TechOnTip Weblog

Run book for Technocrats

Powershell Trick: Execute Logon Script as per Group Membership

Posted by Brajesh Panda on May 22, 2016

If((Get-ADPrincipalGroupMembership $env:username).name -like “Domain Users”)

{Write-Host “Yes”}

Change the Write-Host section with the action script, what you want to execute. I think this is what you want.

Here $env:username gets the logged on user name. It is like “whoami” command, without the domain info. You can get domain info using $env:USERDNSDOMAIN

Posted in Mix & Match | Leave a Comment »

Powershell Trick: Convert TXT to HTML and Send Email

Posted by Brajesh Panda on May 17, 2016

If you want to get contents from a txt file and send its content in email body, this trick will do the job. My txt file has multiple separate lines, like general error files.

So this trick joins all lines with <BR> HTML encode to introduce line breaks. If you do not use this encode and just do get-content, all lines will be messed like a paragraph and will be hard to read.

$Body = (Get-Content <File Path>) -join ‘<BR>’

After you encode the html, make sure use BodyAsHtml to set outgoing email format. So email client will convert html page back to readable format.

Send-MailMessage -From <> -To <> -Subject <Message> -Body $Body -BodyAsHtml -SmtpServer smtp.server

Posted in Mix & Match | Leave a Comment »

Powershell Trick: Capture Valid IP

Posted by Brajesh Panda on April 30, 2016

[ipaddress]$ipaddress = Read-Host “Type valid ip”

https://communary.net/2014/11/12/quick-tip-validate-ip-address-parameter-in-custom-functions/

Posted in Mix & Match | Leave a Comment »

Windows Hello: Password Less World

Posted by Brajesh Panda on April 13, 2016

https://blogs.windows.com/msedgedev/2016/04/12/a-world-without-passwords-windows-hello-in-microsoft-edge/

Interesting technology…

Posted in Mix & Match | Leave a Comment »

Powershell – Get AD Forest Details

Posted by Brajesh Panda on March 30, 2016

Get AD Forest Details…

$Forest = [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest() | select -expandproperty domains

$Forest | Add-Member -MemberType NoteProperty DCs ”

$forest | ForEach-Object {$PSitem.DCs = ($PSItem | select -ExpandProperty DomainControllers) -join ‘,’}

$Forest

Like Domains, sites can be expanded for more details etc. So I am going to work on this and expand the same to get more details… Thank you Jason Heisley for motivating me to learn ADSI .Net Namespaces😉

Posted in Mix & Match | Leave a Comment »

Service Now REST API and PowerShell

Posted by Brajesh Panda on March 28, 2016

Disclaimer… Neither am I a software developer nor a Service Now Guru. In the absence of our service now dev guy, I just got some time to play around with my powershell stuff. Just out of curiosity trying to learn how to work with REST API using Powershell.

Latest service now instances (starting with Eureka release) supports REST API. More info can be found here http://wiki.servicenow.com/index.php?title=REST_API#gsc.tab=0

There are tons of REST client resources in programming languages & dev guys understand them better. But as an infrastructure professional, without much of Dev knowledge, I play around with Powershell & bit with Chrome’s REST Extension. So “Invoke-RestMethod” cmdlet is my friend here. Note, Powershell 3.0 and above support this. I use latest one… 5.0😉. Just learned a new app from getpostman.com, https://www.getpostman.com/docs/introduction. These GUI tools are kind of cool to understand different parameters.

1. So Service Now REST API can be connected using two methods;

a. With Normal User ID & Password. Means every time you query, you need to send out both user ID & password for authentication. Although it goes thru HTTPS, it is little bit too much when you are doing all these stateless queries.

b. With Token based authentication. Starting with Service now’s Fuji release we can use Access Token to do all these queries. And this Access Token expires after certain time (default 30mins), then we can use another token called as Refresh Token with a fixed Client ID (like a weird string user name) & Client secret (like a complex password) to regenerate the Access Token.

