Public/Add/Add-OATHToken.ps1

<#
.SYNOPSIS
    Adds OATH hardware tokens to Microsoft Entra ID
.DESCRIPTION
    Adds one or more OATH hardware tokens to Microsoft Entra ID via the Microsoft Graph API.
    Supports different secret formats (Base32, Hex, and Text) and automatically converts
    them to the required Base32 format.
.PARAMETER Tokens
    An array of token objects to add. Each token must have at least serialNumber and secretKey properties.
.PARAMETER Token
    A single token object to add, with serialNumber and secretKey properties.
.PARAMETER SerialNumber
    The serial number of the token to add when using the simplified parameter set.
.PARAMETER SecretKey
    The secret key of the token to add when using the simplified parameter set.
.PARAMETER SecretFormat
    The format of the provided SecretKey (Base32, Hex, or Text). Defaults to Base32.
.PARAMETER Manufacturer
    The manufacturer of the token to add. Defaults to "Yubico".
.PARAMETER Model
    The model of the token to add. Defaults to "YubiKey".
.PARAMETER DisplayName
    A friendly name for the token. If not provided, the serial number will be used.
.PARAMETER ApiVersion
    The Microsoft Graph API version to use. Defaults to 'beta'.
.EXAMPLE
    $token = @{
        serialNumber = "12345678"
        secretKey = "ABCDEFGHIJKLMNOPQRSTUVWXYZ234567"
        manufacturer = "Yubico"
        model = "YubiKey 5"
    }
    Add-OATHToken -Tokens @($token)
    
    Adds a single token with the specified properties.
.EXAMPLE
    Add-OATHToken -SerialNumber "12345678" -SecretKey "3a085cfcd4618c61dc235c300d7a70c4" -SecretFormat Hex
    
    Adds a token with the specified serial number and secret key in hexadecimal format.
.EXAMPLE
    $tokens = Import-Csv -Path "tokens.csv" | ForEach-Object {
        @{
            serialNumber = $_.SerialNumber
            secretKey = $_.SecretKey
            manufacturer = $_.Manufacturer
            model = $_.Model
        }
    }
    Add-OATHToken -Tokens $tokens
    
    Adds multiple tokens from a CSV file.
.NOTES
    Requires Microsoft.Graph.Authentication module and appropriate permissions:
    - Policy.ReadWrite.AuthenticationMethod
#>


function Add-OATHToken {
    [CmdletBinding(DefaultParameterSetName = 'Tokens')]
    [OutputType([PSCustomObject[]])]
    param(
        [Parameter(ParameterSetName = 'Tokens', Mandatory = $true, Position = 0, ValueFromPipeline = $true)]
        [object[]]$Tokens,
        
        [Parameter(ParameterSetName = 'Token', Mandatory = $true)]
        [object]$Token,
        
        [Parameter(ParameterSetName = 'Simple', Mandatory = $true)]
        [string]$SerialNumber,
        
        [Parameter(ParameterSetName = 'Simple', Mandatory = $true)]
        [string]$SecretKey,
        
        [Parameter(ParameterSetName = 'Simple')]
        [ValidateSet('Base32', 'Hex', 'Text')]
        [string]$SecretFormat = 'Base32',
        
        [Parameter(ParameterSetName = 'Simple')]
        [string]$Manufacturer = 'Yubico',
        
        [Parameter(ParameterSetName = 'Simple')]
        [string]$Model = 'YubiKey',
        
        [Parameter(ParameterSetName = 'Simple')]
        [string]$DisplayName,
        
        [Parameter(ParameterSetName = 'Simple')]
        [string]$UserId,
        
        [Parameter()]
        [string]$ApiVersion = 'beta'
    )
    
    begin {
        # Initialize the skip processing flag at the start of each function call
        $script:skipProcessing = $false
        
        # Ensure we're connected to Graph
        if (-not (Test-MgConnection)) {
            $script:skipProcessing = $true
            # Return here only exits the begin block, not the function
            return
        }
        
        $baseEndpoint = "https://graph.microsoft.com/$ApiVersion/directory/authenticationMethodDevices/hardwareOathDevices"
        
        # Create a collection to store tokens to process
        $tokensToProcess = [System.Collections.Generic.List[object]]::new()
        
        # Get existing tokens to check for duplicates
        try {
            Write-Verbose "Retrieving existing tokens..."
            $existingTokens = (Invoke-MgGraphWithErrorHandling -Uri $baseEndpoint).value
            Write-Verbose "Found $($existingTokens.Count) existing tokens"
        }
        catch {
            Write-Warning "Failed to retrieve existing tokens: $_"
            $existingTokens = @()
        }
        
        # Counters for reporting
        $processedCount = 0
        $successCount = 0
        $skippedCount = 0
        $failedCount = 0
        $results = [System.Collections.Generic.List[object]]::new()
        
        # Resolve UserId if provided in Simple parameter set
        $resolvedUserId = $null
        if ($PSCmdlet.ParameterSetName -eq 'Simple' -and -not [string]::IsNullOrWhiteSpace($UserId)) {
            try {
                $user = Get-MgUserByIdentifier -Identifier $UserId
                if ($user) {
                    $resolvedUserId = $user.id
                    Write-Verbose "Resolved user ID $UserId to: $resolvedUserId"
                } else {
                    Write-Warning "Could not resolve user: $UserId - Token will be created but not assigned"
                }
            } catch {
                Write-Warning "Error resolving user $UserId`: $_"
            }
        }
    }
    
    process {
        # Skip all processing if the connection check failed
        if ($script:skipProcessing) {
            return $null
        }

        # Handle different parameter sets
        if ($PSCmdlet.ParameterSetName -eq 'Token') {
            $tokensToProcess.Add($Token)
        }
        elseif ($PSCmdlet.ParameterSetName -eq 'Simple') {
            # Create a token object from the simple parameters
            $simpleToken = @{
                serialNumber = $SerialNumber
                secretKey = $SecretKey
                manufacturer = $Manufacturer
                model = $Model
            }
            
            if ($DisplayName) {
                $simpleToken.displayName = $DisplayName
            }
            
            if ($SecretFormat -ne 'Base32') {
                $simpleToken.secretFormat = $SecretFormat.ToLower()
            }
            
            # Add user assignment if a user was resolved
            if ($resolvedUserId) {
                $simpleToken['assignTo'] = @{ id = $resolvedUserId }
            }
            
            $tokensToProcess.Add($simpleToken)
        }
        else {
            # Add each token from the pipeline
            foreach ($currentToken in $Tokens) {
                $tokensToProcess.Add($currentToken)
            }
        }
    }
    
    end {
        Write-Verbose "Processing $($tokensToProcess.Count) tokens..."
        
        foreach ($currentToken in $tokensToProcess) {
            $processedCount++
            
            try {
                # Validate the token has the required properties
                if (-not $currentToken.serialNumber) {
                    Write-Warning "Token #$processedCount is missing the required 'serialNumber' property"
                    $failedCount++
                    continue
                }
                
                if (-not $currentToken.secretKey) {
                    Write-Warning "Token with serial number $($currentToken.serialNumber) is missing the required 'secretKey' property"
                    $failedCount++
                    continue
                }
                
                # Check for duplicate serial number
                $existingToken = $existingTokens | Where-Object { $_.serialNumber -eq $currentToken.serialNumber }
                if ($existingToken) {
                    Write-Warning "Token with serial number $($currentToken.serialNumber) already exists (ID: $($existingToken.id))"
                    $skippedCount++
                    continue
                }
                
                # Convert secret key to Base32 if needed
                if ($currentToken.secretKey -and (-not [regex]::IsMatch($currentToken.secretKey, '^[A-Z2-7]+=*$'))) {
                    $originalKey = $currentToken.secretKey
                    $format = if ($currentToken.secretFormat -and $currentToken.secretFormat -in @('hex', 'text')) {
                        $currentToken.secretFormat
                    } else {
                        'Hex'  # Default assumption for non-Base32 keys is hex
                    }
                    
                    try {
                        switch ($format.ToLower()) {
                            'hex' {
                                # First check if it's actually a valid hex string
                                if (-not [regex]::IsMatch($originalKey, '^[0-9a-fA-F]+$')) {
                                    throw "Invalid hexadecimal string: $originalKey"
                                }
                                $currentToken.secretKey = ConvertTo-Base32 -InputString $originalKey -InputFormat 'Hex'
                            }
                            'text' {
                                $currentToken.secretKey = ConvertTo-Base32 -InputString $originalKey -InputFormat 'Text'
                            }
                        }
                    }
                    catch {
                        Write-Error "Error converting secret key for token $($currentToken.serialNumber): $_"
                        $failedCount++
                        continue
                    }
                    
                    if (-not $currentToken.secretKey) {
                        Write-Warning "Failed to convert secret key for token with serial number $($currentToken.serialNumber)"
                        $failedCount++
                        continue
                    }
                    
                    Write-Verbose "Converted secret key from format '$format' to Base32 for token $($currentToken.serialNumber)"
                }
                
                # Set default values for optional properties if not provided
                if (-not $currentToken.manufacturer) {
                    $currentToken.manufacturer = 'Yubico'
                }
                
                if (-not $currentToken.model) {
                    $currentToken.model = 'YubiKey'
                }
                
                if (-not $currentToken.timeIntervalInSeconds) {
                    $currentToken.timeIntervalInSeconds = 30
                }
                
                if (-not $currentToken.hashFunction) {
                    $currentToken.hashFunction = 'hmacsha1'
                }
                
                if (-not $currentToken.displayName) {
                    $currentToken.displayName = "YubiKey ($($currentToken.serialNumber))"
                }
                
                # Process user assignment if present
                if ($currentToken.ContainsKey('assignTo') -and $currentToken.assignTo -and $currentToken.assignTo.id) {
                    # Verify the user ID is valid
                    $userIdToAssign = $currentToken.assignTo.id
                    if ($userIdToAssign -ne "null" -and -not [string]::IsNullOrWhiteSpace($userIdToAssign)) {
                        Write-Verbose "Token will be assigned to user ID: $userIdToAssign"
                    } else {
                        # Remove invalid assignTo property
                        $currentToken.Remove('assignTo')
                    }
                }
                
                # Remove any non-Graph API properties
                $propertiesToRemove = @('secretFormat')
                foreach ($prop in $propertiesToRemove) {
                    if ($currentToken.ContainsKey($prop)) {
                        $currentToken.Remove($prop)
                    }
                }
                
                # Add the token
                Write-Verbose "Adding token with serial number: $($currentToken.serialNumber)"
                $body = $currentToken | ConvertTo-Json -Depth 10
                Write-Verbose "Request body: $body"
                
                try {
                    $response = Invoke-MgGraphWithErrorHandling -Method POST -Uri $baseEndpoint -Body $body -ContentType "application/json"
                    
                    Write-Host "Successfully added token with serial number: $($currentToken.serialNumber)" -ForegroundColor Green
                    
                    # Display user assignment information if applicable
                    if ($currentToken.ContainsKey('assignTo') -and $currentToken.assignTo -and $currentToken.assignTo.id) {
                        Write-Host " Token was assigned to user: $($currentToken.assignTo.id)" -ForegroundColor Green
                    }
                    
                    $successCount++
                    $results.Add($response)
                }
                catch {
                    Write-Warning "Failed to add token with serial number $($currentToken.serialNumber): $_"
                    $failedCount++
                }
            }
            catch {
                Write-Warning "Unexpected error processing token #$processedCount : $_"
                $failedCount++
            }
        }
        
        # Output summary
        Write-Host "`nToken Addition Summary:" -ForegroundColor Cyan
        Write-Host " Total Processed: $processedCount" -ForegroundColor White
        Write-Host " Successfully Added: $successCount" -ForegroundColor Green
        Write-Host " Skipped (Already Exists): $skippedCount" -ForegroundColor Yellow
        Write-Host " Failed: $failedCount" -ForegroundColor Red
        
        return $results
    }
}

# Add alias for backward compatibility - only if it doesn't already exist
if (-not (Get-Alias -Name 'Add-HardwareOathToken' -ErrorAction SilentlyContinue)) {
    New-Alias -Name 'Add-HardwareOathToken' -Value 'Add-OATHToken'
}