a2acallers.psm1
# Helper function Invoke-SafeguardA2aMethodWithCertificate { [CmdletBinding()] Param( [Parameter(Mandatory=$true,Position=0)] [string]$Appliance, [Parameter(Mandatory=$false)] [switch]$Insecure, [Parameter(ParameterSetName="File",Mandatory=$true)] [string]$CertificateFile, [Parameter(ParameterSetName="File",Mandatory=$false)] [SecureString]$Password, [Parameter(ParameterSetName="CertStore",Mandatory=$true)] [string]$Thumbprint, [Parameter(Mandatory=$false)] [string]$Authorization, [Parameter(Mandatory=$true)] [ValidateSet("a2a", "core", IgnoreCase=$true)] [string]$Service, [Parameter(Mandatory=$true)] [string]$Method, [Parameter(Mandatory=$true)] [string]$RelativeUrl, [Parameter(Mandatory=$false)] [int]$Version = 4, [Parameter(Mandatory=$false)] [object]$Body ) if (-not $PSBoundParameters.ContainsKey("ErrorAction")) { $ErrorActionPreference = "Stop" } if (-not $PSBoundParameters.ContainsKey("Verbose")) { $VerbosePreference = $PSCmdlet.GetVariableValue("VerbosePreference") } Import-Module -Name "$PSScriptRoot\sslhandling.psm1" -Scope Local if ($Insecure) { Disable-SslVerification if ($global:PSDefaultParameterValues) { $PSDefaultParameterValues = $global:PSDefaultParameterValues.Clone() } } $local:Headers = @{ "Accept" = "application/json"; "Content-type" = "application/json" } if ($Authorization) { $local:Headers["Authorization"] = $Authorization } Write-Verbose "---Request---" Write-Verbose "Headers=$(ConvertTo-Json -InputObject $Headers)" $Service = $Service.ToLower() $local:BodyInternal = $null if ($Body) { $local:BodyInternal = (ConvertTo-Json -InputObject $Body) Write-Verbose "---Request Body---" Write-Verbose "$($local:BodyInternal)" } if (-not $Thumbprint) { Import-Module -Name "$PSScriptRoot\ps-utilities.psm1" -Scope Local $local:Cert = (Use-CertificateFile $CertificateFile $Password) } try { if (-not $Thumbprint) { Invoke-RestMethod -Certificate $local:Cert -Method $Method -Headers $local:Headers ` -Uri "https://$Appliance/service/$Service/v$Version/$RelativeUrl" -Body $local:BodyInternal } else { Invoke-RestMethod -CertificateThumbprint $Thumbprint -Method $Method -Headers $local:Headers ` -Uri "https://$Appliance/service/$Service/v$Version/$RelativeUrl" -Body $local:BodyInternal } } catch { Write-Warning "An exception was caught trying to call A2A using a certificate." Write-Warning "If you are experiencing a certificate connection failure, your problem may be a quirk on Windows where" Write-Warning "the low-level HTTPS client requires that the Issuing CA be in your 'Intermediate Certificate Authorities'" Write-Warning "store, otherwise Windows doesn't think you have a matching certificate to send in the initial client" Write-Warning "connection. This occurs even if you pass in a PFX file specifying exactly which certificate to use." Import-Module -Name "$PSScriptRoot\sg-utilities.psm1" -Scope Local Out-SafeguardExceptionIfPossible $_ } finally { if ($Insecure) { Enable-SslVerification if ($global:PSDefaultParameterValues) { $PSDefaultParameterValues = $global:PSDefaultParameterValues.Clone() } } } } function Invoke-SafeguardA2aCredentialRetrieval { [CmdletBinding()] Param( [Parameter(Mandatory=$false)] [string]$Appliance, [Parameter(Mandatory=$false)] [switch]$Insecure, [Parameter(Mandatory=$false)] [string]$CertificateFile, [Parameter(Mandatory=$false)] [SecureString]$Password, [Parameter(Mandatory=$false)] [string]$Thumbprint, [Parameter(Mandatory=$false)] [string]$Authorization, [Parameter(Mandatory=$false)] [ValidateSet("Password","PrivateKey",IgnoreCase=$true)] [string]$CredentialType, [Parameter(Mandatory=$false)] [ValidateSet("OpenSsh","Ssh2","Putty",IgnoreCase=$true)] [string]$KeyFormat = $null, [Parameter(Mandatory=$false)] [int]$Version = 4 ) if (-not $PSBoundParameters.ContainsKey("ErrorAction")) { $ErrorActionPreference = "Stop" } if (-not $PSBoundParameters.ContainsKey("Verbose")) { $VerbosePreference = $PSCmdlet.GetVariableValue("VerbosePreference") } switch ($CredentialType) { "password" { $CredentialType = "Password"; break } "privatekey" { $CredentialType = "PrivateKey"; break } } $local:RelativeUrl = "Credentials?type=$CredentialType" if ($KeyFormat) { switch ($KeyFormat) { "openssh" { $KeyFormat = "OpenSsh"; break } "ssh2" { $KeyFormat = "Ssh2"; break } "putty" { $KeyFormat = "Putty"; break } } $local:RelativeUrl = "Credentials?type=$CredentialType&keyFormat=$KeyFormat" } if (-not $Thumbprint) { Invoke-SafeguardA2aMethodWithCertificate -Insecure:$Insecure -Appliance $Appliance -Authorization $Authorization ` -CertificateFile $CertificateFile -Password $Password -Service a2a -Method GET -RelativeUrl $local:RelativeUrl -Version $Version } else { Invoke-SafeguardA2aMethodWithCertificate -Insecure:$Insecure -Appliance $Appliance -Authorization $Authorization ` -Thumbprint $Thumbprint -Service a2a -Method GET -RelativeUrl $local:RelativeUrl -Version $Version } } <# .SYNOPSIS Get a list of all the accounts retrievable from the A2A service using this certificate user. .DESCRIPTION The purpose of this cmdlet is to know which accounts can be retrieved using A2A without having to go through access request workflow. This cmdlet will also give the API Key to use to request the account. .PARAMETER Appliance IP address or hostname of a Safeguard appliance. .PARAMETER Insecure Ignore verification of Safeguard appliance SSL certificate. .PARAMETER CertificateFile A string containing the path to a certificate file to use for authentication. .PARAMETER Password A secure string containing the password for decrypting the certificate file. .PARAMETER Thumbprint A string containing the thumbprint of a certificate the system certificate store. .PARAMETER Version Version of the Web API you are using (default: 4). .INPUTS None. .OUTPUTS JSON response from Safeguard Web API. .EXAMPLE Get-SafeguardA2aRetrievableAccount -Appliance 10.5.32.54 -CertificateFile C:\certs\file.pfx -Password $pass .EXAMPLE Get-SafeguardA2aRetrievableAccount 10.5.32.54 -Thumbprint 756766BB590D7FA9CA9E1971A4AE41BB9CEC82F1 #> function Get-SafeguardA2aRetrievableAccount { [CmdletBinding(DefaultParameterSetName="CertStore")] Param( [Parameter(Mandatory=$true,Position=0)] [string]$Appliance, [Parameter(Mandatory=$false)] [switch]$Insecure, [Parameter(ParameterSetName="File",Mandatory=$true)] [string]$CertificateFile, [Parameter(ParameterSetName="File",Mandatory=$false)] [SecureString]$Password, [Parameter(ParameterSetName="CertStore",Mandatory=$true)] [string]$Thumbprint, [Parameter(Mandatory=$false)] [int]$Version = 4 ) if (-not $PSBoundParameters.ContainsKey("ErrorAction")) { $ErrorActionPreference = "Stop" } if (-not $PSBoundParameters.ContainsKey("Verbose")) { $VerbosePreference = $PSCmdlet.GetVariableValue("VerbosePreference") } if (-not $Thumbprint) { if (-not $Password) { $Password = (Read-Host "Password" -AsSecureString) } $local:Registrations = (Invoke-SafeguardA2aMethodWithCertificate -Insecure:$Insecure -Appliance $Appliance -Version $Version ` -CertificateFile $CertificateFile -Password $Password -Service core -Method GET -RelativeUrl "A2ARegistrations") } else { $local:Registrations = (Invoke-SafeguardA2aMethodWithCertificate -Insecure:$Insecure -Appliance $Appliance -Version $Version ` -Thumbprint $Thumbprint -Service core -Method GET -RelativeUrl "A2ARegistrations") } $local:Registrations | ForEach-Object { $local:Reg = $_ if (-not $Thumbprint) { $local:Accounts = (Invoke-SafeguardA2aMethodWithCertificate -Insecure:$Insecure -Appliance $Appliance -Version $Version ` -CertificateFile $CertificateFile -Password $Password -Service core -Method GET -RelativeUrl "A2ARegistrations/$($local:Reg.Id)/RetrievableAccounts") } else { $local:Accounts = (Invoke-SafeguardA2aMethodWithCertificate -Insecure:$Insecure -Appliance $Appliance -Version $Version ` -Thumbprint $Thumbprint -Service core -Method GET -RelativeUrl "A2ARegistrations/$($local:Reg.Id)/RetrievableAccounts") } $local:Accounts | ForEach-Object { $local:Disabled = $local:Reg.Disabled if (-not $local:Disabled -and $_.AccountDisabled) { $local:Disabled = $true } New-Object PSObject -Property ([ordered]@{ AppName = $local:Reg.AppName; Description = $local:Reg.Description; Disabled = $local:Disabled; CertificateUserId = $local:Reg.CertificateUserId; CertificateUser = $local:Reg.CertificateUser; CertificateUserThumbprint = $local:Reg.CertificateUserThumbprint; ApiKey = $_.ApiKey; AssetId = $_.AssetId; AssetName = $_.AssetName; NetworkAddress = $_.NetworkAddress; AccountId = $_.AccountId; AccountName = $_.AccountName; DomainName = $_.DomainName; AccountType = $_.AccountType; }) } } } <# .SYNOPSIS Get an account password from Safeguard via the A2A service of the Web API. .DESCRIPTION The purpose of this cmdlet is to retrieve a single password without having to go through access request workflow. Passwords retrieve using this cmdlet must be configured as part of an A2A registration. .PARAMETER Appliance IP address or hostname of a Safeguard appliance. .PARAMETER Insecure Ignore verification of Safeguard appliance SSL certificate. .PARAMETER CertificateFile A string containing the path to a certificate file to use for authentication. .PARAMETER Password A secure string containing the password for decrypting the certificate file. .PARAMETER Thumbprint A string containing the thumbprint of a certificate the system certificate store. .PARAMETER ApiKey A string containing the API key that identifies the account being requested. .PARAMETER Version Version of the Web API you are using (default: 4). .INPUTS None. .OUTPUTS JSON response from Safeguard Web API. .EXAMPLE Get-SafeguardA2aPassword -Appliance 10.5.32.54 -CertificateFile C:\certs\file.pfx -Password $pass -ApiKey 6A4psUnrLv1hvoWSB3jsm2V50eFT62vwAI9Zlj/dDWw= .EXAMPLE Get-SafeguardA2aPassword 10.5.32.54 6A4psUnrLv1hvoWSB3jsm2V50eFT62vwAI9Zlj/dDWw= -Thumbprint 756766BB590D7FA9CA9E1971A4AE41BB9CEC82F1 #> function Get-SafeguardA2aPassword { [CmdletBinding(DefaultParameterSetName="CertStore")] Param( [Parameter(Mandatory=$true,Position=0)] [string]$Appliance, [Parameter(Mandatory=$false)] [switch]$Insecure, [Parameter(ParameterSetName="File",Mandatory=$true)] [string]$CertificateFile, [Parameter(ParameterSetName="File",Mandatory=$false)] [SecureString]$Password, [Parameter(ParameterSetName="CertStore",Mandatory=$true)] [string]$Thumbprint, [Parameter(Mandatory=$true,Position=1)] [string]$ApiKey, [Parameter(Mandatory=$false)] [int]$Version = 4 ) if (-not $PSBoundParameters.ContainsKey("ErrorAction")) { $ErrorActionPreference = "Stop" } if (-not $PSBoundParameters.ContainsKey("Verbose")) { $VerbosePreference = $PSCmdlet.GetVariableValue("VerbosePreference") } if ($PsCmdlet.ParameterSetName -eq "CertStore") { Invoke-SafeguardA2aCredentialRetrieval -Insecure:$Insecure -Appliance $Appliance -Authorization "A2A $ApiKey" ` -Thumbprint $Thumbprint -CredentialType Password -Version $Version } else { Invoke-SafeguardA2aCredentialRetrieval -Insecure:$Insecure -Appliance $Appliance -Authorization "A2A $ApiKey" ` -CertificateFile $CertificateFile -Password $Password -CredentialType Password -Version $Version } } <# .SYNOPSIS Get an account private key from Safeguard via the A2A service of the Web API. .DESCRIPTION The purpose of this cmdlet is to retrieve a single password without having to go through access request workflow. Passwords retrieve using this cmdlet must be configured as part of an A2A registration. .PARAMETER Appliance IP address or hostname of a Safeguard appliance. .PARAMETER Insecure Ignore verification of Safeguard appliance SSL certificate. .PARAMETER CertificateFile A string containing the path to a certificate file to use for authentication. .PARAMETER Password A secure string containing the password for decrypting the certificate file. .PARAMETER Thumbprint A string containing the thumbprint of a certificate the system certificate store. .PARAMETER ApiKey A string containing the API key that identifies the account being requested. .PARAMETER KeyFormat A string containing which format to use for the private key. The options are: - OpenSsh: OpenSSH legacy PEM format (default) - Ssh2: Tectia format for use with tools from SSH.com - Putty: Putty format for use with PuTTY tools .PARAMETER Version Version of the Web API you are using (default: 4). .INPUTS None. .OUTPUTS JSON response from Safeguard Web API. .EXAMPLE Get-SafeguardA2aPrivateKey -Appliance 10.5.32.54 -CertificateFile C:\certs\file.pfx -Password $pass -ApiKey 6A4psUnrLv1hvoWSB3jsm2V50eFT62vwAI9Zlj/dDWw= .EXAMPLE Get-SafeguardA2aPrivateKey 10.5.32.54 6A4psUnrLv1hvoWSB3jsm2V50eFT62vwAI9Zlj/dDWw= -Thumbprint 756766BB590D7FA9CA9E1971A4AE41BB9CEC82F1 #> function Get-SafeguardA2aPrivateKey { [CmdletBinding(DefaultParameterSetName="CertStore")] Param( [Parameter(Mandatory=$true,Position=0)] [string]$Appliance, [Parameter(Mandatory=$false)] [switch]$Insecure, [Parameter(ParameterSetName="File",Mandatory=$true)] [string]$CertificateFile, [Parameter(ParameterSetName="File",Mandatory=$false)] [SecureString]$Password, [Parameter(ParameterSetName="CertStore",Mandatory=$true)] [string]$Thumbprint, [Parameter(Mandatory=$true,Position=1)] [string]$ApiKey, [Parameter(Mandatory=$false)] [ValidateSet("OpenSsh","Ssh2","Putty",IgnoreCase=$true)] [string]$KeyFormat = $null, [Parameter(Mandatory=$false)] [int]$Version = 4 ) if (-not $PSBoundParameters.ContainsKey("ErrorAction")) { $ErrorActionPreference = "Stop" } if (-not $PSBoundParameters.ContainsKey("Verbose")) { $VerbosePreference = $PSCmdlet.GetVariableValue("VerbosePreference") } if ($PsCmdlet.ParameterSetName -eq "CertStore") { Invoke-SafeguardA2aCredentialRetrieval -Insecure:$Insecure -Appliance $Appliance -Authorization "A2A $ApiKey" ` -Thumbprint $Thumbprint -CredentialType PrivateKey -Version $Version } else { if ($KeyFormat) { Invoke-SafeguardA2aCredentialRetrieval -Insecure:$Insecure -Appliance $Appliance -Authorization "A2A $ApiKey" ` -CertificateFile $CertificateFile -Password $Password -CredentialType PrivateKey -KeyFormat $KeyFormat -Version $Version } else { Invoke-SafeguardA2aCredentialRetrieval -Insecure:$Insecure -Appliance $Appliance -Authorization "A2A $ApiKey" ` -CertificateFile $CertificateFile -Password $Password -CredentialType PrivateKey -Version $Version } } } <# .SYNOPSIS Create a new access request on behalf of another Safeguard user using the A2A service and a configure access request broker. .DESCRIPTION This cmdlet will create an access request on behalf of a Safeguard user. The A2A certificate user cannot actually access the password or the session. It just creates the access request, and the target user will be notified via SignalR. The target user can then enter the session or view the