Public/Session/Connect-Me.ps1
# Module: TeamsFunctions # Function: Session # Author: David Eberhardt # Updated: 01-JAN-2021 # Status: Live #TODO Add -Credentials parameter to be passed to all Commands function Connect-Me { <# .SYNOPSIS Connect to AzureAd, MicrosoftTeams and optionally also to Exchange .DESCRIPTION One function to connect them all. This CmdLet solves the requirement for individual authentication prompts for AzureAD and MicrosoftTeams (and optionally also to ExchangeOnline) when multiple connections are required. .PARAMETER AccountId Required. UserPrincipalName or LoginName of the Office365 Administrator .PARAMETER ExchangeOnline Optional. Connects to Exchange Online Management. Requires Exchange Admin Role .PARAMETER NoFeedback Optional. Suppresses output session information about established sessions. Used for calls by other functions .EXAMPLE Connect-Me [-AccountId] admin@domain.com Creates a session to AzureAD prompting for a Password for 'admin@domain.com' If AzureAdPreview is loaded, tries to enable eligible Admin roles in Privileged Identity Management Creates a session to MicrosoftTeams with the AzureAd Session details If unsuccessful, prompting for selection of the authenticated User only (no additional authentication needed) .EXAMPLE Connect-Me -AccountId admin@domain.com -NoFeedBack If AzureAdPreview is loaded, tries to enable eligible Admin roles in Privileged Identity Management Creates a session to MicrosoftTeams with the AzureAd Session details If unsuccessful, prompting for selection of the authenticated User only (no additional authentication needed) Does not display Session Information Object at the end - This is useful if called by other functions. .EXAMPLE Connect-Me -AccountId admin@domain.com -ExchangeOnline If AzureAdPreview is loaded, tries to enable eligible Admin roles in Privileged Identity Management Creates a session to MicrosoftTeams with the AzureAd Session details If unsuccessful, prompting for selection of the authenticated User only (no additional authentication needed) Also connects to ExchangeOnline .INPUTS System.String .OUTPUTS System.Object - Default Behavior, incl. on-screen feedback about performed tasks System.Object - Reduced information, no on-screen output .NOTES This CmdLet can be used to establish a session to: AzureAD, MicrosoftTeams and ExchangeOnline Each Service has different requirements for connection, query (Get-CmdLets), and action (other CmdLets) For AzureAD, no particular role is needed for connection and query. Get-CmdLets are available without an Admin-role. For MicrosoftTeams, a Teams Administrator Role is required (ideally Teams Communication or Service Administrator) Module MicrosoftTeams v2.3.1 now fully supercedes previous connection methods. The Legcay role 'Skype for Business Legacy Administrator' is no longer required if connected via MicrosoftTeams v2.3.1 or higher. Actual administrative capabilities are dependent on actual Office 365 admin role assignments (displayed as output) Disconnects current sessions (if found) in order to establish a clean new session to each desired service. .COMPONENT TeamsSession .FUNCTIONALITY Connects to one or multiple Office 365 Services with as few Authentication prompts as possible .LINK https://github.com/DEberhardt/TeamsFunctions/tree/main/docs/Connect-Me.md .LINK https://github.com/DEberhardt/TeamsFunctions/tree/main/docs/about_TeamsSession.md .LINK https://github.com/DEberhardt/TeamsFunctions/tree/main/docs/ #> [Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSAvoidUsingWriteHost', '', Justification = 'Colourful feedback required to emphasise feedback for script executors')] [CmdletBinding()] [Alias('con')] param( [Parameter(Mandatory, Position = 0, HelpMessage = 'UserPrincipalName, Administrative Account')] [Alias('UserPrincipalName', 'Username')] [string]$AccountId, [Parameter(HelpMessage = 'Establishes a connection to Exchange Online. Reuses