Publish version 1.0.x #45
58
README.md
58
README.md
@ -1,45 +1,42 @@
|
|||||||
[![AppVeyor branch](https://img.shields.io/appveyor/ci/OCram85/PSCredentialStore/master.svg?style=plastic "Master Banch Build Status")](https://ci.appveyor.com/project/OCram85/pscredentialstore/branch/master)
|
[![AppVeyor branch](https://img.shields.io/appveyor/ci/OCram85/PSCredentialStore/master.svg?style=plastic "Master Branch Build Status")](https://ci.appveyor.com/project/OCram85/pscredentialstore/branch/master)
|
||||||
[![AppVeyor tests branch](https://img.shields.io/appveyor/tests/OCram85/PSCredentialStore/master.svg?style=plastic "Pester Tests Results")](https://ci.appveyor.com/project/OCram85/pscredentialstore/branch/master/tests)
|
[![AppVeyor tests branch](https://img.shields.io/appveyor/tests/OCram85/PSCredentialStore/master.svg?style=plastic "Pester Tests Results")](https://ci.appveyor.com/project/OCram85/pscredentialstore/branch/master/tests)
|
||||||
[![Coveralls github](https://img.shields.io/coveralls/github/OCram85/PSCredentialStore.svg?style=plastic "Coveralls.io Coverage Report")](https://coveralls.io/github/OCram85/PSCredentialStore?branch=master)
|
[![Coveralls github](https://img.shields.io/coveralls/github/OCram85/PSCredentialStore.svg?style=plastic "Coveralls.io Coverage Report")](https://coveralls.io/github/OCram85/PSCredentialStore?branch=master)
|
||||||
[![PowerShell Gallery](https://img.shields.io/powershellgallery/v/PSCredentialStore.svg?style=plastic "PowershellGallery Published Version")](https://www.powershellgallery.com/packages/PSCredentialStore)
|
[![PowerShell Gallery](https://img.shields.io/powershellgallery/v/PSCredentialStore.svg?style=plastic "PowershellGallery Published Version")](https://www.powershellgallery.com/packages/PSCredentialStore)
|
||||||
|
[![PowerShell Gallery](https://img.shields.io/powershellgallery/vpre/PSCredentialStore.svg?label=latest%20preview&style=plastic "PowershellGallery Latest Preview Version")](https://www.powershellgallery.com/packages/PSCredentialStore)
|
||||||
[![PowerShell Gallery](https://img.shields.io/powershellgallery/dt/PSCredentialStore.svg?style=plastic "PowershellGallery Downloads")](https://www.powershellgallery.com/packages/PSCredentialStore)
|
[![PowerShell Gallery](https://img.shields.io/powershellgallery/dt/PSCredentialStore.svg?style=plastic "PowershellGallery Downloads")](https://www.powershellgallery.com/packages/PSCredentialStore)
|
||||||
|
|
||||||
![forthebadge](http://forthebadge.com/images/badges/built-with-love.svg)
|
![forthebadge](http://forthebadge.com/images/badges/built-with-love.svg)
|
||||||
![forthebadge](http://forthebadge.com/images/badges/for-you.svg)
|
![forthebadge](http://forthebadge.com/images/badges/for-you.svg)
|
||||||
|
|
||||||
General
|
:key: General
|
||||||
=======
|
=======
|
||||||
|
|
||||||
The PSCredentialStore is a simple credential manager for PSCredentials. It stores PSCredentials in a simple json
|
The PSCredentialStore is a simple credential manager for `PSCredential` objects. It stores PSCredentials in a simple json
|
||||||
file. You can choose between a private and shared credential store. The private one exists in your profile and can
|
file. You can choose between a private and shared credential store. The private one exists in your profile and can
|
||||||
ony accessed by your account on the same machine. The shared store enables you to use different credentials for your
|
ony accessed by your account on the same machine. The shared store enables you to use different credentials for your
|
||||||
scripts without exposing them as plain text.
|
scripts without exposing them as plain text.
|
||||||
|
|
||||||
**The shared store isn't 100% secure and I don't recommend using it in production!**
|
|
||||||
|
|
||||||
PSCredentialStore was developed to simplify the delegation of complex powershell scripts. In this case you often
|
PSCredentialStore was developed to simplify the delegation of complex powershell scripts. In this case you often
|
||||||
need to store credentials for non interactive usage like in scheduled tasks.
|
need to store credentials for non interactive usage like in scheduled tasks.
|
||||||
|
|
||||||
|
Starting with version `1.0.0` PSCredential uses Pfx certificates fo encryption. You can use Pfx certificate files
|
||||||
|
or certificates stored in the certificate store.
|
||||||
|
|
||||||
For more details read the [about_PSCredentialStore](/docs/about_PSCredentialStore.md) page on github or via CLI with
|
For more details read the [about_PSCredentialStore](/docs/about_PSCredentialStore.md) page on github or via CLI with
|
||||||
`Get-Help about_PSCredentialStore`.
|
`Get-Help about_PSCredentialStore`.
|
||||||
|
|
||||||
:exclamation: Upcoming Changes :exclamation:
|
You can find the [reference](/docs/PSCredentialStore.md) in the /docs/ path as well.
|
||||||
================
|
|
||||||
|
|
||||||
The will be some breaking changes starting with the `0.5.0.xxx`:
|
:vulcan_salute: Requirements
|
||||||
|
|
||||||
- **PSCredentialStore will use PFX certificates to encrypt your credentials.**
|
|
||||||
- This replaces the the current encryption methods and you need to recreate or upgrade your pre existing stores.
|
|
||||||
- The changes allows the PSCredentialStore module to support the PowerShell `Core` editions.
|
|
||||||
- Yes this means, you can use the module on any PowerShell 6 supported linux distribution.
|
|
||||||
- It's also possible to create a shared credential store and transfer it onto a another platform like:
|
|
||||||
`Windows -- to --> Linux` and vice versa.
|
|
||||||
- Automatically creates self signed certificate with 2048 bits RSA keys for encryption.
|
|
||||||
|
|
||||||
Installation
|
|
||||||
============
|
============
|
||||||
|
|
||||||
PowerShellGallery.com (Recommended Way)
|
- PowerShell >= `5.1`
|
||||||
|
- .NET Framework >= `4.6` or .NET Core >= `1.0`
|
||||||
|
|
||||||
|
:hammer_and_wrench: Installation
|
||||||
|
============
|
||||||
|
|
||||||
|
:artificial_satellite: PowerShellGallery.com (Recommended Way)
|
||||||
---------------------------------------
|
---------------------------------------
|
||||||
|
|
||||||
* Make sure you use PowerShell 5.1 or higher with `$PSVersionTable`.
|
* Make sure you use PowerShell 5.1 or higher with `$PSVersionTable`.
|
||||||
@ -47,7 +44,7 @@ PowerShellGallery.com (Recommended Way)
|
|||||||
* Additionally use the `-AllowPrerelease` switch until we publish the final release!
|
* Additionally use the `-AllowPrerelease` switch until we publish the final release!
|
||||||
* Done. Start exploring the Module with `Import-Module PSCredentialStore ; Get-Command -Module PSCredentialStore`
|
* Done. Start exploring the Module with `Import-Module PSCredentialStore ; Get-Command -Module PSCredentialStore`
|
||||||
|
|
||||||
Manual Way
|
:building_construction: Manual Way
|
||||||
----------
|
----------
|
||||||
|
|
||||||
* Take a look at the [Latest Release](https://github.com/OCram85/PSCredentialStore/releases/latest) page.
|
* Take a look at the [Latest Release](https://github.com/OCram85/PSCredentialStore/releases/latest) page.
|
||||||
@ -56,19 +53,27 @@ Manual Way
|
|||||||
* Don't forget to change the NTFS permission flag in the context menu.
|
* Don't forget to change the NTFS permission flag in the context menu.
|
||||||
* Start with `Import-Module PSCredentialStore`
|
* Start with `Import-Module PSCredentialStore`
|
||||||
|
|
||||||
Quick Start
|
:sparkles: Quick Start
|
||||||
-----------
|
-----------
|
||||||
|
|
||||||
**1.** First we need a blank credential store. You can decide between a *private* or *shared* store. The private
|
**1.** First we need a blank credential store. You can decide between a *private* or *shared* store. The private
|
||||||
Credential Store can only be accessed with your profile on the machine you created it.
|
Credential Store can only be accessed with your profile on the machine you created it.
|
||||||
|
|
||||||
|
Starting with version `1.0.0` you can decide the storage type of your fresh created certificate. As default
|
||||||
|
PSCredentialStore creates a new pfx certificate file beside the credential store itself. Optionally you can provide
|
||||||
|
the parameter `-UseCertStore`. This imports the new certificate in the user or machine certificate store as well.
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
# Private credential store
|
# Private credential store
|
||||||
New-CredentialStore
|
New-CredentialStore
|
||||||
|
|
||||||
# Shared credential rtore
|
# Private credential store with certificate store usage
|
||||||
|
New-CredentialStore -UseCertStore
|
||||||
|
|
||||||
|
# Shared credential store
|
||||||
New-CredentialStore -Shared
|
New-CredentialStore -Shared
|
||||||
|
|
||||||
#Shared credential store in custom Location
|
#Shared credential store in custom location
|
||||||
New-CredentialStore -Shared -Path 'C:\CredentialStore.json'
|
New-CredentialStore -Shared -Path 'C:\CredentialStore.json'
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -110,14 +115,17 @@ Connect-To -RemoteHost "ftp.myside.local" -Type FTP
|
|||||||
Connect-To -RemoteHost "fas.myside.local" -Type NetAppFAS
|
Connect-To -RemoteHost "fas.myside.local" -Type NetAppFAS
|
||||||
Connect-To -RemoteHost "esx01.myside.local" -Type VMware
|
Connect-To -RemoteHost "esx01.myside.local" -Type VMware
|
||||||
Connect-To -RemoteHost "vcr.myside.local" -Type CisServer
|
Connect-To -RemoteHost "vcr.myside.local" -Type CisServer
|
||||||
|
Connect-To -RemoteHost "exchange1.myside.local" -Type ExchangeHTTP
|
||||||
|
Connect-To -RemoteHost "exchange1.myside.local" -Type ExchangeHTTPS
|
||||||
|
Connect-To -RemoteHost "ubuntu.myside.local" -Type SCP
|
||||||
```
|
```
|
||||||
|
|
||||||
Credits
|
:pushpin: Credits
|
||||||
-------
|
-------
|
||||||
|
|
||||||
A huge thanks to all the people who helped with their projects and indirect contributions which made this possible!
|
A huge thanks to all the people who helped with their projects and indirect contributions which made this possible!
|
||||||
|
|
||||||
- This module is inspired by the awesome work of @dlwyatt with articles like these:
|
- This module is inspired by the awesome work of Dave Wyatt ([@dlwyatt](https://github.com/dlwyatt)) with articles like these:
|
||||||
- https://powershell.org/2013/11/24/saving-passwords-and-preventing-other-processes-from-decrypting-them/
|
- https://powershell.org/2013/11/24/saving-passwords-and-preventing-other-processes-from-decrypting-them/
|
||||||
- https://powershell.org/2014/02/01/revisited-powershell-and-encryption/
|
- https://powershell.org/2014/02/01/revisited-powershell-and-encryption/
|
||||||
- The awesome people from [LibreSSL](http://www.libressl.org/) which publishes the [portable openssl/libressl binaries](https://github.com/libressl-portable/portable)!
|
- The awesome people from [LibreSSL](http://www.libressl.org/) which publishes the [portable openssl/libressl binaries](https://github.com/libressl-portable/portable)!
|
||||||
|
@ -1,8 +1,5 @@
|
|||||||
# release version:
|
|
||||||
#version: 0.5.0.{build}
|
|
||||||
|
|
||||||
# pre release version:
|
# pre release version:
|
||||||
version: 0.5.{build}
|
version: 1.0.{build}
|
||||||
|
|
||||||
#branches:
|
#branches:
|
||||||
# only:
|
# only:
|
||||||
|
@ -1,10 +1,3 @@
|
|||||||
---
|
|
||||||
external help file: PSCredentialStore-help.xml
|
|
||||||
Module Name: PSCredentialStore
|
|
||||||
online version: https://github.com/OCram85/PSCredentialStore
|
|
||||||
schema: 2.0.0
|
|
||||||
---
|
|
||||||
|
|
||||||
# Connect-To
|
# Connect-To
|
||||||
|
|
||||||
## SYNOPSIS
|
## SYNOPSIS
|
||||||
@ -14,14 +7,14 @@ Connects to the given host using the stored CredentialStoreItem.
|
|||||||
|
|
||||||
### Private (Default)
|
### Private (Default)
|
||||||
```
|
```
|
||||||
Connect-To -RemoteHost <String> [-Identifier <String>] -Type <String> [-Credentials <PSCredential>]
|
Connect-To -RemoteHost <String> [-Identifier <String>] -Type <String> [-Credentials <PSCredential>] [-PassThru]
|
||||||
[<CommonParameters>]
|
[<CommonParameters>]
|
||||||
```
|
```
|
||||||
|
|
||||||
### Shared
|
### Shared
|
||||||
```
|
```
|
||||||
Connect-To -RemoteHost <String> [-Identifier <String>] -Type <String> [-Credentials <PSCredential>]
|
Connect-To -RemoteHost <String> [-Identifier <String>] -Type <String> [-Credentials <PSCredential>] [-Shared]
|
||||||
[-Path <String>] [-Shared] [<CommonParameters>]
|
[-Path <String>] [-PassThru] [<CommonParameters>]
|
||||||
```
|
```
|
||||||
|
|
||||||
## DESCRIPTION
|
## DESCRIPTION
|
||||||
@ -29,37 +22,37 @@ Establish a connection to the selected host using a stored CredentialStoreItem.
|
|||||||
|
|
||||||
## EXAMPLES
|
## EXAMPLES
|
||||||
|
|
||||||
### EXAMPLE 1
|
### BEISPIEL 1
|
||||||
```
|
```
|
||||||
Connect-To -RemoteHost "ucs.myside.local" -Type CiscoUcs
|
Connect-To -RemoteHost "ucs.myside.local" -Type CiscoUcs
|
||||||
```
|
```
|
||||||
|
|
||||||
### EXAMPLE 2
|
### BEISPIEL 2
|
||||||
```
|
```
|
||||||
Connect-To -RemoteHost "ftp.myside.local" -Type FTP
|
Connect-To -RemoteHost "ftp.myside.local" -Type FTP
|
||||||
```
|
```
|
||||||
|
|
||||||
### EXAMPLE 3
|
### BEISPIEL 3
|
||||||
```
|
```
|
||||||
Connect-To -RemoteHost "fas.myside.local" -Type NetAppFAS
|
Connect-To -RemoteHost "fas.myside.local" -Type NetAppFAS
|
||||||
```
|
```
|
||||||
|
|
||||||
### EXAMPLE 4
|
### BEISPIEL 4
|
||||||
```
|
```
|
||||||
Connect-To -RemoteHost "esx01.myside.local" -Type VMware
|
Connect-To -RemoteHost "esx01.myside.local" -Type VMware
|
||||||
```
|
```
|
||||||
|
|
||||||
### EXAMPLE 5
|
### BEISPIEL 5
|
||||||
```
|
```
|
||||||
Connect-To -RemoteHost "vCenter.myside.local" -Type CisServer
|
Connect-To -RemoteHost "vCenter.myside.local" -Type CisServer
|
||||||
```
|
```
|
||||||
|
|
||||||
### EXAMPLE 6
|
### BEISPIEL 6
|
||||||
```
|
```
|
||||||
Connect-To -RemoteHost "exchange01.myside.local" -Type ExchangeHTTP
|
Connect-To -RemoteHost "exchange01.myside.local" -Type ExchangeHTTP
|
||||||
```
|
```
|
||||||
|
|
||||||
### EXAMPLE 7
|
### BEISPIEL 7
|
||||||
```
|
```
|
||||||
Connect-To -RemoteHost "exchange01.myside.local" -Type ExchangeHTTPS
|
Connect-To -RemoteHost "exchange01.myside.local" -Type ExchangeHTTPS
|
||||||
```
|
```
|
||||||
@ -102,6 +95,21 @@ Accept pipeline input: False
|
|||||||
Accept wildcard characters: False
|
Accept wildcard characters: False
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### -PassThru
|
||||||
|
Returns the value from the underlying connection type function.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: SwitchParameter
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: False
|
||||||
|
Position: Named
|
||||||
|
Default value: False
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
### -Path
|
### -Path
|
||||||
Define a custom path to a shared CredentialStore.
|
Define a custom path to a shared CredentialStore.
|
||||||
|
|
||||||
@ -112,7 +120,7 @@ Aliases:
|
|||||||
|
|
||||||
Required: False
|
Required: False
|
||||||
Position: Named
|
Position: Named
|
||||||
Default value: "{0}\PSCredentialStore\CredentialStore.json" -f $env:ProgramData
|
Default value: None
|
||||||
Accept pipeline input: False
|
Accept pipeline input: False
|
||||||
Accept wildcard characters: False
|
Accept wildcard characters: False
|
||||||
```
|
```
|
||||||
@ -142,7 +150,7 @@ Type: SwitchParameter
|
|||||||
Parameter Sets: Shared
|
Parameter Sets: Shared
|
||||||
Aliases:
|
Aliases:
|
||||||
|
|
||||||
Required: False
|
Required: True
|
||||||
Position: Named
|
Position: Named
|
||||||
Default value: False
|
Default value: False
|
||||||
Accept pipeline input: False
|
Accept pipeline input: False
|
||||||
@ -167,20 +175,18 @@ Accept wildcard characters: False
|
|||||||
```
|
```
|
||||||
|
|
||||||
### CommonParameters
|
### CommonParameters
|
||||||
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
## INPUTS
|
## INPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## OUTPUTS
|
## OUTPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## NOTES
|
## NOTES
|
||||||
File Name : Connect-To.ps1
|
- File Name : Connect-To.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
## RELATED LINKS
|
## RELATED LINKS
|
||||||
|
|
||||||
|
@ -1,10 +1,3 @@
|
|||||||
---
|
|
||||||
external help file: PSCredentialStore-help.xml
|
|
||||||
Module Name: PSCredentialStore
|
|
||||||
online version: https://github.com/OCram85/PSCredentialStore
|
|
||||||
schema: 2.0.0
|
|
||||||
---
|
|
||||||
|
|
||||||
# Disconnect-From
|
# Disconnect-From
|
||||||
|
|
||||||
## SYNOPSIS
|
## SYNOPSIS
|
||||||
@ -21,42 +14,42 @@ Terminates a session established with Connect-To using a CredentialStoreItem.