2. Let’s see the powershell codes for 1(a) method.

# Query Incident Table and get maximum numbers of ticket

$URI = ‘https://techontip.service-now.com/api/now/table/incident?’

# OR Query Incident Table and get one ticket using sysparm query

# $URI = ‘https:// techontip.service-now.com/api/now/table/incident?sysparm_limit=1’

$SNowUser = “DomainUser” # If integrated with ADFS or any SAML Identity Source for SSO

$SNowPass = ConvertTo-SecureString –String “Password” –AsPlainText -Force

$SNowCreds = New-Object –TypeName System.Management.Automation.PSCredential –ArgumentList $SNowUser, $SNowPass

$Incidents = Invoke-RestMethod -Uri $URI -Credential $SNowCreds -Body $Body -ContentType "application/json"

$Incidents.result.count

$Incidents.result[1]

3. For 1(b) method, you have to enable OAuth 2.0 thru service now portal. Here are the steps; http://wiki.servicenow.com/index.php?title=OAuth_Setup#gsc.tab=0

4. You may have to give yourself security admin role. I think I have that access in our Dev instance. I am going to figure that out later. As it is not my current priority, I have not checked those details.

5. Here is a screenshot. I created a new one for my Powershell Scripts.

In Service Now – Search “system oauth” – click on “application registry” – Click “new” – Select “Create an Oauth api endpoint for external clients” – configure necessary things..

6. Keep Client ID & Client Secret in a safe place. You may like to change Refresh token and access token time period as per our requirement.

7. Here is a nice video presentation from service now team using getpostman app. This one demonstrate how to generate refresh token & access token. And then how to use access token to retrieve data. But I am going to give you few line of Powershell codes here…

# Get Refresh token and Access Token using below script

$username = “DomainUsername”

$password = “Password”

$ClientID = “Paste Client ID from Step 6”

$ClientSecret = “Paste Client Secret from Step 6”

# Query REST Endpoint

$RestEndpoint = ‘https://techontip.service-now.com/oauth_token.do’

$body = [System.Text.Encoding]::UTF8.GetBytes(‘grant_type=password&username=’+$username+’&password=’+$password+’&client_id=’+$ClientID+’&client_secret=’+$ClientSecret)

Invoke-RestMethod -Uri $RestEndpoint -Body $Body -ContentType ‘application/x-www-form-urlencoded’ -Method Post

8. Output will be somewhat like below..

scope : useraccount

token_type : Bearer

expires_in : 1800

refresh_token : jsdfkajd;ewiorqjkfmsdkfamdfi;qirjqwkvm,c vkoejpmfklsdmfpiopioqijekmfd,kj7381893409mkas

access_token : sdnfok34u59834mdkfmaoiei4u398mlak;smr9i43uumaslkjripp98q347ja;k3ju409932mf;lkaj493q883

9. Now let’s use the access_token to retrieve data. We need to pass access_token thru headers as authorization. Do not forget that Bearer word to append before the access token.

# Query Incident Table and get maximum numbers of ticket

$URI = ‘https://techontip.service-now.com/api/now/table/incident?’

# OR Query Incident Table and get one ticket using sysparm query

# $URI = ‘https:// techontip.service-now.com/api/now/table/incident?sysparm_limit=1’

$headers = @{“authorization” = “Bearer sdnfok34u59834mdkfmaoiei4u398mlak;smr9i43uumaslkjripp98q347ja;k3ju409932mf;lkaj493q883”}

$result = Invoke-RestMethod -Uri $URI -Headers $headers

10. After 1800 seconds, the access_token will expire and we need a new one. We can use the step 7 or below codes with the existing refresh_token, client id & secret to get a new access_token.

