Examples/Example-TokenWorkflow.ps1

<#
.SYNOPSIS
    Example workflow for OATH token management
.DESCRIPTION
    Demonstrates a complete workflow for adding, assigning, activating, and managing OATH tokens
    using the OATHTokens module.
.NOTES
    This script is provided as an example of how to use the OATHTokens module
    for common token management tasks.
#>


# Import the module - use a relative path for the example
$modulePath = Join-Path -Path $PSScriptRoot -ChildPath ".."
Import-Module -Name $modulePath -Force -Verbose

# Connect to Microsoft Graph if not already connected
if (-not (Get-MgContext)) {
    Write-Host "Connecting to Microsoft Graph..." -ForegroundColor Yellow
    Connect-MgGraph -Scopes "Policy.ReadWrite.AuthenticationMethod","Directory.Read.All"
}

Write-Host "=== OATH Token Management Example Workflow ===" -ForegroundColor Cyan

#region Step 1: Generate a unique token serial number
Write-Host "`nStep 1: Generate a unique token serial number" -ForegroundColor Green

# Generate a serial number for our new token
$serialNumber = New-OATHTokenSerial -Prefix "DEMO-" -Format Alphanumeric -CheckExisting
Write-Host "Generated serial number: $serialNumber" -ForegroundColor Yellow

#endregion

#region Step 2: Generate a secure secret key
Write-Host "`nStep 2: Generate a secure secret key" -ForegroundColor Green

# Generate a random secret key (32 hexadecimal characters)
$hexChars = "0123456789ABCDEF"
$secretKey = -join (1..32 | ForEach-Object { $hexChars[(Get-Random -Minimum 0 -Maximum $hexChars.Length)] })
Write-Host "Generated hex secret key: $secretKey" -ForegroundColor Yellow

# Create a proper Base32 string for the secret
# Base32 uses characters A-Z and 2-7
$base32Chars = "ABCDEFGHIJKLMNOPQRSTUVWXYZ234567"
$base32Secret = -join (1..32 | ForEach-Object { $base32Chars[(Get-Random -Minimum 0 -Maximum $base32Chars.Length)] })
Write-Host "Generated Base32 secret: $base32Secret" -ForegroundColor Yellow

# Load the TOTP module if needed for other operations
$totpPath = Join-Path $modulePath "Public\Utility\TOTP.ps1"
if (Test-Path $totpPath) {
    . $totpPath
}

#endregion

#region Step 3: Add the token to the system
Write-Host "`nStep 3: Add the token to the system" -ForegroundColor Green

# First, check if we have any tokens with the same serial number (should be none)
$existingToken = Get-OATHToken -SerialNumber $serialNumber

# Fix the false positive detection by properly checking the existingToken result
if ($existingToken -and $existingToken.SerialNumber -eq $serialNumber) {
    Write-Host "Found existing token with the same serial number: $serialNumber" -ForegroundColor Red
    Write-Host "Token details: ID=$($existingToken.Id), Status=$($existingToken.Status)" -ForegroundColor Red
    Write-Host "Generating a new serial number..." -ForegroundColor Yellow
    $serialNumber = New-OATHTokenSerial -Prefix "DEMO-" -Format Alphanumeric -CheckExisting
    Write-Host "New serial number: $serialNumber" -ForegroundColor Yellow
}
else {
    # If we get here, there was no token with this serial number
    Write-Host "No existing token found with serial number: $serialNumber. Proceeding with creation." -ForegroundColor Green
}

# Create a token object
$token = @{
    serialNumber = $serialNumber
    secretKey = $base32Secret  # Now using the proper Base32 secret
    secretFormat = "base32"    # Changed to Base32 format
    manufacturer = "Example Corp"
    model = "Demo YubiKey"
    displayName = "Demo Token ($serialNumber)"
    timeIntervalInSeconds = 30
    hashFunction = "hmacsha1"
}

Write-Host "Adding token to the system..." -ForegroundColor Yellow
$addedToken = Add-OATHToken -Token $token

if ($addedToken) {
    Write-Host "Successfully added token with ID: $($addedToken.id)" -ForegroundColor Green
    $tokenId = $addedToken.id
}
else {
    Write-Host "Failed to add token. Exiting example." -ForegroundColor Red
    exit
}

# Retrieve and display the token
$retrievedToken = Get-OATHToken -TokenId $tokenId
Write-Host "Token details:" -ForegroundColor Yellow
$retrievedToken | Format-List

#endregion

#region Step 4: Find a user to assign the token to
Write-Host "`nStep 4: Find a user to assign the token to" -ForegroundColor Green