|
|||||||
|
|
||||||
## EXAMPLES
|
## EXAMPLES
|
||||||
|
|
||||||
### EXAMPLE 1
|
### BEISPIEL 1
|
||||||
```
|
```
|
||||||
Disconnect-From -RemoteHost "ucs.myside.local" -Type CiscoUcs
|
Disconnect-From -RemoteHost "ucs.myside.local" -Type CiscoUcs
|
||||||
```
|
```
|
||||||
|
|
||||||
### EXAMPLE 2
|
### BEISPIEL 2
|
||||||
```
|
```
|
||||||
Disconnect-From -RemoteHost "ftp.myside.local" -Type FTP
|
Disconnect-From -RemoteHost "ftp.myside.local" -Type FTP
|
||||||
```
|
```
|
||||||
|
|
||||||
### EXAMPLE 3
|
### BEISPIEL 3
|
||||||
```
|
```
|
||||||
Disconnect-From -RemoteHost "fas.myside.local" -Type NetAppFAS
|
Disconnect-From -RemoteHost "fas.myside.local" -Type NetAppFAS
|
||||||
```
|
```
|
||||||
|
|
||||||
### EXAMPLE 4
|
### BEISPIEL 4
|
||||||
```
|
```
|
||||||
Disconnect-From -RemoteHost "esx01.myside.local" -Type VMware
|
Disconnect-From -RemoteHost "esx01.myside.local" -Type VMware
|
||||||
```
|
```
|
||||||
|
|
||||||
### EXAMPLE 5
|
### BEISPIEL 5
|
||||||
```
|
```
|
||||||
Disconnect-From -RemoteHost "esx01.myside.local" -Type VMware -Force:$True
|
Disconnect-From -RemoteHost "esx01.myside.local" -Type VMware -Force:$True
|
||||||
```
|
```
|
||||||
|
|
||||||
### EXAMPLE 6
|
### BEISPIEL 6
|
||||||
```
|
```
|
||||||
Disconnect-From -RemoteHost "vcenter.myside.local" -Type CisServer
|
Disconnect-From -RemoteHost "vcenter.myside.local" -Type CisServer
|
||||||
```
|
```
|
||||||
|
|
||||||
### EXAMPLE 7
|
### BEISPIEL 7
|
||||||
```
|
```
|
||||||
Disconnect-From -RemoteHost "exchange01.myside.local" -Type ExchangeHTTP
|
Disconnect-From -RemoteHost "exchange01.myside.local" -Type ExchangeHTTP
|
||||||
```
|
```
|
||||||
|
|
||||||
### EXAMPLE 8
|
### BEISPIEL 8
|
||||||
```
|
```
|
||||||
Disconnect-From -RemoteHost "exchange01.myside.local" -Type ExchangeHTTPS
|
Disconnect-From -RemoteHost "exchange01.myside.local" -Type ExchangeHTTPS
|
||||||
```
|
```
|
||||||
@ -111,20 +104,18 @@ Accept wildcard characters: False
|
|||||||
```
|
```
|
||||||
|
|
||||||
### CommonParameters
|
### CommonParameters
|
||||||
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
## INPUTS
|
## INPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## OUTPUTS
|
## OUTPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## NOTES
|
## NOTES
|
||||||
File Name : Disconnect-From.ps1
|
- File Name : Disconnect-From.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
## RELATED LINKS
|
## RELATED LINKS
|
||||||
|
|
||||||
|
71
docs/Get-CSCertificate.md
Normal file
71
docs/Get-CSCertificate.md
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
# Get-CSCertificate
|
||||||
|
|
||||||
|
## SYNOPSIS
|
||||||
|
Returns the current used valid PfX certificate.
|
||||||
|
|
||||||
|
## SYNTAX
|
||||||
|
|
||||||
|
```
|
||||||
|
Get-CSCertificate [-Type] <String> [-Thumbprint] <String> [<CommonParameters>]
|
||||||
|
```
|
||||||
|
|
||||||
|
## DESCRIPTION
|
||||||
|
Use this function to get the available pfx certificate respecting the config hierarchy.
|
||||||
|
|
||||||
|
## EXAMPLES
|
||||||
|
|
||||||
|
### BEISPIEL 1
|
||||||
|
```
|
||||||
|
Get-CSCertificate -Type 'Shared' -Thumbprint '12334456'
|
||||||
|
```
|
||||||
|
|
||||||
|
## PARAMETERS
|
||||||
|
|
||||||
|
### -Thumbprint
|
||||||
|
Provide the credentials thumbprint for the search.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: String
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: True
|
||||||
|
Position: 2
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -Type
|
||||||
|
Select the current credential store type.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: String
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: True
|
||||||
|
Position: 1
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### CommonParameters
|
||||||
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
|
## INPUTS
|
||||||
|
|
||||||
|
### [None]
|
||||||
|
## OUTPUTS
|
||||||
|
|
||||||
|
### [System.Security.Cryptography.X509Certificates.X509Certificate2]
|
||||||
|
## NOTES
|
||||||
|
- File Name : Get-CSCertificate.ps1
|
||||||
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
|
- Requires :
|
||||||
|
|
||||||
|
## RELATED LINKS
|
||||||
|
|
||||||
|
[https://github.com/OCram85/PSCredentialStore](https://github.com/OCram85/PSCredentialStore)
|
||||||
|
|
@ -1,10 +1,3 @@
|
|||||||
---
|
|
||||||
external help file: PSCredentialStore-help.xml
|
|
||||||
Module Name: PSCredentialStore
|
|
||||||
online version: https://github.com/OCram85/PSCredentialStore
|
|
||||||
schema: 2.0.0
|
|
||||||
---
|
|
||||||
|
|
||||||
# Get-CredentialStore
|
# Get-CredentialStore
|
||||||
|
|
||||||
## SYNOPSIS
|
## SYNOPSIS
|
||||||
@ -31,7 +24,7 @@ Get-CredentialStoreItem.
|
|||||||
|
|
||||||
## EXAMPLES
|
## EXAMPLES
|
||||||
|
|
||||||
### EXAMPLE 1
|
### BEISPIEL 1
|
||||||
```
|
```
|
||||||
$CSContent = Get-CredentialStore -Path "C:\TMP\mystore.json"
|
$CSContent = Get-CredentialStore -Path "C:\TMP\mystore.json"
|
||||||
```
|
```
|
||||||
@ -48,7 +41,7 @@ Aliases:
|
|||||||
|
|
||||||
Required: False
|
Required: False
|
||||||
Position: Named
|
Position: Named
|
||||||
Default value: "{0}\PSCredentialStore\CredentialStore.json" -f $env:ProgramData
|
Default value: None
|
||||||
Accept pipeline input: False
|
Accept pipeline input: False
|
||||||
Accept wildcard characters: False
|
Accept wildcard characters: False
|
||||||
```
|
```
|
||||||
@ -71,22 +64,18 @@ Accept wildcard characters: False
|
|||||||
```
|
```
|
||||||
|
|
||||||
### CommonParameters
|
### CommonParameters
|
||||||
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
## INPUTS
|
## INPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## OUTPUTS
|
## OUTPUTS
|
||||||
|
|
||||||
### [PSObject] Returns the credential store content as PSObject.
|
### [PSObject] Returns the credential store content as PSObject.
|
||||||
|
|
||||||
## NOTES
|
## NOTES
|
||||||
\`\`\`
|
- File Name : Get-CredentialStore.ps1
|
||||||
File Name : Get-CredentialStore.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
\`\`\`
|
|
||||||
|
|
||||||
## RELATED LINKS
|
## RELATED LINKS
|
||||||
|
|
||||||
|
@ -1,10 +1,3 @@
|
|||||||
---
|
|
||||||
external help file: PSCredentialStore-help.xml
|
|
||||||
Module Name: PSCredentialStore
|
|
||||||
online version: https://github.com/OCram85/PSCredentialStore
|
|
||||||
schema: 2.0.0
|
|
||||||
---
|
|
||||||
|
|
||||||
# Get-CredentialStoreItem
|
# Get-CredentialStoreItem
|
||||||
|
|
||||||
## SYNOPSIS
|
## SYNOPSIS
|
||||||
@ -28,7 +21,7 @@ Return the credential as PSCredential object.
|
|||||||
|
|
||||||
## EXAMPLES
|
## EXAMPLES
|
||||||
|
|
||||||
### EXAMPLE 1
|
### BEISPIEL 1
|
||||||
```
|
```
|
||||||
$myCreds = Get-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
$myCreds = Get-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
||||||
```
|
```
|
||||||
@ -63,7 +56,7 @@ Aliases:
|
|||||||
|
|
||||||
Required: False
|
Required: False
|
||||||
Position: Named
|
Position: Named
|
||||||
Default value: "{0}\PSCredentialStore\CredentialStore.json" -f $env:ProgramData
|
Default value: None
|
||||||
Accept pipeline input: False
|
Accept pipeline input: False
|
||||||
Accept wildcard characters: False
|
Accept wildcard characters: False
|
||||||
```
|
```
|
||||||
@ -101,22 +94,18 @@ Accept wildcard characters: False
|
|||||||
```
|
```
|
||||||
|
|
||||||
### CommonParameters
|
### CommonParameters
|
||||||
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
## INPUTS
|
## INPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## OUTPUTS
|
## OUTPUTS
|
||||||
|
|
||||||
### [System.Management.Automation.PSCredential]
|
### [System.Management.Automation.PSCredential]
|
||||||
|
|
||||||
## NOTES
|
## NOTES
|
||||||
\`\`\`
|
- File Name : Get-CredentialStoreItem.ps1
|
||||||
File Name : Get-CredentialStoreItem.ps1
|
- Author : Messing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
\`\`\`
|
|
||||||
|
|
||||||
## RELATED LINKS
|
## RELATED LINKS
|
||||||
|
|
||||||
|
72
docs/Import-CSCertificate.md
Normal file
72
docs/Import-CSCertificate.md
Normal file
@ -0,0 +1,72 @@
|
|||||||
|
# Import-CSCertificate
|
||||||
|
|
||||||
|
## SYNOPSIS
|
||||||
|
Imports a linked certificate to the valid store location.
|
||||||
|
|
||||||
|
## SYNTAX
|
||||||
|
|
||||||
|
```
|
||||||
|
Import-CSCertificate [-Type] <String> [-Path] <FileInfo> [<CommonParameters>]
|
||||||
|
```
|
||||||
|
|
||||||
|
## DESCRIPTION
|
||||||
|
Import-CSCertificate takes a pfx certificate file and imports it to the supposed certificate store for
|
||||||
|
private and shared credential stores.
|
||||||
|
|
||||||
|
## EXAMPLES
|
||||||
|
|
||||||
|
### BEISPIEL 1
|
||||||
|
```
|
||||||
|
Import-CSCertificate -Type 'Private' -Path (Join-Path -Path $Env:APPDATA -ChildItem 'PfxCertificate.pfx')
|
||||||
|
```
|
||||||
|
|
||||||
|
## PARAMETERS
|
||||||
|
|
||||||
|
### -Path
|
||||||
|
Provide a valid path to pfx certificate file.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: FileInfo
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: True
|
||||||
|
Position: 2
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -Type
|
||||||
|
Select between the a private and shared credential store.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: String
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: True
|
||||||
|
Position: 1
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### CommonParameters
|
||||||
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
|
## INPUTS
|
||||||
|
|
||||||
|
### [None]
|
||||||
|
## OUTPUTS
|
||||||
|
|
||||||
|
### [None]
|
||||||
|
## NOTES
|
||||||
|
- File Name : Import-CSCertificate.ps1
|
||||||
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
|
- Requires :
|
||||||
|
|
||||||
|
## RELATED LINKS
|
||||||
|
|
||||||
|
[https://github.com/OCram85/PSCredentialStore](https://github.com/OCram85/PSCredentialStore)
|
||||||
|
|
147
docs/New-CSCertAttribute.md
Normal file
147
docs/New-CSCertAttribute.md
Normal file
@ -0,0 +1,147 @@
|
|||||||
|
# New-CSCertAttribute
|
||||||
|
|
||||||
|
## SYNOPSIS
|
||||||
|
Creates required data for a certificate signing request.
|
||||||
|
|
||||||
|
## SYNTAX
|
||||||
|
|
||||||
|
```
|
||||||
|
New-CSCertAttribute [-Country] <String> [-State] <String> [-City] <String> [-Organization] <String>
|
||||||
|
[-OrganizationalUnitName] <String> [-CommonName] <String> [[-Days] <Int32>] [<CommonParameters>]
|
||||||
|
```
|
||||||
|
|
||||||
|
## DESCRIPTION
|
||||||
|
Defines the certificate related properties for an upcoming New-PfxCertificate execution.
|
||||||
|
|
||||||
|
## EXAMPLES
|
||||||
|
|
||||||
|
### BEISPIEL 1
|
||||||
|
```
|
||||||
|
New-CSCertAttribute -Country 'DE' -State 'BW' -City 'Karlsruhe' -Organization 'AwesomeIT' -OrganizationalUnitName '' -CommonName 'MyPrivateCert'
|
||||||
|
```
|
||||||
|
|
||||||
|
## PARAMETERS
|
||||||
|
|
||||||
|
### -City
|
||||||
|
Certificate city value.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: String
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: True
|
||||||
|
Position: 3
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -CommonName
|
||||||
|
The certificate common name.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: String
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: True
|
||||||
|
Position: 6
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -Country
|
||||||
|
County code like EN, DE, IT, FR...
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: String
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: True
|
||||||
|
Position: 1
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -Days
|
||||||
|
The validation time itself.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: Int32
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: False
|
||||||
|
Position: 7
|
||||||
|
Default value: 365
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -Organization
|
||||||
|
Certificate organization value.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: String
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: True
|
||||||
|
Position: 4
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -OrganizationalUnitName
|
||||||
|
Certificate OrganizationalUnitName value.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: String
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: True
|
||||||
|
Position: 5
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -State
|
||||||
|
Certificate state value.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: String
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: True
|
||||||
|
Position: 2
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### CommonParameters
|
||||||
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
|
## INPUTS
|
||||||
|
|
||||||
|
### [None]
|
||||||
|
## OUTPUTS
|
||||||
|
|
||||||
|
### [PSCredentialStore.Certificate.CSRDetails]
|
||||||
|
## NOTES
|
||||||
|
- File Name : New-CSCertAttribute.ps1
|
||||||
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
|
- Requires :
|
||||||
|
|
||||||
|
## RELATED LINKS
|
||||||
|
|
||||||
|
[https://github.com/OCram85/PSCredentialStore](https://github.com/OCram85/PSCredentialStore)
|
||||||
|
|
120
docs/New-CSCertificate.md
Normal file
120
docs/New-CSCertificate.md
Normal file
@ -0,0 +1,120 @@
|
|||||||
|
# New-CSCertificate
|
||||||
|
|
||||||
|
## SYNOPSIS
|
||||||
|
Creates a new PFX certificate for the CredentialStore encryption.
|
||||||
|
|
||||||
|
## SYNTAX
|
||||||
|
|
||||||
|
```
|
||||||
|
New-CSCertificate [-CRTAttribute] <Object> [[-KeyName] <String>] [[-CertName] <String>] [-WhatIf] [-Confirm]
|
||||||
|
[<CommonParameters>]
|
||||||
|
```
|
||||||
|
|
||||||
|
## DESCRIPTION
|
||||||
|
Use this function to create a custom self signed certificate used by the PSCredentialStore module.
|
||||||
|
|
||||||
|
## EXAMPLES
|
||||||
|
|
||||||
|
### BEISPIEL 1
|
||||||
|
```
|
||||||
|
New-CSCertificate -CRTAttribute $CRTAttribute -KeyName './myprivate.key' -CertName './mycert.pfx'
|
||||||
|
```
|
||||||
|
|
||||||
|
## PARAMETERS
|
||||||
|
|
||||||
|
### -CertName
|
||||||
|
Provide a custom full path and name for the PFX certificate file.
|
||||||
|
The file extension has to be \`*.pfx\`
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: String
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: False
|
||||||
|
Position: 3
|
||||||
|
Default value: ./certificate.pfx
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -CRTAttribute
|
||||||
|
Provide certificate related attributes provided by function New-CRTAttribute.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: Object
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: True
|
||||||
|
Position: 1
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: True (ByValue)
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -KeyName
|
||||||
|
Provide a custom full path and name for the private key.
|
||||||
|
The file extension has to be \`*.key\`.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: String
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: False
|
||||||
|
Position: 2
|
||||||
|
Default value: ./private.key
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -Confirm
|
||||||
|
Prompts you for confirmation before running the cmdlet.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: SwitchParameter
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases: cf
|
||||||
|
|
||||||
|
Required: False
|
||||||
|
Position: Named
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -WhatIf
|
||||||
|
Shows what would happen if the cmdlet runs.
