0bvbXuCbKuoauZAH5XE18pw/mUbFcEGjD
# hlApGiebZ2+90AHoUedZBIFc4cdciZlldQhmjjvAnZa/X7s/RAIdt48Nn6uWezWC
# rgk4YJUGTdAz7Y9ZI+zixLRgCi3wBh7/2KzUJc7xKvfT05NauyAKua+f5xZykQdX
# vDCxBpTrfu3B+B7MQyoz1xBnSKEwZcAfCaszipJorCMVFH4IKqklwpu5lwlRIMce
# GFNpS//ZC8wj+fId6TOv4n/GETze0CgpFkPa8yfUhjaVdqXL8VQU2LUvovCDKmHe
# nNcdg1LH69hY8Xe0SSEVf8dEMdVbhdgdkJmv7IFUJ5LTtLblluhowfb+6P99DNOf
# VwUPC9JL9jsp6eGMWifZ4kKkkQN2rmA/C/2W5WukQMfkb8o7ypcHVtv+P07xzkwB
# 87GlYIK1dzB5e60RjR7fMCHDaEKVK4EnyHgrUyfE0WcMmXD+W9nqDa/htJbTS4Oi
# GjaJsETNljf0yHNQ9YSgCZlkHlS2jlu2IwTeqF+cHgUX7M8g0P/S9d9O0evji8No
# +F6xz+4yOu2/P7ZxO0JdO+GsdxVFykLQ9ifm8xRm/XwFCk5JSrQlbxx54VGB7wAO
# /TeK4A==
# SIG # End signature block
|
Get-ADFSTkLocalTransformRules-dist.ps1 | ADFSToolkit-2.3.0 | function Get-ADFSTkLocalTransformRules
{
#Helper object, do not remove!
$TransformRules = @{}
# This example will release upn as eduPersonPrincipalName without changing it.
# This is good if the institution has more than one scope for their users
<#
$TransformRules.eduPersonPrincipalName = [PSCustomObject]@{
Rule=@"
@RuleName = "compose eduPersonPrincipalName"
c:[Type == "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn" ]
=> issue(Type = "urn:oid:1.3.6.1.4.1.5923.1.1.1.6",
Value = c.value,
Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/attributename"] = "urn:oasis:names:tc:SAML:2.0:attrname-format:uri");
"@
Attribute="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn"
AttributeGroup="Local rules"
}
#>
#Helper objects, do not remove!
$TransformRules
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAxnSPdKiXfVF46
# 8c4ff+JS/Bjog9MUe9jxHwpoRAOuDqCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDIOHZU4uU36vj8yp2EpQHbng+Y
# c9NL+ui+S8+SgNscRjANBgkqhkiG9w0BAQEFAASCAgBXvRaDhPQCiwyC2qPlfkm7
# /mpSIXJbFnPuCsWstsU0Mdd+PikVZfSGWEC26dkPYZqlF5D/Vfch7smSn22OX8db
# FCmcsWgwa/APUgMsWwr66lOUlYdvEDv4aNRlOh3eLXLXBFAsciyln7IWNNvwui+m
# SfmoWm6q5BvyUGzSU+Oj/PVIIk97v6QrnKKeHVD7j78hKkhvWLBLiRcYBAC/22zL
# upHK7Yn/7FNuniE33GrDx5jdmCng5rqJm4PteN9X7NLMd/Pxyx1FyF7lzmYUwwn6
# xxHVEUdg1yNcsj6X/hWVHR6uh8rBXIsewqbk0gRz+O03FeY93ssceu8sqIgl748I
# uf0rafOvKxpJV8Ejg9aQS6YWvvNkoWM1Tw5n2McKRkknOoOuOchVwQnjJU482Qvj
# 5gX4PHCRjmRUarzGbOCHDKFitr5ltGZmGwBjP/+mn+PM6qZJvueXzAyKYRwocFvJ
# z1wekJ/DPZEJTPHaeEe1J52/4Q+gz7uGHEVgJh8kv0pXbyt7mFKoXOUr71ummbWz
# vAxtXVuCX030hbUM5+WoKeXHWeVlfdDeDd43N+GCE4wQy82LZyMIfpXImc5Tjdq7
# F5H8vOPS3B8A1vt7kI5cqd8kZmtXraXgg2RDF4rF4V7dUM3oI+QVYplkUzl8jOVP
# jbJFII2ipuOrZk052XJr0qGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjAzMTha
# MC8GCSqGSIb3DQEJBDEiBCCU+sGga7OWdEsS9FudkJupH8RciKBrv2yhzdyRD3I1
# 3DANBgkqhkiG9w0BAQEFAASCAgCRarNW7ZUhJLs5RZzFkJpGb8aO5O3yycT5PVon
# XLx2TEyZlaVsKpkfXuq1On/tI/1216gFZIxiJkx/CuZ/NXm8pkAOwMXALueBQtn2
# 39EtaR1KFhIompm+DZYBjjonlmzmdr9oYhYwXeOC/FZT8UF4c8vm0drDfLyWVKF4
# mDhFfHZ1Q6+C4XXJEwo9KJH45cgTgozcv/dvrrj6yQUzI9qeIoJVRmpXGBNjpHO+
# dmns5e794ItjVwknwoa6VsoyiX15PM4t8QycGMVWOl3Nwi4xyoJ5Ba0wBiqAxtEa
# ejbfJiSX2C52tb6e2Rk7ZFQtnwrEFPahkEk03bMrwwOzWWp8+BAhVVQwHv33vH8v
# KVdAaWnl/oukFlztD4QewtxymKu+8a2ErxLv2i0xsdI2h+3uxNCOKFYT+zO8lthy
# B7lirf7Bjbh6E1LhGaRmddbC+g0E8V7jX5rcOQYYipvvAvZN7TOZ1kuL1K8aaZ+3
# ARXQzxl8R5tZiMsrtjMcHqqb4iO1rrlZUHQwNTtVaxiqUTAc59E87cHKwmocZ07e
# PMIAdskx5ais0fLEHrWbF6+f6LUh9LG6dQi5hJSkoZ1KhU4yfoqJgRZffI270BTf
# Z2WPNktEwKH2/rhL/pfdfRKsYuOA6VBtmXK4DAs5q6Ixqlp6iY/n51C5jvq2KOZr
# xamZfA==
# SIG # End signature block
|
Enable-ADFSTkInstitutionConfiguration.ps1 | ADFSToolkit-2.3.0 | function Enable-ADFSTkInstitutionConfiguration {
[CmdletBinding(SupportsShouldProcess = $true)]
param(
[switch]$All
)
#Get all config items and set the enabled to false
$configItems = Get-ADFSTkConfiguration -ConfigFilesOnly
if ($PSBoundParameters.ContainsKey('All') -and $All -ne $false) {
$selectedConfigFiles = $configItems | ? Enabled -eq 'false'
}
else {
$selectedConfigFiles = $configItems | Out-GridView -Title (Get-ADFSTkLanguageText confSelectInstitutionConfigToEnable) -OutputMode Multiple | ? Enabled -eq 'false'
}
if ([string]::IsNullOrEmpty($selectedConfigFiles)) {
Write-ADFSTkHost confNoInstitutionConfigFileSelected
}
else {
foreach ($configItem in $selectedConfigFiles) {
#Don't update the configuration file if -WhatIf is present
if ($PSCmdlet.ShouldProcess("ADFSToolkit configuration file", "Save")) {
try {
Set-ADFSTkInstitutionConfiguration -ConfigurationItem $configItem.ConfigFile -Status 'Enabled'
}
catch {
throw $_
}
}
}
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDNBFHnap6EWdri
# fClFDarueSyvP5BAz5xRrnlIfDIWLqCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCCU6I1bi2wawEHyBSgMwN+uPPGZ
# Pp8LCOR1BEQGcd+cRjANBgkqhkiG9w0BAQEFAASCAgB3Rv8iL8sXVonhtG8in/ZF
# Qjyke6cF3gNnZllZwZyPYdWKTveeUeiIcSwLMT1borb1aIZVlGEWAPJ8cmkthfen
# yPag/oHH1k8lXzH4xACQouavaBAt+JivQ9hdYWAI5p+Jd0K91Ycfin4EM0ccvr0V
# DekourFMFVVUJ4B0sCz47RdCvjrEzV8+lbBExmoJPjRHBk5heB70oRk+/6gTmgWc
# hgdDNEZ4uG64Lkb4nWfCP3Xj5si1Ib/jMIjcFZBHn4PoNMmYEohnKMcJDLxXMzdl
# XNoqw0whdzo+eEJC2fm9HULnSa/5MCUq3Bb38z2GactS9JvokQBhUsgQx3/8lefE
# edflfDjw3yUib3vNFe1zhQffDhpwgJ81Rt2y1fzcRSQY5C2StHOjvb0hnpClLPy9
# xdaOtpQSH+dBYJ3m6AyuWZ5yLy4WRbvTRSMEIaJdZixj+2Bf7iqo9q94NRLE6txe
# UB7WlxuRD2SCNICMPUvoyda2CLjBq4oXbdlsbhjdHc9Fm9A/m25RYos5VzExlcQs
# KPN2kz7A4RfPT41BUHTviGoy8fv6k+gs76nDRDgQEaqbR6dpRnuaTHEPKise6R2A
# bC0KzyF9vuJ6mC6czuYAScFahraY3l4qKLD2wdWtulCQuzYYw2QxXnemnzOqv4zP
# wufqO2SeSgeEqYFBYz+CT6GCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA1MzFa
# MC8GCSqGSIb3DQEJBDEiBCB5vrkZDQwCCS7GdIC6AgkYqpq2C+iZxJioIeVCz2xp
# mjANBgkqhkiG9w0BAQEFAASCAgAdRS2XdEr+/UkkdptMk0y8NikA8nFt2vd4S/xt
# kK2IAXKyZk1y9q6eplSGmDctYfqLq6GX/7Mv0Ux4/cymdt5XXGTHde0iFyv1LVBm
# EcGiWOXqAOe71gdPtR2ubnvDEtcggI8+8Qfrspi4mcYX1ZB1Y8jQwlWfaB6+QTKu
# k63j5uUejC4yi3oEdZ4uPF0jpRTK8ykLThPK4+Cln7/5DxSzLbAGhHsdOoZKKNOO
# 2kR7Xyuuc/rEBUyicdFgOPeecUDGhp/YD72vj1h9pxIkgO66xkSxm/pqDD1nN8+5
# fsj8ZeG2rb6NLhRAiN1hvgYcEAsiDyTtFUbankQWWlACps6d1Uu00kd+39fd+SY+
# pPOzDqpoxxAqHpCuscUE+xOrAQIVFv0VgyL+HUl9ZbYC+ozglXJlX5Ej0I4Xtzv0
# ff0FGhWLvcrS9isZJ6STv2Y8yk/3M/aZ0+e02QcOiqhn7BVb7eWz0ckZG8eZLLn2
# 3mYgFqahmwhXAKNE5GU8JyG5s0UK9Ulg1jcEdxTtWR9IvQgbv7TDSYTona2HgHJO
# o9VE0uDFN5rT0z6plTGQ7Zi2VOGRYTva1p8wOxVDXniOtNUR+iRviy8y7i26ypAo
# AC8GGHL2AaKaOxzB0GBnZfote4ZR9iuLwV5vaCedQ+aesbYv7vstuvtm8Ftxf0/4
# HE0bOg==
# SIG # End signature block
|
