Public/Connect/Connect-Cloud.ps1

function Connect-Cloud {
    <#
    .SYNOPSIS
    Connects to Office 365 services and/or Azure.
 
    .DESCRIPTION
    Connects to Office 365 services and/or Azure.
 
    Connects to some or all of the Office 365/Azure services based on switches provided at runtime.
 
    Office 365 tenant name, for example, either contoso or contoso.onmicrosoft.com must be provided with -Tenant parameter.
    The -Tenant parameter is mandatory.
 
    There is a switch to use Multi-Factor Authentication.
    For Exchange Online MFA, you are required to download and use the Exchange Online Remote PowerShell Module.
    To download the Exchange Online Remote PowerShell Module for multi-factor authentication ONCE, in the EAC (https://outlook.office365.com/ecp/), go to Hybrid \> Setup and click the appropriate Configure button.
    When using Multi-Factor Authentication the saving of credentials is not available currently - thus each service will prompt independently for credentials.
 
    Locally saves and encrypts to a file the username and password.
    The encrypted file...can only be used on the computer and within the user's profile from which it was created, is the same .txt file for all the Office 365 services and is a separate .json file for Azure.
    If a username or password becomes corrupt or is entered incorrectly, it can be deleted using -DeleteCreds.
    For example, Connect-Cloud Contoso -DeleteCreds
 
    If Azure switch is used for first time :
 
    1. User will login as normal when prompted by Azure
    2. User will be prompted to select which Azure Subscription
    3. Select the subscription and click "OK"
 
    If Azure switch is used after first time:
 
    1. User will be prompted to pick username used previously
    2. If a new username is to be used (e.g.username not found when prompted), click Cancel to be prompted to login.
    3. User will be prompted to select which Azure Subscription
    4. Select the subscription and click "OK"
 
    Directories used/created during the execution of this script
 
    1. $env:USERPROFILE\ps\
    2. $env:USERPROFILE\ps\creds\
 
    All saved credentials are saved in `$env:USERPROFILE\ps\creds\`
    Transcript is started and kept in `$env:USERPROFILE\ps\<tenantspecified>`
 
    .PARAMETER Tenant
    Mandatory parameter that specifies which Office 365 and/or Azure Tenant you want to connect to.
    If connecting to SharePoint Online, this parameter is used to used to create the URL needed to connect to SharePoint Online
 
    .PARAMETER ExchangeOnline
    Connects to Exchange Online
 
    .PARAMETER MSOnline
    Connects to Microsoft Online Service (Azure AD Version 1)
 
    .PARAMETER All365
    Connects to all Office 365 Services
 
    .PARAMETER Azure
    Connects to Azure
 
    .PARAMETER Skype
    Connects to Skype Online
 
    .PARAMETER SharePoint
    Connects to SharePoint Online
 
    .PARAMETER Compliance
    Connects to Security & Compliance Center
 
    .PARAMETER Intune
    Connects to Intue
 
    .PARAMETER AzureADver2
    Connects to Azure AD Version 2
 
    .PARAMETER MFA
    Parameter description
 
    .PARAMETER DeleteCreds
    Deletes your saved credentials for tenant specified
 
    .PARAMETER EXOPrefix
    Adds CLOUD prefix to all Exchange Online commands. For example Get-CLOUDMailbox.
 
    .EXAMPLE
    Connect-Cloud -Tenant Contoso -ExchangeOnline -MSOnline
 
    Connects to MS Online Service (MSOL) and Exchange Online
 
    The tenant must be specified, for example either contoso or contoso.onmicrosoft.com
 
    .EXAMPLE
    Connect-Cloud -Tenant Contoso -All365 -Azure
 
    Connects to Azure, MS Online Service (MSOL), Exchange Online, Skype, SharePoint & Compliance
 
    .EXAMPLE
    Connect-Cloud Contoso -Skype -Azure -ExchangeOnline -MSOnline
 
    Connects to Azure, MS Online Service (MSOL), Exchange Online & Skype
 
    This is to illustrate that any number of individual services can be used to connect.
    Also that the -Tenant parameter is positional
 
    #>


    [CmdletBinding(SupportsShouldProcess = $true)]
    Param
    (
        [Parameter(Position = 0, Mandatory)]
        [string]
        $Tenant,

        [Parameter()]
        [switch]
        $ExchangeOnline,

        [Parameter()]
        [switch]
        $EXO2,

        [Parameter()]
        [switch]
        $MSOnline,

        [Parameter()]
        [switch]
        $All365,

        [Parameter()]
        [switch]
        $Skype,

        [Parameter()]
        [switch]
        $Teams,

        [Parameter()]
        [switch]
        $SharePoint,

        [Parameter()]
        [switch]
        $Compliance,

        [Parameter()]
        [switch]
        $Intune,

        [Parameter()]
        [switch]
        $Az,

        [Parameter()]
        [Alias('AzureADver2')]
        [switch]
        $AzureAD,

        [Parameter()]
        [switch]
        $MFA,

        [Parameter()]
        [switch]
        $GCCHIGH,

        [Parameter()]
        [switch]
        $DeleteCreds,

        [Parameter()]
        [switch]
        $EXOPrefix
    )
    if ($Tenant -like '*.onmicrosoft.com') { $Tenant = $Tenant.Split('.')[0] }

    $host.ui.RawUI.WindowTitle = "Tenant: $($Tenant.ToUpper())"
    $RootPath = $env:USERPROFILE + "\ps\"
    $KeyPath = $Rootpath + "creds\"
    [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12

    if ($DeleteCreds) {
        try {
            Remove-Item ($KeyPath + "$($Tenant).cred") -ErrorAction Stop
        }
        catch {
            Write-Warning "While the attempt to delete credentials failed, this may be normal. Please try to connect again."
        }
        try {
            Remove-Item ($KeyPath + "$($Tenant).ucred") -ErrorAction Stop
        }
        catch {
            break
        }
    }
    if (-not (Test-Path ($RootPath + $Tenant + "\logs\"))) {
        New-Item -ItemType Directory -Force -Path ($RootPath + $Tenant + "\logs\")
    }
    try {
        Start-Transcript -ErrorAction Stop -path ($RootPath + $Tenant + "\logs\" + "transcript-" + ($(Get-Date -Format _yyyy-MM-dd_HH-mm-ss)) + ".txt")
    }
    catch {
        Stop-Transcript -ErrorAction SilentlyContinue
        Start-Transcript -path ($RootPath + $Tenant + "\logs\" + "transcript-" + ($(Get-Date -Format _yyyy-MM-dd_HH-mm-ss)) + ".txt")
    }
    # Create KeyPath Directory
    if (-not (Test-Path $KeyPath)) {
        try {
            $null = New-Item -ItemType Directory -Path $KeyPath -ErrorAction STOP
        }
        catch {
            throw $_.Exception.Message
        }
    }
    if (($ExchangeOnline -or $MSOnline -or $All365 -or $Skype -or
            $SharePoint -or $Compliance -or $AzureADver2 -or $AzureAD -or $EXO2 -or $Teams) -and (-not $MFA)) {
        if (Test-Path ($KeyPath + "$($Tenant).cred")) {
            $PwdSecureString = Get-Content ($KeyPath + "$($Tenant).cred") | ConvertTo-SecureString
            $UsernameString = Get-Content ($KeyPath + "$($Tenant).ucred")
            $Credential = [System.Management.Automation.PSCredential]::new($UsernameString, $PwdSecureString)
        }
        else {
            $Credential = Get-Credential -Message "ENTER USERNAME & PASSWORD FOR OFFICE 365/AZURE AD"
            if ($Credential.Password) {
                $Credential.Password | ConvertFrom-SecureString | Out-File ($KeyPath + "$($Tenant).cred") -Force
            }
            else {
                Connect-Cloud $Tenant -DeleteCreds
                Write-Warning " No Password Present "
                Write-Warning " Please try your last command again... "
                Write-Warning "...you will be prompted to enter your Office 365 credentials again. "
                Break
            }
            $Credential.UserName | Out-File ($KeyPath + "$($Tenant).ucred")
        }
    }
    if ($MSOnline -or $All365) {
        if (-not ($null = Get-Module -Name MSOnline -ListAvailable -ErrorAction Stop)) {
            Install-Module -Name MSOnline -Scope CurrentUser -Force -AllowClobber
        }
        try {
            $null = Get-MsolAccountSku -ErrorAction Stop
        }
        catch {
            try {
                $MSOLSplat = @{
                    Credential  = $Credential
                    ErrorAction = 'Stop'
                    Verbose     = $false
                }
                if ($GCCHIGH) {
                    $MSOLSplat['AzureEnvironment'] = 'USGovernment'
                }
                Connect-MsolService @MSOLSplat
                Write-Host "You have successfully connected to MSONLINE" -foregroundcolor "magenta" -backgroundcolor "white"
            }
            catch {
                if ($_.exception.Message -match "password") {
                    Connect-Cloud $Tenant -DeleteCreds
                    Write-Warning " Bad Username or Password. "
                    Write-Warning " Please try your last command again... "
                    Write-Warning "...you will be prompted to enter your Office 365 credentials again. "
                    Break

                }
                else {
                    Connect-Cloud $Tenant -DeleteCreds
                    Write-Warning " There was an error connecting you to MSOnline "
                    Write-Warning " Please try your last command again... "
                    Write-Warning "...you will be prompted to enter your Office 365 credentials again. "
                    Break
                }
            }
        }
    }

    # Skype Online
    if ($Skype -or $All365) {
        if (-not $MFA) {
            try {
                $sfboSession = New-CsOnlineSession -ErrorAction Stop -Credential $Credential -OverrideAdminDomain "$Tenant.onmicrosoft.com"
                Write-Host "You have successfully connected to Skype" -foregroundcolor "magenta" -backgroundcolor "white"
            }
            catch [System.Management.Automation.CommandNotFoundException] {
                Write-Warning "Skype for Business Online Module not found. Please download and install it from here:"
                Write-Warning "https://www.microsoft.com/en-us/download/details.aspx?id=39366"
            }
            catch {
                $_
            }
            Import-Module (Import-PSSession $sfboSession -AllowClobber) -Global | Out-Null
        }
        else {
            try {
                $sfboSession = New-CsOnlineSession -UserName $Credential.UserName -OverrideAdminDomain "$Tenant.onmicrosoft.com" -ErrorAction Stop
                Write-Host "You have successfully connected to Skype" -foregroundcolor "magenta" -backgroundcolor "white"
            }
            catch [System.Management.Automation.CommandNotFoundException] {
                Write-Warning "Skype for Business Online Module not found. Please download and install it from here:"
                Write-Warning "https://www.microsoft.com/en-us/download/details.aspx?id=39366"
            }
            catch {
                $_
            }
            Import-Module (Import-PSSession $sfboSession -AllowClobber) -Global | Out-Null
        }
    }
    # SharePoint Online
    if ($SharePoint -or $All365) {
        $SharePointAdminSite = 'https://' + $Tenant + '-admin.sharepoint.com'
        try {
            Import-Module Microsoft.Online.SharePoint.PowerShell -DisableNameChecking -ErrorAction Stop
        }
        catch {
            Install-Module -Name Microsoft.Online.SharePoint.PowerShell -force -AllowClobber
        }
        if (-not $MFA) {
            try {
                Connect-SPOService -Url $SharePointAdminSite -credential $Credential -ErrorAction stop
                Write-Host "You have successfully connected to SharePoint" -foregroundcolor "magenta" -backgroundcolor "white"
            }
            catch {
                $_
                Write-Warning "Unable to Connect to SharePoint Online."
            }
        }
        else {
            try {
                Connect-SPOService -Url $SharePointAdminSite -ErrorAction stop
                Write-Host "You have successfully connected to SharePoint" -foregroundcolor "magenta" -backgroundcolor "white"
            }
            catch {
                Write-Warning "Unable to Connect to SharePoint Online."
                Write-Warning "verify the tenant name: $Tenant is correct"
                Write-Warning "This was the URL attempted: https:`/`/$Tenant`-admin.sharepoint.com"
            }
        }
    }
    # Azure AD
    If ($AzureAD -or $AzureADver2 -or $All365) {
        if (-not $MFA) {
            If (-not ($null = Get-Module -Name 'AzureAD', 'AzureADPreview' -ListAvailable)) {
                Install-Module -Name AzureAD -Scope CurrentUser -Force -AllowClobber
            }
            try {
                $null = Get-AzureADTenantDetail -ErrorAction Stop
            }
            catch {
                try {
                    $AzureADSplat = @{
                        Credential  = $Credential
                        ErrorAction = 'Stop'
                    }
                    if ($GCCHIGH) {
                        $AzureADSplat['AzureEnvironmentName'] = 'AzureUSGovernment'
                    }
                    Connect-AzureAD @AzureADSplat
                    Write-Host "You have successfully connected to AzureADver2" -foregroundcolor "magenta" -backgroundcolor "white"
                }
                catch {
                    if ($error[0]) {
                        Connect-Cloud $Tenant -DeleteCreds
                        Write-Warning "There was an issue with your credentials"
                        Write-Warning "Please run the same command you just ran and try again"
                        Break
                    }
                    else {
                        $_
                        Write-Warning "There was an error Connecting to Azure Ad - Ensure the module is installed"
                        Write-Warning "Download PowerShell 5 or PowerShellGet"
                        Write-Warning "https://msdn.microsoft.com/en-us/powershell/wmf/5.1/install-configure"
                        Break
                    }
                }
            }
        }
        else {
            If (-not ($null = Get-Module -Name AzureAD -ListAvailable)) {
                Install-Module -Name AzureAD -Scope CurrentUser -Force -AllowClobber
            }
            try {
                $null = Get-AzureADTenantDetail -ErrorAction Stop
            }
            catch {
                try {
                    $AzureADSplat = @{
                        Credential  = $Credential
                        ErrorAction = 'Stop'
                    }
                    if ($GCCHIGH) {
                        $AzureADSplat['AzureEnvironmentName'] = 'AzureUSGovernment'
                    }
                    Connect-AzureAD @AzureADSplat
                    Write-Host "You have successfully connected to AzureADver2" -foregroundcolor "magenta" -backgroundcolor "white"
                }
                catch {
                    if ($error[0]) {
                        Connect-Cloud $Tenant -DeleteCreds
                        Write-Warning "There was as issue with your credentials"
                        Write-Warning "Please run the same command you just ran and try again"
                        Break
                    }
                    else {
                        $error[0]
                        Write-Warning "There was an error Connecting to Azure Ad - Ensure the module is installed"
                        Write-Warning "Download PowerShell 5 or PowerShellGet"
                        Write-Warning "https://msdn.microsoft.com/en-us/powershell/wmf/5.1/install-configure"
                        Break
                    }
                }
            }
        }
    }
    if ($Teams) {
        Connect-CloudModuleImport -Teams
        $TeamsSplat = @{
            Credential = $Credential
        }
        if ($GCCHIGH) {
            $TeamsSplat['TeamsEnvironmentName'] = 'TeamsGCCH'
        }
        Connect-MicrosoftTeams @TeamsSplat
    }
    if ($EXO2 -or $ExchangeOnline -or $Compliance) {
        $Script:RestartConsole = $null
        Connect-CloudModuleImport -EXO2
        if ($RestartConsole) { return }
        $Splat = @{ }
        if ($GCCHIGH) { $Splat['ExchangeEnvironmentName'] = 'O365USGovGCCHigh' }
        if (-not $MFA) { $Splat['Credential'] = $Credential }
        else { $Splat['UserPrincipalName'] = $Credential.UserName }
        if ($EXOPrefix) { $Splat['Prefix'] = 'EXO' }
    }
    if ($Exo2 -or $ExchangeOnline) {
        Connect-ExchangeOnline @Splat -ShowBanner:$false
        Write-Host "You have successfully connected to Exchange Online" -foregroundcolor "magenta" -backgroundcolor "white"
    }
    if ($Az) {
        Connect-CloudModuleImport -Az
        if (Test-Path ($KeyPath + "$($Tenant).cred")) {
            $PwdSecureString = Get-Content ($KeyPath + "$($Tenant).cred") | ConvertTo-SecureString
            $UsernameString = Get-Content ($KeyPath + "$($Tenant).ucred")
            $Credential = [System.Management.Automation.PSCredential]::new($UsernameString, $PwdSecureString)
        }
        else {
            $Credential = Get-Credential -Message "ENTER USERNAME & PASSWORD FOR AZ"
            $Credential.Password | ConvertFrom-SecureString | Out-File ($KeyPath + "$($Tenant).cred") -Force
            $Credential.UserName | Out-File ($KeyPath + "$($Tenant).ucred")
        }
        $AZHash = @{
            Credential = $Credential
        }
        if ($GCCHIGH) {
            $AZHash['Environment'] = 'AzureUSGovernment'
        }
        Connect-AzAccount @AZHash
        Write-Host "You have successfully connected to Az Cmdlets" -foregroundcolor "magenta" -backgroundcolor "white"
    }
    if ($Compliance) {
        Get-PSSession | Remove-PSSession
        Connect-ExchangeOnline -ConnectionUri 'https://ps.compliance.protection.outlook.com/powershell-liveid' @Splat
        Write-Host "You have successfully connected to Security & Compliance Center" -foregroundcolor "magenta" -backgroundcolor "white"
    }
    if ($Intune) {
        Connect-CloudModuleImport -Intune
        if (Test-Path ($KeyPath + "$($Tenant).cred")) {
            $PwdSecureString = Get-Content ($KeyPath + "$($Tenant).cred") | ConvertTo-SecureString
            $UsernameString = Get-Content ($KeyPath + "$($Tenant).ucred")
            $Credential = [System.Management.Automation.PSCredential]::new($UsernameString, $PwdSecureString)
        }
        else {
            $Credential = Get-Credential -Message "ENTER USERNAME & PASSWORD FOR AZ"
            $Credential.Password | ConvertFrom-SecureString | Out-File ($KeyPath + "$($Tenant).cred") -Force
            $Credential.UserName | Out-File ($KeyPath + "$($Tenant).ucred")
        }
        Connect-MSGraph -Credential $Credential
        Write-Host "You have successfully connected to Security & Compliance Center" -foregroundcolor "magenta" -backgroundcolor "white"
    }
}