|
||||||
|
The cmdlet is not run.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: SwitchParameter
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases: wi
|
||||||
|
|
||||||
|
Required: False
|
||||||
|
Position: Named
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### CommonParameters
|
||||||
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
|
## INPUTS
|
||||||
|
|
||||||
|
### [PSCredentialStore.Certificate.Attribute]
|
||||||
|
## OUTPUTS
|
||||||
|
|
||||||
|
### [None]
|
||||||
|
## NOTES
|
||||||
|
- File Name : New-CSCertificate.ps1
|
||||||
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
|
- Requires :
|
||||||
|
|
||||||
|
## RELATED LINKS
|
||||||
|
|
||||||
|
[https://github.com/OCram85/PSCredentialStore](https://github.com/OCram85/PSCredentialStore)
|
||||||
|
|
@ -1,92 +1,111 @@
|
|||||||
---
|
# New-CredentialStore
|
||||||
external help file: PSCredentialStore-help.xml
|
|
||||||
Module Name: PSCredentialStore
|
|
||||||
online version: https://github.com/OCram85/PSCredentialStore
|
|
||||||
schema: 2.0.0
|
|
||||||
---
|
|
||||||
|
|
||||||
# Get-CredentialStoreItem
|
|
||||||
|
|
||||||
## SYNOPSIS
|
## SYNOPSIS
|
||||||
Returns the Credential from a given remote host item.
|
Creates a new credential store File
|
||||||
|
|
||||||
## SYNTAX
|
## SYNTAX
|
||||||
|
|
||||||
### Private (Default)
|
### Private (Default)
|
||||||
```
|
```
|
||||||
Get-CredentialStoreItem -RemoteHost <String> [-Identifier <String>] [<CommonParameters>]
|
New-CredentialStore [-Force] [-PassThru] [-SkipPFXCertCreation] [-UseCertStore] [-WhatIf] [-Confirm]
|
||||||
|
[<CommonParameters>]
|
||||||
```
|
```
|
||||||
|
|
||||||
### Shared
|
### Shared
|
||||||
```
|
```
|
||||||
Get-CredentialStoreItem -RemoteHost <String> [-Identifier <String>] [-Shared] [-Path <String>]
|
New-CredentialStore [-Shared] [-Path <FileInfo>] [-Force] [-PassThru] [-SkipPFXCertCreation] [-UseCertStore]
|
||||||
[<CommonParameters>]
|
[-WhatIf] [-Confirm] [<CommonParameters>]
|
||||||
```
|
```
|
||||||
|
|
||||||
## DESCRIPTION
|
## DESCRIPTION
|
||||||
Return the credential as PSCredential object.
|
You need to run this script first to create a new credential store before you try to
|
||||||
|
save new credentials with New-CredentialStoreItem.
|
||||||
|
|
||||||
## EXAMPLES
|
## EXAMPLES
|
||||||
|
|
||||||
### EXAMPLE 1
|
### BEISPIEL 1
|
||||||
```
|
```
|
||||||
$myCreds = Get-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
New-CredentialStore
|
||||||
```
|
```
|
||||||
|
|
||||||
|
# Creates a new private CredentialStore
|
||||||
|
|
||||||
|
### BEISPIEL 2
|
||||||
|
```
|
||||||
|
New-CredentialStore -Force
|
||||||
|
```
|
||||||
|
|
||||||
|
# Resets an existing private CredentialStore
|
||||||
|
|
||||||
|
### BEISPIEL 3
|
||||||
|
```
|
||||||
|
New-CredentialStore -Shared
|
||||||
|
```
|
||||||
|
|
||||||
|
# Creates a new shared CredentialStore
|
||||||
|
|
||||||
|
### BEISPIEL 4
|
||||||
|
```
|
||||||
|
New-CredentialStore -Shared -Path "C:\TMP\CredentialStore.json"
|
||||||
|
```
|
||||||
|
|
||||||
|
# Creates a new shared CredentialStore in the given location.
|
||||||
|
|
||||||
## PARAMETERS
|
## PARAMETERS
|
||||||
|
|
||||||
### -Identifier
|
### -Force
|
||||||
Provide a custom identifier to the given remote host key.
|
Use this switch to reset an existing store.
|
||||||
This enables you to store multiple credentials
|
The complete content will be wiped.
|
||||||
for a single remote host entry.
|
|
||||||
For example ad/sys1, ftp/sys1, mssql/sys1
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
Type: String
|
Type: SwitchParameter
|
||||||
Parameter Sets: (All)
|
Parameter Sets: (All)
|
||||||
Aliases:
|
Aliases:
|
||||||
|
|
||||||
Required: False
|
Required: False
|
||||||
Position: Named
|
Position: Named
|
||||||
Default value: None
|
Default value: False
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -PassThru
|
||||||
|
{{ Fill PassThru Description }}
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: SwitchParameter
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: False
|
||||||
|
Position: Named
|
||||||
|
Default value: False
|
||||||
Accept pipeline input: False
|
Accept pipeline input: False
|
||||||
Accept wildcard characters: False
|
Accept wildcard characters: False
|
||||||
```
|
```
|
||||||
|
|
||||||
### -Path
|
### -Path
|
||||||
Define a custom path to a shared CredentialStore.
|
Define a location for the new shared CredentialStore.
|
||||||
|
The default store will be created in
|
||||||
|
$Env:ProgramData\PSCredentialStore dir.
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
Type: String
|
Type: FileInfo
|
||||||
Parameter Sets: Shared
|
Parameter Sets: Shared
|
||||||
Aliases:
|
Aliases:
|
||||||
|
|
||||||
Required: False
|
Required: False
|
||||||
Position: Named
|
Position: Named
|
||||||
Default value: "{0}\PSCredentialStore\CredentialStore.json" -f $env:ProgramData
|
|
||||||
Accept pipeline input: False
|
|
||||||
Accept wildcard characters: False
|
|
||||||
```
|
|
||||||
|
|
||||||
### -RemoteHost
|
|
||||||
Specify the host, for which you would like to change the credentials.
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
Type: String
|
|
||||||
Parameter Sets: (All)
|
|
||||||
Aliases:
|
|
||||||
|
|
||||||
Required: True
|
|
||||||
Position: Named
|
|
||||||
Default value: None
|
Default value: None
|
||||||
Accept pipeline input: False
|
Accept pipeline input: False
|
||||||
Accept wildcard characters: False
|
Accept wildcard characters: False
|
||||||
```
|
```
|
||||||
|
|
||||||
### -Shared
|
### -Shared
|
||||||
Switch to shared mode with this param.
|
Creates a CredentialStore in the Shared mode.
|
||||||
This enforces the command to work with a shared CredentialStore which
|
This enables you to read the CredentialStore Items on
|
||||||
can be decrypted across systems.
|
different systems or profiles.
|
||||||
|
In addition you can optionally provide a custom path wit the -Path parameter.
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
Type: SwitchParameter
|
Type: SwitchParameter
|
||||||
@ -100,23 +119,86 @@ Accept pipeline input: False
|
|||||||
Accept wildcard characters: False
|
Accept wildcard characters: False
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### -SkipPFXCertCreation
|
||||||
|
You can skip the pfx certificate creation process.
|
||||||
|
This makes sense if you have a previously created cert or want to
|
||||||
|
import a cert in cross-platform environments.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: SwitchParameter
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: False
|
||||||
|
Position: Named
|
||||||
|
Default value: False
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -UseCertStore
|
||||||
|
Instead of using a plain pfx file beside your CredentialStore file you can import it into the user or machine
|
||||||
|
certificate store.
|
||||||
|
In this case the system itself secures the cert and you don't hat to set custom NTFS
|
||||||
|
permissions so secure your shared certificate.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: SwitchParameter
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: False
|
||||||
|
Position: Named
|
||||||
|
Default value: False
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -Confirm
|
||||||
|
Prompts you for confirmation before running the cmdlet.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: SwitchParameter
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases: cf
|
||||||
|
|
||||||
|
Required: False
|
||||||
|
Position: Named
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -WhatIf
|
||||||
|
Shows what would happen if the cmdlet runs.
|
||||||
|
The cmdlet is not run.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: SwitchParameter
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases: wi
|
||||||
|
|
||||||
|
Required: False
|
||||||
|
Position: Named
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
### CommonParameters
|
### CommonParameters
|
||||||
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
## INPUTS
|
## INPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## OUTPUTS
|
## OUTPUTS
|
||||||
|
|
||||||
### [System.Management.Automation.PSCredential]
|
### ['PSCredentialStore.Store'] Returns the recently created CredentialStore object if the -PassThru parameter
|
||||||
|
### was given.
|
||||||
## NOTES
|
## NOTES
|
||||||
\`\`\`
|
- File Name : New-CredentialStore.ps1
|
||||||
File Name : Get-CredentialStoreItem.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
\`\`\`
|
|
||||||
|
|
||||||
## RELATED LINKS
|
## RELATED LINKS
|
||||||
|
|
||||||
|
@ -1,10 +1,3 @@
|
|||||||
---
|
|
||||||
external help file: PSCredentialStore-help.xml
|
|
||||||
Module Name: PSCredentialStore
|
|
||||||
online version: https://github.com/OCram85/PSCredentialStore
|
|
||||||
schema: 2.0.0
|
|
||||||
---
|
|
||||||
|
|
||||||
# New-CredentialStoreItem
|
# New-CredentialStoreItem
|
||||||
|
|
||||||
## SYNOPSIS
|
## SYNOPSIS
|
||||||
@ -33,7 +26,7 @@ a VIConnection, NetApp FAS or UCS Fabric Interconnect.
|
|||||||
|
|
||||||
## EXAMPLES
|
## EXAMPLES
|
||||||
|
|
||||||
### EXAMPLE 1
|
### BEISPIEL 1
|
||||||
```
|
```
|
||||||
New-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
New-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
||||||
```
|
```
|
||||||
@ -83,7 +76,7 @@ Aliases:
|
|||||||
|
|
||||||
Required: False
|
Required: False
|
||||||
Position: Named
|
Position: Named
|
||||||
Default value: "{0}\PSCredentialStore\CredentialStore.json" -f $env:ProgramData
|
Default value: None
|
||||||
Accept pipeline input: False
|
Accept pipeline input: False
|
||||||
Accept wildcard characters: False
|
Accept wildcard characters: False
|
||||||
```
|
```
|
||||||
@ -104,7 +97,9 @@ Accept wildcard characters: False
|
|||||||
```
|
```
|
||||||
|
|
||||||
### -Shared
|
### -Shared
|
||||||
{{Fill Shared Description}}
|
Define the CredentialStore where you want to add the new item.
|
||||||
|
Default is always personal but can be
|
||||||
|
changed to shared, or even shared with custom path.
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
Type: SwitchParameter
|
Type: SwitchParameter
|
||||||
@ -119,22 +114,18 @@ Accept wildcard characters: False
|
|||||||
```
|
```
|
||||||
|
|
||||||
### CommonParameters
|
### CommonParameters
|
||||||
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
## INPUTS
|
## INPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## OUTPUTS
|
## OUTPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## NOTES
|
## NOTES
|
||||||
\`\`\`
|
- File Name : New-CredentialStoreItem.ps1
|
||||||
File Name : New-CredentialStoreItem.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
\`\`\`
|
|
||||||
|
|
||||||
## RELATED LINKS
|
## RELATED LINKS
|
||||||
|
|
||||||
|
@ -1,14 +1,6 @@
|
|||||||
---
|
|
||||||
Module Name: PSCredentialStore
|
|
||||||
Module Guid: 6800e192-9df8-4e30-b253-eb2c799bbe84
|
|
||||||
Download Help Link: {{Please enter FwLink manually}}
|
|
||||||
Help Version: {{Please enter version of help manually (X.X.X.X) format}}
|
|
||||||
Locale: en-US
|
|
||||||
---
|
|
||||||
|
|
||||||
# PSCredentialStore Module
|
# PSCredentialStore Module
|
||||||
## Description
|
## Description
|
||||||
{{Manually Enter Description Here}}
|
[about_PSCredentialStore](about_PSCredentialStore.md)
|
||||||
|
|
||||||
## PSCredentialStore Cmdlets
|
## PSCredentialStore Cmdlets
|
||||||
### [Connect-To](Connect-To.md)
|
### [Connect-To](Connect-To.md)
|
||||||
@ -23,12 +15,24 @@ Reads the complete content of the credential store and returns it as a new objec
|
|||||||
### [Get-CredentialStoreItem](Get-CredentialStoreItem.md)
|
### [Get-CredentialStoreItem](Get-CredentialStoreItem.md)
|
||||||
Returns the Credential from a given remote host item.
|
Returns the Credential from a given remote host item.
|
||||||
|
|
||||||
### [Get-CredentialStoreItem](Get-CredentialStoreItem.md)
|
### [Get-CSCertificate](Get-CSCertificate.md)
|
||||||
Returns the Credential from a given remote host item.
|
Returns the current used valid PfX certificate.
|
||||||
|
|
||||||
|
### [Import-CSCertificate](Import-CSCertificate.md)
|
||||||
|
Imports a linked certificate to the valid store location.
|
||||||
|
|
||||||
|
### [Import-CSCertificate](Import-CSCertificate.md)
|
||||||
|
Imports a linked certificate to the valid store location.
|
||||||
|
|
||||||
### [New-CredentialStoreItem](New-CredentialStoreItem.md)
|
### [New-CredentialStoreItem](New-CredentialStoreItem.md)
|
||||||
Adds a credential store item containing host, user and password to the given store.
|
Adds a credential store item containing host, user and password to the given store.
|
||||||
|
|
||||||
|
### [New-CSCertAttribute](New-CSCertAttribute.md)
|
||||||
|
Creates required data for a certificate signing request.
|
||||||
|
|
||||||
|
### [New-CSCertificate](New-CSCertificate.md)
|
||||||
|
Creates a new PFX certificate for the CredentialStore encryption.
|
||||||
|
|
||||||
### [Remove-CredentialStoreItem](Remove-CredentialStoreItem.md)
|
### [Remove-CredentialStoreItem](Remove-CredentialStoreItem.md)
|
||||||
Remove the given credentials from the credential store.
|
Remove the given credentials from the credential store.
|
||||||
|
|
||||||
@ -41,6 +45,12 @@ Returns the credential store state.
|
|||||||
### [Test-CredentialStoreItem](Test-CredentialStoreItem.md)
|
### [Test-CredentialStoreItem](Test-CredentialStoreItem.md)
|
||||||
Checks if the given RemoteHost identifier combination exists in the credential store.
|
Checks if the given RemoteHost identifier combination exists in the credential store.
|
||||||
|
|
||||||
|
### [Test-CSCertificate](Test-CSCertificate.md)
|
||||||
|
Tests if the linked certificate is store ein the specified cert stores.
|
||||||
|
|
||||||
### [Test-CSConnection](Test-CSConnection.md)
|
### [Test-CSConnection](Test-CSConnection.md)
|
||||||
Returns the connection state of a given type to the remote host.
|
Returns the connection state of a given type to the remote host.
|
||||||
|
|
||||||
|
### [Use-CSCertificate](Use-CSCertificate.md)
|
||||||
|
Links an existing PFX Certificate to a CredentialStore.
|
||||||
|
|
||||||
|
@ -1,10 +1,3 @@
|
|||||||
---
|
|
||||||
external help file: PSCredentialStore-help.xml
|
|
||||||
Module Name: PSCredentialStore
|
|
||||||
online version: https://github.com/OCram85/PSCredentialStore
|
|
||||||
schema: 2.0.0
|
|
||||||
---
|
|
||||||
|
|
||||||
# Remove-CredentialStoreItem
|
# Remove-CredentialStoreItem
|
||||||
|
|
||||||
## SYNOPSIS
|
## SYNOPSIS
|
||||||
@ -28,12 +21,25 @@ Use this CMDLet to completely remove an credential store item.
|
|||||||
|
|
||||||
## EXAMPLES
|
## EXAMPLES
|
||||||
|
|
||||||
### EXAMPLE 1
|
### BEISPIEL 1
|
||||||
```
|
```
|
||||||
Remove-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
Remove-CredentialStoreItem -RemoteHost "esx01.myside.local"
|
||||||
```
|
```
|
||||||
|
|
||||||
Remove-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local" -Identifier svc
|
### BEISPIEL 2
|
||||||
|
```
|
||||||
|
Remove-CredentialStoreItem -Shared -RemoteHost "esx01.myside.local"
|
||||||
|
```
|
||||||
|
|
||||||
|
### BEISPIEL 3
|
||||||
|
```
|
||||||
|
Remove-CredentialStoreItem -Shared -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
||||||
|
```
|
||||||
|
|
||||||
|
### BEISPIEL 4
|
||||||
|
```
|
||||||
|
Remove-CredentialStoreItem -RemoteHost "esx01.myside.local" -Identifier svc
|
||||||
|
```
|
||||||
|
|
||||||
## PARAMETERS
|
## PARAMETERS
|
||||||
|
|
||||||
@ -64,7 +70,7 @@ Aliases:
|
|||||||
|
|
||||||
Required: False
|
Required: False
|
||||||
Position: Named
|
Position: Named
|
||||||
Default value: "{0}\PSCredentialStore\CredentialStore.json" -f $env:ProgramData
|
Default value: None
|
||||||
Accept pipeline input: False
|
Accept pipeline input: False
|
||||||
Accept wildcard characters: False
|
Accept wildcard characters: False
|
||||||
```
|
```
|
||||||
@ -102,22 +108,18 @@ Accept wildcard characters: False
|
|||||||
```
|
```
|
||||||
|
|
||||||
### CommonParameters
|
### CommonParameters
|
||||||
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
## INPUTS
|
## INPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## OUTPUTS
|
## OUTPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## NOTES
|
## NOTES
|
||||||
\`\`\`
|
- File Name : Remove-CredentialStoreItem.ps1
|
||||||
File Name : Remove-CredentialStoreItem.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
\`\`\`
|
|
||||||
|
|
||||||
## RELATED LINKS
|
## RELATED LINKS
|
||||||
|
|
||||||
|
@ -1,10 +1,3 @@
|
|||||||
---
|
|
||||||
external help file: PSCredentialStore-help.xml
|
|
||||||
Module Name: PSCredentialStore
|
|
||||||
online version: https://github.com/OCram85/PSCredentialStore
|
|
||||||
schema: 2.0.0
|
|
||||||
---
|
|
||||||
|
|
||||||
# Set-CredentialStoreItem
|
# Set-CredentialStoreItem
|
||||||
|
|
||||||
## SYNOPSIS
|
## SYNOPSIS
|
||||||
@ -25,21 +18,24 @@ Set-CredentialStoreItem -RemoteHost <String> [-Identifier <String>] [-Credential
|
|||||||
```
|
```
|
||||||
|
|
||||||
## DESCRIPTION
|
## DESCRIPTION
|
||||||
{{Fill in the Description}}
|
Use this function to update your already stored RemoteHost items.
|
||||||
|
|
||||||
## EXAMPLES
|
## EXAMPLES
|
||||||
|
|
||||||
### EXAMPLE 1
|
### BEISPIEL 1
|
||||||
```
|
```
|
||||||
Set-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
Set-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### BEISPIEL 2
|
||||||
|
```
|
||||||
Set-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local" -Identifier svc
|
Set-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local" -Identifier svc
|
||||||
|
```
|
||||||
|
|
||||||
## PARAMETERS
|
## PARAMETERS
|
||||||
|
|
||||||
### -Credential
|
### -Credential
|
||||||
{{Fill Credential Description}}
|
Provided the new credentials you want to update inside the RemoteHost item.