# Prompt for a user identifier (UPN, display name, etc.)
$userIdentifier = Read-Host "Enter a user identifier (UPN, name, etc.) or press Enter to skip assignment"

if (-not [string]::IsNullOrWhiteSpace($userIdentifier)) {
    # Look up the user
    Write-Host "Looking up user: $userIdentifier" -ForegroundColor Yellow
    $user = Get-MgUser -Filter "userPrincipalName eq '$userIdentifier'" -ErrorAction SilentlyContinue
    
    if (-not $user) {
        # Try to search by display name if UPN fails
        $user = Get-MgUser -Filter "startswith(displayName,'$userIdentifier')" -ErrorAction SilentlyContinue | Select-Object -First 1
    }
    
    if ($user) {
        Write-Host "Found user:" -ForegroundColor Green
        Write-Host " Display Name: $($user.displayName)" -ForegroundColor Yellow
        Write-Host " UPN: $($user.userPrincipalName)" -ForegroundColor Yellow
        Write-Host " ID: $($user.id)" -ForegroundColor Yellow
        
        #region Step 5: Assign the token to the user
        Write-Host "`nStep 5: Assign the token to the user" -ForegroundColor Green
        
        Write-Host "Assigning token to user..." -ForegroundColor Yellow
        $assignResult = Set-OATHTokenUser -TokenId $tokenId -UserId $user.id
        
        if ($assignResult) {
            Write-Host "Successfully assigned token to user" -ForegroundColor Green
            
            #region Step 6: Activate the token
            Write-Host "`nStep 6: Activate the token" -ForegroundColor Green
            
            # Wait longer for the assignment to propagate in Microsoft Graph
            Write-Host "Waiting for token assignment to propagate..." -ForegroundColor Yellow
            Start-Sleep -Seconds 10
            
            # Verify the token is properly assigned before attempting activation
            $assignedToken = Get-OATHToken -TokenId $tokenId
            if ($assignedToken -and $assignedToken.AssignedToName -match $user.displayName) {
                Write-Host "Token is properly assigned to $($assignedToken.AssignedToName)" -ForegroundColor Green
                $tokenAssigned = $true
            }
            else {
                Write-Host "Token assignment verification failed. Current status: $($assignedToken.Status)" -ForegroundColor Yellow
                Write-Host "Assigned to: $($assignedToken.AssignedToName)" -ForegroundColor Yellow
                
                # Try to re-assign the token
                Write-Host "Trying to re-assign the token..." -ForegroundColor Yellow
                $reassignResult = Set-OATHTokenUser -TokenId $tokenId -UserId $user.id
                if ($reassignResult) {
                    Write-Host "Re-assignment successful. Waiting for propagation..." -ForegroundColor Green
                    Start-Sleep -Seconds 10
                    $tokenAssigned = $true
                }
                else {
                    Write-Host "Re-assignment failed. Will still attempt activation." -ForegroundColor Red
                    $tokenAssigned = $false
                }
            }
            
            # Generate a TOTP code using our implementation
            Write-Host "Generating TOTP code from the secret..." -ForegroundColor Yellow
            try {
                # Make sure we have a valid Base32 secret before continuing
                if (-not [regex]::IsMatch($base32Secret, '^[A-Z2-7]+=*$')) {
                    Write-Host "Current secret is not valid Base32. Generating a new one..." -ForegroundColor Yellow
                    $base32Chars = "ABCDEFGHIJKLMNOPQRSTUVWXYZ234567"
                    $base32Secret = -join (1..32 | ForEach-Object { $base32Chars[(Get-Random -Minimum 0 -Maximum $base32Chars.Length)] })
                    Write-Host "New Base32 secret: $base32Secret" -ForegroundColor Yellow
                }
                
                # Use Get-TOTP directly without any additional parameters
                $totpCode = Get-TOTP -Secret $base32Secret -InputFormat Base32
                Write-Host "Current TOTP code: $totpCode" -ForegroundColor Cyan
                Write-Host "This code will change every 30 seconds" -ForegroundColor Yellow
            }
            catch {
                Write-Host "Error generating TOTP code: $_" -ForegroundColor Red
                Write-Host "Generating a simpler Base32 secret and new TOTP code..." -ForegroundColor Yellow
                
                # Generate a simpler Base32 string to avoid any issues
                $base32Secret = "JBSWY3DPEB3W64TMMQQHGZLEORZHKIDUMVZXIYLE"
                try {
                    $totpCode = Get-TOTP -Secret $base32Secret -InputFormat Base32
                    Write-Host "Current TOTP code: $totpCode" -ForegroundColor Cyan
                }
                catch {
                    Write-Host "Still couldn't generate TOTP code. Using fallback code 123456" -ForegroundColor Red
                    $totpCode = "123456"
                }
            }
            