# Get Access Token using Refresh Token.

$Refreshtoken = "jsdfkajd;ewiorqjkfmsdkfamdfi;qirjqwkvm,c vkoejpmfklsdmfpiopioqijekmfd,kj7381893409mkas"

$ClientID = “Paste Client ID from Step 6”

$ClientSecret = “Paste Client Secret from Step 6”

# Query REST Endpoint

$RestEndpoint = ‘https://techontip.service-now.com/oauth_token.do’

$body = [System.Text.Encoding]::UTF8.GetBytes(‘grant_type=refresh_token&client_id=’+$ClientID+’&client_secret=’+$ClientSecret+’&refresh_token=’+$refreshtoken)

Invoke-RestMethod -Uri $RestEndpoint -Body $Body -ContentType ‘application/x-www-form-urlencoded’ -Method Post

11. Output will be kind of same as step 8, with a different access_token. Then repeat step 9 using new access token.

Posted in Mix & Match | Tagged: , , | Leave a Comment »

Application of Active Directory Snapshot feature

Posted by Brajesh Panda on March 21, 2016

https://blogs.technet.microsoft.com/ashleymcglone/2014/04/24/oh-snap-active-directory-attribute-recovery-with-powershell/

Posted in Active Directory User Management, BackupExec 2010, BackupExec2010R3, Mix & Match | Leave a Comment »

Find ADFS Database Server details

Posted by Brajesh Panda on February 4, 2016

Get-WmiObject -namespace root/adfs -class securitytokenservice

Output from a farm where SQL is used as backed.

__GENUS : 2

__CLASS : SecurityTokenService

__SUPERCLASS :

__DYNASTY : SecurityTokenService

__RELPATH : SecurityTokenService=@

__PROPERTY_COUNT : 2

__DERIVATION : {}

__SERVER : ADFS01

__NAMESPACE : root\adfs

__PATH : \\ADFS01\root\adfs:SecurityTokenService=@

ConfigurationDatabaseConnectionString : Data Source=SQL01.techontip.local;Initial Catalog=AdfsConfiguration;Integrated

Security=True

ConfigurationServiceAddress : net.tcp://localhost:1500/policy

PSComputerName : ADFS01

Output from a farm where WID database is used

__GENUS : 2

__CLASS : SecurityTokenService

__SUPERCLASS :

__DYNASTY : SecurityTokenService

__RELPATH : SecurityTokenService=@

__PROPERTY_COUNT : 2

__DERIVATION : {}

__SERVER : ADFS02

__NAMESPACE : root\adfs

__PATH : \\ADFS02\root\adfs:SecurityTokenService=@

ConfigurationDatabaseConnectionString : Data Source=np:\\.\pipe\microsoft##wid\tsql\query;Initial

Catalog=AdfsConfiguration;Integrated Security=True

ConfigurationServiceAddress : net.tcp://localhost:1500/policy

PSComputerName : ADFS01

Posted in ADFS, Mix & Match | Tagged: | Leave a Comment »

Custom ADFS Claim Rules – Country/Office/CountryCode/SpecificGroup/FixedValue/ObjectGuid/eduPerson

Posted by Brajesh Panda on February 4, 2016

Earlier I have posted an article about Claim Language. Here it is: https://techontip.wordpress.com/2014/03/10/the-claims-rule-language-in-active-directory-federation-services/

In this article I am going to show you few regularly used custom claims, for which you need to write custom claim rules.

Before you create custom claim rules make sure you have claim descriptions created.

Custom Claim

country, office, countrycode_iso

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname&quot;, Issuer == "AD AUTHORITY"]

=> issue(store = "Active Directory", types = ("http://custom.techontipadfs.com/adattribute/country", "http://custom.techontipadfs.com/adattribute/office", "http://custom.techontipadfs.com/adattribute/countrycode_iso"), query = ";co,physicalDeliveryOfficeName,c;{0}", param = c.Value);

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Filtered Groups – Pass specific groups starting with a value like referral

http://blogs.technet.com/b/askds/archive/2013/05/07/ad-fs-2-0-claims-rule-language-part-2.aspx

https://social.technet.microsoft.com/wiki/contents/articles/8008.ad-fs-2-0-selectively-send-group-membership-s-as-a-claim.aspx

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Rule 1: GroupAdd

c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname&quot;, Issuer == "AD AUTHORITY"]