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
Type: PSCredential
|
Type: PSCredential
|
||||||
@ -80,7 +76,7 @@ Aliases:
|
|||||||
|
|
||||||
Required: False
|
Required: False
|
||||||
Position: Named
|
Position: Named
|
||||||
Default value: "{0}\PSCredentialStore\CredentialStore.json" -f $env:ProgramData
|
Default value: None
|
||||||
Accept pipeline input: False
|
Accept pipeline input: False
|
||||||
Accept wildcard characters: False
|
Accept wildcard characters: False
|
||||||
```
|
```
|
||||||
@ -118,22 +114,18 @@ Accept wildcard characters: False
|
|||||||
```
|
```
|
||||||
|
|
||||||
### CommonParameters
|
### CommonParameters
|
||||||
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
## INPUTS
|
## INPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## OUTPUTS
|
## OUTPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## NOTES
|
## NOTES
|
||||||
\`\`\`
|
- File Name : Set-CredentialStoreItem.ps1
|
||||||
File Name : Set-CredentialStoreItem.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
\`\`\`
|
|
||||||
|
|
||||||
## RELATED LINKS
|
## RELATED LINKS
|
||||||
|
|
||||||
|
56
docs/Test-CSCertificate.md
Normal file
56
docs/Test-CSCertificate.md
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
# Test-CSCertificate
|
||||||
|
|
||||||
|
## SYNOPSIS
|
||||||
|
Tests if the linked certificate is store ein the specified cert stores.
|
||||||
|
|
||||||
|
## SYNTAX
|
||||||
|
|
||||||
|
```
|
||||||
|
Test-CSCertificate [-Type] <String> [<CommonParameters>]
|
||||||
|
```
|
||||||
|
|
||||||
|
## DESCRIPTION
|
||||||
|
Test-CSCertificate should be an easy high level test for the linked certificate.
|
||||||
|
|
||||||
|
## EXAMPLES
|
||||||
|
|
||||||
|
### BEISPIEL 1
|
||||||
|
```
|
||||||
|
Test-CSCertificate -Type 'Shared'
|
||||||
|
```
|
||||||
|
|
||||||
|
## PARAMETERS
|
||||||
|
|
||||||
|
### -Type
|
||||||
|
Select between 'Private' or 'Shared'.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: String
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: True
|
||||||
|
Position: 1
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### CommonParameters
|
||||||
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
|
## INPUTS
|
||||||
|
|
||||||
|
### [None]
|
||||||
|
## OUTPUTS
|
||||||
|
|
||||||
|
### [bool]
|
||||||
|
## NOTES
|
||||||
|
- File Name : Test-CSCertificate.ps1
|
||||||
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
|
- Requires :
|
||||||
|
|
||||||
|
## RELATED LINKS
|
||||||
|
|
||||||
|
[https://github.com/OCram85/PSCredentialStore](https://github.com/OCram85/PSCredentialStore)
|
||||||
|
|
@ -1,10 +1,3 @@
|
|||||||
---
|
|
||||||
external help file: PSCredentialStore-help.xml
|
|
||||||
Module Name: PSCredentialStore
|
|
||||||
online version: https://github.com/OCram85/PSCredentialStore
|
|
||||||
schema: 2.0.0
|
|
||||||
---
|
|
||||||
|
|
||||||
# Test-CSConnection
|
# Test-CSConnection
|
||||||
|
|
||||||
## SYNOPSIS
|
## SYNOPSIS
|
||||||
@ -21,9 +14,9 @@ Use this script to check a connection which was established with the \`Connect-T
|
|||||||
|
|
||||||
## EXAMPLES
|
## EXAMPLES
|
||||||
|
|
||||||
### EXAMPLE 1
|
### BEISPIEL 1
|
||||||
```
|
```
|
||||||
.\Test-CMConnection -RemoteHost "r0-i01-vcr01.p0r.kivbf-cloud.net" -Type VMware
|
Test-CMConnection -RemoteHost "vcr01.internal.net" -Type VMware
|
||||||
```
|
```
|
||||||
|
|
||||||
## PARAMETERS
|
## PARAMETERS
|
||||||
@ -61,20 +54,18 @@ Accept wildcard characters: False
|
|||||||
```
|
```
|
||||||
|
|
||||||
### CommonParameters
|
### CommonParameters
|
||||||
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
## INPUTS
|
## INPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## OUTPUTS
|
## OUTPUTS
|
||||||
|
|
||||||
### [Boolean]
|
### [bool]
|
||||||
|
|
||||||
## NOTES
|
## NOTES
|
||||||
File Name : Test-CSConnection.ps1
|
- File Name : Test-CSConnection.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
## RELATED LINKS
|
## RELATED LINKS
|
||||||
|
|
||||||
|
@ -1,10 +1,3 @@
|
|||||||
---
|
|
||||||
external help file: PSCredentialStore-help.xml
|
|
||||||
Module Name: PSCredentialStore
|
|
||||||
online version: https://github.com/OCram85/PSCredentialStore
|
|
||||||
schema: 2.0.0
|
|
||||||
---
|
|
||||||
|
|
||||||
# Test-CredentialStore
|
# Test-CredentialStore
|
||||||
|
|
||||||
## SYNOPSIS
|
## SYNOPSIS
|
||||||
@ -29,12 +22,10 @@ the file exists.
|
|||||||
|
|
||||||
## EXAMPLES
|
## EXAMPLES
|
||||||
|
|
||||||
### Example 1
|
### BEISPIEL 1
|
||||||
```powershell
|
```
|
||||||
PS C:\> {{ Add example code here }}
|
Test-CredentialStore -eq $true
|
||||||
```
|
```
|
||||||
|
|
||||||
{{ Add example description here }}
|
|
||||||
|
|
||||||
## PARAMETERS
|
## PARAMETERS
|
||||||
|
|
||||||
@ -48,7 +39,7 @@ Aliases:
|
|||||||
|
|
||||||
Required: False
|
Required: False
|
||||||
Position: Named
|
Position: Named
|
||||||
Default value: "{0}\PSCredentialStore\CredentialStore.json" -f $env:ProgramData
|
Default value: None
|
||||||
Accept pipeline input: False
|
Accept pipeline input: False
|
||||||
Accept wildcard characters: False
|
Accept wildcard characters: False
|
||||||
```
|
```
|
||||||
@ -71,18 +62,16 @@ Accept wildcard characters: False
|
|||||||
```
|
```
|
||||||
|
|
||||||
### CommonParameters
|
### CommonParameters
|
||||||
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
## INPUTS
|
## INPUTS
|
||||||
|
|
||||||
## OUTPUTS
|
## OUTPUTS
|
||||||
|
|
||||||
## NOTES
|
## NOTES
|
||||||
\`\`\`
|
- File Name : Test-CredentialStore.ps1
|
||||||
File Name : Test-CredentialStore.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
\`\`\`
|
|
||||||
|
|
||||||
## RELATED LINKS
|
## RELATED LINKS
|
||||||
|
|
||||||
|
@ -1,10 +1,3 @@
|
|||||||
---
|
|
||||||
external help file: PSCredentialStore-help.xml
|
|
||||||
Module Name: PSCredentialStore
|
|
||||||
online version: https://github.com/OCram85/PSCredentialStore
|
|
||||||
schema: 2.0.0
|
|
||||||
---
|
|
||||||
|
|
||||||
# Test-CredentialStoreItem
|
# Test-CredentialStoreItem
|
||||||
|
|
||||||
## SYNOPSIS
|
## SYNOPSIS
|
||||||
@ -30,7 +23,7 @@ you try to interact with it.
|
|||||||
|
|
||||||
## EXAMPLES
|
## EXAMPLES
|
||||||
|
|
||||||
### EXAMPLE 1
|
### BEISPIEL 1
|
||||||
```
|
```
|
||||||
If (Test-CredentialStoreItem -RemoteHost "Default") {
|
If (Test-CredentialStoreItem -RemoteHost "Default") {
|
||||||
```
|
```
|
||||||
@ -110,22 +103,18 @@ Accept wildcard characters: False
|
|||||||
```
|
```
|
||||||
|
|
||||||
### CommonParameters
|
### CommonParameters
|
||||||
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
## INPUTS
|
## INPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## OUTPUTS
|
## OUTPUTS
|
||||||
|
|
||||||
### [None]
|
### [None]
|
||||||
|
|
||||||
## NOTES
|
## NOTES
|
||||||
\`\`\`
|
- File Name : Test-CredentialStoreItem.ps1
|
||||||
File Name : Test-CredentialStoreItem.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
\`\`\`
|
|
||||||
|
|
||||||
## RELATED LINKS
|
## RELATED LINKS
|
||||||
|
|
||||||
|
107
docs/Use-CSCertificate.md
Normal file
107
docs/Use-CSCertificate.md
Normal file
@ -0,0 +1,107 @@
|
|||||||
|
# Use-CSCertificate
|
||||||
|
|
||||||
|
## SYNOPSIS
|
||||||
|
Links an existing PFX Certificate to a CredentialStore.
|
||||||
|
|
||||||
|
## SYNTAX
|
||||||
|
|
||||||
|
### Private (Default)
|
||||||
|
```
|
||||||
|
Use-CSCertificate -Path <String> [-UseCertStore] [<CommonParameters>]
|
||||||
|
```
|
||||||
|
|
||||||
|
### Shared
|
||||||
|
```
|
||||||
|
Use-CSCertificate -Path <String> [-CredentialStore <String>] [-Shared] [-UseCertStore] [<CommonParameters>]
|
||||||
|
```
|
||||||
|
|
||||||
|
## DESCRIPTION
|
||||||
|
Linking a certificate is needed if you plan to use the same CredentialStore in cross platform scenarios.
|
||||||
|
|
||||||
|
## EXAMPLES
|
||||||
|
|
||||||
|
### BEISPIEL 1
|
||||||
|
```
|
||||||
|
Use-CSCertificate -Path 'C:\cert.pfx'
|
||||||
|
```
|
||||||
|
|
||||||
|
## PARAMETERS
|
||||||
|
|
||||||
|
### -CredentialStore
|
||||||
|
Specify a custom path for a shared credential store.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: String
|
||||||
|
Parameter Sets: Shared
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: False
|
||||||
|
Position: Named
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -Path
|
||||||
|
Specify the path to the PFX Certificate you want to link for usage.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: String
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: True
|
||||||
|
Position: Named
|
||||||
|
Default value: None
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -Shared
|
||||||
|
Use the credential store in shared mode.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: SwitchParameter
|
||||||
|
Parameter Sets: Shared
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: True
|
||||||
|
Position: Named
|
||||||
|
Default value: False
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### -UseCertStore
|
||||||
|
Use the given certificate and import it into the corresponding certificate store.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
Type: SwitchParameter
|
||||||
|
Parameter Sets: (All)
|
||||||
|
Aliases:
|
||||||
|
|
||||||
|
Required: False
|
||||||
|
Position: Named
|
||||||
|
Default value: False
|
||||||
|
Accept pipeline input: False
|
||||||
|
Accept wildcard characters: False
|
||||||
|
```
|
||||||
|
|
||||||
|
### CommonParameters
|
||||||
|
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
|
||||||
|
|
||||||
|
## INPUTS
|
||||||
|
|
||||||
|
### [None]
|
||||||
|
## OUTPUTS
|
||||||
|
|
||||||
|
### [None]
|
||||||
|
## NOTES
|
||||||
|
File Name : Use-CSCertificate.ps1
|
||||||
|
Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
|
Requires :
|
||||||
|
|
||||||
|
## RELATED LINKS
|
||||||
|
|
||||||
|
[https://github.com/OCram85/PSCredentialStore](https://github.com/OCram85/PSCredentialStore)
|
||||||
|
|
@ -1,4 +1,4 @@
|
|||||||
# PSCredentialStore
|
# PSCredentialStore
|
||||||
## about_PSCredentialStore
|
## about_PSCredentialStore
|
||||||
|
|
||||||
|
|
||||||
@ -7,24 +7,30 @@ PSCredentialStore enables managing multiple PSCredential objects.
|
|||||||
|
|
||||||
|
|
||||||
# LONG DESCRIPTION
|
# LONG DESCRIPTION
|
||||||
The PSCredentialStore is an simple credential manager for PSCredentials. It stores multiple credential objects in a
|
The PSCredentialStore is a simple credential manager for `PSCredential` objects. It stores PSCredentials in a simple json
|
||||||
simple json file. You can choose between a private and shared store. The private one exists in your profile and can
|
file. You can choose between a private and shared credential store. The private one exists in your profile and can
|
||||||
ony accessed by your account on the same machine. The shared store enables you to use different credentials for your
|
ony accessed by your account on the same machine. The shared store enables you to use different credentials for your
|
||||||
script without exposing them as plain text.
|
scripts without exposing them as plain text.
|
||||||
|
|
||||||
**The shared store isn't 100% secure and I don't recommend using it in production!**
|
|
||||||
|
|
||||||
PSCredentialStore was developed to simplify the delegation of complex powershell scripts. In this case you often
|
PSCredentialStore was developed to simplify the delegation of complex powershell scripts. In this case you often
|
||||||
need to store credentials for non interactive usage like in scheduled tasks.
|
need to store credentials for non interactive usage like in scheduled tasks.
|
||||||
|
|
||||||
To get started read the [about_PSCredentialStore](/src/en-US/about_PSCredential.help.txt) page.
|
Starting with version `1.0.0` PSCredential uses Pfx certificates fo encryption. You can use Pfx certificate files
|
||||||
|
or certificates stored in the certificate store.
|
||||||
|
|
||||||
|
For more details read the [about_PSCredentialStore](/docs/about_PSCredentialStore.md) page on github or via CLI with
|
||||||
|
`Get-Help about_PSCredentialStore`.
|
||||||
|
|
||||||
|
## Requirements
|
||||||
|
|
||||||
|
- PowerShell >= `5.1`
|
||||||
|
- .NET Framework >= `4.6` or .NET Core >= `1.0`
|
||||||
|
|
||||||
## Installation
|
## Installation
|
||||||
|
|
||||||
## PowerShellGallery.com (Recommended Way)
|
## PowerShellGallery.com (Recommended Way)
|
||||||
|
|
||||||
* Make sure you use PowerShell 4.0 or higher with `$PSVersionTable`.
|
* Make sure you use PowerShell 5.1 or higher with `$PSVersionTable`.
|
||||||
* Use the builtin PackageManagement and install with: `Install-Module PSCredentialStore`
|
* Use the builtin PackageManagement and install with: `Install-Module PSCredentialStore`
|
||||||
* Done. Start exploring the Module with `Import-Module PSCredentialStore ; Get-Command -Module PSCredentialStore`
|
* Done. Start exploring the Module with `Import-Module PSCredentialStore ; Get-Command -Module PSCredentialStore`
|
||||||
|
|
||||||
@ -36,19 +42,28 @@ To get started read the [about_PSCredentialStore](/src/en-US/about_PSCredential.
|
|||||||
* Don't forget to change the NTFS permission flag in the context menu.
|
* Don't forget to change the NTFS permission flag in the context menu.
|
||||||
* Start with `Import-Module PSCredentialStore`
|
* Start with `Import-Module PSCredentialStore`
|
||||||
|
|
||||||
**1.** First we need a blank CredentialStore. You can decide between a *private* or *shared* store. The private
|
**1.** First we need a blank credential store. You can decide between a *private* or *shared* store. The private
|
||||||
Credential Store can only be accessed with your profile on the machine you created it.
|
Credential Store can only be accessed with your profile on the machine you created it.
|
||||||
|
|
||||||
|
Starting with version `1.0.0` you can decide the storage type of your fresh created certificate. As default
|
||||||
|
PSCredentialStore creates a new pfx certificate file beside the credential store itself. Optionally you can provide
|
||||||
|
the parameter `-UseCertStore`. This imports the new certificate in the user or machine certificate store as well.
