Functions/Accounts/Request-PASAdHocAccess.ps1

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
function Request-PASAdHocAccess {
    <#
.SYNOPSIS
Requests access to a target Windows machine
 
.DESCRIPTION
Requests and receives access, with administrative rights, to a target Windows machine.
The domain user who requests access will be added to the local Administrators group of the target machine.
 
.PARAMETER AccountID
The ID of the local account that will be used to add the logged on user to the Administrators group on the target machine.
 
.EXAMPLE
Request-PASAdHocAccess -AccountID 36_3
 
Requests "ad hoc" access on the server for which the account with id 36_3 is a local account with local admin membership.
 
.INPUTS
All parameters can be piped by propertyname
 
.OUTPUTS
None
#>

    [CmdletBinding()]
    param(
        [parameter(
            Mandatory = $true,
            ValueFromPipelinebyPropertyName = $true
        )]
        [ValidateNotNullOrEmpty()]
        [Alias("id")]
        [string]$AccountID
    )

    BEGIN {
        $MinimumVersion = [System.Version]"10.6"
    }#begin

    PROCESS {

        #check minimum version
        Assert-VersionRequirement -ExternalVersion $Script:ExternalVersion -RequiredVersion $MinimumVersion

        #Create URL for request (Version 10.4 onwards)
        $URI = "$Script:BaseURI/api/Accounts/$AccountID/grantAdministrativeAccess"

        #Send request to webservice
        Invoke-PASRestMethod -Uri $URI -Method POST -WebSession $Script:WebSession

    }#process

    END {}#end
}