public/Get-VPASRotationalPlatformDetails.ps1

<#
.Synopsis
   GET ROTATIONAL PLATFORM DETAILS
   CREATED BY: Vadim Melamed, EMAIL: vmelamed5@gmail.com
.DESCRIPTION
   USE THIS FUNCTION TO GET ROTATIONAL PLATFORM DETAILS
.PARAMETER token
   HashTable of data containing various pieces of login information (PVWA, LoginToken, HeaderType, etc).
   If -token is not passed, function will use last known hashtable generated by New-VPASToken
.PARAMETER rotationalplatformID
   Unique RotationalPlatformID to retrieve details for
.EXAMPLE
   $RotationalPlatformDetailsJSON = Get-VPASRotationalPlatformDetails -rotationalplatformID {ROTATIONAL PLATFORMID VALUE}
.OUTPUTS
   If successful:
   {
        "PlatformID": "RotationalPlat01",
        "Details": {
                        "PolicyID": "RotationalPlat01",
                        "PolicyName": "RotationalPlat01",
                        "SearchForUsages": "Yes",
                        "PolicyType": "regular",
                        "ImmediateInterval": "5",
                        "Interval": "1440",
                        "MaxConcurrentConnections": "3",
                        "AllowedSafes": ".*",
                        "MinValidityPeriod": "60",
                        "ResetOveridesMinValidity": "yes",
                        "ResetOveridesTimeFrame": "yes",
                        "Timeout": "30",
                        "UnlockIfFail": "no",
                        "UnrecoverableErrors": "2103,2105,2121",
                        "MaximumRetries": "5",
                        "MinDelayBetweenRetries": "90",
                        "DllName": "PMWindows.dll",
                        "XMLFile": "yes",
                        "AllowManualChange": "Yes",
                        "PerformPeriodicChange": "No",
                        "HeadStartInterval": "5",
                        "FromHour": "-1",
                        "ToHour": "-1",
                        "ChangeNotificationPeriod": "-1",
                        "DaysNotifyPriorExpiration": "7",
                        "VFAllowManualVerification": "Yes",
                        "VFPerformPeriodicVerification": "No",
                        "VFFromHour": "-1",
                        "VFToHour": "-1",
                        "RCAllowManualReconciliation": "Yes",
                        "RCAutomaticReconcileWhenUnsynched": "No",
                        "RCReconcileReasons": "2114,2115,2106,2101",
                        "RCFromHour": "-1",
                        "RCToHour": "-1",
                        "NFNotifyPriorExpiration": "No",
                        "NFPriorExpirationRecipients": "",
                        "NFNotifyOnPasswordDisable": "Yes",
                        "NFOnPasswordDisableRecipients": "",
                        "NFNotifyOnVerificationErrors": "Yes",
                        "NFOnVerificationErrorsRecipients": "",
                        "NFNotifyOnPasswordUsed": "No",
                        "NFOnPasswordUsedRecipients": "",
                        "PasswordLength": "12",
                        "MinUpperCase": "2",
                        "MinLowerCase": "2",
                        "MinDigit": "1",
                        "MinSpecial": "1",
                        "OneTimePassword": "No",
                        "ExpirationPeriod": "90",
                        "VFVerificationPeriod": "7",
                        "PasswordLevelRequestTimeframe": "No"
                    },
        "Active": true
   }
   ---
   $false if failed
#>

function Get-VPASRotationalPlatformDetails{
    [OutputType('System.Object')]
    [CmdletBinding()]
    Param(

        [Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,HelpMessage="Enter target PlatformID to query details from (for example: WinServerLocal)",Position=0)]
        [String]$rotationalplatformID,

        [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,Position=1)]
        [hashtable]$token
    )

    Begin{
        $tokenval,$sessionval,$PVWA,$Header,$ISPSS,$IdentityURL,$EnableTextRecorder,$AuditTimeStamp,$NoSSL,$VaultVersion,$HideWarnings,$AuthenticatedAs,$SubDomain = Get-VPASSession -token $token
        $CommandName = $MyInvocation.MyCommand.Name
        $log = Write-VPASTextRecorder -inputval $CommandName -token $token -LogType COMMAND
    }
    Process{
        try{
            $platformID = $rotationalplatformID
            Write-Verbose "CONSTRUCTING SEARCH STRING TO QUERY CYBERARK"
            $searchQuery = "$platformID"

            if($NoSSL){
                Write-Verbose "NO SSL ENABLED, USING HTTP INSTEAD OF HTTPS"
                $uri = "http://$PVWA/passwordvault/api/platforms/rotationalGroups/"
            }
            else{
                Write-Verbose "SSL ENABLED BY DEFAULT, USING HTTPS"
                $uri = "https://$PVWA/passwordvault/api/platforms/rotationalGroups/"
            }
            $log = Write-VPASTextRecorder -inputval $uri -token $token -LogType URI
            $log = Write-VPASTextRecorder -inputval "GET" -token $token -LogType METHOD
            write-verbose "MAKING API CALL"

            if($sessionval){
                $response = Invoke-RestMethod -Headers @{"Authorization"=$Header} -Uri $uri -Method GET -ContentType "application/json" -WebSession $sessionval
            }
            else{
                $response = Invoke-RestMethod -Headers @{"Authorization"=$Header} -Uri $uri -Method GET -ContentType "application/json"
            }

            $counter = $response.Total
            Write-Verbose "FOUND $counter ROTATIONAL PLATFORMS...LOOKING FOR TARGET ROTATIONAL PLATFORMID: $searchQuery"

            $output = -1
            foreach($rec in $response.Platforms){
                $recid = $rec.ID
                $recplatformid = $rec.PlatformID
                $recname = $rec.Name

                if($recplatformid -eq $platformID -or $recname -eq $platformID){
                    $output = $rec
                    Write-Verbose "FOUND $platformID : TARGET ENTRY FOUND, RETURNING DETAILS"
                    $log = Write-VPASTextRecorder -inputval $output -token $token -LogType RETURN
                    return $output
                }
                Write-Verbose "FOUND $recplatformid : NOT TARGET ENTRY (SKIPPING)"

            }
            $log = Write-VPASTextRecorder -inputval "CAN NOT FIND TARGET ENTRY" -token $token -LogType MISC
            $log = Write-VPASTextRecorder -inputval "REST API COMMAND RETURNED: FALSE" -token $token -LogType MISC
            Write-Verbose "CAN NOT FIND TARGET ENTRY, RETURNING -1"
            Write-VPASOutput -str "UNABLE TO FIND TARGET ROTATIONAL PLATFORMID, RETURNING -1" -type E
            return $output
        }catch{
            $log = Write-VPASTextRecorder -inputval $_ -token $token -LogType ERROR
            $log = Write-VPASTextRecorder -inputval "REST API COMMAND RETURNED: FALSE" -token $token -LogType MISC
            Write-Verbose "UNABLE TO QUERY CYBERARK"
            Write-VPASOutput -str $_ -type E
        }
    }
    End{
        $log = Write-VPASTextRecorder -inputval $CommandName -token $token -LogType DIVIDER
    }
}