Scripts/Reskit9/All Resources/xAdcsDeployment/xCertificateServices/Examples/Config-SetupActiveDirectory.ps1
#region Param param ( [String]$DomainName, [String]$DomainNetbiosName, [PSCredential]$Credential, [PSCredential]$DomainCredential, [PSCredential]$SafeModeAdministratorPassword, [String]$EncryptionCertificateThumbprint ) #endregion #region Decrypt function Decrypt { param ( [Parameter(Mandatory)] [String]$Thumbprint, [Parameter(Mandatory)] [String]$Base64EncryptedValue ) # Decode Base64 string $encryptedBytes = [System.Convert]::FromBase64String($Base64EncryptedValue) # Get certificate from store $store = new-object System.Security.Cryptography.X509Certificates.X509Store([System.Security.Cryptography.X509Certificates.StoreLocation]::LocalMachine) $store.open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadOnly) $certificate = $store.Certificates | %{if($_.thumbprint -eq $Thumbprint){$_}} # Decrypt $decryptedBytes = $certificate.PrivateKey.Decrypt($encryptedBytes, $false) $decryptedValue = [System.Text.Encoding]::UTF8.GetString($decryptedBytes) return $decryptedValue } if ($EncryptionCertificateThumbprint) { Write-Verbose -Message "Decrypting parameters with certificate $EncryptionCertificateThumbprint..." $Password = Decrypt -Thumbprint $EncryptionCertificateThumbprint -Base64EncryptedValue $Password $SafeModeAdministratorPassword = Decrypt -Thumbprint $EncryptionCertificateThumbprint -Base64EncryptedValue $SafeModeAdministratorPassword Write-Verbose -Message "Successfully decrypted parameters." } else { Write-Verbose -Message "No encryption certificate specified. Assuming cleartext parameters." } #endregion #region Config Data if ($env:COMPUTERNAME -match 'DC-Server\d\d') { $ConfigData = @{ AllNodes = @( @{ Nodename = $env:COMPUTERNAME ServerRole = 'Active Directory Domain Controller' DomainName = $DomainName DomainNetbiosName = $DomainNetbiosName Disk = 1 Drive = 'F' PSDscAllowPlainTextPassword = $true Credential = $Credential DomainCredential = $DomainCredential SMCredential = $SafeModeAdministratorPassword } ) } } if ($EncryptionCertificateThumbprint) { $certificate = dir Cert:\LocalMachine\My\$EncryptionCertificateThumbprint $certificatePath = Join-Path -path $PSScriptRoot -childPath "EncryptionCertificate.cer" Export-Certificate -Cert $certificate -FilePath $certificatePath | Out-Null $configData = @{ AllNodes = @( @{ Nodename = "*" CertificateFile = $certificatePath Thumbprint = $EncryptionCertificateThumbprint PSDscAllowPlainTextPassword = $false } ) } } #endregion #region First DC Configuration Script if ((test-path C:\Windows\temp\FirstDC.txt) -eq $True) { configuration FirstDomainController { Import-DscResource -ModuleName xComputerManagement, xActiveDirectory, xCertificateServices node $AllNodes.Where{$_.ServerRole -eq 'Active Directory Domain Controller'}.Nodename { xWaitForDisk SMA { DiskNumber = $Node.Disk RetryCount = 720 } xDisk DataDisk { DiskNumber = $Node.Disk DriveLetter = $Node.Drive DependsOn = '[xWaitforDisk]SMA' } WindowsFeature AD-Domain-Services { Ensure = 'Present' Name = 'AD-Domain-Services' } WindowsFeature ADCS-Cert-Authority { Ensure = 'Present' Name = 'ADCS-Cert-Authority' } WindowsFeature ADCS-Web-Enrollment { Ensure = 'Present' Name = 'ADCS-Web-Enrollment' } xADDomain PrimaryDC { DomainAdministratorCredential = $Node.Credential DomainName = $Node.DomainName SafemodeAdministratorPassword = $Node.SMCredential DatabasePath = $Node.Drive + ":\NTDS" LogPath = $Node.Drive + ":\NTDS" SysvolPath = $Node.Drive + ":\SYSVOL" DependsOn = "[xDisk]DataDisk", "[WindowsFeature]AD-Domain-Services" } xADCSCertificationAuthority ADCS { Ensure = 'Present' Credential = $Node.Credential CAType = 'EnterpriseRootCA' DependsOn = '[WindowsFeature]ADCS-Cert-Authority' } xADCSWebEnrollment CertSrv { Ensure = 'Absent' Name = 'CertSrv' Credential = $Node.Credential DependsOn = '[xADCSCertificationAuthority]ADCS' } LocalConfigurationManager { CertificateId = $node.Thumbprint ConfigurationMode = 'ApplyandAutoCorrect' RebootNodeIfNeeded = 'True' } } } FirstDomainController -ConfigurationData $configData -OutputPath $PSScriptRoot } #endregion #region DC Configuration Script if ((test-path C:\Windows\temp\FirstDC.txt) -eq $False) { configuration DomainController { Import-DscResource -ModuleName xComputerManagement, xActiveDirectory node $AllNodes.Where{$_.ServerRole -eq 'Active Directory Domain Controller'}.Nodename { xWaitForDisk DataDisk { DiskNumber = $Node.Disk RetryCount = 720 } xDisk DataDisk { DiskNumber = $Node.Disk DriveLetter = $Node.Drive DependsOn = '[xWaitforDisk]DataDisk' } WindowsFeature AD-Domain-Services { Ensure = 'Present' Name = 'AD-Domain-Services' } xWaitForADDomain WaitforDomain { DomainName = $Node.DomainName DomainUserCredential = $Node.DomainCredential RetryCount = 720 RetryIntervalSec = 10 DependsOn = "[WindowsFeature]AD-Domain-Services" } xADDomainController BackupDC { DomainAdministratorCredential = $Node.DomainCredential DomainName = $Node.DomainName SafemodeAdministratorPassword = $Node.SMCredential DatabasePath = $Node.Drive + ":\NTDS" LogPath = $Node.Drive + ":\NTDS" SysvolPath = $Node.Drive + ":\SYSVOL" DependsOn = '[xDisk]DataDisk', '[WindowsFeature]AD-Domain-Services', '[xWaitforADDomain]WaitforDomain' } LocalConfigurationManager { CertificateId = $node.Thumbprint ConfigurationMode = 'ApplyandAutoCorrect' RebootNodeIfNeeded = 'True' } } } DomainController -ConfigurationData $configData -OutputPath $PSScriptRoot } #endregion #region Apply MOF winrm quickconfig -quiet Set-DscLocalConfigurationManager -ComputerName $env:COMPUTERNAME -Path $PSScriptRoot -Verbose Start-DscConfiguration -ComputerName $env:COMPUTERNAME -Path $PSScriptRoot -Force -Verbose -Wait #endregion |