functions/Restore-DbaDbCertificate.ps1
function Restore-DbaDbCertificate { <# .SYNOPSIS Imports certificates from .cer files using SMO. .DESCRIPTION Imports certificates from.cer files using SMO. .PARAMETER SqlInstance The SQL Server to create the certificates on. .PARAMETER Path The Path the contains the certificate and private key files. The path can be a directory or a specific certificate. .PARAMETER SqlCredential Login to the target instance using alternative credentials. Windows and SQL Authentication supported. Accepts credential objects (Get-Credential) .PARAMETER Password Secure string used to decrypt the private key. .PARAMETER EncryptionPassword If specified this will be used to encrypt the private key. .PARAMETER Database The database where the certificate imports into. Defaults to master. .PARAMETER WhatIf Shows what would happen if the command were to run. No actions are actually performed. .PARAMETER Confirm Prompts you for confirmation before executing any changing operations within the command. .PARAMETER EnableException By default, when something goes wrong we try to catch it, interpret it and give you a friendly warning message. This avoids overwhelming you with "sea of red" exceptions, but is inconvenient because it basically disables advanced scripting. Using this switch turns this "nice by default" feature off and enables you to catch exceptions with your own try/catch. .NOTES Tags: Migration, Certificate Author: Jess Pomfret (@jpomfret), jesspomfret.com Website: https://dbatools.io Copyright: (C) Chrissy LeMaire, clemaire@gmail.com License: MIT https://opensource.org/licenses/MIT .EXAMPLE Restore-DbaDbCertificate -SqlInstance Server1 -Path \\Server1\Certificates -Password (ConvertTo-SecureString -Force -AsPlainText GoodPass1234!!) Restores all the certificates in the specified path, password is used to both decrypt and encrypt the private key. .EXAMPLE Restore-DbaDbCertificate -SqlInstance Server1 -Path \\Server1\Certificates\DatabaseTDE.cer -EncryptionType MasterKey -Password (ConvertTo-SecureString -force -AsPlainText GoodPass1234!!) Restores the DatabaseTDE certificate to Server1 and uses the MasterKey to encrypt the private key. #> [CmdletBinding(DefaultParameterSetName = "Default", SupportsShouldProcess = $true)] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [Alias("ServerInstance", "SqlServer")] [DbaInstanceParameter]$SqlInstance, [PSCredential]$SqlCredential, [parameter(Mandatory, ValueFromPipeline)] [object[]]$Path, [Security.SecureString]$EncryptionPassword, [object]$Database = "master", [Security.SecureString]$Password = (Read-Host "Password" -AsSecureString), [Alias('Silent')] [switch]$EnableException ) begin { Test-DbaDeprecation -DeprecatedOn "1.0.0" -Alias Retore-DbaDatabaseCertificate } process { if (Test-FunctionInterrupt) { return } try { Write-Message -Level Verbose -Message "Connecting to $SqlInstance" $server = Connect-SqlInstance -SqlInstance $SqlInstance -SqlCredential $sqlcredential } catch { Stop-Function -Message "Failed to connect to: $SqlInstance" -Target $SqlInstance -InnerErrorRecord $_ return } foreach ($fullname in $path) { if (-not $SqlInstance.IsLocalHost -and -not $fullname.StartsWith('\')) { Stop-Function -Message "Path ($fullname) must be a UNC share when SQL instance is not local." -Continue -Target $fullname } if (-not (Test-DbaPath -SqlInstance $server -Path $fullname)) { Stop-Function -Message "$SqlInstance cannot access $fullname" -Continue -Target $fullname } $directory = Split-Path $fullname $filename = Split-Path $fullname -Leaf $certname = [io.path]::GetFileNameWithoutExtension($filename) if ($Pscmdlet.ShouldProcess("$certname on $SqlInstance", "Importing Certificate")) { $smocert = New-Object Microsoft.SqlServer.Management.Smo.Certificate $smocert.Name = $certname $smocert.Parent = $server.Databases[$Database] Write-Message -Level Verbose -Message "Creating Certificate: $certname" try { $fullcertname = "$directory\$certname.cer" $privatekey = "$directory\$certname.pvk" Write-Message -Level Verbose -Message "Full certificate path: $fullcertname" Write-Message -Level Verbose -Message "Private key: $privatekey" $fromfile = 1 if($EncryptionPassword) { $smocert.Create($fullcertname, $fromfile, $privatekey, [System.Runtime.InteropServices.marshal]::PtrToStringAuto([System.Runtime.InteropServices.marshal]::SecureStringToBSTR($password)), [System.Runtime.InteropServices.marshal]::PtrToStringAuto([System.Runtime.InteropServices.marshal]::SecureStringToBSTR($password))) }else { $smocert.Create($fullcertname, $fromfile, $privatekey, [System.Runtime.InteropServices.marshal]::PtrToStringAuto([System.Runtime.InteropServices.marshal]::SecureStringToBSTR($password))) } $cert = $smocert } catch { Write-Message -Level Warning -Message $_ -ErrorRecord $_ -Target $instance } } Get-DbaDbCertificate -SqlInstance $server -Database $Database -Certificate $cert.Name } } } |