Get-ADFSTkStateConfiguration.ps1 | ADFSToolkit-2.3.0 | function Get-ADFSTkStateConfiguration {
param(
)
if ((Test-Path $Global:ADFSTKPaths.stateConfigFile)) {
try {
[xml]$stateConfig = Get-Content $Global:ADFSTKPaths.stateConfigFile
}
catch {
Write-ADFSTkLog (Get-ADFSTkLanguageText stateconfCouldNotParseConfigFile -f $_) -MajorFault
}
$stateConfig.Configuration
}
else {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText stateconfNewConfFileMissing)
New-ADFSTkStateConfiguration -PassThru
}
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAfWR68JQ7tJlod
# 8/SA0M3eD++ZyHmvBFDr1B33x+hbE6CCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDsik0meOIhVCig4Mz1oEUhLgHw
# Q1U43TivNbt1BxJbUzANBgkqhkiG9w0BAQEFAASCAgBXwMhknxymEuijhGZu5AA4
# 3NoHS9w/5Xx+pPr2X8w4udT4lQNGRaJncXUa/HBPAYLo9YLTkjJ6QX8CWCXaPzxU
# a2X6VHjqn/IxTRlgUrsCueeTIhGGiXIbmaV5phoWq/tixrQ5gT8B7mKDUulUX0eB
# v6Ch2Q0kHDzeckofoETOwn6fKq5E/9Czzo5siYHi6vUuQf5QZlu7/Veqj8XbK7aW
# ufEnAiq4scVVOeeMtsQ+49KCyJhGsNvnMZ5h6Hx4WsWnsO/P8jPPUkQ6JV04am65
# m8NZSbcgFNg3vB+9bALJqJjO4b5tnX5aketWzqb75UM2RoAgJ8qGa22mepXmo37q
# lbO6UDuIfyADBZWQ5enqu89n4wPnRKf/t3gmuBSYLqKKJi7JS3moN+9aO9R9eX1J
# 9EmN5TbaTNXmo3l5o+7HQGUeFbInxyrBdHZ2jZqXI4U2dKPCf7+KctsSVV7yiClg
# EhNhgHlGDUxrFSyuadxFvMQNTy/H2BPsOF9E/m8bzti7t3qkQXvzsd0IOFkuTKeC
# CLePm01ok1mU6kQl6cEslLQ5LN/qXU0QhVu4uqedZSZOsh55W/bvVH3JvGPFtYIQ
# S/6fwI/OSjfoE4cFoXlJBKCLX0A/RVoJ0ngXWIzRudG6rVHzkw7tWItHyBEyVozD
# VizRg9vXlNNWIuLLjwtRHqGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA1NDla
# MC8GCSqGSIb3DQEJBDEiBCA3xVif/Hbv/wQ3SzDn9LrEC1/heOwUTcwMF7txNbMr
# zzANBgkqhkiG9w0BAQEFAASCAgCXEh4+Sm/pRlcggjHs5qhxkMaRlh4yAYrrVB00
# 8ARAOZmWbSNxvWWmExZ5JzoNAsNvBKtF1zBIGIcYnEsVvYax9/a4paGg+CyPX2AC
# O8LFtZOE2qlWPfJVviPam9DYyiNrDZZSLdM1siM43UI7MgsOlLUc3kNEB4ElrbaO
# nNUddr5IyMP4Oh8M+UuhmB6hPTRrw1QGUaZRPIUi0SFR2BSSEnQ/kMm2/Necx+Hj
# mvQ8sXRUXXr3/VOKCOa5YkCCWzKqn2vjnLJJWPGBNBAdsAzBsVa8MwBMtgGsv8jJ
# 07HFaiggdtGlNc9VJZT0NnLQVFeXxi4TPym0VM7GckBXUpnXxxJZpmQ7fUw5vzpd
# 8ThZzsR3ivSALVDTxnBMPtYjNzpdD24R9OcDZh/s5jIgAPh1rNNS1+cwolISfOCt
# kzGcSCKIiWlj8ugop0m92rVtAUOjNzIah7yg+d2xYRfVrtN0GRvUdqlCfdzHMHHG
# ZZU7nb7YYez8xjGcPsMrOaz1YckpWrM/CK/f/fLyZXKBj2h8trkXgnJZ8ohEAckH
# eIzMMHHjHbIP4dY+ZT7cg5GxbebNrnrgIgdLS6ZHg0Vv9AvuP4xOwWwu2+zspbAY
# 8tHszNSgimruBa/Lumznroz/xMdipz2lxGaLu6BxiHU093+UncBwcAFrCLj2kfgY
# UQwpvw==
# SIG # End signature block
|
Update-ADFSTkInstitutionConfiguration.ps1 | ADFSToolkit-2.3.0 | function Update-ADFSTkInstitutionConfiguration {
[CmdletBinding(SupportsShouldProcess = $true)]
param(
[xml]$config, #Institution Config XML
$configFile, #Institution Config file object
[xml]$defaultFederationConfig,
[xml]$defaultConfig
)
#region Functions
function Update-ADFSTkXML {
param (
$XPath,
$ExampleValue
)
$params = @{
XPath = $XPath
ExampleValue = $ExampleValue
NewConfig = $config
}
$defaultFederationConfigNode = $null
if (![string]::IsNullOrEmpty($defaultFederationConfig)) {
$defaultFederationConfigNode = Select-Xml -Xml $defaultFederationConfig -XPath $XPath
}
if ([string]::IsNullOrEmpty($defaultFederationConfigNode)) {
$params.DefaultConfig = $defaultConfig
}
else {
$params.DefaultConfig = $defaultFederationConfig
}
Set-ADFSTkConfigItem @params
}
function Remove-ADFSTkXML {
param (
$XPath
)
$node = $config.SelectSingleNode($XPath)
if (![string]::IsNullOrEmpty($node)) {
$node.ParentNode.RemoveChild($node) | Out-Null
}
}
#endregion
if (!$PSBoundParameters.ContainsKey('config')) {
Write-ADFSTkLog (Get-ADFSTkLanguageText confNoInstConfigFileSelectedborting) -MajorFault
}
#Create result object
$resultObject = [PSCustomObject]@{
Result = $false
RemoveCache = $false
}
#Load the eventlog
if ([string]::IsNullOrEmpty((Write-ADFSTkLog -GetEventLogName))) {
$Settings = $config
if (Verify-ADFSTkEventLogUsage) {
#If we evaluated as true, the eventlog is now set up and we link the WriteADFSTklog to it
Write-ADFSTkLog -SetEventLogName $config.configuration.logging.LogName -SetEventLogSource $config.configuration.logging.Source
}
}
if ($config.configuration.ConfigVersion -eq $Global:ADFSTkCompatibleInstitutionConfigVersion) {
Write-ADFSTkLog (Get-ADFSTkLanguageText confInstConfAlreadyCorrectVersion -f 'Institution config file', $Global:ADFSTkCompatibleInstitutionConfigVersion) -EntryType Information
}
else {
$oldConfigVersion = $config.configuration.ConfigVersion
$configFileObject = Get-ChildItem $configFile.configFile
#Check if the config is enabled and disable it if so
if ($configFile.Enabled) {
Write-ADFSTkHost confInstitutionConfigEnabledWarning -Style Attention
Set-ADFSTkInstitutionConfiguration -ConfigurationItem $configFile.configFile -Status Disabled
}
#First take a backup of the current file
if (!(Test-Path $Global:ADFSTkPaths.institutionBackupDir)) {
Write-ADFSTkVerboseLog -Message (Get-ADFSTkLanguageText cFileDontExist -f $Global:ADFSTkPaths.institutionBackupDir)
New-Item -ItemType Directory -Path $Global:ADFSTkPaths.institutionBackupDir | Out-Null
Write-ADFSTkVerboseLog -Message (Get-ADFSTkLanguageText cCreated)
}
$backupFilename = "{0}_backup_v{3}_{1}{2}" -f $configFileObject.BaseName, (Get-Date).tostring("yyyyMMdd_HHmmss"), $configFile.Extension, $config.configuration.ConfigVersion
$backupFile = Join-Path $Global:ADFSTkPaths.institutionBackupDir $backupFilename
Copy-Item -Path $configFile.configFile -Destination $backupFile | Out-Null
Write-ADFSTkLog (Get-ADFSTkLanguageText confOldConfBackedUpTo -f $backupFile) -ForegroundColor Green
###Now lets upgrade in steps!###
$resultObject.RemoveCache = $false
#v0.9 --> v1.0
$currentVersion = '0.9'