credentials if authenticated already.')] [Alias('Exchange')] [switch]$ExchangeOnline, [Parameter(HelpMessage = 'Suppresses Session Information output')] [switch]$NoFeedback ) #param begin { Show-FunctionStatus -Level Live Write-Verbose -Message "[BEGIN ] $($MyInvocation.MyCommand)" $Stack = Get-PSCallStack $Called = ($stack.length -ge 3) # Setting Preference Variables according to Upstream settings if (-not $PSBoundParameters.ContainsKey('Verbose')) { $VerbosePreference = $PSCmdlet.SessionState.PSVariable.GetValue('VerbosePreference') } if (-not $PSBoundParameters.ContainsKey('Confirm')) { $ConfirmPreference = $PSCmdlet.SessionState.PSVariable.GetValue('ConfirmPreference') } if (-not $PSBoundParameters.ContainsKey('WhatIf')) { $WhatIfPreference = $PSCmdlet.SessionState.PSVariable.GetValue('WhatIfPreference') } if (-not $PSBoundParameters.ContainsKey('Debug')) { $DebugPreference = $PSCmdlet.SessionState.PSVariable.GetValue('DebugPreference') } else { $DebugPreference = 'Continue' } if ( $PSBoundParameters.ContainsKey('InformationAction')) { $InformationPreference = $PSCmdlet.SessionState.PSVariable.GetValue('InformationAction') } else { $InformationPreference = 'Continue' } # Required as Warnings on the OriginalRegistrarPool somehow may halt Script execution $WarningPreference = 'Continue' #Initialising Counters $private:StepsID0, $private:StepsID1 = Get-WriteBetterProgressSteps -Code $($MyInvocation.MyCommand.Definition) -MaxId 1 $private:ActivityID0 = $($MyInvocation.MyCommand.Name) [int] $private:CountID0 = [int] $private:CountID1 = 1 #region Preparation $StatusID0 = 'Preparation' $CurrentOperationID0 = 'Preparing environment' Write-BetterProgress -Id 0 -Activity $ActivityID0 -Status $StatusID0 -CurrentOperation $CurrentOperationID0 -Step ($private:CountID0++) -Of $private:StepsID0 #Persist Stored Credentials on local machine - Value is unclear as they don't seem to be needed anymore now that New-CsOnlineSession is gone if (!$PSDefaultParameterValues.'Parameters:Processed') { $PSDefaultParameterValues.add('New-StoredCredential:Persist', 'LocalMachine') $PSDefaultParameterValues.add('Parameters:Processed', $true) } #Loading Modules $CurrentOperationID0 = 'Loading modules' Write-BetterProgress -Id 0 -Activity $ActivityID0 -Status $StatusID0 -CurrentOperation $CurrentOperationID0 -Step ($private:CountID0++) -Of $private:StepsID0 $AzureAdModule, $AzureAdPreviewModule, $TeamsModule = Get-NewestModule AzureAd, AzureAdPreview, MicrosoftTeams Write-Verbose -Message "Importing Module 'MicrosoftTeams'" $SaveVerbosePreference = $global:VerbosePreference; $global:VerbosePreference = 'SilentlyContinue'; if ( -not $TeamsModule -or $TeamsModule.Version -lt '4.2.0' ) { throw [System.Activities.VersionMismatchException]::New('MicrosoftTeams Module not installed in v4.2.0 or higher - Please verify Module!') } if ( -not (Get-Module MicrosoftTeams) ) { try { Import-Module MicrosoftTeams -MinimumVersion 4.2.0 -Force -Global -Verbose:$false -ErrorAction Stop } catch { throw [System.Activities.VersionMismatchException]::New('Cannot import MicrosoftTeams Module - Please investigate Module!') } } $global:VerbosePreference = $SaveVerbosePreference # Determine Module Version loaded #TODO Apply selective import for AzureAdPreview if ( $AzureAdPreviewModule ) { Remove-Module AzureAd -Verbose:$false -ErrorAction SilentlyContinue Import-Module AzureAdPreview -Force -Global -Verbose:$false if ( -not (Assert-Module AzureAdPreview )) { if ( -not (Assert-Module AzureAd) ) { throw 'Error importing Module: Neither AzureAd nor AzureAdPreview are available' } } } # Privileged Identity Management # Determining options $Command = 'Get-AzureADMSPrivilegedRoleAssignment' try { $PIMavailable = Get-Command -Name $Command -ErrorAction Stop } catch { Write-Information "INFO: Command '$Command' not available. Privileged Identity Management role activation cannot be used. Please ensure admin roles are activated prior to running this command" Write-Verbose -Message 'AzureAd & MicrosoftTeams: Establishing a connection will work, though only GET-commands will be able to be executed' } #endregion # Defining Connection Parameters (baseline) $ConnectionParameters = $null $ConnectionParameters += @{ 'ErrorAction' = 'Stop' } if ($PSBoundParameters.ContainsKey('Verbose')) { $ConnectionParameters += @{ 'Verbose' = $true } } if ($PSBoundParameters.ContainsKey('Debug') -or $DebugPreference -eq 'Continue') { $ConnectionParameters += @{ 'Debug' = $true } } } #begin process { Write-Verbose -Message "[PROCESS] $($MyInvocation.MyCommand)" #region Connections $StatusID0 = 'Preparation' $CurrentOperationID0 = 'Determining Order & Scope' Write-BetterProgress -Id 0 -Activity $ActivityID0 -Status $StatusID0 -CurrentOperation $CurrentOperationID0 -Step ($private:CountID0++) -Of $private:StepsID0 Write-Information "INFO: Establishing Connection to Tenant: $($($AccountId -split '@')[1])" $ConnectionOrder = @('AzureAd') if ( $PIMavailable ) { $ConnectionOrder += 'Enabling eligible Admin Roles' } else { Write-Verbose 'Enable-AzureAdAdminrole - Privileged Identity Management functions are not available' -Verbose } $ConnectionOrder += 'MicrosoftTeams' if ($ExchangeOnline) { $ConnectionOrder += 'ExchangeOnline' } [int] $private:StepsID0 = $private:StepsID0 + $(if ($ConnectionOrder.IsArray) { $ConnectionOrder.Count } else { 1 }) foreach ($Connection in $ConnectionOrder) { $StatusID0 = 'Authenticating' $CurrentOperationID0 = "$Connection" Write-BetterProgress -Id 0 -Activity $ActivityID0 -Status $StatusID0 -CurrentOperation $CurrentOperationID0 -Step ($private:CountID0++) -Of $private:StepsID0 try { switch ($Connection) { 'AzureAd' { $AzureAdParameters = $ConnectionParameters $AzureAdParameters += @{ 'AccountId' = $AccountId } $AzureAdFeedback = Connect-AzureAD @AzureAdParameters Write-Information "SUCCESS: $StatusID0 - $CurrentOperationID0" } 'Enabling eligible Admin Roles' { try { #VALIDATE Same code as Assert-MicrosoftTeamsConnection - may want to generalise this into a private function input: Username, Output, roles or add it into Enable-MyAzureAdAdminRole #TEST why AccountId didn't work for one scenario #$ActivatedRoles = Enable-AzureAdAdminRole -Identity "$($AzureAdFeedback.Account)" -PassThru -Force -ErrorAction Stop # (default should only enable the Teams ones? switch?) $ActivatedRoles = Enable-AzureAdAdminRole -Identity "$AccountId" -PassThru -Force -ErrorAction Stop #(default should only enable the Teams ones? switch?) $NrOfRoles = if ($ActivatedRoles.Count -gt 0) { $ActivatedRoles.Count } else { if ( $ActivatedRoles ) { 1 } else { 0 } } if ( $NrOfRoles -gt 0 ) { $Seconds = 15 Write-Verbose "Enable-AzureAdAdminrole - $NrOfRoles Role(s) activated. Waiting for AzureAd to propagate ($Seconds`s)" -Verbose Start-Sleep -Seconds $Seconds } else { Write-Verbose 'Enable-AzureAdAdminrole - No roles have been activated - If Privileged Admin Groups are used, please activate via PIM: https://aka.ms/myroles ' -Verbose } Write-Information "SUCCESS: $StatusID0 - $CurrentOperationID0" } catch { if ( $_.Exception.Message.Split('["')[2] -eq 'MfaRule' ) { Write-Host 'Enable-AzureAdAdminrole - No valid authentication via MFA is present. Please authenticate via https://portal.azure.com and retry' -ForegroundColor Red } elseif ( $_.Exception.Message.contains('No valid authentication via MFA is present') ) { Write-Host 'Enable-AzureAdAdminrole - No valid authentication via MFA is present. Please authenticate https://portal.azure.com and retry' -ForegroundColor Red } elseif ( $_.Exception.Message.Split('["')[2] -eq 'TicketingRule' ) { Write-Host 'Enable-AzureAdAdminrole - Activating Admin roles failed: PIM requires a Ticket Number - please activate via Azure Admin Center - https://aka.ms/myroles' -ForegroundColor Red } else { Write-Verbose 'Enable-AzureAdAdminrole - PIM or roles could not be activated or Tenant may not be enabled for PIM' -Verbose if ($PSBoundParameters.ContainsKey('Debug') -or $DebugPreference -eq 'Continue') { " Function: $($MyInvocation.MyCommand.Name) - Exception:", $_.Exception.Message | Write-Debug } } $PIMavailable = $false } } 'MicrosoftTeams' { $MicrosoftTeamsParameters = $ConnectionParameters #TODO Re-Evaluate AccountId on v4.7.0 or higher. #Using AccountId currently results in a Connection that is established but cannot open a PS context to SfBOnline #$MicrosoftTeamsParameters += @{ 'AccountId' = $AccountId } if ($AzureAdFeedback) { $MicrosoftTeamsParameters += @{ 'TenantId' = $AzureAdFeedback.TenantId } } try { $TeamsConnection = Connect-MicrosoftTeams @MicrosoftTeamsParameters } catch { Write-Verbose -Message " $StatusID0 - $CurrentOperationID0 - Try `#2 - Please confirm Account" -Verbose if ($AzureAdFeedback) { $TeamsConnection = Connect-MicrosoftTeams -TenantId $AzureAdFeedback.TenantId -ErrorAction Stop } else { $TeamsConnection = Connect-MicrosoftTeams -ErrorAction Stop } } if (-not (Test-MicrosoftTeamsConnection) -and $TeamsConnection) { # order is important here! Write-Warning -Message 'When activating roles with this CmdLet, propagation may not have completed. Please wait a few seconds and retry this command.' throw 'MicrosoftTeams - Connection to MicrosoftTeams established, but Cmdlets not able to run. Please verify Admin Roles via https://aka.ms/myroles' } Write-Information "SUCCESS: $StatusID0 - $CurrentOperationID0" } 'ExchangeOnline' { $ExchangeOnlineParameters = $ConnectionParameters $ExchangeOnlineParameters += @{ 'UserPrincipalName' = $AccountId } $ExchangeOnlineParameters += @{ 'ShowProgress' = $true } $ExchangeOnlineParameters += @{ 'ShowBanner' = $false } $null = Connect-ExchangeOnline @ExchangeOnlineParameters Write-Information "SUCCESS: $StatusID0 - $CurrentOperationID0" } } } catch { Write-Error -Message "$($_.Exception.Message)" if (($_.Exception.Message.Contains('User canceled authentication'))) { return } } } if ( -not $NoFeedback ) { $StatusID0 = 'Providing Feedback' $CurrentOperationID0 = 'Querying information about established sessions' Write-BetterProgress -Id 0 -Activity $ActivityID0 -Status $StatusID0 -CurrentOperation $CurrentOperationID0 -Step ($private:CountID0++) -Of $private:StepsID0 $SessionInfo = Get-CurrentConnectionInfo $SessionInfo | Add-Member -MemberType NoteProperty -Name AdminRoles -Value '' #Querying Admin Roles if ( $ActivatedRoles -and $ActivatedRoles.RoleName -gt 0 ) { $SessionInfo.AdminRoles = $($ActivatedRoles.RoleName -join ', ') } else { #AdminRoles is already populated if they have been activated with PIM (though only with eligible ones) this overwrites the previous set of roles $CurrentOperationID0 = 'Querying assigned Admin Roles' Write-BetterProgress -Id 0 -Activity $ActivityID0 -Status $StatusID0 -CurrentOperation $CurrentOperationID0 -Step ($private:CountID0++) -Of $private:StepsID0 if ( Test-AzureADConnection) { try { $Roles = $(Get-AzureAdAdminRole -Identity (Get-AzureADCurrentSessionInfo).Account -ErrorAction Stop).RoleName -join ', ' } catch { $Roles = $(Get-AzureAdAdminRole -Identity (Get-AzureADCurrentSessionInfo).Account -QueryGroupsOnly).RoleName -join ', ' } $SessionInfo.AdminRoles = $Roles } } # Changing Window Title to match TenantDomain if ( $SessionInfo.TenantDomain ) { Set-PowerShellWindowTitle $SessionInfo.Tenant } #Output Write-Progress -Id 0 -Activity $ActivityID0 -Completed Write-Output $SessionInfo Write-Host "$(Get-Date -Format 'dd MMM yyyy HH:mm') | Ready" -ForegroundColor Green Get-RandomQuote } else { Write-Progress -Id 0 -Activity $ActivityID0 -Completed return $(if ($Called) { # Returning basic connection information $SessionInfo = Get-CurrentConnectionInfo Write-Output $SessionInfo | Select-Object Account, ConnectedTo, TeamsUpgradeEffectiveMode }) } #endregion } #process end { Write-Verbose -Message "[END ] $($MyInvocation.MyCommand)" } #end } # Connect-Me |