diff --git a/VMware.CloudFoundation.PasswordManagement.psd1 b/VMware.CloudFoundation.PasswordManagement.psd1 index 572b451..f7e9beb 100644 --- a/VMware.CloudFoundation.PasswordManagement.psd1 +++ b/VMware.CloudFoundation.PasswordManagement.psd1 @@ -11,7 +11,7 @@ RootModule = '.\VMware.CloudFoundation.PasswordManagement.psm1' # Version number of this module. - ModuleVersion = '1.9.0.1002' + ModuleVersion = '1.9.0.1003' # ID used to uniquely identify this module GUID = '34e5a0c7-6e6e-4f72-8b3c-1c28248f8ac9' diff --git a/VMware.CloudFoundation.PasswordManagement.psm1 b/VMware.CloudFoundation.PasswordManagement.psm1 index e841545..25bbb3d 100644 --- a/VMware.CloudFoundation.PasswordManagement.psm1 +++ b/VMware.CloudFoundation.PasswordManagement.psm1 @@ -73,15 +73,15 @@ Set-Variable -Name "minLengthNotExceeds" -Value "SDDC Manager is able to rotate ########################################################################## ########################################################################## -#Region Begin Password Rotation Manager Functions ###### +#Region Begin Password Rotation Functions ###### Function Invoke-PasswordRotationManager { <# .SYNOPSIS - Generates a Password Rotation Manager Report for a workload domain or all workload domains. + Generates a Password Rotation Report for a workload domain or all workload domains. .DESCRIPTION - The Invoke-PasswordRotationManager generates a Password Rotation Manager Report for a VMware Cloud Foundation instance. + The Invoke-PasswordRotationManager generates a Password Rotation Report for a VMware Cloud Foundation instance. .EXAMPLE Invoke-PasswordRotationManager -sddcManagerFqdn [sddc_manager_fqdn] -sddcManagerUser [admin_username] -sddcManagerPass [admin_password] -sddcRootPass [root_password] -reportPath [report_path] -darkMode -allDomains @@ -169,7 +169,7 @@ Function Invoke-PasswordRotationManager { $commandSwitch = $commandSwitch + " -json" Write-LogMessage -Type INFO -Message "Starting the process of generating the password rotation JSON for $workflowMessage." -Colour Yellow } else { - Write-LogMessage -Type INFO -Message "Starting the Process of Generating Password Rotation Manager Report for $workflowMessage." -Colour Yellow + Write-LogMessage -Type INFO -Message "Starting the Process of Generating Password Rotation Report for $workflowMessage." -Colour Yellow Write-LogMessage -Type INFO -Message "Setting up the log file to path $logfile." Write-LogMessage -Type INFO -Message "Setting up report folder and report $reportName." } @@ -242,40 +242,40 @@ Function Invoke-PasswordRotationManager { } # Version Information: Build Password Rotation Object - $vcfVersion = New-Object -TypeName psobject - $vcfVersion | Add-Member -notepropertyname 'vcfVersion' -notepropertyvalue $version + $vcfVersion = New-Object -TypeName PSObject + $vcfVersion | Add-Member -NotePropertyName 'vcfVersion' -NotePropertyValue $version # Platform Resources: Build Password Rotation Object if ($PsBoundParameters.ContainsKey('allDomains')) { $allWorkloadDomains = Get-VCFWorkloadDomain foreach ($domain in $allWorkloadDomains) { if ($domain.type -eq 'MANAGEMENT') { - $sddcManagerPasswordRotationObj = New-Object -TypeName psobject - $sddcManagerPasswordRotationObj | Add-Member -notepropertyname 'sddcManager' -notepropertyvalue $sddcManagerPasswordRotation + $sddcManagerPasswordRotationObj = New-Object -TypeName PSObject + $sddcManagerPasswordRotationObj | Add-Member -NotePropertyName 'sddcManager' -NotePropertyValue $sddcManagerPasswordRotation - $ssoPasswordRotationObj = New-Object -TypeName psobject - $ssoPasswordRotationObj | Add-Member -notepropertyname 'sso' -notepropertyvalue $ssoPasswordRotation + $ssoPasswordRotationObj = New-Object -TypeName PSObject + $ssoPasswordRotationObj | Add-Member -NotePropertyName 'sso' -NotePropertyValue $ssoPasswordRotation } } } elseif ($PsBoundParameters.ContainsKey('workloadDomain')) { $domain = Get-VCFWorkloadDomain | Where-Object { $_.name -eq $workloadDomain } if ($domain.type -eq 'MANAGEMENT') { - $sddcManagerPasswordRotationObj = New-Object -TypeName psobject - $sddcManagerPasswordRotationObj | Add-Member -notepropertyname 'sddcManager' -notepropertyvalue $sddcManagerPasswordRotation + $sddcManagerPasswordRotationObj = New-Object -TypeName PSObject + $sddcManagerPasswordRotationObj | Add-Member -NotePropertyName 'sddcManager' -NotePropertyValue $sddcManagerPasswordRotation - $ssoPasswordRotationObj = New-Object -TypeName psobject - $ssoPasswordRotationObj | Add-Member -notepropertyname 'sso' -notepropertyvalue $ssoPasswordRotation + $ssoPasswordRotationObj = New-Object -TypeName PSObject + $ssoPasswordRotationObj | Add-Member -NotePropertyName 'sso' -NotePropertyValue $ssoPasswordRotation } } - $vcenterServerPasswordRotationObj = New-Object -TypeName psobject - $vcenterServerPasswordRotationObj | Add-Member -notepropertyname 'vcenterServer' -notepropertyvalue $vcenterServerPasswordRotation + $vcenterServerPasswordRotationObj = New-Object -TypeName PSObject + $vcenterServerPasswordRotationObj | Add-Member -NotePropertyName 'vcenterServer' -NotePropertyValue $vcenterServerPasswordRotation - $nsxManagerPasswordRotationObj = New-Object -TypeName psobject - $nsxManagerPasswordRotationObj | Add-Member -notepropertyname 'nsxManager' -notepropertyvalue $nsxManagerPasswordRotation + $nsxManagerPasswordRotationObj = New-Object -TypeName PSObject + $nsxManagerPasswordRotationObj | Add-Member -NotePropertyName 'nsxManager' -NotePropertyValue $nsxManagerPasswordRotation - $nsxEdgePasswordRotationObj = New-Object -TypeName psobject - $nsxEdgePasswordRotationObj | Add-Member -notepropertyname 'nsxEdge' -notepropertyvalue $nsxEdgePasswordRotation + $nsxEdgePasswordRotationObj = New-Object -TypeName PSObject + $nsxEdgePasswordRotationObj | Add-Member -NotePropertyName 'nsxEdge' -NotePropertyValue $nsxEdgePasswordRotation if ($PsBoundParameters.ContainsKey('allDomains') -or ($PsBoundParameters.ContainsKey('workloadDomain') -and $workloadDomain -eq $managementDomain.name)) { if (Get-VCFAriaLifecycle) { @@ -296,8 +296,8 @@ Function Invoke-PasswordRotationManager { if ($isEnabled) { $variableName = "${resource}PasswordRotation" if (Get-Variable -Name $variableName -ValueOnly) { - $ariaPasswordRotationObj = New-Object -TypeName psobject - $ariaPasswordRotationObj | Add-Member -notepropertyname $resourceTitleCase -notepropertyvalue (Get-Variable -Name $variableName -ValueOnly) + $ariaPasswordRotationObj = New-Object -TypeName PSObject + $ariaPasswordRotationObj | Add-Member -NotePropertyName $resourceTitleCase -NotePropertyValue (Get-Variable -Name $variableName -ValueOnly) Set-Variable -Name "${resource}PasswordRotationObj" -Value $ariaPasswordRotationObj } } @@ -306,8 +306,8 @@ Function Invoke-PasswordRotationManager { } # Combine Password Rotation Data - $outputJsonObject = New-Object -TypeName psobject - $outputJsonObject | Add-Member -notepropertyname 'vcf' -notepropertyvalue $vcfVersion + $outputJsonObject = New-Object -TypeName PSObject + $outputJsonObject | Add-Member -NotePropertyName 'vcf' -NotePropertyValue $vcfVersion # Platform Resources: Combine Password Rotation Data if ($PsBoundParameters.ContainsKey('allDomains') -or ($PsBoundParameters.ContainsKey('workloadDomain') -and $workloadDomain -eq $managementDomain.name)) { @@ -325,7 +325,7 @@ Function Invoke-PasswordRotationManager { 'nsxManager' { 'NSX Manager' } 'nsxEdge' { 'NSX Edge' } } - $outputJsonObject | Add-Member -notepropertyname $resourceTitleCase -notepropertyvalue (Get-Variable -Name $variableName -ValueOnly) + $outputJsonObject | Add-Member -NotePropertyName $resourceTitleCase -NotePropertyValue (Get-Variable -Name $variableName -ValueOnly) } } @@ -350,7 +350,7 @@ Function Invoke-PasswordRotationManager { 'ariaAutomation' { 'Aria Automation' } 'workspaceOneAccess' { 