Public/Get-MerakiNetworkSmBypassActivationLockAttempt.ps1

function Get-MerakiNetworkSmBypassActivationLockAttempt {
    <#
    .SYNOPSIS
    Retrieves the details of a specified SM device's bypass activation lock attempt.
     
    .PARAMETER AuthToken
    The API token generated in the Meraki dashboard.
     
    .PARAMETER NetworkId
    The network ID for the network containing the SM device.
     
    .PARAMETER AttemptId
    The unique ID of the bypass activation lock attempt to retrieve details for.
     
    .EXAMPLE
    PS C:\> Get-MerakiNetworkSmBypassActivationLockAttempt -AuthToken "1234" -NetworkId "L_123456789012345678" -AttemptId "123456789012345"
     
    Retrieves the details of the SM device's bypass activation lock attempt with ID "123456789012345" in the network with ID "L_123456789012345678".
     
    .NOTES
    For more information on using the Meraki API, see https://developer.cisco.com/meraki/api/.
    #>

    param (
        [parameter(Mandatory=$true)]
        [string]$AuthToken,
        [parameter(Mandatory=$true)]
        [string]$NetworkId,
        [parameter(Mandatory=$true)]
        [string]$AttemptId
    )
    
    try {
        $header = @{
            "X-Cisco-Meraki-API-Key" = $AuthToken
        }
        $response = Invoke-RestMethod -Method Get -Uri "https://api.meraki.com/api/v1/networks/$networkId/sm/bypassActivationLockAttempts/$attemptId" -headers $header -UserAgent "MerakiPowerShellModule/1.1.0 DocNougat"
        return $response
    }
    catch {
        Write-Debug $_
        Throw $_
    }
}