public/Remove-VPASDPAStrongAccount.ps1
<#
.Synopsis DELETE DPA STRONG ACCOUNT CREATED BY: Vadim Melamed, EMAIL: vpasmodule@gmail.com .DESCRIPTION USE THIS FUNCTION TO DELETE A STRONG ACCOUNT FROM DPA .LINK https://vpasmodule.com/commands/Remove-VPASDPAStrongAccount .PARAMETER token HashTable of data containing various pieces of login information (PVWA, LoginToken, HeaderType, etc). If -token is not passed, function will use last known hashtable generated by New-VPASToken .PARAMETER StrongAccountID UniqueID of the target strong account in DPA .PARAMETER StrongAccountName Unique name of the target strong account in DPA .PARAMETER WhatIf Run code simulation to see what is affected by running the command as well as any possible implications This is a code simulation flag, meaning the command will NOT actually run .PARAMETER HideWhatIfOutput Suppress any code simulation output from the console .PARAMETER InputParameters HashTable of values containing the parameters required to make the API call .EXAMPLE $DeleteStrongAccount = Remove-VPASDPAStrongAccount -StrongAccountID {STRONG ACCOUNT ID VALUE} .EXAMPLE $DeleteStrongAccount = Remove-VPASDPAStrongAccount -StrongAccountName {STRONG ACCOUNT NAME VALUE} -WhatIf .EXAMPLE $InputParameters = @{ StrongAccountID = "hkjgjk678-1234-5678-kjhg-hjakshd789987" WhatIf = $true|$false HideOutput = $true|$false } $DeleteStrongAccount = Remove-VPASDPAStrongAccount -InputParameters $InputParameters .EXAMPLE $InputParameters = @{ StrongAccountName = "StrongAccount1" WhatIf = $true|$false HideOutput = $true|$false } $DeleteStrongAccount = Remove-VPASDPAStrongAccount -InputParameters $InputParameters .OUTPUTS $true if successful --- $false if failed #> function Remove-VPASDPAStrongAccount{ [OutputType([bool],'System.Object')] [CmdletBinding(DefaultParameterSetName='Set1')] Param( [Parameter(Mandatory=$true,ParameterSetName='Set1',ValueFromPipelineByPropertyName=$true,HelpMessage="Unique strong account ID of the target strong account (for example: hkjgjk678-1234-5678-kjhg-hjakshd789987)")] [String]$StrongAccountID, [Parameter(Mandatory=$true,ParameterSetName='Set2',ValueFromPipelineByPropertyName=$true,HelpMessage="Username of the target strong account (for example: StrongAccount1)")] [String]$StrongAccountName, [Parameter(Mandatory=$false,ParameterSetName='Set1',ValueFromPipelineByPropertyName=$true)] [Parameter(Mandatory=$false,ParameterSetName='Set2',ValueFromPipelineByPropertyName=$true)] [Switch]$WhatIf, [Parameter(Mandatory=$false,ParameterSetName='Set1',ValueFromPipelineByPropertyName=$true)] [Parameter(Mandatory=$false,ParameterSetName='Set2',ValueFromPipelineByPropertyName=$true)] [Switch]$HideWhatIfOutput, [Parameter(Mandatory=$true,ParameterSetName='InputParameters',ValueFromPipelineByPropertyName=$true,HelpMessage="Hashtable of parameters required to make API call, refer to get-help -examples for valid inputs")] [hashtable]$InputParameters, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true)] [hashtable]$token ) Begin{ $tokenval,$sessionval,$PVWA,$Header,$ISPSS,$IdentityURL,$EnableTextRecorder,$AuditTimeStamp,$NoSSL,$VaultVersion,$HideWarnings,$AuthenticatedAs,$SubDomain,$EnableTroubleshooting = Get-VPASSession -token $token $CommandName = $MyInvocation.MyCommand.Name $log = Write-VPASTextRecorder -inputval $CommandName -token $token -LogType COMMAND } Process{ try{ if($PSCmdlet.ParameterSetName -eq "InputParameters"){ $KeyHash = @{ set1 = @{ AcceptableKeys = @("StrongAccountID","WhatIf","HideWhatIfOutput") MandatoryKeys = @("StrongAccountID") } set2 = @{ AcceptableKeys = @("StrongAccountName","WhatIf","HideWhatIfOutput") MandatoryKeys = @("StrongAccountName") } } $CheckSet = Test-VPASHashtableKeysHelper -InputHash $InputParameters -KeyHash $KeyHash if(!