password. .PARAMETER Appliance IP address or hostname of a Safeguard appliance. .PARAMETER Insecure Ignore verification of Safeguard appliance SSL certificate. .PARAMETER CertificateFile A string containing the path to a certificate file to use for authentication. .PARAMETER Password A secure string containing the password for decrypting the certificate file. .PARAMETER Thumbprint A string containing the thumbprint of a certificate the system certificate store. .PARAMETER ApiKey A string containing the API key that identifies the account being requested. .PARAMETER ForProviderName A string containing the name of the identity provider of the user to create the request for. .PARAMETER ForUserName A string containing the name of the user to create the request for. .PARAMETER ForUserId An integer containing the ID of the user to create the request for. .PARAMETER AssetToUse A string containing the name of the asset to request. .PARAMETER AssetIdToUse An integer containing the ID of the asset to request. .PARAMETER AccountToUse A string containing the name of the account to request. .PARAMETER AccountIdToUse An integer containing the ID of the account to request .PARAMETER AccessRequestType A string containing the type of access request to make. .PARAMETER Emergency Whether the access request is an emergency. .PARAMETER ReasonCode An integer containing the reason code ID or a string containing the name. .PARAMETER ReasonComment A string containing the reason comment for the access request. .PARAMETER TicketNumber A string containing the ticket number for the access request. .PARAMETER RequestedFor A string containing the UTC date/time the request becomes active. For example: "2018-10-17T12:11:12Z". .PARAMETER RequestedDurationDays An integer containing the number of days for the request duration (0-31). .PARAMETER RequestedDurationHours An integer containing the number of hours for the request duration (0-23). .PARAMETER RequestedDurationMinutes An integer containing the number of minutes for the request duration (0-59). .PARAMETER Version Version of the Web API you are using (default: 4). .INPUTS None. .OUTPUTS JSON response from Safeguard Web API. .EXAMPLE New-SafeguardA2aAccessRequest .EXAMPLE New-SafeguardA2aAccessRequest 10.5.32.23 -CertificateFile .\CERT.pfx UK1Pf45hvWa7OVBu4l87U3dvgydWXMElRZhQ3DDYVwo= TestUser linux.sample.com root SSH #> function New-SafeguardA2aAccessRequest { [CmdletBinding(DefaultParameterSetName="CertStoreAndNames")] Param( [Parameter(Mandatory=$true,Position=0)] [string]$Appliance, [Parameter(Mandatory=$false)] [switch]$Insecure, [Parameter(ParameterSetName="FileAndNames",Mandatory=$true)] [Parameter(ParameterSetName="FileAndIds",Mandatory=$true)] [string]$CertificateFile, [Parameter(ParameterSetName="FileAndNames",Mandatory=$false)] [Parameter(ParameterSetName="FileAndIds",Mandatory=$false)] [SecureString]$Password, [Parameter(ParameterSetName="CertStoreAndNames",Mandatory=$true)] [Parameter(ParameterSetName="CertStoreAndIds",Mandatory=$true)] [string]$Thumbprint, [Parameter(Mandatory=$true,Position=1)] [string]$ApiKey, [Parameter(Mandatory=$false)] [string]$ForProviderName, [Parameter(ParameterSetName="FileAndNames",Mandatory=$true,Position=2)] [Parameter(ParameterSetName="CertStoreAndNames",Mandatory=$true,Position=2)] [string]$ForUserName, [Parameter(ParameterSetName="FileAndIds",Mandatory=$true,Position=2)] [Parameter(ParameterSetName="CertStoreAndIds",Mandatory=$true,Position=2)] [int]$ForUserId, [Parameter(ParameterSetName="FileAndNames",Mandatory=$true,Position=3)] [Parameter(ParameterSetName="CertStoreAndNames",Mandatory=$true,Position=3)] [string]$AssetToUse, [Parameter(ParameterSetName