=> add(store = "Active Directory", types = ("http://schemas.xmlsoap.org/claims/Group"), query = ";tokenGroups;{0}", param = c.Value);

Rule 2: GroupFilter

# Just filter one group

c:[Type == "http://schemas.xmlsoap.org/claims/Group&quot;, Value =~ "(?i)referral"]

=> issue(claim = c);

# Filter out multiple groups.

c:[Type == "http://schemas.xmlsoap.org/claims/Group&quot;, Value =~ "(?i)referral|(?i)techontip deals"]

=> issue(claim = c);

Note: Here (?i) is for not case sensitive, and | is for OR

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Pass fixed value

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname&quot;, Issuer == "AD AUTHORITY"]

=> issue(type = "Test1", value = "Techontip Int User");

c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname&quot;, Issuer == "AD AUTHORITY"]

=> issue(Type = "orgdir", Value = "techontip");

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Pass ObjectGUID

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname&quot;, Issuer == "AD AUTHORITY"]

=> issue(store = "Active Directory", types = ("http://custom.techontipadfs.com/adattribute/ObjectGUID"), query = ";ObjectGUID;{0}", param = c.Value);

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

ObjectGuid

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname&quot;, Issuer == "AD AUTHORITY"]

=> issue(store = "Active Directory", types = ("http://custom.techontipadfs.com/adattribute/ObjectGUID"), query = ";ObjectGUID;{0}", param = c.Value);

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Transform to eduPerson Claims

Shibboleth is preconfigured to assert multiple attributes of the eduPerson object class, which is specially designed for higher education institutions. These are not configured by default in AD FS 2.0. Also, Shibboleth expects inbound SAML attributes names to use a different name format (urn:oasis:names:tc:SAML:2.0:attrname-format:uri) than AD FS 2.0 publishes by default (urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified). For these reasons, we will use the AD FS 2.0 custom rule language to generate Shibboleth-compliant claims.

http://technet.microsoft.com/en-us/library/gg317734%28v=ws.10%29.aspx#BKMK_EditClaimRulesforRelyingPartyTrust

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

1. 1st add a normal LDAP Claim – like UserPrincipal to UPN

2. 2nd Transform above claim to eduPerson claim. Below example converts above UPN to eduPerson. Here "urn:oid:0.9.2342.19200300.100.1.1" can be anything, as per application config.

c:[Type == "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn"%5D

=> issue(Type = "urn:oid:0.9.2342.19200300.100.1.1", Value = c.Value, Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/attributename"%5D = "urn:oasis:names:tc:SAML:2.0:attrname-format:uri");

Posted in ADFS, Mix & Match | Tagged: | Leave a Comment »

Bypass or Exclude Mails from Clutter

Posted by Brajesh Panda on January 26, 2016

Office 365 has a new interesting feature called Clutter. It uses Machine Learning language and automatically moves ignored (?) messages to Clutter folder. If any user doesn’t want it at all, they can On/Off from OWA. But as admin you can configure transport rules and set ‘X-MS-Exchange-Organization-BypassClutter’ message header to True. This will help Exchange Online to put the message in Inbox instead of Clutter folder.

Here are few examples of transport rules;

If the message…

Is received from “EmailAddress”

Do the following…

set message header ‘X-MS-Exchange-Organization-BypassClutter’ with the value ‘True’

If the message…

sender ip addresses belong to one of these ranges: <SourceIPAddresses>

Do the following…

and set message header ‘X-MS-Exchange-Organization-BypassClutter’ with the value ‘True’

Posted in Mix & Match | Leave a Comment »

Skype for Business Online: Dial-In Conferencing Reporting

Posted by Brajesh Panda on January 25, 2016

Here is my tiny script to report all user level Dial-In Conferencing details from Skype for Business Online Tenant. Useful if you have integrated InterCall, Pgi etc.

