2017-09-21 13:32:15 +02:00
|
|
|
function New-CredentialStoreItem {
|
|
|
|
<#
|
|
|
|
.SYNOPSIS
|
|
|
|
Adds a credential store item containing host, user and password to the given store.
|
|
|
|
|
|
|
|
.DESCRIPTION
|
|
|
|
The credentials are stored without any relations to it's further use. If you need to change an existing
|
|
|
|
item please use Set-CredentialStoreItem. You need to decide afterwards, whether to use the credential for
|
|
|
|
a VIConnection, NetApp FAS or UCS Fabric Interconnect.
|
|
|
|
|
|
|
|
.PARAMETER Path
|
|
|
|
Define the store in which you would like to add a new item.
|
|
|
|
|
|
|
|
.PARAMETER RemoteHost
|
|
|
|
The identifier or rather name for the given credentials.
|
|
|
|
|
|
|
|
.PARAMETER Identifier
|
|
|
|
Provide a custom identifier to the given remote host key. This enables you to store multiple credentials
|
|
|
|
for a single remote host entry. For example ad/sys1, ftp/sys1, mssql/sys1
|
|
|
|
|
|
|
|
.PARAMETER Credential
|
|
|
|
You can provide credentials optionally as pre existing pscredential object.
|
|
|
|
|
2019-04-29 16:05:43 +02:00
|
|
|
.PARAMETER Shared
|
|
|
|
Define the CredentialStore where you want to add the new item. Default is always personal but can be
|
|
|
|
changed to shared, or even shared with custom path.
|
|
|
|
|
2017-09-21 13:32:15 +02:00
|
|
|
.INPUTS
|
|
|
|
[None]
|
|
|
|
|
|
|
|
.OUTPUTS
|
|
|
|
[None]
|
|
|
|
|
|
|
|
.EXAMPLE
|
2022-09-20 15:01:05 +02:00
|
|
|
New-CredentialStoreItem -Path 'C:\TMP\mystore.json' -RemoteHost esx01.myside.local'
|
2017-09-21 13:32:15 +02:00
|
|
|
#>
|
|
|
|
|
2022-06-28 08:56:33 +02:00
|
|
|
[CmdletBinding(DefaultParameterSetName = 'Private')]
|
2022-07-15 10:59:56 +02:00
|
|
|
[Diagnostics.CodeAnalysis.SuppressMessageAttribute(
|
|
|
|
'PSUseShouldProcessForStateChangingFunctions',
|
|
|
|
'',
|
|
|
|
Justification = 'Adds data into an existing object/file'
|
|
|
|
)]
|
2022-06-28 08:56:33 +02:00
|
|
|
param (
|
|
|
|
[Parameter(Mandatory = $true, ParameterSetName = 'Shared')]
|
|
|
|
[Parameter(Mandatory = $true, ParameterSetName = 'Private')]
|
2017-09-21 13:32:15 +02:00
|
|
|
[ValidateNotNullOrEmpty()]
|
|
|
|
[string]$RemoteHost,
|
|
|
|
|
2022-06-28 08:56:33 +02:00
|
|
|
[Parameter(Mandatory = $false, ParameterSetName = 'Shared')]
|
|
|
|
[Parameter(Mandatory = $false, ParameterSetName = 'Private')]
|
2017-09-21 13:32:15 +02:00
|
|
|
[ValidateNotNullOrEmpty()]
|
|
|
|
[string]$Identifier,
|
|
|
|
|
2018-03-21 14:32:32 +01:00
|
|
|
[Parameter(Mandatory = $false, ValueFromPipeline = $true)]
|
2017-09-21 13:32:15 +02:00
|
|
|
[ValidateNotNullOrEmpty()]
|
2018-03-21 14:32:32 +01:00
|
|
|
[PSCredential]$Credential,
|
2017-09-21 13:32:15 +02:00
|
|
|
|
2022-06-28 08:56:33 +02:00
|
|
|
[Parameter(Mandatory = $true, ParameterSetName = 'Shared')]
|
2019-01-16 12:55:29 +01:00
|
|
|
[switch]$Shared,
|
|
|
|
|
2022-06-28 08:56:33 +02:00
|
|
|
[Parameter(Mandatory = $false, ParameterSetName = 'Shared')]
|
2019-01-16 12:55:29 +01:00
|
|
|
[ValidateNotNullOrEmpty()]
|
|
|
|
[string]$Path
|
2017-09-21 13:32:15 +02:00
|
|
|
|
|
|
|
|
2019-01-16 12:55:29 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
begin {
|
|
|
|
# Set the CredentialStore for private, shared or custom mode.
|
2022-09-20 15:01:05 +02:00
|
|
|
Write-Debug ('ParameterSetName: {0}' -f $PSCmdlet.ParameterSetName)