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
# Private Credential Store
|
# Private credential store
|
||||||
New-CredentialStore
|
New-CredentialStore
|
||||||
|
|
||||||
# Shared Credential Store
|
# Private credential store with certificate store usage
|
||||||
|
New-CredentialStore -UseCertStore
|
||||||
|
|
||||||
|
# Shared credential rtore
|
||||||
New-CredentialStore -Shared
|
New-CredentialStore -Shared
|
||||||
|
|
||||||
#Shared CredentialStore in custom Location
|
#Shared credential store in custom Location
|
||||||
New-CredentialStore -Shared -Path 'C:\CredentialStore.json'
|
New-CredentialStore -Shared -Path 'C:\CredentialStore.json'
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
**2.** Now you can manage your CredentialStoreItems:
|
**2.** Now you can manage your CredentialStoreItems:
|
||||||
```powershell
|
```powershell
|
||||||
# This will prompt for credentials and stores it in a private store
|
# This will prompt for credentials and stores it in a private store
|
||||||
|
@ -1,33 +1,30 @@
|
|||||||
function Get-CSCertificate {
|
function Get-CSCertificate {
|
||||||
<#
|
<#
|
||||||
.SYNOPSIS
|
.SYNOPSIS
|
||||||
Returns the certificate object given by thumbprint.
|
Returns the current used valid PfX certificate.
|
||||||
|
|
||||||
.DESCRIPTION
|
.DESCRIPTION
|
||||||
You can use this function to get a stored certificate. Search for the object by its unique thumbprint.
|
Use this function to get the available pfx certificate respecting the config hierarchy.
|
||||||
|
|
||||||
|
.PARAMETER Type
|
||||||
|
Select the current credential store type.
|
||||||
|
|
||||||
.PARAMETER Thumbprint
|
.PARAMETER Thumbprint
|
||||||
Provide one or more thumprints.
|
Provide the credentials thumbprint for the search.
|
||||||
|
|
||||||
.PARAMETER StoreName
|
|
||||||
Select the store name in which you want to search the certificates.
|
|
||||||
|
|
||||||
.PARAMETER StoreLocation
|
|
||||||
Select between the both available locations CurrentUser odr LocalMachine.
|
|
||||||
|
|
||||||
.INPUTS
|
.INPUTS
|
||||||
[string]
|
[None]
|
||||||
|
|
||||||
.OUTPUTS
|
.OUTPUTS
|
||||||
[System.Security.Cryptography.X509Certificates.X509Certificate2[]]
|
[System.Security.Cryptography.X509Certificates.X509Certificate2]
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Get-CSCertificate -Thumbprint '12345678' -StoreName 'My' -StoreLocation 'CurrentUser'
|
Get-CSCertificate -Type 'Shared' -Thumbprint '12334456'
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
File Name : Get-CSCertificate.ps1
|
- File Name : Get-CSCertificate.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
@ -35,47 +32,43 @@ function Get-CSCertificate {
|
|||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
[OutputType([System.Security.Cryptography.X509Certificates.X509Certificate2])]
|
[OutputType([System.Security.Cryptography.X509Certificates.X509Certificate2])]
|
||||||
param(
|
param(
|
||||||
[Parameter(Mandatory = $true, ValueFromPipeline = $true)]
|
[Parameter(Mandatory = $true)]
|
||||||
[ValidateNotNullOrEmpty()]
|
[ValidateNotNullOrEmpty()]
|
||||||
[string[]]$Thumbprint,
|
[ValidateSet('Private', 'Shared')]
|
||||||
|
[string]$Type,
|
||||||
|
|
||||||
[Parameter(Mandatory = $false)]
|
[Parameter(Mandatory = $true)]
|
||||||
[ValidateSet(
|
[ValidateNotNullOrEmpty()]
|
||||||
'AddressBook',
|
[string]$Thumbprint
|
||||||
'AuthRoot',
|
|
||||||
'CertificateAuthority',
|
|
||||||
'Disallowed',
|
|
||||||
'My',
|
|
||||||
'Root',
|
|
||||||
'TrustedPeople',
|
|
||||||
'TrustedPublisher'
|
|
||||||
)]
|
|
||||||
[string]$StoreName = 'My',
|
|
||||||
|
|
||||||
[Parameter(Mandatory = $false)]
|
|
||||||
[ValidateSet(
|
|
||||||
'CurrentUser',
|
|
||||||
'LocalMachine'
|
|
||||||
)]
|
|
||||||
[string]$StoreLocation = 'CurrentUser'
|
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
$Store = [System.Security.Cryptography.X509Certificates.X509Store]::New($StoreName, $StoreLocation)
|
|
||||||
try {
|
|
||||||
$Store.Open('ReadOnly')
|
|
||||||
}
|
}
|
||||||
catch {
|
|
||||||
$_.Exception.Message | Write-Error -ErrorAction Stop
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
process {
|
process {
|
||||||
foreach ($Thumb in $Thumbprint) {
|
if ($Type -eq 'Private') {
|
||||||
Write-Output $Store.Certificates | Where-Object { $_.Thumbprint -eq $Thumb }
|
Get-CSPfXCertificate -Thumbprint $Thumbprint -StoreName 'My' -StoreLocation 'CurrentUser'
|
||||||
|
}
|
||||||
|
elseif ($Type -eq 'Shared') {
|
||||||
|
if ( $isLinux) {
|
||||||
|
$cert = Get-CSPfxCertificate -Thumbprint $Thumbprint -StoreName 'My' -StoreLocation 'CurrentUser'
|
||||||
|
if ($null -eq $cert) {
|
||||||
|
Get-CSPfxCertificate -Thumbprint $Thumbprint -StoreName 'Root' -StoreLocation 'LocalMachine'
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
Write-Output $cert
|
||||||
|
}
|
||||||
|
}
|
||||||
|
elseif ( (! $isLinux) -or ($isWindows) ) {
|
||||||
|
$cert = Get-CSPfxCertificate -Thumbprint $Thumbprint -StoreName 'My' -StoreLocation 'LocalMachine'
|
||||||
|
if ($null -eq $cert) {
|
||||||
|
Get-CSPfxCertificate -Thumbprint $Thumbprint -StoreName 'Root' -StoreLocation 'LocalMachine'
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
Write-Output $cert
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
end {
|
end {
|
||||||
$Store.Close()
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,18 +1,17 @@
|
|||||||
function Import-CSCertificate {
|
function Import-CSCertificate {
|
||||||
<#
|
<#
|
||||||
.SYNOPSIS
|
.SYNOPSIS
|
||||||
adds a given pfx certificate file to current uerers personal certificate store.
|
Imports a linked certificate to the valid store location.
|
||||||
|
|
||||||
.DESCRIPTION
|
.DESCRIPTION
|
||||||
This function is used to import existing pfx certificate files. The Import-PFXCertificate cmdle from the
|
Import-CSCertificate takes a pfx certificate file and imports it to the supposed certificate store for
|
||||||
PKI module imports the certficate into a deprecated store. Thus you can't read the private key afterwards or
|
private and shared credential stores.
|
||||||
using it for decrypting data.
|
|
||||||
|
.PARAMETER Type
|
||||||
|
Select between the a private and shared credential store.
|
||||||
|
|
||||||
.PARAMETER Path
|
.PARAMETER Path
|
||||||
Path to an existing *.pfx certificate file.
|
Provide a valid path to pfx certificate file.
|
||||||
|
|
||||||
.PARAMETER StoreName
|
|
||||||
Additionally you change change the store where you want the certificate into.
|
|
||||||
|
|
||||||
.INPUTS
|
.INPUTS
|
||||||
[None]
|
[None]
|
||||||
@ -21,12 +20,12 @@ function Import-CSCertificate {
|
|||||||
[None]
|
[None]
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Import-CSCertificate -Path (Join-Path -Path $Env:APPDATA -ChildPath '/PSCredentialStore.pfx')
|
Import-CSCertificate -Type 'Private' -Path (Join-Path -Path $Env:APPDATA -ChildItem 'PfxCertificate.pfx')
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
File Name : Import-CSCertificate.ps1
|
- File Name : Import-CSCertificate.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
@ -36,77 +35,38 @@ function Import-CSCertificate {
|
|||||||
param(
|
param(
|
||||||
[Parameter(Mandatory = $true)]
|
[Parameter(Mandatory = $true)]
|
||||||
[ValidateNotNullOrEmpty()]
|
[ValidateNotNullOrEmpty()]
|
||||||
[string]$Path,
|
[ValidateSet('Private', 'Shared')]
|
||||||
|
[string]$Type,
|
||||||
|
|
||||||
[Parameter(Mandatory = $false)]
|
[Parameter(Mandatory = $true)]
|
||||||
[ValidateSet(
|
[ValidateNotNullOrEmpty()]
|
||||||
'AddressBook',
|
[System.IO.FileInfo]$Path
|
||||||
'AuthRoot',
|
|
||||||
'CertificateAuthority',
|
|
||||||
'Disallowed',
|
|
||||||
'My',
|
|
||||||
'Root',
|
|
||||||
'TrustedPeople',
|
|
||||||
'TrustedPublisher'
|
|
||||||
)]
|
|
||||||
[string]$StoreName = 'My',
|
|
||||||
|
|
||||||
[Parameter(Mandatory = $false)]
|
|
||||||
[ValidateSet(
|
|
||||||
'CurrentUser',
|
|
||||||
'LocalMachine'
|
|
||||||
)]
|
|
||||||
[string]$StoreLocation = 'CurrentUser',
|
|
||||||
|
|
||||||
[Parameter(Mandatory = $false)]
|
|
||||||
[ValidateSet(
|
|
||||||
'ReadOnly',
|
|
||||||
'ReadWrite',
|
|
||||||
'MaxAllowed',
|
|
||||||
'OpenExistingOnly',
|
|
||||||
'InclueArchived'
|
|
||||||
)]
|
|
||||||
[string]$OpenFlags = 'ReadWrite'
|
|
||||||
)
|
)
|
||||||
begin {
|
begin {
|
||||||
$Store = [System.Security.Cryptography.X509Certificates.X509Store]::new($StoreName, $StoreLocation)
|
if (! (Test-Path -Path $Path)) {
|
||||||
try {
|
|
||||||
$Store.Open($OpenFlags)
|
|
||||||
}
|
|
||||||
catch {
|
|
||||||
$_.Exception.Message | Write-Error -ErrorAction Stop
|
|
||||||
}
|
|
||||||
}
|
|
||||||
process {
|
|
||||||
try {
|
|
||||||
$cert = [System.Security.Cryptography.X509Certificates.X509Certificate2]::new(
|
|
||||||
$Path,
|
|
||||||
$null,
|
|
||||||
(
|
|
||||||
[System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::Exportable -bor
|
|
||||||
[System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::PersistKeySet
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
if (Test-CSCertificate -Thumbprint $cert.Thumbprint) {
|
|
||||||
Write-Warning -Message ('The certificate with thumbprint {0} is already present!' -f $cert.Thumbprint)
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
$Store.Add($cert)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
catch {
|
|
||||||
$_.Exception.Message | Write-Error -ErrorAction Stop
|
|
||||||
$ErrorParams = @{
|
$ErrorParams = @{
|
||||||
ErrorAction = 'Stop'
|
ErrorAction = 'Stop'
|
||||||
Exception = [System.Exception]::new(
|
Exception = [System.Exception]::new(
|
||||||
'Could not read or add the pfx certificate!'
|
('File {0} not found!') -f $Path
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
Write-Error @ErrorParams
|
Write-Error @ErrorParams
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
process {
|
||||||
|
# Import to CurrentUser\My store for windows and linux
|
||||||
|
if ($Type -eq 'Private') {
|
||||||
|
Import-CSPfxCertificate -Path $Path -StoreName 'My' -StoreLocation 'CurrentUser' -OpenFlags 'ReadWrite'
|
||||||
|
}
|
||||||
|
elseif ( (! $isLinux ) -and ($Type -eq 'Shared') ) {
|
||||||
|
Import-CSPfxCertificate -Path $Path -StoreName 'My' -StoreLocation 'LocalMachine' -OpenFlags 'ReadWrite'
|
||||||
|
}
|
||||||
|
elseif ( ($isLinux) -and ($Type -eq 'Shared') ) {
|
||||||
|
Import-CSPfxCertificate -Path $Path -StoreName 'My' -StoreLocation 'CurrentUser' -OpenFlags 'ReadWrite'
|
||||||
|
}
|
||||||
|
}
|
||||||
end {
|
end {
|
||||||
$Store.Close()
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,13 +1,13 @@
|
|||||||
function New-CRTAttribute {
|
function New-CSCertAttribute {
|
||||||
<#
|
<#
|
||||||
.SYNOPSIS
|
.SYNOPSIS
|
||||||
Create required data for a certificate signing request.
|
Creates required data for a certificate signing request.
|
||||||
|
|
||||||
.DESCRIPTION
|
.DESCRIPTION
|
||||||
Defines the certificate related properties for an upcoming New-PfxCertificate execution.
|
Defines the certificate related properties for an upcoming New-PfxCertificate execution.
|
||||||
|
|
||||||
.PARAMETER Country
|
.PARAMETER Country
|
||||||
Provide a two letter country code.
|
County code like EN, DE, IT, FR...
|
||||||
|
|
||||||
.PARAMETER State
|
.PARAMETER State
|
||||||
Certificate state value.
|
Certificate state value.
|
||||||
@ -24,23 +24,22 @@ function New-CRTAttribute {
|
|||||||
.PARAMETER CommonName
|
.PARAMETER CommonName
|
||||||
The certificate common name.
|
The certificate common name.
|
||||||
|
|
||||||
.PARAMETER CSRSubject
|
.PARAMETER Days
|
||||||
you can provide the needed certificate properties with in one hashtable. This hashtable has to contain the
|
The validation time itself.
|
||||||
following keys: 'Country', 'State', 'City', 'Organization', 'OrganizationalUnitName', 'CommonName'.
|
|
||||||
|
|
||||||
.INPUTS
|
.INPUTS
|
||||||
[None]
|
[None]
|
||||||
|
|
||||||
.OUTPUTS
|
.OUTPUTS
|
||||||
['PSCredentialStore.Certificate.CSRDetails']
|
[PSCredentialStore.Certificate.CSRDetails]
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
New-CRTAttribute -CSRSubject @{Country = 'DE'; State = 'BW'; City = 'Karlsruhe'; Organization = 'AwesomeIT'; OrganizationalUnitName = '';CommonName = 'MyPrivateCert'}
|
New-CSCertAttribute -Country 'DE' -State 'BW' -City 'Karlsruhe' -Organization 'AwesomeIT' -OrganizationalUnitName '' -CommonName 'MyPrivateCert'
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
File Name : New-CSRDetails.ps1
|
- File Name : New-CSCertAttribute.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
@ -1,7 +1,7 @@
|
|||||||
function New-PfxCertificate {
|
function New-CSCertificate {
|
||||||
<#
|
<#
|
||||||
.SYNOPSIS
|
.SYNOPSIS
|
||||||
Creates new PFX certificate for the CredentialStore encryption.
|
Creates a new PFX certificate for the CredentialStore encryption.
|
||||||
|
|
||||||
.DESCRIPTION
|
.DESCRIPTION
|
||||||
Use this function to create a custom self signed certificate used by the PSCredentialStore module.
|
Use this function to create a custom self signed certificate used by the PSCredentialStore module.
|
||||||
@ -22,12 +22,12 @@ function New-PfxCertificate {
|
|||||||
[None]
|
[None]
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
New-PfxCertificate -CRTAttribute $CRTAttribute -KeyName './myprivate.key' -CertName './mycert.pfx'
|
New-CSCertificate -CRTAttribute $CRTAttribute -KeyName './myprivate.key' -CertName './mycert.pfx'
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
File Name : New-PfxCertificate.ps1
|
- File Name : New-CSCertificate.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
@ -1,19 +1,13 @@
|
|||||||
function Test-CSCertificate {
|
function Test-CSCertificate {
|
||||||
<#
|
<#
|
||||||
.SYNOPSIS
|
.SYNOPSIS
|
||||||
Tests if the given certificate exists in a store.
|
Tests if the linked certificate is store ein the specified cert stores.
|
||||||
|
|
||||||
.DESCRIPTION
|
.DESCRIPTION
|
||||||
Use this function to ensure if a certificate is already imported into a given store.
|
Test-CSCertificate should be an easy high level test for the linked certificate.
|
||||||
|
|
||||||
.PARAMETER Thumbprint
|
.PARAMETER Type
|
||||||
Provide one or more thumprints.
|
Select between 'Private' or 'Shared'.
|
||||||
|
|
||||||
.PARAMETER StoreName
|
|
||||||
Select the store name in which you want to search the certificates.
|
|
||||||
|
|
||||||
.PARAMETER StoreLocation
|
|
||||||
Select between the both available locations CurrentUser odr LocalMachine.
|
|
||||||
|
|
||||||
.INPUTS
|
.INPUTS
|
||||||
[None]
|
[None]
|
||||||
@ -22,12 +16,12 @@ function Test-CSCertificate {
|
|||||||
[bool]
|
[bool]
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Test-CSCertificate -Thumbprint '12345678' -StoreName 'My' -StoreLocation 'CurrentUser'
|
Test-CSCertificate -Type 'Shared'
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
File Name : Test-CSCertificate.ps1
|
- File Name : Test-CSCertificate.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
@ -35,45 +29,42 @@ function Test-CSCertificate {
|
|||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
[OutputType([bool])]
|
[OutputType([bool])]
|
||||||
param(
|
param(
|
||||||
[Parameter(Mandatory = $true, ValueFromPipeline = $true)]
|
[Parameter(Mandatory = $true)]
|
||||||
[ValidateNotNullOrEmpty()]
|
[ValidateNotNullOrEmpty()]
|
||||||
[string]$Thumbprint,
|
[ValidateSet('Private', 'Shared')]
|
||||||
|
[string]$Type
|
||||||
[Parameter(Mandatory = $false)]
|
|
||||||
[ValidateSet(
|
|
||||||
'AddressBook',
|
|
||||||
'AuthRoot',
|
|
||||||
'CertificateAuthority',
|
|
||||||
'Disallowed',
|
|
||||||
'My',
|
|
||||||
'Root',
|
|
||||||
'TrustedPeople',
|
|
||||||
'TrustedPublisher'
|
|
||||||
)]
|
|
||||||
[string]$StoreName = 'My',
|
|
||||||
|
|
||||||
[Parameter(Mandatory = $false)]
|
|
||||||
[ValidateSet(
|
|
||||||
'CurrentUser',
|
|
||||||
'LocalMachine'
|
|
||||||
)]
|
|
||||||
[string]$StoreLocation = 'CurrentUser'
|
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {
|
begin {
|
||||||
$Store = [System.Security.Cryptography.X509Certificates.X509Store]::New($StoreName, $StoreLocation)
|
if ($Type -eq 'Private') {
|
||||||
try {
|
$CS = Get-CredentialStore
|
||||||
$Store.Open('ReadOnly')
|
|
||||||
}
|
}
|
||||||
catch {
|
elseif ($Type -eq 'Shared') {
|
||||||
$_.Exception.Message | Write-Error -ErrorAction Stop
|
$CS = Get-CredentialStore -Shared
|
||||||
}
|
}
|
||||||
|
if ($null -ne $CS.PfxCertificate) {
|
||||||
|
Write-Warning 'There is a Pfx certificate file linked in the store. Certificates saved in the Cert store will be ignored!'