$newVersion = '1.0'
if ($config.configuration.ConfigVersion -eq $currentVersion) {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText confUpdatingInstConfigFromTo -f $currentVersion, $newVersion)
if ($config.configuration.LocalRelyingPartyFile -eq $null) {
Add-ADFSTkXML -Xml $config -XPathParentNode "configuration" -NodeName "LocalRelyingPartyFile" -RefNodeName "MetadataCacheFile"
}
Update-ADFSTkXML -XPath "configuration/LocalRelyingPartyFile" -ExampleValue 'get-ADFSTkLocalManualSPSettings.ps1'
$config.configuration.ConfigVersion = $newVersion
$config.Save($configFile.configFile);
}
#v1.0 --> v1.1
$currentVersion = '1.0'
$newVersion = '1.1'
if ($config.configuration.ConfigVersion -eq $currentVersion) {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText confUpdatingInstConfigFromTo -f $currentVersion, $newVersion)
if ($config.configuration.eduPersonPrincipalNameRessignable -eq $null) {
Add-ADFSTkXML -Xml $config -XPathParentNode "configuration" -NodeName "eduPersonPrincipalNameRessignable" -RefNodeName "MetadataPrefixSeparator"
}
Update-ADFSTkXML -XPath "configuration/eduPersonPrincipalNameRessignable" -ExampleValue 'true/false'
$config.configuration.ConfigVersion = $newVersion
$config.Save($configFile.configFile);
if ($resultObject.RemoveCache -eq $false) {
$resultObject.RemoveCache = $true
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText confCacheNeedsToBeRemoved)
}
}
#v1.1 --> v1.2
$currentVersion = '1.1'
$newVersion = '1.2'
if ($config.configuration.ConfigVersion -eq $currentVersion) {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText confUpdatingInstConfigFromTo -f $currentVersion, $newVersion)
Remove-ADFSTkXML -XPath 'configuration/WorkingPath'
Remove-ADFSTkXML -XPath 'configuration/ConfigDir'
Remove-ADFSTkXML -XPath 'configuration/CacheDir'
foreach ($store in $config.configuration.storeConfig.stores.store) {
if ([string]::IsNullOrEmpty($store.storetype)) {
$store.SetAttribute('storetype', $store.name)
'issuer', 'type', 'order' | % {
$attributeValue = $store.$_
if (![string]::IsNullOrEmpty($attributeValue)) {
$store.RemoveAttribute($_)
$store.SetAttribute($_, $attributeValue)
}
}
}
}
$config.configuration.ConfigVersion = $newVersion
$config.Save($configFile.configFile);
}
#v1.2 --> v1.3
$currentVersion = '1.2'
$newVersion = '1.3'
if ($config.configuration.ConfigVersion -eq $currentVersion) {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText confUpdatingInstConfigFromTo -f $currentVersion, $newVersion)
if (![string]::IsNullOrEmpty($config.configuration.storeConfig.transformRules)) {
Write-ADFSTkLog (Get-ADFSTkLanguageText confMoveNodeFromStoreConfigToConfig -f 'transformRules')
$config.configuration.AppendChild($config.configuration.storeConfig.transformRules) | Out-Null
}
if (![string]::IsNullOrEmpty($config.configuration.storeConfig.attributes)) {
Write-ADFSTkLog (Get-ADFSTkLanguageText confMoveNodeFromStoreConfigToConfig -f 'attributes')
$config.configuration.AppendChild($config.configuration.storeConfig.attributes) | Out-Null
}
$commonName = $config.configuration.attributes.attribute | ? type -eq "http://schemas.xmlsoap.org/claims/CommonName"
if ($commonName.store -eq "Active Directory" -and $commonName.name -eq "cn") {
Write-ADFSTkHost confChangeCommonNameToDisplayName
if (Get-ADFSTkAnswer (Get-ADFSTkLanguageText confDoYouWantToChangeCommonName) -DefaultYes) {
$commonName.name = "displayname"
Write-ADFSTkLog (Get-ADFSTkLanguageText confCommonNameChangedFromCnToDisplayName)
}
}
$config.configuration.ConfigVersion = $newVersion
$config.Save($configFile.configFile);
}
#v1.3 --> v1.4
$currentVersion = '1.3'
$newVersion = '1.4'
if ($config.configuration.ConfigVersion -eq $currentVersion) {
Write-ADFSTkVerboseLog (Get-ADFSTkLanguageText confUpdatingInstConfigFromTo -f $currentVersion, $newVersion)
#Two attributes are added from Defaul Config below
#Nothing else is needed
$config.configuration.ConfigVersion = $newVersion
$config.Save($configFile.configFile);
$resultObject.Result = $true
}
Write-ADFSTkLog (Get-ADFSTkLanguageText confUpdatedInstConfigDone -f $configFile.configFile, $oldConfigVersion, $Global:ADFSTkCompatibleInstitutionConfigVersion) -EntryType Information
}
#Add any new attributes from Default Config or Default Federation Config to the Institution Config
if ([string]::IsNullOrEmpty($defaultFederationConfig)) {
#Compare Default Config
$compare = Compare-ADFSTkObject $defaultConfig.configuration.attributes.attribute.Type $config.configuration.attributes.attribute.Type -CompareType InFirstSetOnly
if (![string]::IsNullOrEmpty($compare.CompareSet)) {
foreach ($type in $compare.CompareSet) {
$xmlNode = $defaultConfig.configuration.attributes.attribute | ? type -eq $type
Add-ADFSTkXMLNode -XML $config -XPathParentNode 'configuration/attributes' -Node $xmlNode
}
$config.Save($configFile.configFile);
$resultObject.Result = $true
Write-ADFSTkLog (Get-ADFSTkLanguageText confAddedAttributeToInstitutionConfig -f ($compare.CompareSet -join [System.Environment]::NewLine)) -EventID 45 -EntryType Information
}
}
else {
#Compare Default Federation
$compare = Compare-ADFSTkObject $defaultFederationConfig.configuration.attributes.attribute.Type $config.configuration.attributes.attribute.Type -CompareType InFirstSetOnly
if (![string]::IsNullOrEmpty($compare.CompareSet)) {
foreach ($type in $compare.CompareSet) {
$xmlNode = $defaultFederationConfig.configuration.attributes.attribute | ? type -eq $type
Add-ADFSTkXMLNode -XML $config -XPathParentNode 'configuration/attributes' -Node $xmlNode
}
$config.Save($configFile.configFile);
$resultObject.Result = $true
Write-ADFSTkLog (Get-ADFSTkLanguageText confAddedAttributeToInstitutionConfig -f ($compare.CompareSet -join [System.Environment]::NewLine)) -EventID 45 -EntryType Information
}
}
}
Write-ADFSTkLog (Get-ADFSTkLanguageText confUpdatedInstConfigAllDone) -EntryType Information