="FileAndIds",Mandatory=$true,Position=3)] [Parameter(ParameterSetName="CertStoreAndIds",Mandatory=$true,Position=3)] [int]$AssetIdToUse, [Parameter(ParameterSetName="FileAndNames",Mandatory=$false,Position=4)] [Parameter(ParameterSetName="CertStoreAndNames",Mandatory=$false,Position=4)] [string]$AccountToUse, [Parameter(ParameterSetName="FileAndIds",Mandatory=$false,Position=4)] [Parameter(ParameterSetName="CertStoreAndIds",Mandatory=$false,Position=4)] [int]$AccountIdToUse, [Parameter(Mandatory=$false,Position=5)] [ValidateSet("Password", "SSHKey", "SSH", "RemoteDesktop", "RDP", "RemoteDesktopApplication", "RDPApplication", "RDPApp", "Telnet", IgnoreCase=$true)] [string]$AccessRequestType, [Parameter(Mandatory=$false)] [switch]$Emergency = $false, [Parameter(Mandatory=$false)] [object]$ReasonCode, [Parameter(Mandatory=$false)] [string]$ReasonComment, [Parameter(Mandatory=$false)] [string]$TicketNumber, [Parameter(Mandatory=$false)] [string]$RequestedFor, [Parameter(Mandatory=$false)] [ValidateRange(0, 31)] [int]$RequestedDurationDays, [Parameter(Mandatory=$false)] [ValidateRange(0, 23)] [int]$RequestedDurationHours, [Parameter(Mandatory=$false)] [ValidateRange(0, 59)] [int]$RequestedDurationMinutes, [Parameter(Mandatory=$false)] [int]$Version = 4 ) if (-not $PSBoundParameters.ContainsKey("ErrorAction")) { $ErrorActionPreference = "Stop" } if (-not $PSBoundParameters.ContainsKey("Verbose")) { $VerbosePreference = $PSCmdlet.GetVariableValue("VerbosePreference") } if ($AccessRequestType -ieq "RDP") { $AccessRequestType = "RemoteDesktop" } elseif ($AccessRequestType -ieq "RDPApplication" -or $AccessRequestType -ieq "RDPApp") { $AccessRequestType = "RemoteDesktopApplication" } if ($PsCmdlet.ParameterSetName -eq "CertStoreAndNames" -or $PsCmdlet.ParameterSetName -eq "FileAndNames") { $local:Body = @{ ForUser = $ForUserName; AssetName = $AssetToUse; AccessRequestType = "$AccessRequestType" } if ($AccountToUse) { $local:Body["AccountName"] = $AccountToUse } } else { $local:Body = @{ ForUserId = $ForUserId; AssetId = $AssetIdToUse; AccessRequestType = "$AccessRequestType" } if ($AccountIdToUse) { $local:Body["AccountId"] = $AccountIdToUse } } if ($ForProviderName) {$local:Body["ForProvider"] = $ForProviderName } if ($Emergency) { $local:Body["IsEmergency"] = $true } if ($ReasonCode) { Import-Module -Name "$PSScriptRoot\sg-utilities.psm1" -Scope Local $local:ReasonCodeId = (Resolve-ReasonCodeId -AccessToken $AccessToken -Appliance $Appliance -Insecure:$Insecure $ReasonCode) $local:Body["ReasonCodeId"] = $local:ReasonCodeId } if ($ReasonComment) { $local:Body["ReasonComment"] = $ReasonComment } if ($TicketNumber) { $local:Body["TicketNumber"] = $TicketNumber } if ($RequestedFor) { $local:Body["RequestedFor"] = $RequestedFor } if ($RequestedDurationDays) { $local:Body["RequestedDurationDays"] = $RequestedDurationDays } if ($RequestedDurationHours) { $local:Body["RequestedDurationHours"] = $RequestedDurationHours } if ($RequestedDurationMinutes) { $local:Body["RequestedDurationMinutes"] = $RequestedDurationMinutes } if ($PsCmdlet.ParameterSetName -eq "CertStoreAndNames" -or $PsCmdlet.ParameterSetName -eq "CertStoreAndIds") { Invoke-SafeguardA2aMethodWithCertificate -Insecure:$Insecure -Appliance $Appliance -Authorization "A2A $ApiKey" ` -Thumbprint $Thumbprint -Service a2a -Method POST -RelativeUrl AccessRequests -Body $local:Body -Version $Version } else { Invoke-SafeguardA2aMethodWithCertificate -Insecure:$Insecure -Appliance $Appliance -Authorization "A2A $ApiKey" -Version $Version ` -CertificateFile $CertificateFile -Password $Password -Service a2a -Method POST -RelativeUrl AccessRequests -Body $local:Body } } |