|
||||||
}
|
}
|
||||||
|
|
||||||
|
}
|
||||||
process {
|
process {
|
||||||
$Cert = $Store.Certificates | Where-Object { $_.Thumbprint -eq $Thumbprint }
|
if ($Type -eq 'Private') {
|
||||||
|
$cert = Get-CSPfXCertificate -Thumbprint $CS.Thumbprint -StoreName 'My' -StoreLocation 'CurrentUser'
|
||||||
if ($null -eq $Cert) {
|
}
|
||||||
|
elseif ($Type -eq 'Shared') {
|
||||||
|
if ( $isLinux) {
|
||||||
|
$cert = Get-CSPfxCertificate -Thumbprint $CS.Thumbprint -StoreName 'My' -StoreLocation 'CurrentUser'
|
||||||
|
if ($null -eq $cert) {
|
||||||
|
$cert = Get-CSPfxCertificate -Thumbprint $CS.Thumbprint -StoreName 'Root' -StoreLocation 'LocalMachine'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
elseif ( (! $isLinux) -or ($isWindows) ) {
|
||||||
|
$cert = Get-CSPfxCertificate -Thumbprint $CS.Thumbprint -StoreName 'My' -StoreLocation 'LocalMachine'
|
||||||
|
if ($null -eq $cert) {
|
||||||
|
$cert = Get-CSPfxCertificate -Thumbprint $CS.Thumbprint -StoreName 'Root' -StoreLocation 'LocalMachine'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if ($null -eq $cert) {
|
||||||
return $false
|
return $false
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
@ -81,6 +72,5 @@ function Test-CSCertificate {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
end {
|
end {
|
||||||
$Store.Close()
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
function Use-PfxCertificate {
|
function Use-CSCertificate {
|
||||||
<#
|
<#
|
||||||
.SYNOPSIS
|
.SYNOPSIS
|
||||||
Links an existing PFX Certifiacte to a CredentialStore.
|
Links an existing PFX Certificate to a CredentialStore.
|
||||||
|
|
||||||
.DESCRIPTION
|
.DESCRIPTION
|
||||||
Linking a certificate is needed if you plan to use the same CredentialStore in cross platform scenarios.
|
Linking a certificate is needed if you plan to use the same CredentialStore in cross platform scenarios.
|
||||||
@ -9,6 +9,15 @@ function Use-PfxCertificate {
|
|||||||
.PARAMETER Path
|
.PARAMETER Path
|
||||||
Specify the path to the PFX Certificate you want to link for usage.
|
Specify the path to the PFX Certificate you want to link for usage.
|
||||||
|
|
||||||
|
.PARAMETER CredentialStore
|
||||||
|
Specify a custom path for a shared credential store.
|
||||||
|
|
||||||
|
.PARAMETER Shared
|
||||||
|
Use the credential store in shared mode.
|
||||||
|
|
||||||
|
.PARAMETER UseCertStore
|
||||||
|
Use the given certificate and import it into the corresponding certificate store.
|
||||||
|
|
||||||
.INPUTS
|
.INPUTS
|
||||||
[None]
|
[None]
|
||||||
|
|
||||||
@ -16,10 +25,10 @@ function Use-PfxCertificate {
|
|||||||
[None]
|
[None]
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
|
Use-CSCertificate -Path 'C:\cert.pfx'
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
File Name : Use-PfxCertificate.ps1
|
File Name : Use-CSCertificate.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
Requires :
|
||||||
|
|
||||||
@ -40,9 +49,13 @@ function Use-PfxCertificate {
|
|||||||
[string]$CredentialStore,
|
[string]$CredentialStore,
|
||||||
|
|
||||||
[Parameter(Mandatory = $true, ParameterSetName = "Shared")]
|
[Parameter(Mandatory = $true, ParameterSetName = "Shared")]
|
||||||
[switch]$Shared
|
[switch]$Shared,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $false, ParameterSetName = "Private")]
|
||||||
|
[Parameter(Mandatory = $false, ParameterSetName = "Shared")]
|
||||||
|
[Switch]$UseCertStore
|
||||||
)
|
)
|
||||||
begin {}
|
begin { }
|
||||||
|
|
||||||
process {
|
process {
|
||||||
try {
|
try {
|
||||||
@ -93,10 +106,16 @@ Make sure you used the same AES keys for encrypting!
|
|||||||
"@
|
"@
|
||||||
}
|
}
|
||||||
|
|
||||||
$CS.PfxCertificate = $validPath.Path
|
if ($UseCertStore) {
|
||||||
|
Import-CSCertificate -Type $PSCmdlet.ParameterSetName -Path $Path
|
||||||
$CS.Thumbprint = $PfxCertificate.Thumbprint
|
$CS.Thumbprint = $PfxCertificate.Thumbprint
|
||||||
|
$CS.PfxCertificate = $null
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$CS.PfxCertificate = $validPath.Path
|
||||||
|
}
|
||||||
$CS | ConvertTo-Json -Depth 5 | Out-File -FilePath $StorePath -Force -Encoding utf8
|
$CS | ConvertTo-Json -Depth 5 | Out-File -FilePath $StorePath -Force -Encoding utf8
|
||||||
}
|
}
|
||||||
|
|
||||||
end {}
|
end { }
|
||||||
}
|
}
|
@ -29,6 +29,9 @@ function Connect-To {
|
|||||||
Switch to shared mode with this param. This enforces the command to work with a shared CredentialStore which
|
Switch to shared mode with this param. This enforces the command to work with a shared CredentialStore which
|
||||||
can be decrypted across systems.
|
can be decrypted across systems.
|
||||||
|
|
||||||
|
.PARAMETER PassThru
|
||||||
|
Returns the value from the underlying connection type function.
|
||||||
|
|
||||||
.INPUTS
|
.INPUTS
|
||||||
[None]
|
[None]
|
||||||
|
|
||||||
@ -57,9 +60,9 @@ function Connect-To {
|
|||||||
Connect-To -RemoteHost "exchange01.myside.local" -Type ExchangeHTTPS
|
Connect-To -RemoteHost "exchange01.myside.local" -Type ExchangeHTTPS
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
File Name : Connect-To.ps1
|
- File Name : Connect-To.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
@ -194,7 +197,7 @@ function Connect-To {
|
|||||||
}
|
}
|
||||||
try {
|
try {
|
||||||
$FTPSessionOption = New-WinSCPSessionOption @WinSCPConParams
|
$FTPSessionOption = New-WinSCPSessionOption @WinSCPConParams
|
||||||
$Global:WinSCPSession = New-WinSCPSession @FTPSessionOption
|
$Global:WinSCPSession = New-WinSCPSession -SessionOption $FTPSessionOption
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
throw "Could not connect to {0} using {1} protocol!" -f $RemoteHost, $Type
|
throw "Could not connect to {0} using {1} protocol!" -f $RemoteHost, $Type
|
||||||
|
@ -51,9 +51,9 @@ function Disconnect-From {
|
|||||||
Disconnect-From -RemoteHost "exchange01.myside.local" -Type ExchangeHTTPS
|
Disconnect-From -RemoteHost "exchange01.myside.local" -Type ExchangeHTTPS
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
File Name : Disconnect-From.ps1
|
- File Name : Disconnect-From.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
|
@ -17,22 +17,22 @@ function Test-CSConnection {
|
|||||||
[None]
|
[None]
|
||||||
|
|
||||||
.OUTPUTS
|
.OUTPUTS
|
||||||
[Boolean]
|
[bool]
|
||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
.\Test-CMConnection -RemoteHost "r0-i01-vcr01.p0r.kivbf-cloud.net" -Type VMware
|
Test-CMConnection -RemoteHost "vcr01.internal.net" -Type VMware
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
File Name : Test-CSConnection.ps1
|
- File Name : Test-CSConnection.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
#>
|
#>
|
||||||
|
|
||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
[OutputType([boolean])]
|
[OutputType([bool])]
|
||||||
param(
|
param(
|
||||||
[Parameter(Mandatory = $true)]
|
[Parameter(Mandatory = $true)]
|
||||||
[ValidateNotNullOrEmpty()]
|
[ValidateNotNullOrEmpty()]
|
||||||
|
35
src/Formats/PSCredential.Store.Format.ps1xml
Normal file
35
src/Formats/PSCredential.Store.Format.ps1xml
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" ?>
|
||||||
|
<Configuration>
|
||||||
|
<ViewDefinitions>
|
||||||
|
<View>
|
||||||
|
<Name>PSCredentialStore.Store</Name>
|
||||||
|
<ViewSelectedBy>
|
||||||
|
<TypeName>PSCredentialStore.Store</TypeName>
|
||||||
|
</ViewSelectedBy>
|
||||||
|
<ListControl>
|
||||||
|
<ListEntries>
|
||||||
|
<ListEntry>
|
||||||
|
<ListItems>
|
||||||
|
<ListItem>
|
||||||
|
<PropertyName>Version</PropertyName>
|
||||||
|
</ListItem>
|
||||||
|
<ListItem>
|
||||||
|
<PropertyName>Created</PropertyName>
|
||||||
|
</ListItem>
|
||||||
|
<ListItem>
|
||||||
|
<Label>PfxCertificate</Label>
|
||||||
|
<ScriptBlock>$_.PfxCertificate | Split-Path -Leaf</ScriptBlock>
|
||||||
|
</ListItem>
|
||||||
|
<ListItem>
|
||||||
|
<PropertyName>Thumbprint</PropertyName>
|
||||||
|
</ListItem>
|
||||||
|
<ListItem>
|
||||||
|
<PropertyName>Type</PropertyName>
|
||||||
|
</ListItem>
|
||||||
|
</ListItems>
|
||||||
|
</ListEntry>
|
||||||
|
</ListEntries>
|
||||||
|
</ListControl>
|
||||||
|
</View>
|
||||||
|
</ViewDefinitions>
|
||||||
|
</Configuration>
|
37
src/Formats/PSCredentialStore.Certificate.Attribute.ps1xml
Normal file
37
src/Formats/PSCredentialStore.Certificate.Attribute.ps1xml
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" ?>
|
||||||
|
<Configuration>
|
||||||
|
<ViewDefinitions>
|
||||||
|
<View>
|
||||||
|
<Name>PSCredentialStore.Certificate.Attribute</Name>
|
||||||
|
<ViewSelectedBy>
|
||||||
|
<TypeName>PSCredentialStore.Certificate.Attribute</TypeName>
|
||||||
|
</ViewSelectedBy>
|
||||||
|
<ListControl>
|
||||||
|
<ListEntries>
|
||||||
|
<ListEntry>
|
||||||
|
<ListItems>
|
||||||
|
<ListItem>
|
||||||
|
<PropertyName>Country</PropertyName>
|
||||||
|
</ListItem>
|
||||||
|
<ListItem>
|
||||||
|
<PropertyName>State</PropertyName>
|
||||||
|
</ListItem>
|
||||||
|
<ListItem>
|
||||||
|
<PropertyName>City</PropertyName>
|
||||||
|
</ListItem>
|
||||||
|
<ListItem>
|
||||||
|
<PropertyName>Organization</PropertyName>
|
||||||
|
</ListItem>
|
||||||
|
<ListItem>
|
||||||
|
<PropertyName>OrganizationalUnitName</PropertyName>
|
||||||
|
</ListItem>
|
||||||
|
<ListItem>
|
||||||
|
<PropertyName>CommonName</PropertyName>
|
||||||
|
</ListItem>
|
||||||
|
</ListItems>
|
||||||
|
</ListEntry>
|
||||||
|
</ListEntries>
|
||||||
|
</ListControl>
|
||||||
|
</View>
|
||||||
|
</ViewDefinitions>
|
||||||
|
</Configuration>
|
@ -31,11 +31,10 @@ function Get-CredentialStoreItem {
|
|||||||
$myCreds = Get-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
$myCreds = Get-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
```
|
- File Name : Get-CredentialStoreItem.ps1
|
||||||
File Name : Get-CredentialStoreItem.ps1
|
- Author : Messing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
```
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
#>
|
#>
|
||||||
@ -87,24 +86,12 @@ function Get-CredentialStoreItem {
|
|||||||
$CSMembers = Get-Member -InputObject $CS
|
$CSMembers = Get-Member -InputObject $CS
|
||||||
# Let's first check if the given remote host exists as object property
|
# Let's first check if the given remote host exists as object property
|
||||||
if (($CSMembers.MemberType -eq "NoteProperty") -and ($CSMembers.Name -contains $CredentialName)) {
|
if (($CSMembers.MemberType -eq "NoteProperty") -and ($CSMembers.Name -contains $CredentialName)) {
|
||||||
try {
|
|
||||||
if ($null -eq $CS.PfxCertificate) {
|
if ($null -eq $CS.PfxCertificate) {
|
||||||
$Cert = Get-CSCertificate -Thumbprint $CS.Thumbprint
|
$Cert = Get-CSCertificate -Type $CS.Type -Thumbprint $CS.Thumbprint
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
$Cert = Get-PfxCertificate -FilePath $CS.PfxCertificate -ErrorAction Stop
|
$Cert = Get-PfxCertificate -FilePath $CS.PfxCertificate -ErrorAction Stop
|
||||||
}
|
}
|
||||||
}
|
|
||||||
catch {
|
|
||||||
$_.Exception.Message | Write-Error
|
|
||||||
$ErrorParams = @{
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
Exception = [System.Security.Cryptography.CryptographicException]::new(
|
|
||||||
'Could not read the given PFX certificate.'
|
|
||||||
)
|
|
||||||
}
|
|
||||||
Write-Error @ErrorParams
|
|
||||||
}
|
|
||||||
$DecryptedKey = $Cert.PrivateKey.Decrypt(
|
$DecryptedKey = $Cert.PrivateKey.Decrypt(
|
||||||
[Convert]::FromBase64String($CS.$CredentialName.EncryptedKey),
|
[Convert]::FromBase64String($CS.$CredentialName.EncryptedKey),
|
||||||
[System.Security.Cryptography.RSAEncryptionPadding]::Pkcs1
|
[System.Security.Cryptography.RSAEncryptionPadding]::Pkcs1
|
||||||
|
@ -21,6 +21,10 @@ function New-CredentialStoreItem {
|
|||||||
.PARAMETER Credential
|
.PARAMETER Credential
|
||||||
You can provide credentials optionally as pre existing pscredential object.
|
You can provide credentials optionally as pre existing pscredential object.
|
||||||
|
|
||||||
|
.PARAMETER Shared
|
||||||
|
Define the CredentialStore where you want to add the new item. Default is always personal but can be
|
||||||
|
changed to shared, or even shared with custom path.
|
||||||
|
|
||||||
.INPUTS
|
.INPUTS
|
||||||
[None]
|
[None]
|
||||||
|
|
||||||
@ -31,11 +35,10 @@ function New-CredentialStoreItem {
|
|||||||
New-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
New-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
```
|
- File Name : New-CredentialStoreItem.ps1
|
||||||
File Name : New-CredentialStoreItem.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
```
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
#>
|
#>
|
||||||
@ -91,15 +94,6 @@ function New-CredentialStoreItem {
|
|||||||
Write-Error @MessageParams
|
Write-Error @MessageParams
|
||||||
}
|
}
|
||||||
|
|
||||||
# Read the file content based on the given ParameterSetName
|
|
||||||
<#
|
|
||||||
if ($PSCmdlet.ParameterSetName -eq 'Private') {
|
|
||||||
$CSContent = Get-CredentialStore
|
|
||||||
}
|
|
||||||
elseif ($PSCmdlet.ParameterSetName -eq 'Shared') {
|
|
||||||
$CSContent = Get-CredentialStore -Shared -Path $Path
|
|
||||||
}
|
|
||||||
#>
|
|
||||||
$CSContent = Get-CredentialStore -Shared -Path $Path
|
$CSContent = Get-CredentialStore -Shared -Path $Path
|
||||||
|
|
||||||
$CurrentDate = Get-Date -UFormat "%Y-%m-%d %H:%M:%S"
|
$CurrentDate = Get-Date -UFormat "%Y-%m-%d %H:%M:%S"
|
||||||
@ -116,33 +110,12 @@ function New-CredentialStoreItem {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if ($Credential.UserName) {
|
if ($Credential.UserName) {
|
||||||
try {
|
|
||||||
if ($null -eq $CSContent.PfxCertificate) {
|
if ($null -eq $CSContent.PfxCertificate) {
|
||||||
$Cert = Get-CSCertificate -Thumbprint $CSContent.Thumbprint
|
$Cert = Get-CSCertificate -Type $CSContent.Type -Thumbprint $CSContent.Thumbprint
|
||||||
if ($null -eq $Cert) {
|
|
||||||
$ErrorParams = @{
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
Exception = [System.Security.Cryptography.X509Certificates.FileNotFoundException]::new(
|
|
||||||
('Could not find the linked certificate with thumbprint {0}' -f $CSContent.Thumbprint)
|
|
||||||
)
|
|
||||||
}
|
|
||||||
Write-Error @ErrorParams
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
$Cert = Get-PfxCertificate -FilePath $CSContent.PfxCertificate -ErrorAction Stop
|
$Cert = Get-PfxCertificate -FilePath $CSContent.PfxCertificate -ErrorAction Stop
|
||||||
}
|
}
|
||||||
}
|
|
||||||
catch {
|
|
||||||
$_.Exception.Message | Write-Error
|
|
||||||
$ErrorParams = @{
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
Exception = [System.Security.Cryptography.CryptographicException]::new(
|
|
||||||
'Could not read the given PFX certificate.'