return $resultObject
# }
# function Add-ADFSTkXML {
# param (
# $NodeName,
# $XPathParentNode,
# $RefNodeName,
# $Value = [string]::Empty
# )
# $configurationNode = Select-Xml -Xml $config -XPath $XPathParentNode
# $configurationNodeChild = $config.CreateNode("element", $NodeName, $null)
# $configurationNodeChild.InnerText = $Value
# #$configurationNode.Node.AppendChild($configurationNodeChild) | Out-Null
# $refNode = Select-Xml -Xml $config -XPath "$XPathParentNode/$RefNodeName"
# if ($refNode -is [Object[]]) {
# $refNode = $refNode[-1]
# }
# $configurationNode.Node.InsertAfter($configurationNodeChild, $refNode.Node) | Out-Null
# }
# function Add-ADFSTkXMLNode {
# param (
# $XPathParentNode,
# $Node
# )
# $configurationNode = Select-Xml -Xml $config -XPath $XPathParentNode
# $configurationNode.Node.AppendChild($config.ImportNode($Node, $true)) | Out-Null
# }
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCoC9pHA+QwKHbh
# gcWIH1fyDCFG1Hvi9l2lJ8ZSTBrId6CCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCD1YAC/90BEjPhcUNh0GbewTm1U
# LOnXnCOxgIqgHbD+eDANBgkqhkiG9w0BAQEFAASCAgBxJZfxee5Ek8+9FYuAUg+Q
# 6QtltCeZjEf5K8Qnp4VyIbSYqZFgp+cPkHyri0uD7uwJhG/91fIzi3ZBWLO1WgIF
# l4qSeunjtfTE7kY3/NZRcFyTiNDuIc+ZtWlqZPymQ7p9GtBK6Js8fswO3uRDaw32
# SFJZ12ZYK/4Xi7zM/UsyOlCACldSY0t2XAk3hUnQDCIFXKLMYX//H1iRP+odU9dX
# d+TN552ftvgFPNhoVnUxgYEkaJyaMVUvIFQXcQIemLw6f/C/1QEPRNqGt0aNoLW9
# 49yQMKnwG7bt0M27ZrUBrjN+Jt2i4fjebWk5RkWIeqPXeYUKGsQJpjAR6ZTb+xrE
# 917GmmcLWPuQyCBGUjYAz9eljCyXVlHiT0GfyTHQumPapwxIOrHUxI8K5XLD/YuG
# 7uHdtKOK8PmH3J+7U2evxSwly+LizkSZcXL0n6hbvpoRwE66UaMDHvJSkBauSXYK
# mV54TWZzYwX5MRdmwffR68AwAlh0PrXBiARpL+D7E7KVzuTuRCuLo13AfJOD/NkZ
# qKlk6TpTkKgFukHzDx3f7lt9umyDvfMGaRnu/mf1LKWb6Ucuamsr3mfEdfIZnuBv
# HmcKEsk77QTPD10mpqbau5XxiEzZBPFDnAGy9EbOPgbuWnVtGqta2PhtI88AO3Cl
# W7TlSGd2IYMW8axaEv5OuqGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA2NTJa
# MC8GCSqGSIb3DQEJBDEiBCB1jeGOjB88vk6VD/eca1f1uzuabT5vn0Ac2z9pydXS
# MTANBgkqhkiG9w0BAQEFAASCAgAkpNaBsD+O8shOoZKrDOG9fgEMpOPXhT8VVEYz
# h+4eSdFiakGVWYAO3zoF1r2Yp8dU3WqAxVZXDxonKUvzuWQiviUJDFzZ3UghcpBv
# ZDzc5d9cTYzUj3mURPIaSk/XYXWacuflO3dCnNlVazRG1pUUaTonROdVkbE0Dcc8
# KHdkV2NJIlLxqKacIKz8xanZjwlgyeGrfxj2o9dHVQBvZqymFO48Zb+L7r1JJbl4
# VVnJUu66O1BQqZSr7feldX8vGLMtrEpvi9yeNjBlfG53ECeXwfa7NqqAkfdneqPc
# IZZN+MsGigkCFoCR/YXp8FQbxGr9tchiJGNiB/X1RDahQVkLvN8OujNlWbLJkyqu
# ZMAVvn8jiewzp2GmzOsOpAuXfJBHqYn11A1LCf8aiG8pAoLhbTLB8715Jz/3hDk7
# C/ZVyzd8qeC4yDCUqRIUU3A1m/Kz1uuLKTCWz4kr41tfFZj20aCZpF7STjb1BZTQ
# DPX45ur8Xx7gSf5Zoyk7+FDqrkF+Ix1DN/ySfalC8SEWmwLGVtt7IjYzgJk89ytm
# Z/xAZWZsmA7oWDC1uGXj2Xw4yxnnDbSs17xJVqmkVPvj9dRhE3NwlYaPo77WOIQk
# qPeytUOjviHfH2BMSaSygvKZvLzriMjw+KAOVILrC7ZcmtNP2H7QDvFmD52CsgQJ
# mPbidA==
# SIG # End signature block
|
New-ADFSTkSalt.ps1 | ADFSToolkit-2.3.0 | function New-ADFSTkSalt {
param (
# The nuber of randomized bytes in the Salt. Default is 30 which gives a salt with 40 characters.
[uint16]$RandomizedBytes = 30
)
# $characters = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+/="
# # Större teckenrymd men Base64 encoda efteråt och använd det som salt
# # 0x30..0x39 | % { $characters += ([char]$_) }
# # 0x41..0x5A | % { $characters += ([char]$_) }
# # 0x61..0x7A | % { $characters += ([char]$_) }
# do {
# $bytes = New-Object byte[] ($Length * 2)
# $RandomGenerator = [System.Security.Cryptography.RandomNumberGenerator]::Create()
# $RandomGenerator.GetBytes($bytes)
# foreach ($byte in $bytes) {
# if ($Salt.Length -lt $Length -and $characters.Contains([char]$byte)) {
# $Salt += [char]$byte
# }
# }
# }
# until ($Salt.Length -ge $Length)
# $SaltBytes = [System.Text.Encoding]::Unicode.GetBytes($Salt)
# $EncodedSalt =[Convert]::ToBase64String($SaltBytes)
$bytes = New-Object byte[] ($RandomizedBytes)
$RandomGenerator = [System.Security.Cryptography.RandomNumberGenerator]::Create()
$RandomGenerator.GetBytes($bytes)
$EncodedSalt = [Convert]::ToBase64String($bytes)
return $EncodedSalt
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCUc3f7iBiU7gEp
# Q09BknyAqy2y3DmUmJnwXBQN/TxnJ6CCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBy2o7Z6UKqlu5tcgB8w/hn5bWn
# MBBdFAWGaiP/Wwd8wTANBgkqhkiG9w0BAQEFAASCAgBTRW68xG4lyokgoa9VL4lM
# 2gu0C88mLxxslNI2ybKePk0zWTqjdlfXVY4MpZjOrwR2OznvGeXXd9pCm6dgKFZR
# EoyH+Y8Gcy9I3XzdxWmBE9OTj8kYxN09ARhTMBlAVCzXE4bIbWuj7sY6wh7ZGJjF
# 0pPSDrjJ6aMxEmlmd6c5VTZgzb5OW3xjp540np95MFIb0P3GFYjPCcp/ErSftj1C
# T3ac5xyMlKeMck8Y5M4MwrCTyMUaC3iDSm4WHjrGLmM12N48uXTOxFJjCGvKAJdM
# H6xFOPkYDyU/y3xRyqMR6hp6NKxS49lTWAMBtua3oTVkpQ68GN13Fs0Mw21/uPbW
# MimlxJ6nQseZdZ6WpqpXxWcR21MZvgl9+EZ08ChhfmW++29NTRibsQIzqnim/Ynj
# IYbd+5aPcfDwPSmKu4uP+Nqs5onnsjUneskCRy4OoJjKoNysbnZl+4muyqBfzVIj
# KUL0eNUR/ADc9TpGCRLhFbmfv17xHcIiUSiRtpPIBeP5NO/ImQDxS/KFJzpwLqEi
# g7zQYQ1f88hI/nOcLKv3oJdbP+paCFzMVaNhCrzJelf/caCxHZhg4VaETbgnBOGb
# l++HdwHSmXXc2bxkh8xdNBKSGv8F10+2AheUfVTC6Ow/jwvPeVhMijwjYzaF+glG
# S+S8bxzdgkbXbjLOxc14uaGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA0NDla
# MC8GCSqGSIb3DQEJBDEiBCDPLAkJox9yyG6aZamT5sYsLmY7au2mIr3Se/7PfGWt
# WzANBgkqhkiG9w0BAQEFAASCAgCmJo/oKdZe3wS94Ee0MPhZH0hy1ALqIhsKCNj5
# uCMCsx0jkgGRc31HDZatn5MrgmnPIrFGGE5QM3TFSRevSvOn/iAOSq14QSL8AdAv
# gmAf6f6VzPsnVhI18C00ROCc81LMcSus/ou4qRGSNLw+jhhRiRNjMWrhUAh3Dqai
# 36hIBRju5hRqV9opg1nrC/D3zLmvzUO/OUbU2RIjCLARh8TaSTrUPXZVziP6Mc+B
# LjyvN3UP8Ms/1vJn3bPrrymU7utuXha7dykyFE0YIL+TD6AZ1WKSmrFTowBdCV80
# TznT9LrjfHp2y9nWTr2+UsAUOGvCax21whShg/bSJKpay9RSK04vYyafJATUc9Uf
# x0vb0/z8Wc6Yl8q2BtC+jyLTX3q+YMAyJirQGF81hbFLTNqm/dHfSb2nUui0CA2V
# hfUbrvHF/9BZHAK3hSmA5leJOirjBs0IRMKk/Ue2HZrdLFWcLk+jHM8gZCojCG5F
# AD24nxxbpOT505/aPDskuENAs0R7yFthkbNoccJyRzzI3FwNFFQk+Dkb4A3cIQl2
# RRGbiYiMzOBoLWnISnqxE0yQy+SnBJJNC5X+WKoYvA+Z3XKqa+8iaKNpHJc2Kz06
# 3GpquL2sA3uZipUn7OhyCLvizQi5jOz+NIUMO0gWCL2hNn7VhzVMq2Y9BX0QSfk9
# HDBNww==
# SIG # End signature block
|
get-ADFSTkManualSPSettings.ps1 | ADFSToolkit-2.3.0 | function get-ADFSTkManualSPSettings
{
# HOW TO USE THIS FILE
#
# As of 0.9.45, this file purposely abstracts out overrides to user managed PowerShell.
# Please see the help section.
#
# We attempt to detect existance of the function which should contain the collection
# of service provider
$ManualSPSettings = @{}
try {
#Attempt to Get local override
if ([string]::IsNullOrEmpty($Settings.configuration.LocalRelyingPartyFile))
{
Write-ADFSTkLog (Get-ADFSTkLanguageText msNoConfiguredFile) -EntryType Information
}
else
{
# build the file path, source the file, invoke the function/method that the file is named
$localRelyingPartyFileFullPath = Join-Path $Global:ADFSTkPaths.institutionDir $Settings.configuration.LocalRelyingPartyFile
$myRelyingPartyMethodToInvoke = [IO.Path]::GetFileNameWithoutExtension($localRelyingPartyFileFullPath)
if (Test-Path -Path $localRelyingPartyFileFullPath )
{
. $localRelyingPartyFileFullPath
$ManualSPSettings = & $myRelyingPartyMethodToInvoke
}
else
{
Write-ADFSTkLog (Get-ADFSTkLanguageText msNoFileFound -f $Settings.configuration.LocalRelyingPartyFile) -EntryType Information
}
}
# ADFSToolkit ships with empty RP/SP settings now
#
# Sites can pass in their settings by $ADFSTkSiteSPSettings
# Examples are below.
# This returns the hashtable of hashtables to whomever invoked this function
$ManualSPSettings
}
Catch
{
Throw $_
}
<#
.SYNOPSIS
As of 0.9.45 and later, this file detects the existance of a site's Relying Party/Service provider attribute release definitions.
If the variable: ADFSTkSiteSPSettings exists, we will import these site specific settings.
.DESCRIPTION
This file is a harness to allow a site admin to configure per RP/SP attribute release policies for ADFSToolkit.
ADFSToolkit's default behaviour for Entity Categories such as Research and Scholarship are handled elsewhere in the ADFSToolkit Module.
How this Powershell Cmdlet works:
This file is delivered code complete, but returns an empty result.
Creation of this file:
Usually created when get-ADFSTkConfiguration is invoked which uses this file as a template (minus signature):
(Get-Module -Name ADFSToolkit).ModuleBase\config\default\en-US\get-ADFSTkManualSPSettings-dist.ps1
Alternatively, it can be created by hand and placed in c:\ADFSToolkit\<version>\config and sourced by command:
c:\ADFSToolkit\sync-ADFSTkAggregates.ps1
In the site specific file, for each entity we want to change the attribute handling policy of ADFS, we:
- create an empty TransformRules Hashtable
- assign 1 or more specific transform rules that have a corelating TransformRules Object
- When all transform rules are described, the set of transforms is inserted into the Hashtable we return
Clever transforms can be used as well to supercede or inject elements into RP/SP settings. Some are detailed in the examples.
To see example code blocks invoke detailed help by: get-help get-ADFSTkManualSPSettings -Detailed
.INPUTS
none
.OUTPUTS
a Powershell Hashtable structured such that ADFSToolkit may ingest and perform attribute release.