            $activateNow = Read-Host "Do you want to activate the token now? (Y/N)"
            if ($activateNow -eq "Y") {
                Write-Host "Activating token with generated TOTP code..." -ForegroundColor Yellow
                
                # Always attempt activation regardless of assignment status check
                try {
                    # Try with verification code first
                    $activateEndpoint = "https://graph.microsoft.com/beta/users/$($user.id)/authentication/hardwareOathMethods/$tokenId/activate"
                    $activateBody = @{
                        verificationCode = $totpCode
                    } | ConvertTo-Json
                    
                    Write-Host "Sending direct API activation request with code: $totpCode" -ForegroundColor Cyan
                    Invoke-MgGraphRequest -Method POST -Uri $activateEndpoint -Body $activateBody -ContentType "application/json"
                    Write-Host "Successfully activated token using direct API call!" -ForegroundColor Green
                    $activationSuccessful = $true
                }
                catch {
                    Write-Host "Direct activation failed: $_" -ForegroundColor Red
                    
                    Write-Host "Trying with Set-OATHTokenActive cmdlet..." -ForegroundColor Yellow
                    try {
                        $activateResult = Set-OATHTokenActive -TokenId $tokenId -UserId $user.id -VerificationCode $totpCode
                        
                        if ($activateResult) {
                            Write-Host "Successfully activated token with Set-OATHTokenActive!" -ForegroundColor Green
                            $activationSuccessful = $true
                        }
                        else {
                            throw "Set-OATHTokenActive returned false"
                        }
                    }
                    catch {
                        Write-Host "Cmdlet activation failed: $_" -ForegroundColor Red
                        $activationSuccessful = $false
                    }
                }
                
                # If all activation attempts failed, provide troubleshooting info
                if (-not $activationSuccessful) {
                    Write-Host "`nActivation troubleshooting information:" -ForegroundColor Magenta
                    Write-Host "- Token may still be in 'available' status due to propagation delay" -ForegroundColor Yellow
                    Write-Host "- TOTP code may have expired during propagation" -ForegroundColor Yellow
                    Write-Host "- Try manually activating later with:" -ForegroundColor Yellow
                    Write-Host " Set-OATHTokenActive -TokenId $tokenId -UserId $($user.id) -VerificationCode <new-code>" -ForegroundColor Cyan
                }
            }
            else {
                Write-Host "Skipping activation." -ForegroundColor Yellow
            }
            #endregion
        }
        else {
            Write-Host "Failed to assign token to user." -ForegroundColor Red
        }
        #endregion
    }
    else {
        Write-Host "User not found. Skipping assignment." -ForegroundColor Red
    }
}
else {
    Write-Host "No user specified. Skipping assignment." -ForegroundColor Yellow
}

#endregion

#region Step 7: Check token status
Write-Host "`nStep 7: Check token status" -ForegroundColor Green

# Give time for activation to propagate if we attempted it
if ($activateNow -eq "Y") {
    Write-Host "Waiting for status changes to propagate..." -ForegroundColor Yellow
    Start-Sleep -Seconds 5
}

$updatedToken = Get-OATHToken -TokenId $tokenId
Write-Host "Current token status: $($updatedToken.Status)" -ForegroundColor Yellow
Write-Host "Assigned to: $($updatedToken.AssignedToName)" -ForegroundColor Yellow

# Additional diagnostic information
if ($updatedToken.Status -eq "available" -and -not [string]::IsNullOrEmpty($updatedToken.AssignedToName)) {
    Write-Host "Note: Token shows as 'available' but has user assignment - this indicates a propagation delay" -ForegroundColor Yellow
}

#endregion

#region Step 8: Clean up
Write-Host "`nStep 8: Clean up" -ForegroundColor Green

$removeNow = Read-Host "Do you want to remove the demo token? (Y/N)"
if ($removeNow -eq "Y") {
    Write-Host "Removing token..." -ForegroundColor Yellow
    $removeResult = Remove-OATHToken -TokenId $tokenId -Force
    
    if ($removeResult) {
        Write-Host "Successfully removed token." -ForegroundColor Green
    }
    else {
        Write-Host "Failed to remove token." -ForegroundColor Red
    }
}
else {
    Write-Host "Token will remain in the system with ID: $tokenId" -ForegroundColor Yellow
}

#endregion

Write-Host "`nExample workflow complete!" -ForegroundColor Cyan