$CheckSet){ $log = Write-VPASTextRecorder -inputval "FAILED TO FIND TARGET PARAMETER SET" -token $token -LogType MISC Write-Verbose "FAILED TO FIND TARGET PARAMETER SET" Write-VPASOutput -str "FAILED TO FIND TARGET PARAMETER SET...VIEW EXAMPLES BELOW:" -type E $examples = Write-VPASExampleHelper -CommandName $CommandName return $false } else{ foreach($key in $InputParameters.Keys){ Set-Variable -Name $key -Value $InputParameters.$key } } } }catch{ $log = Write-VPASTextRecorder -inputval $_ -token $token -LogType ERROR $log = Write-VPASTextRecorder -inputval "REST API COMMAND RETURNED: FALSE" -token $token -LogType MISC Write-Verbose "FAILED TO REMOVE STRONG ACCOUNT" Write-VPASOutput -str $_ -type E return $false } try{ if($SubDomain -eq "N/A"){ Write-VPASOutput -str "SelfHosted + PriviledgeCloud Standard solutions do not support this API Call, returning false" -type E $log = Write-VPASTextRecorder -inputval "SelfHosted + PrivilegeCloud Standard solutions do not support this API Call, returning false" -token $token -LogType MISC $log = Write-VPASTextRecorder -inputval $false -token $token -LogType RETURN return $false } if([String]::IsNullOrEmpty($StrongAccountID)){ Write-Verbose "NO STRONG ACCOUNT ID PROVIDED...INVOKING HELPER FUNCTION TO RETRIEVE UNIQUE STRONG ACCOUNT ID BASED ON SPECIFIED PARAMETERS" $StrongAccountID = Get-VPASDPAStrongAccountIDHelper -token $token -SearchQuery $StrongAccountName Write-Verbose "RETURNING STRONG ACCOUNT ID" } else{ Write-Verbose "STRONG ACCOUNT ID SUPPLIED, SKIPPING HELPER FUNCTION" } if($StrongAccountID -eq -1){ $log = Write-VPASTextRecorder -inputval "COULD NOT FIND TARGET STRONG ACCOUNT ID: $StrongAccountID" -token $token -LogType MISC $log = Write-VPASTextRecorder -inputval "REST API COMMAND RETURNED: FALSE" -token $token -LogType MISC Write-Verbose "COULD NOT FIND TARGET STRONG ACCOUNT ID: $StrongAccountID" Write-VPASOutput -str "COULD NOT FIND TARGET STRONG ACCOUNT ID: $StrongAccountID" -type E return $false } else{ write-verbose "MAKING API CALL TO CYBERARK" $uri = "https://$SubDomain.dpa.cyberark.cloud/api/secrets/public/v1/$StrongAccountID" Write-Verbose "CONSTRUCTING URI: $uri" $log = Write-VPASTextRecorder -inputval $uri -token $token -LogType URI $log = Write-VPASTextRecorder -inputval "DELETE" -token $token -LogType METHOD if($WhatIf){ $log = Write-VPASTextRecorder -token $token -LogType WHATIF1 $WhatIfHash = @{} Write-Verbose "INITIATING COMMAND SIMULATION" $WhatIfInfo = Get-VPASDPAStrongAccountDetails -StrongAccountID $StrongAccountID -token $token $WhatIfsecretid = $WhatIfInfo.secret_id $WhatIftenantid = $WhatIfInfo.tenant_id $WhatIfsecrettype = $WhatIfInfo.secret_type $WhatIfisactive = $WhatIfInfo.is_active $WhatIfisrotatable = $WhatIfInfo.is_rotatable $WhatIfcreationtime = $WhatIfInfo.creation_time $WhatIflastmodified = $WhatIfInfo.last_modified $WhatIfsecretname = $WhatIfInfo.secret_name $WhatIfsecretdetailscertFileName = $WhatIfInfo.secret_details.certFileName $WhatIfsecretdetailsaccountdomain = $WhatIfInfo.secret_details.account_domain $WhatIfsecretsecretdata = $WhatIfInfo.secret.secret_data $WhatIfsecrettenantencrypted = $WhatIfInfo.secret.tenant_encrypted if(!