# Connect to SfB Online

C:\Script\Connect-LyncOnline-Powershell-Brajesh-Ver2.ps1

# Dial In Users

$DialInUsers = Get-CsOnlineUser -Filter {AcpInfo -ne $null} -ResultSize Unlimited | select FirstName, LastName, DisplayName, UserPrincipalName, SIPAddress, HostingProvider, Office, CountryAbbreviation, CountryOrRegionDisplayName, ACPInfo

# Add Properties

$DialInUsers | Add-Member -MemberType NoteProperty TollNumber ”

$DialInUsers | Add-Member -MemberType NoteProperty TollFreeNumber ”

$DialInUsers | Add-Member -MemberType NoteProperty PassCode ”

$DialInUsers | Add-Member -MemberType NoteProperty Provider ”

$DialInUsers | Add-Member -MemberType NoteProperty Domain ”

# Populate Attributes

foreach($DialInUser in $DialInUsers)

{

$DialInUser.UserPrincipalName

[xml]$DialInInfo = $DialInUser.AcpInfo

$DialInUser.TollNumber = $DialInInfo.acpInformation.tollNumber

$DialInUser.TollFreeNumber = $DialInInfo.acpInformation.tollFreeNumber

$DialInUser.PassCode = $DialInInfo.acpInformation.participantPassCode

$DialInUser.Provider = $DialInInfo.acpInformation.name

$DialInUser.Domain = $DialInInfo.acpInformation.domain

#[xml]$DialInInfo = $null

}

$FilteredData = $DialInUsers | `

select FirstName, LastName, DisplayName, UserPrincipalName, SIPAddress, HostingProvider,Office,CountryAbbreviation,CountryOrRegionDisplayName,TollNumber,TollFreeNumber,PassCode,Provider,Domain

$$FilteredData | Export-Csv C:\Script\InterCallUsers_Report.csv -NoTypeInformation

Posted in Mix & Match | Tagged: , , | Leave a Comment »

Change Exchange 2013 Transport Database Path

Posted by Brajesh Panda on November 25, 2015

è Open Exchange Shell as Administrator

è cd $exscripts

è Determine the new Log drive’s Drive letter & change drive letters in below script. Here I consider “L” drive is my new location. I always prefer to keep the same folder path as it is in C drive.

.\Move-TransportDatabase.ps1 –queueDatabasePath "L:\Program Files\Microsoft\Exchange Server\V15\TransportRoles\data\Queue" –queueDatabaseLoggingPath "L:\Program Files\Microsoft\Exchange Server\V15\TransportRoles\data\Queue" –iPFilterDatabasePath "L:\Program Files\Microsoft\Exchange Server\V15\TransportRoles\data\IpFilter" –iPFilterDatabaseLoggingPath "L:\Program Files\Microsoft\Exchange Server\V15\TransportRoles\data\IpFilter" –temporaryStoragePath "L:\Program Files\Microsoft\Exchange Server\V15\TransportRoles\data\Temp"

Cheers

Posted in Mix & Match | Leave a Comment »

Dell Hardware Info thru Powershell

Posted by Brajesh Panda on November 13, 2015

http://en.community.dell.com/techcenter/os-applications/w/wiki/4145.agentless-management-with-powershell-3-0-cim-cmdlets-and-idraclifecycle-controller?utm_content=buffere803b&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

Posted in Dell OEM, Mix & Match | Tagged: | Leave a Comment »

Work

Posted by Brajesh Panda on October 13, 2015

Posted in Mix & Match | Leave a Comment »

Windows Azure is currently performing an operation on this deployment that requires exclusive access.

Posted by Brajesh Panda on June 23, 2015

Here is an error I have encountered when trying to do some parallel operation on the same Cloud Service like Start-AzureVM or Stop-AzureVM –force.

ConflictError: Windows Azure is currently performing an operation with x-ms-requestid 2fdae353bba7bd40831b50eda73a2547 on this deployment that requires exclusive access.

This is a limitation in Azure right now. It happens due to some kind of locking at the backend on Cloud Services’s Network Provisioning.

Posted in Mix & Match | 1 Comment »

 
Follow

Get every new post delivered to your Inbox.

Join 106 other followers

%d bloggers like this: