DSCResources/cIntuneDeviceConfigurationWiredNetworkPolicyWindows10/cIntuneDeviceConfigurationWiredNetworkPolicyWindows10.schema.psm1
configuration cIntuneDeviceConfigurationWiredNetworkPolicyWindows10 { param ( [Parameter()] [hashtable[]] $Items, [Parameter()] [string] $TenantId, [Parameter()] [bool] $ManagedIdentity, [Parameter()] [pscredential] $Credential, [Parameter()] [string] $CertificateThumbprint, [Parameter()] [pscredential] $ApplicationSecret, [Parameter()] [string] $ApplicationId, [Parameter()] [string[]] $AccessTokens ) <# IntuneDeviceConfigurationWiredNetworkPolicyWindows10 [String] #ResourceName { DisplayName = [string] [AccessTokens = [string[]]] [ApplicationId = [string]] [ApplicationSecret = [PSCredential]] [Assignments = [MSFT_DeviceManagementConfigurationPolicyAssignments[]]] [AuthenticationBlockPeriodInMinutes = [UInt32]] [AuthenticationMethod = [string]{ certificate | derivedCredential | unknownFutureValue | usernameAndPassword }] [AuthenticationPeriodInSeconds = [UInt32]] [AuthenticationRetryDelayPeriodInSeconds = [UInt32]] [AuthenticationType = [string]{ guest | machine | machineOrUser | none | unknownFutureValue | user }] [CacheCredentials = [bool]] [CertificateThumbprint = [string]] [Credential = [PSCredential]] [DependsOn = [string[]]] [Description = [string]] [DisableUserPromptForServerValidation = [bool]] [EapolStartPeriodInSeconds = [UInt32]] [EapType = [string]{ eapFast | eapSim | eapTls | eapTtls | leap | peap | teap }] [Enforce8021X = [bool]] [Ensure = [string]{ Absent | Present }] [ForceFIPSCompliance = [bool]] [Id = [string]] [IdentityCertificateForClientAuthenticationDisplayName = [string]] [IdentityCertificateForClientAuthenticationId = [string]] [InnerAuthenticationProtocolForEAPTTLS = [string]{ challengeHandshakeAuthenticationProtocol | microsoftChap | microsoftChapVersionTwo | unencryptedPassword }] [ManagedIdentity = [bool]] [MaximumAuthenticationFailures = [UInt32]] [MaximumEAPOLStartMessages = [UInt32]] [OuterIdentityPrivacyTemporaryValue = [string]] [PerformServerValidation = [bool]] [PsDscRunAsCredential = [PSCredential]] [RequireCryptographicBinding = [bool]] [RootCertificateForClientValidationDisplayName = [string]] [RootCertificateForClientValidationId = [string]] [RootCertificatesForServerValidationDisplayNames = [string[]]] [RootCertificatesForServerValidationIds = [string[]]] [SecondaryAuthenticationMethod = [string]{ certificate | derivedCredential | unknownFutureValue | usernameAndPassword }] [SecondaryIdentityCertificateForClientAuthenticationDisplayName = [string]] [SecondaryIdentityCertificateForClientAuthenticationId = [string]] [SecondaryRootCertificateForClientValidationDisplayName = [string]] [SecondaryRootCertificateForClientValidationId = [string]] [TenantId = [string]] [TrustedServerCertificateNames = [string[]]] } #> Import-DscResource -ModuleName PSDesiredStateConfiguration Import-DscResource -ModuleName Microsoft365DSC $dscResourceName = 'IntuneDeviceConfigurationWiredNetworkPolicyWindows10' $param = $PSBoundParameters $param.Remove("InstanceName") $dscParameterKeys = 'DisplayName' -split ', ' foreach ($item in $Items) { if (-not $item.ContainsKey('Ensure')) { $item.Ensure = 'Present' } if (-not $item.ContainsKey('TenantId') -and $param.ContainsKey('TenantId')) { $item.TenantId = $TenantId } if (-not $item.ContainsKey('ManagedIdentity') -and $param.ContainsKey('ManagedIdentity')) { $item.ManagedIdentity = $ManagedIdentity } if (-not $item.ContainsKey('Credential') -and $param.ContainsKey('Credential')) { $item.Credential = $Credential } if (-not $item.ContainsKey('CertificateThumbprint') -and $param.ContainsKey('CertificateThumbprint')) { $item.CertificateThumbprint = $CertificateThumbprint } if (-not $item.ContainsKey('ApplicationSecret') -and $param.ContainsKey('ApplicationSecret')) { $item.ApplicationSecret = $ApplicationSecret } if (-not $item.ContainsKey('ApplicationId') -and $param.ContainsKey('ApplicationId')) { $item.ApplicationId = $ApplicationId } if (-not $item.ContainsKey('AccessTokens') -and $param.ContainsKey('AccessTokens')) { $item.AccessTokens = $AccessTokens } $keyValues = foreach ($key in $dscParameterKeys) { $item.$key } $executionName = $keyValues -join '_' $executionName = $executionName -replace "[\s()\\:*-+/{}```"']", '_' (Get-DscSplattedResource -ResourceName $dscResourceName -ExecutionName $executionName -Properties $item -NoInvoke).Invoke($item) } } |