$HideWhatIfOutput){ Write-VPASOutput -str "====== BEGIN COMMAND SIMULATION ======" -type S Write-VPASOutput -str "THE FOLLOWING STRONG ACCOUNT WOULD BE DELETED:" -type S Write-VPASOutput -str "SecretID : $WhatIfsecretid" -type S Write-VPASOutput -str "TenantID : $WhatIftenantid" -type S Write-VPASOutput -str "SecretType : $WhatIfsecrettype" -type S Write-VPASOutput -str "IsActive : $WhatIfisactive" -type S Write-VPASOutput -str "IsRotatable : $WhatIfisrotatable" -type S Write-VPASOutput -str "CreationTime : $WhatIfcreationtime" -type S Write-VPASOutput -str "LastModified : $WhatIflastmodified" -type S Write-VPASOutput -str "SecretName : $WhatIfsecretname" -type S Write-VPASOutput -str "CertFileName : $WhatIfsecretdetailscertFileName" -type S Write-VPASOutput -str "AccountDomain : $WhatIfsecretdetailsaccountdomain" -type S Write-VPASOutput -str "Data : $WhatIfsecretsecretdata" -type S Write-VPASOutput -str "TenantEncrypted : $WhatIfsecrettenantencrypted" -type S Write-VPASOutput -str "---" -type S Write-VPASOutput -str "URI : $uri" -type S Write-VPASOutput -str "METHOD : DELETE" -type S Write-VPASOutput -str " " -type S Write-VPASOutput -str "======= END COMMAND SIMULATION =======" -type S } $WhatIfHash = @{ WhatIf = @{ SecretID = $WhatIfsecretid TenantID = $WhatIftenantid SecretType = $WhatIfsecrettype IsActive = $WhatIfisactive IsRotatable = $WhatIfisrotatable CreationTime = $WhatIfcreationtime LastModified = $WhatIflastmodified SecretName = $WhatIfsecretname CertFileName = $WhatIfsecretdetailscertFileName AccountDomain = $WhatIfsecretdetailsaccountdomain Data = $WhatIfsecretsecretdata TenantEncrypted = $WhatIfsecrettenantencrypted RestURI = $uri RestMethod = "DELETE" Disclaimer = "THIS STRONG ACCOUNT WILL BE DELETED IF -WhatIf FLAG IS REMOVED" } } $WhatIfJSON = $WhatIfHash | ConvertTo-Json | ConvertFrom-Json $log = Write-VPASTextRecorder -inputval $WhatIfJSON -token $token -LogType RETURNARRAY $log = Write-VPASTextRecorder -token $token -LogType WHATIF2 return $WhatIfJSON } else{ if($sessionval){ $response = Invoke-RestMethod -Headers @{"Authorization"=$Header} -Uri $uri -Method DELETE -ContentType "application/json" -WebSession $sessionval } else{ $response = Invoke-RestMethod -Headers @{"Authorization"=$Header} -Uri $uri -Method DELETE -ContentType "application/json" } $log = Write-VPASTextRecorder -inputval $response -token $token -LogType RETURNARRAY Write-Verbose "SUCCESSFULLY DELETED DPA STRONG ACCOUNT: $StrongAccountID" Write-Verbose "RETURNING TRUE" return $true } } }catch{ $log = Write-VPASTextRecorder -inputval $_ -token $token -LogType ERROR $log = Write-VPASTextRecorder -inputval "REST API COMMAND RETURNED: FALSE" -token $token -LogType MISC Write-Verbose "FAILED TO RETRIEVE DPA STRONG ACCOUNT DETAILS" Write-VPASOutput -str $_ -type E return $false } } End{ $log = Write-VPASTextRecorder -inputval $CommandName -token $token -LogType DIVIDER } } |