|
2022-06-28 08:56:33 +02:00
|
|
|
if ($PSCmdlet.ParameterSetName -eq 'Private') {
|
2019-01-16 12:55:29 +01:00
|
|
|
$Path = Get-DefaultCredentialStorePath
|
|
|
|
}
|
2022-06-28 08:56:33 +02:00
|
|
|
elseif ($PSCmdlet.ParameterSetName -eq 'Shared') {
|
2019-01-16 12:55:29 +01:00
|
|
|
if (!($PSBoundParameters.ContainsKey('Path'))) {
|
|
|
|
$Path = Get-DefaultCredentialStorePath -Shared
|
|
|
|
}
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-16 12:55:29 +01:00
|
|
|
process {
|
|
|
|
# Lets do a quick test on the given CredentialStore.
|
|
|
|
if (-not(Test-CredentialStore -Shared -Path $Path)) {
|
|
|
|
$MessageParams = @{
|
|
|
|
Exception = [System.IO.FileNotFoundException]::new(
|
2022-09-20 15:01:05 +02:00
|
|
|
'The given credential store ({0}) does not exist!' -f $Path
|
2019-01-16 12:55:29 +01:00
|
|
|
)
|
2022-09-20 15:01:05 +02:00
|
|
|
ErrorAction = 'Stop'
|
2019-01-16 12:55:29 +01:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
|
|
|
}
|
2017-09-21 13:32:15 +02:00
|
|
|
|
2019-01-16 12:55:29 +01:00
|
|
|
$CSContent = Get-CredentialStore -Shared -Path $Path
|
2017-09-21 13:32:15 +02:00
|
|
|
|
2022-06-28 08:56:33 +02:00
|
|
|
$CurrentDate = Get-Date -Format 'u'
|
2017-09-21 13:32:15 +02:00
|
|
|
|
2022-09-20 15:01:05 +02:00
|
|
|
if ($Identifier -ne '') {
|
|
|
|
$CredentialName = $RemoteHost = '{0}/{1}' -f $Identifier, $RemoteHost
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
else {
|
2019-01-16 12:55:29 +01:00
|
|
|
$CredentialName = $RemoteHost
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
2019-01-16 12:55:29 +01:00
|
|
|
|
|
|
|
if (-not($Credential)) {
|
|
|
|
$Credential = Get-Credential -Message $CredentialName
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
2019-01-16 12:55:29 +01:00
|
|
|
|
|
|
|
if ($Credential.UserName) {
|
2019-04-29 16:05:43 +02:00
|
|
|
if ($null -eq $CSContent.PfxCertificate) {
|
|
|
|
$Cert = Get-CSCertificate -Type $CSContent.Type -Thumbprint $CSContent.Thumbprint
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
2019-04-29 16:05:43 +02:00
|
|
|
else {
|
|
|
|
$Cert = Get-PfxCertificate -FilePath $CSContent.PfxCertificate -ErrorAction Stop
|
2019-01-16 12:55:29 +01:00
|
|
|
}
|
|
|
|
|
2022-07-15 10:59:56 +02:00
|
|
|
if (Get-Member -InputObject $CSContent -Name $CredentialName -MemberType Properties) {
|
2017-09-21 13:32:15 +02:00
|
|
|
$MessageParams = @{
|
2022-06-28 08:56:33 +02:00
|
|
|
Message = 'The given host already exists. Nothing to do here.'
|
2019-01-16 12:55:29 +01:00
|
|
|
}
|
|
|
|
Write-Warning @MessageParams
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
$RSAKey = Get-RandomAESKey
|
|
|
|
|
|
|
|
$CredentialHash = [ordered]@{
|
|
|
|
User = $Credential.UserName
|
|
|
|
Password = ConvertFrom-SecureString -SecureString $Credential.Password -Key $RSAKey
|
|
|
|
Created = $CurrentDate
|
|
|
|
LastChange = $null
|
2022-07-15 10:59:56 +02:00
|
|
|
EncryptedKey = [Convert]::ToBase64String(
|
|
|
|
$Cert.PublicKey.Key.Encrypt(
|
|
|
|
$RSAKey,
|
|
|
|
[System.Security.Cryptography.RSAEncryptionPadding]::Pkcs1
|
|
|
|
)
|
|
|
|
)
|
2019-01-16 12:55:29 +01:00
|
|
|
}
|
2022-07-15 10:59:56 +02:00
|
|
|
$MemberParams = @{
|
|
|
|
InputObject = $CSContent
|
|
|
|
Name = $CredentialName
|
|
|
|
MemberType = 'NoteProperty'
|
|
|
|
Value = $CredentialHash
|
|
|
|
}
|
|
|
|
Add-Member @MemberParams
|
2019-01-16 12:55:29 +01:00
|
|
|
try {
|
|
|
|
ConvertTo-Json -InputObject $CSContent | Out-File -FilePath $Path
|
|
|
|
}
|
|
|
|
catch {
|
|
|
|
$MessageParams = @{
|
2022-06-28 08:56:33 +02:00
|
|
|
Message = 'Could not add item into credential store!'
|
|
|
|
ErrorAction = 'Stop'
|
2019-01-16 12:55:29 +01:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-01-16 12:55:29 +01:00
|
|
|
else {
|
|
|
|
$MessageParams = @{
|
2022-06-28 08:56:33 +02:00
|
|
|
Message = 'Please Provide at least a valid user!'
|
|
|
|
ErrorAction = 'Stop'
|
2019-01-16 12:55:29 +01:00
|
|
|
}
|
|
|
|
Write-Error @MessageParams
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|
|
|
|
}
|
2019-01-16 12:55:29 +01:00
|
|
|
|
2022-06-28 08:56:33 +02:00
|
|
|
end {}
|
2019-01-16 12:55:29 +01:00
|
|
|
|
2017-09-21 13:32:15 +02:00
|
|
|
}
|