.EXAMPLE
### CAF test Federation Validator service attribute release
# $IssuanceTransformRuleManualSP = @{} uncomment when testing example. Needed only once per file to contain set of changes
$TransformRules = [Ordered]@{}
$TransformRules.givenName = $AllTransformRules.givenName
$TransformRules.sn = $AllTransformRules.sn
$TransformRules.cn = $AllTransformRules.cn
$TransformRules.eduPersonPrincipalName = $AllTransformRules.eduPersonPrincipalName
$TransformRules.mail = $AllTransformRules.mail
$TransformRules.eduPersonScopedAffiliation = $AllTransformRules.eduPersonScopedAffiliation
$IssuanceTransformRuleManualSP["https://validator.caftest.canarie.ca/shibboleth"] = $TransformRules
.EXAMPLE
### Lynda.com attribute release
# $IssuanceTransformRuleManualSP = @{} uncomment when testing example. Needed only once per file to contain set of changes
$TransformRules = [Ordered]@{}
$TransformRules.givenName = $AllTransformRules.givenName
$TransformRules.sn = $AllTransformRules.sn
$TransformRules.cn = $AllTransformRules.cn
$TransformRules.eduPersonPrincipalName = $AllTransformRules.eduPersonPrincipalName
$TransformRules.mail = $AllTransformRules.mail
$TransformRules.eduPersonScopedAffiliation = $AllTransformRules.eduPersonScopedAffiliation
$IssuanceTransformRuleManualSP["https://shib.lynda.com/shibboleth-sp"] = $TransformRules
.EXAMPLE
### advanced ADFS Transform rule #1 'from AD'
# $IssuanceTransformRuleManualSP = @{} uncomment when testing example. Needed only once per file to contain set of changes
$TransformRules = [Ordered]@{}
$TransformRules."From AD" = @"
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname",
Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory",
types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn",
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
"http://liu.se/claims/eduPersonScopedAffiliation",
"http://liu.se/claims/Department"),
query = ";userPrincipalName,displayName,mail,eduPersonScopedAffiliation,department;{0}", param = c.Value);
"@
$IssuanceTransformRuleManualSP."advanced.entity.id.org" = $TransformRules
.EXAMPLE
### advanced ADFS Transform rule #2
# $IssuanceTransformRuleManualSP = @{} uncomment when testing example. Needed only once per file to contain set of changes
$TransformRules = [Ordered]@{}
$TransformRules.mail = [PSCustomObject]@{
Rule=@"
@RuleName = "compose mail address as name@schacHomeOrganization"
c:[Type == "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name", Value !~ "^.+\\"]
=> issue(Type = "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier", Value = c.Value + "@$($Settings.configuration.StaticValues.schacHomeOrganization)");
"@
Attribute="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name"
}
$IssuanceTransformRuleManualSP["https://advanced.rule.two.org"] = $TransformRules
.EXAMPLE
### verify-i.myunidays.com
# $IssuanceTransformRuleManualSP = @{} uncomment when testing example. Needed only once per file to contain set of changes
$TransformRules = [Ordered]@{}
$TransformRules["eduPersonScopedAffiliation"] = $AllTransformRules["eduPersonScopedAffiliation"]
$TransformRules["eduPersonTargetedID"] = $AllTransformRules["eduPersonTargetedID"]
$IssuanceTransformRuleManualSP["https://verify-i.myunidays.com/shibboleth"] = $TransformRules
.EXAMPLE
### Release just transient-id
# $IssuanceTransformRuleManualSP = @{} uncomment when testing example. Needed only once per file to contain set of changes
$TransformRules = [Ordered]@{}
$TransformRules.'transient-id' = $AllTransformRules.'transient-id'
$IssuanceTransformRuleManualSP["https://just-transientid.org"] = $TransformRules
.NOTES
Details about Research and Scholarship Entity Category: https://refeds.org/category/research-and-scholarship
#>
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDrMKijOoSEH34+
# KfkWYMac6xQsWpMclFinK5vSN6HSfqCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCALZZRSRyr7D0+VAp3SG5hj+Pdk
# 8JnwEE31Y6uhHCCcTzANBgkqhkiG9w0BAQEFAASCAgBeHXviJSpdQA5qa0r5ZHbl
# uWKjquQCxRmZTV7eDQd0QaGm5ScUWdfVMOYMi9Kzcv9QIT5dTCEGkHBWfv/EkleB
# 8DI+I9vzAhpcOFi8MNMkerird0pSTXlv307K1zFH9NmlwGZTYaN6N54H8NAibD0R
# FMzPcmVTSb/By0yLTkC8rRWoMrb22TJXIBTWzS2r1/9ITkNJ6zxF8hvrp6QDXeR1
# fjov6txRMdLSf25kMQwcrovbwWOOjLjLlCyWJtrBxVATCOpxMd4YNhOhhYOtn2Ai
# fxpVEbZwR3E8uxnyEnegRdbVsKmAW11GbLiZgRLYcrc/3ECIjTxgvsEK9DogpAk8
# sGIAvF1NO9lbj2+YMbRdNByPDdRfaOFMrAGZ/30QEl+Lq1zRvD3YaN15nXmXNirq
# izjAJx1prUfJjzPKnesiSp9wuOwO/WUOilOBndzLcrHIDTZXcyhW0jqSvF7nl/hV
# yTLRoz+E/+TjCv9UQU/UnQpUNzbF8LiBNcz67etNy2Dz1hbxSmni7zAShWSvERQ6
# jmh3M3JrIg+eCfRsMb7ylY0Opzj1zgkdYV3CsNp8InWUljyLasWfyKHUShNh38/a
# kMSPWUB8vLcQeggxlERm/32jGqbnYf3d07Ss9H5r0xcpz/O+C5CmEHgrrvfu42E/
# BMBN4Q12JXbBaCnS0NAhp6GCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjAzMjFa
# MC8GCSqGSIb3DQEJBDEiBCBiSrV2aln0JnrTY9Ze7J5XHg1z/UNWz6J0PhizcsYs
# RTANBgkqhkiG9w0BAQEFAASCAgACgvYrqRnXOdzabjd9HV7/zXcjhlD6WlOIwtHp
# cYOCbXVf3m0Z4vQvOcqV15Q3DGY0QAlHsRMufkPCgujqdOnV/sUZlH0RHSKNQEBS
# u7gNHA9yupDxMqllalt1LknoX7UAOV9KdbcqdpK+tQt5QLkZBO9p/9RSN606yk3l
# o1swhmPCR8xyNsyt9SKun8w02KpEVi0enAwmN60cgWpfFOZWxMORrUZuBZPzmDg7
# vpIDBt55JUzY5umcF7tMsGsGNconw90QoMqAs/bqJ5lD9u84AZUdCGY5flBP6WHV
# FahzuUOPTNuQjiFvCsUyznjzhTCxwxa8lU6bN1O9i+sVBQxAOJSpikYGlW4BnXZj
# xo3OO5T5AjRekYtGmXcOzZ12dCHghGIWDXiPvfjL/z5AnzvgO1RRj9cCWh53g+C7
# 6sHt9Clj3UcAHi4piEYR7V/m005adj0qOpww8Eoy0oBH/HufnxJTq8jK2PH3i1u3
# 59C1gFz+CnFvMFWkqNM/h36mkig7oUTsFZyxYzIPyN6x8R/1bQN8FPTQE/8nvTZG
# nTl3vDDYEtJq+qgOgwJ/yLUy51Da4zGqV6qlyF62k9bh1uikm0myS1GaBZKcQWWi
# /2PbShiRL3DLTXeT/F+iFyksrHdHFJnnjxpmj+VWz7gcYrHyHYO9S8TETR/C/A/M
# 2n1FVA==
# SIG # End signature block
|
Import-ADFSTkIssuanceTransformRuleCategories.ps1 | ADFSToolkit-2.3.0 | function Import-ADFSTkIssuanceTransformRuleCategories {
param (
[Parameter(Mandatory = $false,
ValueFromPipelineByPropertyName = $true,
Position = 0)]
$RequestedAttributes,
[Parameter(Mandatory = $false,
ValueFromPipelineByPropertyName = $true,
Position = 1)]
$SubjectIDReq
)
if ($SubjectIDReq -eq 'any') {
$SubjectIDReq = 'pairwise-id'
}
### Create AttributeStore variables
$IssuanceTransformRuleCategories = @{}
### Released to SP:s without Entity Category
$TransformRules = [Ordered]@{}
#We don't want to send anything to SP's without entity categories at this time
$IssuanceTransformRuleCategories.Add("NoEntityCategory", $TransformRules)
### research-and-scholarship ###
$TransformRules = [Ordered]@{}
$TransformRules.displayName = $Global:ADFSTkAllTransformRules.displayName
$TransformRules.eduPersonAssurance = $Global:ADFSTkAllTransformRules.eduPersonAssurance
$TransformRules.eduPersonPrincipalName = $Global:ADFSTkAllTransformRules.eduPersonPrincipalName
$TransformRules.eduPersonScopedAffiliation = $Global:ADFSTkAllTransformRules.eduPersonScopedAffiliation
#eduPersonTargetedID should only be released if eduPersonPrincipalName i ressignable
if (![string]::IsNullOrEmpty($Settings.configuration.eduPersonPrincipalNameRessignable) -and $Settings.configuration.eduPersonPrincipalNameRessignable.ToLower() -eq "true") {
$TransformRules.eduPersonTargetedID = $Global:ADFSTkAllTransformRules.eduPersonTargetedID
}
# $TransformRules.eduPersonUniqueID = $Global:ADFSTkAllTransformRules.eduPersonUniqueID
$TransformRules.givenName = $Global:ADFSTkAllTransformRules.givenName
$TransformRules.mail = $Global:ADFSTkAllTransformRules.mail
$TransformRules.sn = $Global:ADFSTkAllTransformRules.sn
$IssuanceTransformRuleCategories.Add("http://refeds.org/category/research-and-scholarship", $TransformRules)
### GEANT Dataprotection Code of Conduct
$TransformRules = [Ordered]@{}
if ($RequestedAttributes.Count -gt 0) {
if ($RequestedAttributes.ContainsKey("urn:oid:2.5.4.3")) {
$TransformRules.cn = $Global:ADFSTkAllTransformRules.cn
}
if ($RequestedAttributes.ContainsKey("urn:oid:2.16.840.1.113730.3.1.241")) {
$TransformRules.displayName = $Global:ADFSTkAllTransformRules.displayName
}
if ($RequestedAttributes.ContainsKey("urn:oid:1.3.6.1.4.1.5923.1.1.1.1")) {
$TransformRules.eduPersonAffiliation = $Global:ADFSTkAllTransformRules.eduPersonAffiliation
}
if ($RequestedAttributes.ContainsKey("urn:oid:1.3.6.1.4.1.5923.1.1.1.11")) {
$TransformRules.eduPersonAssurance = $Global:ADFSTkAllTransformRules.eduPersonAssurance
}
if ($RequestedAttributes.ContainsKey("urn:oid:1.3.6.1.4.1.5923.1.1.1.16")) {
$TransformRules.eduPersonOrcid = $Global:ADFSTkAllTransformRules.eduPersonOrcid
}
if ($RequestedAttributes.ContainsKey("urn:oid:1.3.6.1.4.1.5923.1.1.1.6")) {
$TransformRules.eduPersonPrincipalName = $Global:ADFSTkAllTransformRules.eduPersonPrincipalName
}
if ($RequestedAttributes.ContainsKey("urn:oid:1.3.6.1.4.1.5923.1.1.1.9")) {
$TransformRules.eduPersonScopedAffiliation = $Global:ADFSTkAllTransformRules.eduPersonScopedAffiliation
}
if ($RequestedAttributes.ContainsKey("urn:oid:1.3.6.1.4.1.5923.1.1.1.10")) {
#eduPersonTargetedID should only be released if eduPersonPrincipalName i ressignable
# if (![string]::IsNullOrEmpty($Settings.configuration.eduPersonPrincipalNameRessignable) -and $Settings.configuration.eduPersonPrincipalNameRessignable.ToLower() -eq "true") {
$TransformRules.eduPersonTargetedID = $Global:ADFSTkAllTransformRules.eduPersonTargetedID
# }
}
if ($RequestedAttributes.ContainsKey("urn:oid:1.3.6.1.4.1.5923.1.1.1.13")) {
$TransformRules.eduPersonUniqueID = $Global:ADFSTkAllTransformRules.eduPersonUniqueID
}
if ($RequestedAttributes.ContainsKey("urn:oid:2.5.4.42")) {
$TransformRules.givenName = $Global:ADFSTkAllTransformRules.givenName
}
if ($RequestedAttributes.ContainsKey("urn:oid:0.9.2342.19200300.100.1.3")) {
$TransformRules.mail = $Global:ADFSTkAllTransformRules.mail
}
if ($RequestedAttributes.ContainsKey("urn:oid:1.2.752.29.4.13")) {
$TransformRules.personalIdentityNumber = $Global:ADFSTkAllTransformRules.personalIdentityNumber
}
if ($RequestedAttributes.ContainsKey("urn:oid:1.3.6.1.4.1.25178.1.2.3")) {
$TransformRules.schacDateOfBirth = $Global:ADFSTkAllTransformRules.schacDateOfBirth
}
if ($RequestedAttributes.ContainsKey("urn:oid:1.3.6.1.4.1.25178.1.2.9")) {
$TransformRules.schacHomeOrganization = $Global:ADFSTkAllTransformRules.schacHomeOrganization
}
if ($RequestedAttributes.ContainsKey("urn:oid:1.3.6.1.4.1.25178.1.2.10")) {
$TransformRules.schacHomeOrganizationType = $Global:ADFSTkAllTransformRules.schacHomeOrganizationType
}
if ($RequestedAttributes.ContainsKey("urn:oid:2.5.4.4")) {
$TransformRules.sn = $Global:ADFSTkAllTransformRules.sn
}
}
#region Add subject-id/pairwise-id
switch ($SubjectIDReq) {
'pairwise-id' {
$TransformRules.pairwiseID = $Global:ADFSTkAllTransformRules.pairwiseID
}
'subject-id' {
$TransformRules.subjectID = $Global:ADFSTkAllTransformRules.subjectID
}
'none' { }
Default {}
}
#endregion
$IssuanceTransformRuleCategories.Add("http://www.geant.net/uri/dataprotection-code-of-conduct/v1", $TransformRules)
$IssuanceTransformRuleCategories.Add("https://refeds.org/category/code-of-conduct/v2", $TransformRules)
#region Anonymous Authorization – REFEDS
$TransformRules = [Ordered]@{}
$TransformRules.eduPersonScopedAffiliation = $Global:ADFSTkAllTransformRules.eduPersonScopedAffiliation
$TransformRules.eduPersonOrgDN = $Global:ADFSTkAllTransformRules.eduPersonOrgDN
$TransformRules.schacHomeOrganization = $Global:ADFSTkAllTransformRules.schacHomeOrganization
$TransformRules.eduPersonEntitlement = $Global:ADFSTkAllTransformRules.eduPersonEntitlement
$IssuanceTransformRuleCategories.Add("https://refeds.org/category/anonymous", $TransformRules)
#endregion
#region Pseudonymous Authorization – REFEDS
$TransformRules = [Ordered]@{}
$TransformRules.eduPersonScopedAffiliation = $Global:ADFSTkAllTransformRules.eduPersonScopedAffiliation
$TransformRules.eduPersonOrgDN = $Global:ADFSTkAllTransformRules.eduPersonOrgDN
$TransformRules.schacHomeOrganization = $Global:ADFSTkAllTransformRules.schacHomeOrganization
$TransformRules.eduPersonEntitlement = $Global:ADFSTkAllTransformRules.eduPersonEntitlement
$TransformRules.eduPersonAssurance = $Global:ADFSTkAllTransformRules.eduPersonAssurance
$TransformRules.pairwiseID = $Global:ADFSTkAllTransformRules.pairwiseID
$IssuanceTransformRuleCategories.Add("https://refeds.org/category/pseudonymous", $TransformRules)
#endregion
#region Personalized Authorization – REFEDS
$TransformRules = [Ordered]@{}
$TransformRules.eduPersonScopedAffiliation = $Global:ADFSTkAllTransformRules.eduPersonScopedAffiliation
$TransformRules.eduPersonAssurance = $Global:ADFSTkAllTransformRules.eduPersonAssurance
$TransformRules.schacHomeOrganization = $Global:ADFSTkAllTransformRules.schacHomeOrganization
$TransformRules.displayName = $Global:ADFSTkAllTransformRules.displayName
$TransformRules.givenName = $Global:ADFSTkAllTransformRules.givenName
$TransformRules.sn = $Global:ADFSTkAllTransformRules.sn
$TransformRules.mail = $Global:ADFSTkAllTransformRules.mail
$TransformRules.subjectID = $Global:ADFSTkAllTransformRules.subjectID
$IssuanceTransformRuleCategories.Add("https://refeds.org/category/personalized", $TransformRules)
#endregion
###
return $IssuanceTransformRuleCategories
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA5tquKV6vLhnj9
# Sm/LxI8OJM7Zt1WiI8xR3cq/QJ3lSaCCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDNgns7HXhobVoKaj20nCD4s7rv
# s+OeKoUv1yk8zLlpJTANBgkqhkiG9w0BAQEFAASCAgBQtUEk3NaIDlhcdapaS9Ey
# nebBfqvX0OsOzWwoPQ0KsNR+AnnXoSDeTeR3kYTsVNB6t4C2MP890GdSmXfVhQOf
# jNzEEoamHUKK5eFN8JlZYJyFXfdlfvjJ1zQkinAn2yOo0vGREU8ZvpQ+bDMTB39e
# M7oyJNHKjhmY4/XPZqqakpLwJemFBSvPbyXstYetmd2g+UC0RMOCVl/Uzn3Kk+5d
# QEnH07JVSpm2ZziqGV1wqPzqfC72daU4MCuJdgcB5jjL58JmMrV9xNhcDTmPPLdu
# ZjuFtngsQ4y/S/hTkj1lxaiAu0IHthV+qlNpK4wseg6bUot9DeAvTdQfCrMDPZ9a
# K/cKDbX4iTZos1Rsfx2L6v3mqdEINicA4ArcEQchPHjal+whuXPoC20R2v4jnYId
# I7PD32NepD13H4cfZfEpqQunaFBz4kCc7abFrkPmeORViBAWsBT9mU1yGn6rV/uL
# nKOEky6P3KjoCGfjiAmAFOYI2dtsDsUUBingmSvyYZqTunOeLFhTbs1XpZSKs6JK
# aKFUhwsNZR+pz0JHR4LZvs76O9If8Fx/65o493ZNguRasi8FWtdx4Dk5W3Hz7kpN
# ZFUAYHCH/zRkJA2vOUlYY5X3U6dcFyG9tDmPBJgOQ6wwKNuCZf90qrCGrXHYEEW7
# 1rD1uUG36KdV4M/Ix7TvhqGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjA0MzZa
# MC8GCSqGSIb3DQEJBDEiBCB6ONboWhXlNaY9xJzfMe/AoewY3DE3GwW4GC1XXObO
# RDANBgkqhkiG9w0BAQEFAASCAgBMDLG09DBLMquEGo/sSf9kOuTkAOw4NbYRT+KQ
# 0CORHyFM70Q45qi5irOX2Aqq8Nh75FWTRlq5s5IkQuv6V/TEEtKJ7/oqLlfdAoJm
# OhyIdrpD0YUuV/PcHtZe2sD7LNRspqUaqaEXeJZ/y/LzsR3qCdARmRoQShRdJJ1H
# yO3fADE1C8iYVYFVZ3ZuLXAk0CUqJ8yUP9MYg1s+4UeJwiUMiS3IL45A1/KCOKjW
# svK6yuAGES6K2bVYuTO9jz1a5HdYajRQPcKd/laZRDtfnSrgL7HHC+/rc3le2JmA
# 972b7Wx80luqklUDN/KZwTlHmSxMYQz3sw+5KZYPFaB0okKfTy8z/lhP1RhyCVwr
# ykuC4JlPnQ3FzvuTHBmL1x+8COn7+23tB6r/+cTIgOZdXaOLWC4zmlPWNAsNMEM0
# VGlLD0+dCHmbPD4Cmil8ktTko3nYwoxaIvtlaABDVD7Ee7nR8CXfk2OAt5nhv5Jv
# YLah/CdDQy/KkvGqZJIN6tf9xBV7gX9vINqG155riXbsNgzGwoKqeZHbKxRejtFb
# tDPm50xqwCvdcYADoxGbFSyPSdoj6W8HfScnNyuoJTqDp9wCbHUQHmOY4FzFftBC
# 8V3Kb29bj4BaDK2xbQ6BOPvblWS8GNyJts+DAig6OOD8WKUOK50WjggSCl2X6c11
# fsrt0A==
# SIG # End signature block
|
Get-ADFSTkAnswer.ps1 | ADFSToolkit-2.3.0 | function Get-ADFSTkAnswer {
[CmdletBinding(DefaultParameterSetName='NonPipeline')]
param (
[Parameter(Mandatory=$true,
position=0,
ValueFromPipeline=$true,
ValueFromPipelineByPropertyName=$true)]
[Alias('Name')]
[ValidateNotNullOrEmpty()]
[string]
#The message that should be viewed before Yes/No
$Message,
[Parameter(Mandatory=$false,
position=1)]
[string]
#The caption for the message
$Caption = "Choose wisely...",
[Parameter(Mandatory=$false,
position=2)]
[switch]
#Show abort as an alternative
$Abort,
[Parameter(Mandatory=$false,
position=3)]
[switch]
#Use this to prompt Yes as default value
$DefaultYes
)
BEGIN
{
if (!$PSBoundParameters.ContainsKey('Message'))
{
$Pipeline = $true
$Abort = $false
}
$YesToAll = $false
$NoToAll = $false
}
PROCESS
{
if ($Pipeline)
{
$CurrentObject = $_
}
if ($YesToAll)
{
if ($Pipeline)
{
return $CurrentObject
}
else
{
return 1
}
}
elseif ($NoToAll)
{
if (!$Pipeline)
{
return 0
}
}
else
{
if ($DefaultYes) { $DefaultAnswer = 0 } else { $DefaultAnswer = 1 }
$choices = @()
$choices += New-Object System.Management.Automation.Host.ChoiceDescription "&Yes",""
$choices += New-Object System.Management.Automation.Host.ChoiceDescription "&No",""
if ($Abort)
{
$choices += New-Object System.Management.Automation.Host.ChoiceDescription "&Abort",""
}
if ($Pipeline)
{
$choices += New-Object System.Management.Automation.Host.ChoiceDescription "Yes to &ALL",""
$choices += New-Object System.Management.Automation.Host.ChoiceDescription "No to A&LL",""
}
$caption = $Caption
$message = $Message
#$result = $Host.UI.PromptForChoice($caption,$message,$choices,$DefaultAnswer)
$result = $Host.UI.PromptForChoice($caption,$message,[System.Management.Automation.Host.ChoiceDescription[]]($choices),$DefaultAnswer)
switch ($result)
{
0 {
if ($Pipeline)
{
return $CurrentObject
}
else
{
return 1
}
}
1 {
if (!$Pipeline)
{
return 0
}
}
2 {
if ($Abort)
{
return 2
}
else
{
$YesToAll = $true
if ($Pipeline)
{
return $CurrentObject
}
else
{
return 1
}
}
}
3 {
$NoToAll = $true
if (!$Pipeline)
{
return 0
}
}
# 4 {
# if (!$Pipeline)
# {
# $NoToAll = $true
# return 0
# }
# }
}
}
}
END
{
}
<#
.SYNOPSIS
Gives a Yes/No question and returns the answer
.DESCRIPTION
Use this cmdlet to make a quick question to the user.
.EXAMPLE
C:\PS> if (Get-LiUAnswer "Do you want to continue?") {Write-Host "Continuing..."}
Choose wisely...
Do you want to continue?
[Y] Yes [N] No [?] Help (default is "N"): y
Continuing...
.EXAMPLE
C:\PS> $Answer = Get-LiUAnswer "Do you want to continue?" -Abort
Choose wisely...
Do you want to continue?
[Y] Yes [N] No [A] Abort [?] Help (default is "N"): A
C:\PS> if ($Answer -eq 2) {throw "Script aborted!"}
Script aborted!
At line:1 char:21
+ if ($Answer -eq 2) {throw "Script aborted!"}
+ ~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : OperationStopped: (Script aborted!:String) [], RuntimeException
+ FullyQualifiedErrorId : Script aborted!
.EXAMPLE
C:\PS> Get-ChildItem $env:TEMP *.tmp | Get-LiUAnswer -Caption "Delete file?" | Remove-Item -WhatIf
Delete file?
tmp36AC.tmp
[Y] Yes [N] No [A] Yes to ALL [L] No to ALL [?] Help (default is "Y"): A
What if: Performing operation "Remove File" on Target "C:\Users\adm_johpe12\AppData\Local\Temp\tmp36AC.tmp".
What if: Performing operation "Remove File" on Target "C:\Users\adm_johpe12\AppData\Local\Temp\tmp4423.tmp".
What if: Performing operation "Remove File" on Target "C:\Users\adm_johpe12\AppData\Local\Temp\tmp4424.tmp".
...
#>
}
# SIG # Begin signature block
# MIItMAYJKoZIhvcNAQcCoIItITCCLR0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBmn+P61gIFOzQl
# tfZd2e1dlsJCHW0omEUuVh3LdMXPU6CCJjkwggWNMIIEdaADAgECAhAOmxiO+dAt
# 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV
# BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa
# Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy
# dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD
# ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
# ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E
# MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy
# unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF
# xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1
# 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB
# MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR
# WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6
# nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB
# YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S
# UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x
# q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB
# NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP
# TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC
# AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp
# Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB
# LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc
# Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov
# Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy
# oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW
# juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF
# mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z
# twGpn1eqXijiuZQwggXfMIIEx6ADAgECAhBOQOQ3VO3mjAAAAABR05R/MA0GCSqG
# SIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5j
# LjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcG
# A1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVz
# ZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo
# b3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDExMDcxNjEzNDVaMGkxCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlFbnRy
# dXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g
# Q1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2YkPy
# 2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5oG6v2
# W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9Y3/v
# MuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/tcnA
# 4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc51z/
# O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJethl3wP
# 5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH2OxM
# bobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb9Gdo
# BQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbNe0WS
# kUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1nAZKG
# 3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9zgyE
# Ig3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCCAScwDgYDVR0PAQH/BAQD
# AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYwFAYIKwYBBQUHAwMGCCsG
# AQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8v
# d3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGG
# F2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQpMCcwJaAjoCGGH2h0dHA6
# Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0OBBYEFIK61j2Xzp/PceiS
# N6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztpUdRsjZ+QEmarMA0GCSqG
# SIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7BJheWTgTCaRZlEJeUL9P
# bG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+LxR9jx1DNmSzZhNfFMyl
# cfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv3ty/6RHdFoMI0yyNf02o
# FHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHFVuOFuE2bRXKLB/GK+0m4
# X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuXbheIDeHGQ5jXgWG2hZ1H
# 7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIGgzCCBGugAwIBAgIQNa+3
# e500H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQG
# A1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25p
# bmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUw
# NzE5MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRh
# dGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4
# JEIPRtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvE
# jXxG9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bW
# cJL71IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2f
# NSKv1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ41
# 4+Xs5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u
# +o29p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7J
# aWUu7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHR
# h3vHyCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBe
# PLQ2+ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcV
# cDt7AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMB
# AAGjggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoV
# ooRiyjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNV
# HSAEPTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EW
# xFiTZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE
# 85rh13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsq
# jFHjxALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3Xq
# gwCuAHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8f
# gk1cQqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B
# 7wrbfZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHto
# eUdq6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctA
# PiASzghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/
# gLGQ1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFR
# BqqmDDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9d
# BmSFA3d/YNjCvHTJlZFot7d+YRl1MIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBrwwggSkoAMCAQICEAuuZrxaun+Vh8b56QTjMwQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQTAeFw0yNDA5MjYwMDAwMDBaFw0zNTExMjUyMzU5NTlaMEIxCzAJ
# BgNVBAYTAlVTMREwDwYDVQQKEwhEaWdpQ2VydDEgMB4GA1UEAxMXRGlnaUNlcnQg
# VGltZXN0YW1wIDIwMjQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+
# anOf9pUhq5Ywultt5lmjtej9kR8YxIg7apnjpcH9CjAgQxK+CMR0Rne/i+utMeV5
# bUlYYSuuM4vQngvQepVHVzNLO9RDnEXvPghCaft0djvKKO+hDu6ObS7rJcXa/UKv
# NminKQPTv/1+kBPgHGlP28mgmoCw/xi6FG9+Un1h4eN6zh926SxMe6We2r1Z6VFZ
# j75MU/HNmtsgtFjKfITLutLWUdAoWle+jYZ49+wxGE1/UXjWfISDmHuI5e/6+NfQ
# rxGFSKx+rDdNMsePW6FLrphfYtk/FLihp/feun0eV+pIF496OVh4R1TvjQYpAztJ
# pVIfdNsEvxHofBf1BWkadc+Up0Th8EifkEEWdX4rA/FE1Q0rqViTbLVZIqi6viEk
# 3RIySho1XyHLIAOJfXG5PEppc3XYeBH7xa6VTZ3rOHNeiYnY+V4j1XbJ+Z9dI8Zh
# qcaDHOoj5KGg4YuiYx3eYm33aebsyF6eD9MF5IDbPgjvwmnAalNEeJPvIeoGJXae
# BQjIK13SlnzODdLtuThALhGtyconcVuPI8AaiCaiJnfdzUcb3dWnqUnjXkRFwLts
# VAxFvGqsxUA2Jq/WTjbnNjIUzIs3ITVC6VBKAOlb2u29Vwgfta8b2ypi6n2PzP0n
# VepsFk8nlcuWfyZLzBaZ0MucEdeBiXL+nUOGhCjl+QIDAQABo4IBizCCAYcwDgYD
# VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaA
# FLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSfVywDdw4oFZBmpWNe7k+S
# H3agWzBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3Js
# MIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0Eu
# Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQA9rR4fdplb4ziEEkfZQ5H2EdubTggd0ShP
# z9Pce4FLJl6reNKLkZd5Y/vEIqFWKt4oKcKz7wZmXa5VgW9B76k9NJxUl4JlKwyj
# UkKhk3aYx7D8vi2mpU1tKlY71AYXB8wTLrQeh83pXnWwwsxc1Mt+FWqz57yFq6la
# ICtKjPICYYf/qgxACHTvypGHrC8k1TqCeHk6u4I/VBQC9VK7iSpU5wlWjNlHlFFv
# /M93748YTeoXU/fFa9hWJQkuzG2+B7+bMDvmgF8VlJt1qQcl7YFUMYgZU1WM6nyw
# 23vT6QSgwX5Pq2m0xQ2V6FJHu8z4LXe/371k5QrN9FQBhLLISZi2yemW0P8ZZfx4
# zvSWzVXpAb9k4Hpvpi6bUe8iK6WonUSV6yPlMwerwJZP/Gtbu3CKldMnn+LmmRTk
# TXpFIEB06nXZrDwhCGED+8RsWQSIXZpuG4WLFQOhtloDRWGoCwwc6ZpPddOFkM2L
# lTbMcqFSzm4cd0boGhBq7vkqI1uHRz6Fq1IX7TaRQuR+0BGOzISkcqwXu7nMpFu3
# mgrlgbAW+BzikRVQ3K2YHcGkiKjA4gi4OA/kz1YCsdhIBHXqBzR0/Zd2QwQ/l4Gx
# ftt/8wY3grcc/nS//TVkej9nmUYu83BDtccHHXKibMs/yXHhDXNkoPIdynhVAku7
# aRZOwqw6pDCCBsgwggSwoAMCAQICEDVP8/CYmCMy0wHfstCzixQwDQYJKoZIhvcN
# AQELBQAwYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6
# BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcg
# Q0EgLSBFVkNTMjAeFw0yNDAzMjIxNDAyMzdaFw0yNTAzMjkxNDAyMzZaMIGjMQsw
# CQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRMw
# EQYLKwYBBAGCNzwCAQMTAkNBMRQwEgYDVQQKEwtDQU5BUklFIElOQzEdMBsGA1UE
# DxMUUHJpdmF0ZSBPcmdhbml6YXRpb24xETAPBgNVBAUTCDI5MDIwOC03MRQwEgYD
# VQQDEwtDQU5BUklFIElOQzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AIbar6/W1oMcwPbrTZBOR7XAFQ43Qt/AyPGUT42dOQnfcqWqPlZKN2mreuYTFdaA
# knd2pJZC/3b16Yu2O0ElPuqUBwF0CrKapWGjQ5eUvC65Dn5c0hXmPzIV8snCTqRE
# m8nGl5BZmlvqMc7MxaDrMh88kHVxNpHevYP3729AD7AoBKmiwglAOtZnXPNVllH5
# qx4ZHYKt9dVCbEz0nGjzs1LobknyvRV8onsmGaRDhIYvYb27sttPmmKSC6yqnwNl
# ZV00d3KbUt1jOo9PGlS//4ZIw60rm+atIHWvwCVNXLj8WNYOs29xb3IeM1a0JO/Q
# IyQ6n5TZRxns8ateQkuEfsNU9Z5/K9GcyXuiZinGsBjVxvwSQoj2YhXtnlz/ZRzK
# absH1ZtQ3ygedVpt4d1TGJbU3uJI2PrynXqRYgxTYoJ0F38EBvbgY33TiC/fzemT
# NtqkyYJHAzfE7ksUdYQq6GMSDEy5nZA+vXvTB59aSk63S+mHNTDBRPYBDwg5nn10
# NUh+0TGUu+MKwoDCq4Qy8w8VdooxS10RHzYflMp4/b9FxhXfWd9/qtFUQaZtjEvg
# V53s4GpVtsa52ij5L9VSu+ta6ZSZAarxiH/5/ni4bn1n+Q/n7bUfTHk8y8GT3SoX
# zKwOZXsSeUVq4my7beGwn13O2efES/cdx1EzxmHZl18NAgMBAAGjggE1MIIBMTAM
# BgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQSgPtIskRFyN7+qGdwcp+8w1kGDDAfBgNV
# HSMEGDAWgBTOiU+CUaoVooRiyjEjYdJh+/j+eDBnBggrBgEFBQcBAQRbMFkwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAChiZo
# dHRwOi8vYWlhLmVudHJ1c3QubmV0L2V2Y3MyLWNoYWluLnA3YzAxBgNVHR8EKjAo
# MCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2V2Y3MyLmNybDAOBgNVHQ8B
# Af8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwIAYDVR0gBBkwFzAHBgVngQwB
# AzAMBgpghkgBhvpsCgECMA0GCSqGSIb3DQEBCwUAA4ICAQBd5heW6V8s8owim1XL
# vy2aMSMHXB6gjP7suiiyx4WGKZAZn1tY0TWexrjZE66GQI0IxdOrMQQfIXfaTLPy
# 3g6qBNf5IazlcanmgKT45dpGVB0ixKmoOnxBCZKtESJvmmBuXe5/QyH1/EECx1y8
# SA1mO6j9uUKhY+/ZG0jHOYQXTuT/X1e2wfEwmJCGKC/OGiLi2iLjRWWHEwEnYXw1
# 3S0cBqcXhuVpjL+Ce9W/N833TFQ8AA3rjN2ZWuti9RMoO5rabeSXbjGXrDWHi5y6
# MbZL3+QYjHPKSTySjIYjENICf6rFcvCdHnrmNbLP3fWd5plzAObhiJSwgXyiBoMO
# cP+6ZtNMDR/8U3TwUmWbwPH5ulfgVvmyPhchq1cRksxRj6uz48dHSksmDx+pZHMS
# yDj5yITRTwZBa9Q41+giSxPGRxUB/7HyX5slQGZdW6Y4SQHQ06SGvCkrM3dJQ4aG
# Ybw3NBtcwUmhA79pYOu3YhrJmpUXUx5mVQDqnTUrpn6P0RhW9tWopBYSlXRJy2qF
# 0UvguDm0jqhSMmc0wnLl725zGLbC2/lG1NLIvGtDRsGAq5zMbAVpDRUMm4O04R+W
# QeCssBMWFT1HR7PmJyfvUo4cQCkpeZRRS2DL5/AlgBINqTiv+lP2nXKwmkpg6lEX
# vNAaRgMSGgtnMNkDbjpU8ldKsTGCBk0wggZJAgEBMHcwYzELMAkGA1UEBhMCVVMx
# FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5k
# ZWQgVmFsaWRhdGlvbiBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMgIQNU/z8JiYIzLT
# Ad+y0LOLFDANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCABk5QI8PSGbFTBpGs0RraUQRaB
# p8kcG+MprEBCuJ6LUjANBgkqhkiG9w0BAQEFAASCAgA/Mzkljzfkhhnw8xxUwEjR
# eRPi4Jz2BHvoYTapMl4v69WIAqxQ3CsxferwaA3GUDqjed3lWC84pZsxOYZmvyXg
# bnYQx5O5GutfmNpZbDgI4v6QWRnfpPxJnEWAMmAL9BS4UqRxe4JdhS9O0CPGk0l6
# fEiRXeTZBR4YNZiyA+wkVU2Oh9T3G9Ppe9nbPGs3++c/9bqWVySf4aDDLpSInYt7
# 0GAAy6NJg8mRtM161LJk7+x6VYKuOcvmIfIAKyWnCUlJuABsLltMzvfFKpEYXPal
# GtEXScNZSZUwjyu7SFNMoCynYKu4Xcvw1YF/wiSWqoX1muPciP0ZyeAIFNul7sy/
# F2/sBgNGyTqaM9NoeOT0NkztKouOz06xQn7xUGztvuPfTvxrfDpFPk+wN7qBmK/S
# bwN5nxxLLlT99TY8Ds9QZh+gTAnlTIFVOjx3zeed3ZbLerTNhH8BCJUWmGxQMs1W
# xmW/G6ji4UQySblmjFiYkGtbqwhlzVDWQy2CqZz6+qyyHYSCQqahX6xsnQEx7xXh
# Gt70CMtOa7vNTNCt85jNA8XWbiKmGa/BFUnzpEoOtvQywj10YrprlAnbvArJaffO
# 8OebWIFkkrh8tq1JKtZR/4Hw1SZ1zUrg+O11jc3zeWrE2xRnCcu/8ltOKBCaLeHl
# rG8Pr6WDrnr1cWjvs4P0raGCAyAwggMcBgkqhkiG9w0BCQYxggMNMIIDCQIBATB3
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0ECEAuuZrxaun+Vh8b56QTjMwQwDQYJYIZIAWUDBAIBBQCgaTAYBgkqhkiG
# 9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0yNDExMTMxNjAzNDZa
# MC8GCSqGSIb3DQEJBDEiBCA7+UXrH5UjAuDksTZlqlyh06Qin/GGKvY+9fQgOWSR
# RjANBgkqhkiG9w0BAQEFAASCAgAo3TuucPSEm/66p0qd+wG3a3x4AHHiDonvUcZ7
# MsnDwXqMGsd/6h8DfvV6N5rSbnG4D0J30bTYH1Tt4xmbYYefBOPxX6ku92+zBGOe
# R5mWvA5oLUKXu3ZXmlaKG9CEpYvUzK7Esdr8kO7nTZzYJmlvZe1am2Kvb4dIFfkW
# DyU/K23qVH5HbhcCN8sr5GVW1nzNd30sEJ+59/9jKoe39/WeXHELmqpIHaVUWpNt
# npH4ybbfsUsyabGAn8gaNxAn+fk19yaOnoHZL5IfAJmy5CkmkwyRo5nZu1oY1eao
# YTeVyo87s2+Uv8BJ4YqOsna6CnG6pVrk10cmXEWtX8QO5Sn4AxlP09NJCRuo0Hgh
# wvmvcUW6VsPzTMP6uAxFWQNccVv4sBN9jnzRGZzr42AG11ScEL8fHxpa8txj19k0
# vrzbj1tng6tr0WcB9sPaf5NKDzQWVi9ZbqQloG6YdUzvlG86E8hcRsYAO1jlSg8x
# /mEKKkKwdXVRz7YQr9urtI4zzmTzMx2SlfFL4V/wn25rWXdgqET+2ZltyZKcofPx
# 3l9kCQ38UUEDlOSPGXrzetDFWRXTO/BhWP79xg1yPBYjEBlW+t7bN+OispiyvEYd
# iamb92jgrt+iJoipCWKCVmGkEjRJ5mZtV9EAXX5V/fVNO81DD7fVy8Sq60jTL/AO
# 6RQkaQ==
# SIG # End signature block
|
Subsets and Splits