|
|
||||||
)
|
|
||||||
}
|
|
||||||
Write-Error @ErrorParams
|
|
||||||
}
|
|
||||||
|
|
||||||
if (Get-Member -InputObject $CSContent -Name $CredentialName -Membertype Properties) {
|
if (Get-Member -InputObject $CSContent -Name $CredentialName -Membertype Properties) {
|
||||||
$MessageParams = @{
|
$MessageParams = @{
|
||||||
|
@ -39,11 +39,9 @@ function Remove-CredentialStoreItem {
|
|||||||
Remove-CredentialStoreItem -RemoteHost "esx01.myside.local" -Identifier svc
|
Remove-CredentialStoreItem -RemoteHost "esx01.myside.local" -Identifier svc
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
```
|
- File Name : Remove-CredentialStoreItem.ps1
|
||||||
File Name : Remove-CredentialStoreItem.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
```
|
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
|
@ -4,6 +4,7 @@ function Set-CredentialStoreItem {
|
|||||||
Changes the credentials for the given remote host in the store.
|
Changes the credentials for the given remote host in the store.
|
||||||
|
|
||||||
.DESCRIPTION
|
.DESCRIPTION
|
||||||
|
Use this function to update your already stored RemoteHost items.
|
||||||
|
|
||||||
.PARAMETER Path
|
.PARAMETER Path
|
||||||
Define the store in which your given host entry already exists.
|
Define the store in which your given host entry already exists.
|
||||||
@ -19,6 +20,9 @@ function Set-CredentialStoreItem {
|
|||||||
Switch to shared mode with this param. This enforces the command to work with a shared CredentialStore which
|
Switch to shared mode with this param. This enforces the command to work with a shared CredentialStore which
|
||||||
can be decrypted across systems.
|
can be decrypted across systems.
|
||||||
|
|
||||||
|
.PARAMETER Credential
|
||||||
|
Provided the new credentials you want to update inside the RemoteHost item.
|
||||||
|
|
||||||
.INPUTS
|
.INPUTS
|
||||||
[None]
|
[None]
|
||||||
|
|
||||||
@ -27,14 +31,14 @@ function Set-CredentialStoreItem {
|
|||||||
|
|
||||||
.EXAMPLE
|
.EXAMPLE
|
||||||
Set-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
Set-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local"
|
||||||
|
|
||||||
|
.EXAMPLE
|
||||||
Set-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local" -Identifier svc
|
Set-CredentialStoreItem -Path "C:\TMP\mystore.json" -RemoteHost "esx01.myside.local" -Identifier svc
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
```
|
- File Name : Set-CredentialStoreItem.ps1
|
||||||
File Name : Set-CredentialStoreItem.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
```
|
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
@ -102,24 +106,12 @@ function Set-CredentialStoreItem {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if ($Credential.UserName) {
|
if ($Credential.UserName) {
|
||||||
try {
|
|
||||||
if ($null -eq $CSContent.PfxCertificate) {
|
if ($null -eq $CSContent.PfxCertificate) {
|
||||||
$Cert = Get-CSCertificate -Thumbprint $CSContent.Thumbprint
|
$Cert = Get-CSCertificate -Type $CSContent.Type -Thumbprint $CSContent.Thumbprint
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
$Cert = Get-PfxCertificate -FilePath $CSContent.PfxCertificate -ErrorAction Stop
|
$Cert = Get-PfxCertificate -FilePath $CSContent.PfxCertificate -ErrorAction Stop
|
||||||
}
|
}
|
||||||
}
|
|
||||||
catch {
|
|
||||||
$_.Exception.Message | Write-Error
|
|
||||||
$ErrorParams = @{
|
|
||||||
ErrorAction = 'Stop'
|
|
||||||
Exception = [System.Security.Cryptography.CryptographicException]::new(
|
|
||||||
'Could not read the given PFX certificate.'
|
|
||||||
)
|
|
||||||
}
|
|
||||||
Write-Error @ErrorParams
|
|
||||||
}
|
|
||||||
|
|
||||||
if (Get-Member -InputObject $CSContent -Name $CredentialName -Membertype Properties) {
|
if (Get-Member -InputObject $CSContent -Name $CredentialName -Membertype Properties) {
|
||||||
$RSAKey = Get-RandomAESKey
|
$RSAKey = Get-RandomAESKey
|
||||||
|
@ -37,11 +37,9 @@ function Test-CredentialStoreItem {
|
|||||||
}
|
}
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
```
|
- File Name : Test-CredentialStoreItem.ps1
|
||||||
File Name : Test-CredentialStoreItem.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
```
|
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
|
@ -55,7 +55,10 @@
|
|||||||
# TypesToProcess = @()
|
# TypesToProcess = @()
|
||||||
|
|
||||||
# Format files (.ps1xml) to be loaded when importing this module
|
# Format files (.ps1xml) to be loaded when importing this module
|
||||||
# FormatsToProcess = @()
|
FormatsToProcess = @(
|
||||||
|
'Formats/PSCredential.Store.Format.ps1xml',
|
||||||
|
'Formats/PSCredentialStore.Certificate.Attribute.ps1xml'
|
||||||
|
)
|
||||||
|
|
||||||
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
|
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
|
||||||
# NestedModules = @()
|
# NestedModules = @()
|
||||||
@ -65,10 +68,14 @@
|
|||||||
# Certificate
|
# Certificate
|
||||||
'Get-CSCertificate',
|
'Get-CSCertificate',
|
||||||
'Import-CSCertificate',
|
'Import-CSCertificate',
|
||||||
'New-CRTAttribute',
|
'New-CSCertAttribute',
|
||||||
'New-PfxCertificate',
|
'New-CSCertificate',
|
||||||
'Test-CSCertificate',
|
'Test-CSCertificate',
|
||||||
'Use-PfxCertificate',
|
'Use-CSCertificate',
|
||||||
|
# Pfx Certificate
|
||||||
|
# 'Get-CSPfxCertificate',
|
||||||
|
# 'Import-CSPfxCertificate',
|
||||||
|
# 'Test-CSPfxCertificate',
|
||||||
# Connection
|
# Connection
|
||||||
'Connect-To',
|
'Connect-To',
|
||||||
'Disconnect-From',
|
'Disconnect-From',
|
||||||
@ -121,10 +128,10 @@
|
|||||||
IconUri = 'https://raw.githubusercontent.com/OCram85/PSCredentialStore/master/assets/logo256.png'
|
IconUri = 'https://raw.githubusercontent.com/OCram85/PSCredentialStore/master/assets/logo256.png'
|
||||||
|
|
||||||
# ReleaseNotes of this module
|
# ReleaseNotes of this module
|
||||||
ReleaseNotes = 'This is a pre-release version!. Do not use in production!'
|
ReleaseNotes = 'See https://github.com/OCram85/PSCredentialStore/releases page for details.'
|
||||||
|
|
||||||
# Prerelease string of this module
|
# Prerelease string of this module
|
||||||
Prerelease = 'preview'
|
#Prerelease = 'preview'
|
||||||
|
|
||||||
# Flag to indicate whether the module requires explicit user acceptance for install/update
|
# Flag to indicate whether the module requires explicit user acceptance for install/update
|
||||||
# RequireLicenseAcceptance = $false
|
# RequireLicenseAcceptance = $false
|
||||||
|
81
src/Private/Get-CSPfxCertificate.ps1
Normal file
81
src/Private/Get-CSPfxCertificate.ps1
Normal file
@ -0,0 +1,81 @@
|
|||||||
|
function Get-CSPfxCertificate {
|
||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
Returns the certificate object given by thumbprint.
|
||||||
|
|
||||||
|
.DESCRIPTION
|
||||||
|
You can use this function to get a stored certificate. Search for the object by its unique thumbprint.
|
||||||
|
|
||||||
|
.PARAMETER Thumbprint
|
||||||
|
Provide one or more thumbprints.
|
||||||
|
|
||||||
|
.PARAMETER StoreName
|
||||||
|
Select the store name in which you want to search the certificates.
|
||||||
|
|
||||||
|
.PARAMETER StoreLocation
|
||||||
|
Select between the both available locations CurrentUser odr LocalMachine.
|
||||||
|
|
||||||
|
.INPUTS
|
||||||
|
[string]
|
||||||
|
|
||||||
|
.OUTPUTS
|
||||||
|
[System.Security.Cryptography.X509Certificates.X509Certificate2[]]
|
||||||
|
|
||||||
|
.EXAMPLE
|
||||||
|
Get-CSPfxCertificate -Thumbprint '12345678' -StoreName 'My' -StoreLocation 'CurrentUser'
|
||||||
|
|
||||||
|
.NOTES
|
||||||
|
- File Name : Get-CSPfxCertificate.ps1
|
||||||
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
|
- Requires :
|
||||||
|
|
||||||
|
.LINK
|
||||||
|
https://github.com/OCram85/PSCredentialStore
|
||||||
|
#>
|
||||||
|
[CmdletBinding()]
|
||||||
|
[OutputType([System.Security.Cryptography.X509Certificates.X509Certificate2])]
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory = $true, ValueFromPipeline = $true)]
|
||||||
|
[ValidateNotNullOrEmpty()]
|
||||||
|
[string[]]$Thumbprint,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $false)]
|
||||||
|
[ValidateSet(
|
||||||
|
'AddressBook',
|
||||||
|
'AuthRoot',
|
||||||
|
'CertificateAuthority',
|
||||||
|
'Disallowed',
|
||||||
|
'My',
|
||||||
|
'Root',
|
||||||
|
'TrustedPeople',
|
||||||
|
'TrustedPublisher'
|
||||||
|
)]
|
||||||
|
[string]$StoreName = 'My',
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $false)]
|
||||||
|
[ValidateSet(
|
||||||
|
'CurrentUser',
|
||||||
|
'LocalMachine'
|
||||||
|
)]
|
||||||
|
[string]$StoreLocation = 'CurrentUser'
|
||||||
|
)
|
||||||
|
|
||||||
|
begin {
|
||||||
|
$Store = [System.Security.Cryptography.X509Certificates.X509Store]::New($StoreName, $StoreLocation)
|
||||||
|
try {
|
||||||
|
$Store.Open('ReadOnly')
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$_.Exception.Message | Write-Error -ErrorAction Stop
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
process {
|
||||||
|
foreach ($Thumb in $Thumbprint) {
|
||||||
|
Write-Output $Store.Certificates | Where-Object { $_.Thumbprint -eq $Thumb }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
end {
|
||||||
|
$Store.Close()
|
||||||
|
}
|
||||||
|
}
|
@ -16,9 +16,9 @@ function Get-DefaultCredentialStorePath {
|
|||||||
$Path = Get-DefaultCredentialStorePath
|
$Path = Get-DefaultCredentialStorePath
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
File Name : Get-DefaultCredentialStorePath.ps1
|
- File Name : Get-DefaultCredentialStorePath.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
@ -30,7 +30,7 @@ function Get-DefaultCredentialStorePath {
|
|||||||
[switch]$Shared
|
[switch]$Shared
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {}
|
begin { }
|
||||||
|
|
||||||
process {
|
process {
|
||||||
if ($Shared.IsPresent) {
|
if ($Shared.IsPresent) {
|
||||||
@ -57,5 +57,5 @@ function Get-DefaultCredentialStorePath {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
end {}
|
end { }
|
||||||
}
|
}
|
||||||
|
@ -11,9 +11,9 @@ function Get-ModuleBase {
|
|||||||
Returns the base path as string
|
Returns the base path as string
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
File Name : Get-ModuleBase.ps1
|
- File Name : Get-ModuleBase.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
@ -21,9 +21,9 @@ function Get-ModuleBase {
|
|||||||
[CmdletBinding()]
|
[CmdletBinding()]
|
||||||
[OutputType()]
|
[OutputType()]
|
||||||
param()
|
param()
|
||||||
begin {}
|
begin { }
|
||||||
process {
|
process {
|
||||||
return $MyInvocation.MyCommand.Module.ModuleBase
|
return $MyInvocation.MyCommand.Module.ModuleBase
|
||||||
}
|
}
|
||||||
end {}
|
end { }
|
||||||
}
|
}
|
||||||
|
@ -16,9 +16,9 @@ function Get-RandomAESKey {
|
|||||||
.\Get-RandomAESKey
|
.\Get-RandomAESKey
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
File Name : Get-RandomAESKey.ps1
|
- File Name : Get-RandomAESKey.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
@ -28,7 +28,7 @@ function Get-RandomAESKey {
|
|||||||
[OutputType([byte[]])]
|
[OutputType([byte[]])]
|
||||||
param()
|
param()
|
||||||
|
|
||||||
begin {}
|
begin { }
|
||||||
|
|
||||||
process {
|
process {
|
||||||
$key = [byte[]]::new(32)
|
$key = [byte[]]::new(32)
|
||||||
@ -40,5 +40,5 @@ function Get-RandomAESKey {
|
|||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
end {}
|
end { }
|
||||||
}
|
}
|
||||||
|
@ -15,9 +15,9 @@ function Get-TempDir {
|
|||||||
Get-TempDir
|
Get-TempDir
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
File Name : Get-TempDir.ps1
|
- File Name : Get-TempDir.ps1
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Requires :
|
- Requires :
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
|
112
src/Private/Import-CSPfxCertificate.ps1
Normal file
112
src/Private/Import-CSPfxCertificate.ps1
Normal file
@ -0,0 +1,112 @@
|
|||||||
|
function Import-CSPfxCertificate {
|
||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
Adds a given pfx certificate file to current user's personal certificate store.
|
||||||
|
|
||||||
|
.DESCRIPTION
|
||||||
|
This function is used to import existing pfx certificate files. The Import-PFXCertificate cmdlet from the
|
||||||
|
PKI module imports the certificate into a deprecated store. Thus you can't read the private key afterwards or
|
||||||
|
using it for decrypting data.
|
||||||
|
|
||||||
|
.PARAMETER Path
|
||||||
|
Path to an existing *.pfx certificate file.
|
||||||
|
|
||||||
|
.PARAMETER StoreName
|
||||||
|
Additionally you change change the store where you want the certificate into.
|
||||||
|
|
||||||
|
.INPUTS
|
||||||
|
[None]
|
||||||
|
|
||||||
|
.OUTPUTS
|
||||||
|
[None]
|
||||||
|
|
||||||
|
.EXAMPLE
|
||||||
|
Import-CSPfxCertificate -Path (Join-Path -Path $Env:APPDATA -ChildPath '/PSCredentialStore.pfx')
|
||||||
|
|
||||||
|
.NOTES
|
||||||
|
File Name : Import-CSPfxCertificate.ps1
|
||||||
|
Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
|
Requires :
|
||||||
|
|
||||||
|
.LINK
|
||||||
|
https://github.com/OCram85/PSCredentialStore
|
||||||
|
#>
|
||||||
|
[CmdletBinding()]
|
||||||
|
[OutputType()]
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory = $true)]
|
||||||
|
[ValidateNotNullOrEmpty()]
|
||||||
|
[string]$Path,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $false)]
|
||||||
|
[ValidateSet(
|
||||||
|
'AddressBook',
|
||||||
|
'AuthRoot',
|
||||||
|
'CertificateAuthority',
|
||||||
|
'Disallowed',
|
||||||
|
'My',
|
||||||
|
'Root',
|
||||||
|
'TrustedPeople',
|
||||||
|
'TrustedPublisher'
|
||||||
|
)]
|
||||||
|
[string]$StoreName = 'My',
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $false)]
|
||||||
|
[ValidateSet(
|
||||||
|
'CurrentUser',
|
||||||
|
'LocalMachine'
|
||||||
|
)]
|
||||||
|
[string]$StoreLocation = 'CurrentUser',
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $false)]
|
||||||
|
[ValidateSet(
|
||||||
|
'ReadOnly',
|
||||||
|
'ReadWrite',
|
||||||
|
'MaxAllowed',
|
||||||
|
'OpenExistingOnly',
|
||||||
|
'IncludeArchived'
|
||||||
|
)]
|
||||||
|
[string]$OpenFlags = 'ReadWrite'
|
||||||
|
)
|
||||||
|
begin {
|
||||||
|
$Store = [System.Security.Cryptography.X509Certificates.X509Store]::new($StoreName, $StoreLocation)
|
||||||
|
try {
|
||||||
|
$Store.Open($OpenFlags)
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$_.Exception.Message | Write-Error -ErrorAction Stop
|
||||||
|
}
|
||||||
|
}
|
||||||
|
process {
|
||||||
|
try {
|
||||||
|
$cert = [System.Security.Cryptography.X509Certificates.X509Certificate2]::new(
|
||||||
|
$Path,
|
||||||
|
$null,
|
||||||
|
(
|
||||||
|
[System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::Exportable -bor
|
||||||
|
[System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::PersistKeySet
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
if (Test-CSPfxCertificate -Thumbprint $cert.Thumbprint) {
|
||||||
|
Write-Warning -Message ('The certificate with thumbprint {0} is already present!' -f $cert.Thumbprint)
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$Store.Add($cert)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$_.Exception.Message | Write-Error -ErrorAction Stop
|
||||||
|
$ErrorParams = @{
|
||||||
|
ErrorAction = 'Stop'
|
||||||
|
Exception = [System.Exception]::new(
|
||||||
|
'Could not read or add the pfx certificate!'
|
||||||
|
)
|
||||||
|
}
|
||||||
|
Write-Error @ErrorParams
|
||||||
|
}
|
||||||
|
}
|
||||||
|
end {
|
||||||
|
$Store.Close()
|
||||||
|
}
|
||||||
|
}
|
@ -40,11 +40,9 @@ function Resolve-Dependency {
|
|||||||
}
|
}
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
```
|
- File Name : ResolveDependency.ps1
|
||||||
File Name : ResolveDependency.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
```
|
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
@ -69,7 +67,7 @@ function Resolve-Dependency {
|
|||||||
}
|
}
|
||||||
|
|
||||||
process {
|
process {
|
||||||
$SelectedDependency = $Dependency.Optional | Where-Object {$_.Name -match $Name}
|
$SelectedDependency = $Dependency.Optional | Where-Object { $_.Name -match $Name }
|
||||||
# return true if there is no dependency defined
|
# return true if there is no dependency defined
|
||||||
if ($null -eq $SelectedDependency) {
|
if ($null -eq $SelectedDependency) {
|
||||||
return $true
|
return $true
|
||||||
|
86
src/Private/Test-CSPfxCertificate.ps1
Normal file
86
src/Private/Test-CSPfxCertificate.ps1
Normal file
@ -0,0 +1,86 @@
|
|||||||
|
function Test-CSPfxCertificate {
|
||||||
|
<#
|
||||||
|
.SYNOPSIS
|
||||||
|
Tests if the given certificate exists in a store.
|
||||||
|
|
||||||
|
.DESCRIPTION
|
||||||
|
Use this function to ensure if a certificate is already imported into a given store.
|
||||||
|
|
||||||
|
.PARAMETER Thumbprint
|
||||||
|
Provide one or more thumbprints.
|
||||||
|
|
||||||
|
.PARAMETER StoreName
|
||||||
|
Select the store name in which you want to search the certificates.
|
||||||
|
|
||||||
|
.PARAMETER StoreLocation
|
||||||
|
Select between the both available locations CurrentUser odr LocalMachine.
|
||||||
|
|
||||||
|
.INPUTS
|
||||||
|
[None]
|
||||||
|
|
||||||
|
.OUTPUTS
|
||||||
|
[bool]
|
||||||
|
|
||||||
|
.EXAMPLE
|
||||||
|
Test-CSPfxCertificate -Thumbprint '12345678' -StoreName 'My' -StoreLocation 'CurrentUser'
|
||||||
|
|
||||||
|
.NOTES
|
||||||
|
File Name : Test-CSPfxCertificate.ps1
|
||||||
|
Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
|
Requires :
|
||||||
|
|
||||||
|
.LINK
|
||||||
|
https://github.com/OCram85/PSCredentialStore
|
||||||
|
#>
|
||||||
|
[CmdletBinding()]
|
||||||
|
[OutputType([bool])]
|
||||||
|
param(
|
||||||
|
[Parameter(Mandatory = $true, ValueFromPipeline = $true)]
|
||||||
|
[ValidateNotNullOrEmpty()]
|
||||||
|
[string]$Thumbprint,
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $false)]
|
||||||
|
[ValidateSet(
|
||||||
|
'AddressBook',
|
||||||
|
'AuthRoot',
|
||||||
|
'CertificateAuthority',
|
||||||
|
'Disallowed',
|
||||||
|
'My',
|
||||||
|
'Root',
|
||||||
|
'TrustedPeople',
|
||||||
|
'TrustedPublisher'
|
||||||
|
)]
|
||||||
|
[string]$StoreName = 'My',
|
||||||
|
|
||||||
|
[Parameter(Mandatory = $false)]
|
||||||
|
[ValidateSet(
|
||||||
|
'CurrentUser',
|
||||||
|
'LocalMachine'
|
||||||
|
)]
|
||||||
|
[string]$StoreLocation = 'CurrentUser'
|
||||||
|
)
|
||||||
|
|
||||||
|
begin {
|
||||||
|
$Store = [System.Security.Cryptography.X509Certificates.X509Store]::New($StoreName, $StoreLocation)
|
||||||
|
try {
|
||||||
|
$Store.Open('ReadOnly')
|
||||||
|
}
|
||||||
|
catch {
|
||||||
|
$_.Exception.Message | Write-Error -ErrorAction Stop
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
process {
|
||||||
|
$Cert = $Store.Certificates | Where-Object { $_.Thumbprint -eq $Thumbprint }
|
||||||
|
|
||||||
|
if ($null -eq $Cert) {
|
||||||
|
return $false
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
return $true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
end {
|
||||||
|
$Store.Close()
|
||||||
|
}
|
||||||
|
}
|
@ -34,11 +34,9 @@ function Test-Module {
|
|||||||
.\Test-Dependency -Name 'VMware.PowerCLI' -Type 'Module' -StopIfFails
|
.\Test-Dependency -Name 'VMware.PowerCLI' -Type 'Module' -StopIfFails
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
```
|
- File Name : Test-Module.ps1
|
||||||
File Name : Test-Module.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
```
|
|
||||||
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
@ -58,7 +56,7 @@ Could not find the required {0} called {1}. Please install the required {0} to r
|
|||||||
[Parameter(Mandatory = $false)]
|
[Parameter(Mandatory = $false)]
|
||||||
[switch]$StopIfFails
|
[switch]$StopIfFails
|
||||||
)
|
)
|
||||||
begin {}
|
begin { }
|
||||||
|
|
||||||
process {
|
process {
|
||||||
$Message = $MessagePattern -f $Type, $Name
|
$Message = $MessagePattern -f $Type, $Name
|
||||||
@ -75,5 +73,5 @@ Could not find the required {0} called {1}. Please install the required {0} to r
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
end {}
|
end { }
|
||||||
}
|
}
|
||||||
|
@ -25,11 +25,9 @@ function Get-CredentialStore {
|
|||||||
$CSContent = Get-CredentialStore -Path "C:\TMP\mystore.json"
|
$CSContent = Get-CredentialStore -Path "C:\TMP\mystore.json"
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
```
|
- File Name : Get-CredentialStore.ps1
|
||||||
File Name : Get-CredentialStore.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
```
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
#>
|
#>
|
||||||
@ -45,7 +43,7 @@ function Get-CredentialStore {
|
|||||||
[switch]$Shared
|
[switch]$Shared
|
||||||
)
|
)
|
||||||
|
|
||||||
begin {}
|
begin { }
|
||||||
|
|
||||||
process {
|
process {
|
||||||
# Set the CredentialStore for private, shared or custom mode.
|
# Set the CredentialStore for private, shared or custom mode.
|
||||||
@ -83,6 +81,6 @@ function Get-CredentialStore {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
end {}
|
end { }
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@ -18,6 +18,15 @@ function New-CredentialStore {
|
|||||||
.PARAMETER Force
|
.PARAMETER Force
|
||||||
Use this switch to reset an existing store. The complete content will be wiped.
|
Use this switch to reset an existing store. The complete content will be wiped.
|
||||||
|
|
||||||
|
.PARAMETER SkipPFXCertCreation
|
||||||
|
You can skip the pfx certificate creation process. This makes sense if you have a previously created cert or want to
|
||||||
|
import a cert in cross-platform environments.
|
||||||
|
|
||||||
|
.Parameter UseCertStore
|
||||||
|
Instead of using a plain pfx file beside your CredentialStore file you can import it into the user or machine
|
||||||
|
certificate store. In this case the system itself secures the cert and you don't hat to set custom NTFS
|
||||||
|
permissions so secure your shared certificate.
|
||||||
|
|
||||||
.INPUTS
|
.INPUTS
|
||||||
[None]
|
[None]
|
||||||
|
|
||||||
@ -42,11 +51,10 @@ function New-CredentialStore {
|
|||||||
# Creates a new shared CredentialStore in the given location.
|
# Creates a new shared CredentialStore in the given location.
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
```
|
- File Name : New-CredentialStore.ps1
|
||||||
File Name : New-CredentialStore.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
```
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
#>
|
#>
|
||||||
@ -100,7 +108,7 @@ function New-CredentialStore {
|
|||||||
$ErrorParams = @{
|
$ErrorParams = @{
|
||||||
ErrorAction = 'Stop'
|
ErrorAction = 'Stop'
|
||||||
Exception = [System.IO.InvalidDataException]::new(
|
Exception = [System.IO.InvalidDataException]::new(
|
||||||
'Your provided path does not conain the required file extension .json !'
|
'Your provided path does not contain the required file extension .json !'
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
Write-Error @ErrorParams
|
Write-Error @ErrorParams
|
||||||
@ -141,7 +149,7 @@ function New-CredentialStore {
|
|||||||
OrganizationalUnitName = $PSCmdlet.ParameterSetName
|
OrganizationalUnitName = $PSCmdlet.ParameterSetName
|
||||||
CommonName = 'PSCredentialStore'
|
CommonName = 'PSCredentialStore'
|
||||||
}
|
}
|
||||||
$CRTAttribute = New-CRTAttribute @CRTParams
|
$CRTAttribute = New-CSCertAttribute @CRTParams
|
||||||
|
|
||||||
# If we are working with a ne shared store we have to create the location first.
|
# If we are working with a ne shared store we have to create the location first.
|
||||||
# Otherwise openssl fails with unknown path
|
# Otherwise openssl fails with unknown path
|
||||||
@ -171,7 +179,7 @@ function New-CredentialStore {
|
|||||||
}
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
New-PfxCertificate @PfxParams
|
New-CSCertificate @PfxParams
|
||||||
}
|
}
|
||||||
catch {
|
catch {
|
||||||
$_.Exception.Message | Write-Error
|
$_.Exception.Message | Write-Error
|
||||||
@ -202,17 +210,6 @@ function New-CredentialStore {
|
|||||||
Thumbprint = $null
|
Thumbprint = $null
|
||||||
Type = $null
|
Type = $null
|
||||||
}
|
}
|
||||||
if (! $SkipPFXCertCreation.IsPresent) {
|
|
||||||
$ObjProperties.Thumbprint = $FreshCert.Thumbprint
|
|
||||||
|
|
||||||
if (!$UseCertStore.IsPresent) {
|
|
||||||
$ObjProperties.PfxCertificate = $PfxParams.CertName
|
|
||||||
}
|
|
||||||
else {
|
|
||||||
Write-Verbose 'Importing new PFX certificate file...'
|
|
||||||
Import-CSCertificate -Path $PfxParams.CertName -StoreName My -StoreLocation CurrentUser
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if ($PSCmdlet.ParameterSetName -eq "Shared") {
|
if ($PSCmdlet.ParameterSetName -eq "Shared") {
|
||||||
$ObjProperties.Type = "Shared"
|
$ObjProperties.Type = "Shared"
|
||||||
@ -221,6 +218,20 @@ function New-CredentialStore {
|
|||||||
$ObjProperties.Type = "Private"
|
$ObjProperties.Type = "Private"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (! $SkipPFXCertCreation.IsPresent) {
|
||||||
|
$ObjProperties.Thumbprint = $FreshCert.Thumbprint
|
||||||
|
|
||||||
|
if ($UseCertStore.IsPresent) {
|
||||||
|
Write-Verbose 'Importing new PFX certificate file...'
|
||||||
|
Import-CSCertificate -Type $ObjProperties.Type -Path $PfxParams.CertName
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
$ObjProperties.PfxCertificate = $PfxParams.CertName
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
$CredentialStoreObj = [PSCustomObject]$ObjProperties
|
$CredentialStoreObj = [PSCustomObject]$ObjProperties
|
||||||
try {
|
try {
|
||||||
$JSON = ConvertTo-Json -InputObject $CredentialStoreObj -ErrorAction Stop
|
$JSON = ConvertTo-Json -InputObject $CredentialStoreObj -ErrorAction Stop
|
||||||
|
@ -14,12 +14,14 @@ function Test-CredentialStore {
|
|||||||
Switch to shared mode with this param. This enforces the command to work with a shared CredentialStore which
|
Switch to shared mode with this param. This enforces the command to work with a shared CredentialStore which
|
||||||
can be decrypted across systems.
|
can be decrypted across systems.
|
||||||
|
|
||||||
|
.EXAMPLE
|
||||||
|
Test-CredentialStore -eq $true
|
||||||
|
|
||||||
.NOTES
|
.NOTES
|
||||||
```
|
- File Name : Test-CredentialStore.ps1
|
||||||
File Name : Test-CredentialStore.ps1
|
- Author : Marco Blessing - marco.blessing@googlemail.com
|
||||||
Author : Marco Blessing - marco.blessing@googlemail.com
|
- Requires :
|
||||||
Requires :
|
|
||||||
```
|
|
||||||
.LINK
|
.LINK
|
||||||
https://github.com/OCram85/PSCredentialStore
|
https://github.com/OCram85/PSCredentialStore
|
||||||
#>
|
#>
|
||||||
@ -60,6 +62,6 @@ function Test-CredentialStore {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
end {}
|
end { }
|
||||||
|
|
||||||
}
|
}
|
||||||
|
7
tests/Certificate/50_New-CSCertAttribute.Tests.ps1
Normal file
7
tests/Certificate/50_New-CSCertAttribute.Tests.ps1
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
Describe "New-CSCertAttribute" {
|
||||||
|
Context "Basis Tests" {
|
||||||
|
It "Test1: Should not throw " {
|
||||||
|
{ New-CSCertAttribute -Country 'DE' -State 'BW' -City 'KA' -Organization 'IT' -OrganizationalUnitName'' -CommonName 'Mycert' } | Should -Not -Throw
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
15
tests/Certificate/51_New-CSCertificate.Tests.ps1
Normal file
15
tests/Certificate/51_New-CSCertificate.Tests.ps1
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
Describe "New-CSCertificate" {
|
||||||
|
Context "Basic Tests" {
|
||||||
|
It "Test1: Should not throw" {
|
||||||
|
|
||||||
|
$attribs = New-CSCertAttribute -Country 'DE' -State 'BW' -City 'KA' -Organization 'IT' -OrganizationalUnitName'' -CommonName 'Mycert'
|
||||||
|
|
||||||
|
$CertAttribs = @{
|
||||||
|
CRTAttribute = $attribs
|
||||||
|
KeyName = Join-Path -Path (Get-TempDir) -ChildPath '/foo.key'
|
||||||
|
CertName = Join-Path -Path (Get-TempDir) -ChildPath '/cert.pfx'
|
||||||
|
}
|
||||||
|
{ New-CSCertificate @CertAttribs } | Should -Not -Throw
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
10
tests/PfxCertificate/60_Test-CSPfxCertificate.Tests.ps1
Normal file
10
tests/PfxCertificate/60_Test-CSPfxCertificate.Tests.ps1
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
Describe "Test-CSPfxCertificate" {
|
||||||
|
Context "Basic Tests" {
|
||||||
|
It "Should not Throw" {
|
||||||
|
{ Test-CSPfxCertificate -Thumbprint '12345' -StoreName My -StoreLocation CurrentUser } | Should -Not -Throw
|
||||||
|
}
|
||||||
|
It "Should return false" {
|
||||||
|
Test-CSPfxCertificate -Thumbprint '12345' -StoreName My -StoreLocation CurrentUser | Should -Be $false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@ -80,7 +80,7 @@ Describe "New-CredentialStore" {
|
|||||||
$CS = Get-CredentialStore
|
$CS = Get-CredentialStore
|
||||||
$CS.PfxCertificate | Should -Be $null
|
$CS.PfxCertificate | Should -Be $null
|
||||||
$CS.Thumbprint | Should -Not -Be $null
|
$CS.Thumbprint | Should -Not -Be $null
|
||||||
$res = Test-CSCertificate -Thumbprint $CS.Thumbprint -StoreName My -StoreLocation CurrentUser
|
$res = Test-CSCertificate -Type Private
|
||||||
#Write-Verbose -Message ('res: {0}' -f $res) -Verbose
|
#Write-Verbose -Message ('res: {0}' -f $res) -Verbose
|
||||||
$res | Should -Be $true
|
$res | Should -Be $true
|
||||||
|
|
||||||
@ -90,7 +90,7 @@ Describe "New-CredentialStore" {
|
|||||||
$CS = Get-CredentialStore -Shared
|
$CS = Get-CredentialStore -Shared
|
||||||
$CS.PfxCertificate | Should -Be $null
|
$CS.PfxCertificate | Should -Be $null
|
||||||
$CS.Thumbprint | Should -Not -Be $null
|
$CS.Thumbprint | Should -Not -Be $null
|
||||||
$res = Test-CSCertificate -Thumbprint $CS.Thumbprint -StoreName My -StoreLocation CurrentUser
|
$res = Test-CSCertificate -Type Shared
|
||||||
#Write-Verbose -Message ('res: {0}' -f $res) -Verbose
|
#Write-Verbose -Message ('res: {0}' -f $res) -Verbose
|
||||||
$res | Should -Be $true
|
$res | Should -Be $true
|
||||||
}
|
}
|
||||||
|
@ -13,11 +13,11 @@ Describe "Get-CredentialStore" {
|
|||||||
{ Get-CredentialStore } | Should -Not -Throw
|
{ Get-CredentialStore } | Should -Not -Throw
|
||||||
}
|
}
|
||||||
It "Test2: Read Credential Store with testing data" {
|
It "Test2: Read Credential Store with testing data" {
|
||||||
{ Use-PfxCertificate -Shared -CredentialStore $TestCredentialStore -Path $TestPfxCert } | Should -Not -Throw
|
{ Use-CSCertificate -Shared -CredentialStore $TestCredentialStore -Path $TestPfxCert } | Should -Not -Throw
|
||||||
{ Get-CredentialStore -Shared -Path $TestCredentialStore } | Should -Not -Throw
|
{ Get-CredentialStore -Shared -Path $TestCredentialStore } | Should -Not -Throw
|
||||||
}
|
}
|
||||||
It "Test3: Not existing path should return false" {
|
It "Test3: Not existing path should return false" {
|
||||||
{ Get-CredentialStore -Shared -Path './CredentialStore.json' }| Should -Throw "Could not find the CredentialStore."
|
{ Get-CredentialStore -Shared -Path './CredentialStore.json' } | Should -Throw "Could not find the CredentialStore."
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
Context "Testing invalid json data" {
|
Context "Testing invalid json data" {
|
||||||
|
Loading…
Reference in New Issue
Block a user