'Workspace OME Access' } } - $outputJsonObject | Add-Member -notepropertyname $resourceTitleCase -notepropertyvalue (Get-Variable -Name $variableName -ValueOnly) + $outputJsonObject | Add-Member -NotePropertyName $resourceTitleCase -NotePropertyValue (Get-Variable -Name $variableName -ValueOnly) } } } @@ -506,19 +506,19 @@ Function Invoke-PasswordRotationManager { } Export-ModuleMember -Function Invoke-PasswordRotationManager -#EndRegion End Password Rotation Manager Functions ###### +#EndRegion End Password Rotation Functions ###### ########################################################################## ########################################################################## -#Region Begin Password Policy Manager Functions ###### +#Region Begin Password Policy Functions ###### Function Invoke-PasswordPolicyManager { <# .SYNOPSIS - Generates a Password Policy Manager Report for a workload domain or all workload domains. + Generates a Password Policy Report for a workload domain or all workload domains. .DESCRIPTION - The Invoke-PasswordPolicyManager generates a Password Policy Manager Report for a VMware Cloud Foundation instance. + The Invoke-PasswordPolicyManager generates a Password Policy Report for a VMware Cloud Foundation instance. .EXAMPLE Invoke-PasswordPolicyManager -sddcManagerFqdn [sddc_manager_fqdn] -sddcManagerUser [admin_username] -sddcManagerPass [admin_password] -sddcRootPass [root_password] -reportPath [report_path] -darkMode -allDomains @@ -638,9 +638,9 @@ Function Invoke-PasswordPolicyManager { if ($PsBoundParameters.ContainsKey("json")) { $commandSwitch = $commandSwitch + " -json" - Write-LogMessage -Type INFO -Message "Starting the Process of Generating Password Policy Manager Config Drift JSON for $workflowMessage." -Colour Yellow + Write-LogMessage -Type INFO -Message "Starting the Process of Generating Password Policy Config Drift JSON for $workflowMessage." -Colour Yellow } else { - Write-LogMessage -Type INFO -Message "Starting the Process of Generating Password Policy Manager Report for $workflowMessage." -Colour Yellow + Write-LogMessage -Type INFO -Message "Starting the Process of Generating Password Policy Report for $workflowMessage." -Colour Yellow Write-LogMessage -Type INFO -Message "Setting up the log file to path $logfile." Write-LogMessage -Type INFO -Message "Setting up report folder and report $reportName." } @@ -684,7 +684,7 @@ Function Invoke-PasswordPolicyManager { $ariaAccountLockout = Invoke-Expression "Publish-AriaLocalUserPasswordPolicy -server $sddcManagerFqdn -user $sddcManagerUser -pass $sddcManagerPass -policy AccountLockout $($commandSwitch)" if ($PsBoundParameters.ContainsKey("wsaFqdn")) { - Write-LogMessage -Type INFO -Message "Collecting Workspace ONE Access Local Directory Password Policies for $workflowMessage." + Write-LogMessage -Type INFO -Message "Collecting Workspace ONE Access Directory Password Policies for $workflowMessage." $wsaDirectoryPasswordExpiration = Invoke-Expression "Publish-WsaDirectoryPasswordPolicy -server $wsaFqdn -user admin -pass $wsaAdminPass -policy PasswordExpiration $($commandSwitch)" $wsaDirectoryPasswordComplexity = Invoke-Expression "Publish-WsaDirectoryPasswordPolicy -server $wsaFqdn -user admin -pass $wsaAdminPass -policy PasswordComplexity $($commandSwitch)" $wsaDirectoryAccountLockout = Invoke-Expression "Publish-WsaDirectoryPasswordPolicy -server $wsaFqdn -user admin -pass $wsaAdminPass -policy AccountLockout $($commandSwitch)" @@ -697,62 +697,62 @@ Function Invoke-PasswordPolicyManager { if ($PsBoundParameters.ContainsKey("json")) { # Add VCF version into JSON file - $vcfVersion = New-Object -TypeName psobject - $vcfVersion | Add-Member -notepropertyname 'vcfVersion' -notepropertyvalue $version - $sddcManagerPasswordPolicy = New-Object -TypeName psobject - $sddcManagerPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $sddcManagerPasswordExpiration - $sddcManagerPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $sddcManagerPasswordComplexity - $sddcManagerPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $sddcManagerAccountLockout - $ssoPasswordPolicy = New-Object -TypeName psobject - $ssoPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $ssoPasswordExpiration - $ssoPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $ssoPasswordComplexity - $ssoPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $ssoAccountLockout - $vcenterPasswordPolicy = New-Object -TypeName psobject - $vcenterPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $vcenterPasswordExpiration - $vcenterLocalPasswordPolicy = New-Object -TypeName psobject - $vcenterLocalPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $vcenterLocalPasswordExpiration - $vcenterLocalPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $vcenterLocalPasswordComplexity - $vcenterLocalPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $vcenterLocalAccountLockout - $nsxManagerPasswordPolicy = New-Object -TypeName psobject - $nsxManagerPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $nsxManagerPasswordExpiration - $nsxManagerPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $nsxManagerPasswordComplexity - $nsxManagerPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $nsxManagerAccountLockout - $nsxEdgePasswordPolicy = New-Object -TypeName psobject - $nsxEdgePasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $nsxEdgePasswordExpiration - $nsxEdgePasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $nsxEdgePasswordComplexity - $nsxEdgePasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $nsxEdgeAccountLockout - $esxiPasswordPolicy = New-Object -TypeName psobject - $esxiPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $esxiPasswordExpiration - $esxiPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $esxiPasswordComplexity - $esxiPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $esxiAccountLockout - $ariaPasswordPolicy = New-Object -TypeName psobject - $ariaPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $ariaPasswordExpiration - $ariaPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $ariaPasswordComplexity - $ariaPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $ariaAccountLockout + $vcfVersion = New-Object -TypeName PSObject + $vcfVersion | Add-Member -NotePropertyName 'vcfVersion' -NotePropertyValue $version + $sddcManagerPasswordPolicy = New-Object -TypeName PSObject + $sddcManagerPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $sddcManagerPasswordExpiration + $sddcManagerPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $sddcManagerPasswordComplexity + $sddcManagerPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $sddcManagerAccountLockout + $ssoPasswordPolicy = New-Object -TypeName PSObject + $ssoPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $ssoPasswordExpiration + $ssoPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $ssoPasswordComplexity + $ssoPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $ssoAccountLockout + $vcenterPasswordPolicy = New-Object -TypeName PSObject + $vcenterPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $vcenterPasswordExpiration + $vcenterLocalPasswordPolicy = New-Object -TypeName PSObject + $vcenterLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $vcenterLocalPasswordExpiration + $vcenterLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $vcenterLocalPasswordComplexity + $vcenterLocalPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $vcenterLocalAccountLockout + $nsxManagerPasswordPolicy = New-Object -TypeName PSObject + $nsxManagerPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $nsxManagerPasswordExpiration + $nsxManagerPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $nsxManagerPasswordComplexity + $nsxManagerPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $nsxManagerAccountLockout + $nsxEdgePasswordPolicy = New-Object -TypeName PSObject + $nsxEdgePasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $nsxEdgePasswordExpiration + $nsxEdgePasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $nsxEdgePasswordComplexity + $nsxEdgePasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $nsxEdgeAccountLockout + $esxiPasswordPolicy = New-Object -TypeName PSObject + $esxiPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $esxiPasswordExpiration + $esxiPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $esxiPasswordComplexity + $esxiPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $esxiAccountLockout + $ariaPasswordPolicy = New-Object -TypeName PSObject + $ariaPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $ariaPasswordExpiration + $ariaPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $ariaPasswordComplexity + $ariaPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $ariaAccountLockout if ($PsBoundParameters.ContainsKey("wsaFqdn")) { - $wsaDirectoryPasswordPolicy = New-Object -TypeName psobject - $wsaDirectoryPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $wsaDirectoryPasswordExpiration - $wsaDirectoryPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $wsaDirectoryPasswordComplexity - $wsaDirectoryPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $wsaDirectoryAccountLockout - $wsaLocalPasswordPolicy = New-Object -TypeName psobject - $wsaLocalPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $wsaLocalPasswordExpiration - $wsaLocalPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $wsaLocalPasswordComplexity - $wsaLocalPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $wsaLocalAccountLockout + $wsaDirectoryPasswordPolicy = New-Object -TypeName PSObject + $wsaDirectoryPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $wsaDirectoryPasswordExpiration + $wsaDirectoryPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $wsaDirectoryPasswordComplexity + $wsaDirectoryPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $wsaDirectoryAccountLockout + $wsaLocalPasswordPolicy = New-Object -TypeName PSObject + $wsaLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $wsaLocalPasswordExpiration + $wsaLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $wsaLocalPasswordComplexity + $wsaLocalPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $wsaLocalAccountLockout } # Build Final Default Password Policy Object - $outputJsonObject = New-Object -TypeName psobject - $outputJsonObject | Add-Member -notepropertyname 'vcf' -notepropertyvalue $vcfVersion - $outputJsonObject | Add-Member -notepropertyname 'sddcManager' -notepropertyvalue $sddcManagerPasswordPolicy - $outputJsonObject | Add-Member -notepropertyname 'sso' -notepropertyvalue $ssoPasswordPolicy - $outputJsonObject | Add-Member -notepropertyname 'vcenterServer' -notepropertyvalue $vcenterPasswordPolicy - $outputJsonObject | Add-Member -notepropertyname 'vcenterServerLocal' -notepropertyvalue $vcenterLocalPasswordPolicy - $outputJsonObject | Add-Member -notepropertyname 'nsxManager' -notepropertyvalue $nsxManagerPasswordPolicy - $outputJsonObject | Add-Member -notepropertyname 'nsxEdge' -notepropertyvalue $nsxEdgePasswordPolicy - $outputJsonObject | Add-Member -notepropertyname 'esxi' -notepropertyvalue $esxiPasswordPolicy - $outputJsonObject | Add-Member -notepropertyname 'wsaDirectory' -notepropertyvalue $wsaDirectoryPasswordPolicy - $outputJsonObject | Add-Member -notepropertyname 'wsaLocal' -notepropertyvalue $wsaLocalPasswordPolicy - $outputJsonObject | Add-Member -notepropertyname 'ariaLocal' -notepropertyvalue $ariaPasswordPolicy + $outputJsonObject = New-Object -TypeName PSObject + $outputJsonObject | Add-Member -NotePropertyName 'vcf' -NotePropertyValue $vcfVersion + $outputJsonObject | Add-Member -NotePropertyName 'sddcManager' -NotePropertyValue $sddcManagerPasswordPolicy + $outputJsonObject | Add-Member -NotePropertyName 'sso' -NotePropertyValue $ssoPasswordPolicy + $outputJsonObject | Add-Member -NotePropertyName 'vcenterServer' -NotePropertyValue $vcenterPasswordPolicy + $outputJsonObject | Add-Member -NotePropertyName 'vcenterServerLocal' -NotePropertyValue $vcenterLocalPasswordPolicy + $outputJsonObject | Add-Member -NotePropertyName 'nsxManager' -NotePropertyValue $nsxManagerPasswordPolicy + $outputJsonObject | Add-Member -NotePropertyName 'nsxEdge' -NotePropertyValue $nsxEdgePasswordPolicy + $outputJsonObject | Add-Member -NotePropertyName 'esxi' -NotePropertyValue $esxiPasswordPolicy + $outputJsonObject | Add-Member -NotePropertyName 'wsaDirectory' -NotePropertyValue $wsaDirectoryPasswordPolicy + $outputJsonObject | Add-Member -NotePropertyName 'wsaLocal' -NotePropertyValue $wsaLocalPasswordPolicy + $outputJsonObject | Add-Member -NotePropertyName 'ariaLocal' -NotePropertyValue $ariaPasswordPolicy $jsonFile = ($reportFolder + "passwordPolicyManager" + ".json") Write-LogMessage -Type INFO -Message "Generating the Final JSON and Saving to ($jsonFile)." $outputJsonObject | ConvertTo-Json -Depth 25 | Out-File -FilePath $jsonFile @@ -775,8 +775,8 @@ Function Invoke-PasswordPolicyManager { $reportData += $wsaDirectoryPasswordExpiration $reportData += $wsaLocalPasswordExpiration } else { - $reportData += ($wsaDirectoryPasswordExpiration | ConvertTo-Html -Fragment -PreContent '
Workspace ONE Access Not Requested
') - $reportData += ($wsaLocalPasswordExpiration | ConvertTo-Html -Fragment -PreContent 'Workspace ONE Access Not Requested
') + $reportData += ($wsaDirectoryPasswordExpiration | ConvertTo-Html -Fragment -PreContent 'Workspace ONE Access Not Requested
') + $reportData += ($wsaLocalPasswordExpiration | ConvertTo-Html -Fragment -PreContent 'Workspace ONE Access Not Requested
') } $reportData += $sddcManagerPasswordComplexity $reportData += $ssoPasswordComplexity @@ -789,8 +789,8 @@ Function Invoke-PasswordPolicyManager { $reportData += $wsaDirectoryPasswordComplexity $reportData += $wsaLocalPasswordComplexity } else { - $reportData += ($wsaDirectoryPasswordComplexity | ConvertTo-Html -Fragment -PreContent 'Workspace ONE Access Not Requested
') - $reportData += ($wsaLocalPasswordComplexity | ConvertTo-Html -Fragment -PreContent 'Workspace ONE Access Not Requested
') + $reportData += ($wsaDirectoryPasswordComplexity | ConvertTo-Html -Fragment -PreContent 'Workspace ONE Access Not Requested
') + $reportData += ($wsaLocalPasswordComplexity | ConvertTo-Html -Fragment -PreContent 'Workspace ONE Access Not Requested
') } $reportData += $sddcManagerAccountLockout $reportData += $ssoAccountLockout @@ -803,8 +803,8 @@ Function Invoke-PasswordPolicyManager { $reportData += $wsaDirectoryAccountLockout $reportData += $wsaLocalAccountLockout } else { - $reportData += ($wsaDirectoryAccountLockout | ConvertTo-Html -Fragment -PreContent 'Workspace ONE Access Not Requested
') - $reportData += ($wsaLocalAccountLockout | ConvertTo-Html -Fragment -PreContent 'Workspace ONE Access Not Requested
') + $reportData += ($wsaDirectoryAccountLockout | ConvertTo-Html -Fragment -PreContent 'Workspace ONE Access Not Requested
') + $reportData += ($wsaLocalAccountLockout | ConvertTo-Html -Fragment -PreContent 'Workspace ONE Access Not Requested
') } if ($PsBoundParameters.ContainsKey("darkMode")) { @@ -1027,17 +1027,17 @@ Function Start-PasswordPolicyConfig { # Configuring Password Policies for Workspace ONE Access if ($PsBoundParameters.ContainsKey("wsaFqdn")) { # Workspace ONE Access Directory Password Policies - Write-LogMessage -Type INFO -Message "Configuring Password Policies for Workspace ONE Access Local Directory" -Colour Yellow - Write-LogMessage -Type INFO -Message "Configuring Workspace ONE Access Local Directory: Password Expiration Policy for instance ($($wsaFqdn))" + Write-LogMessage -Type INFO -Message "Configuring Password Policies for Workspace ONE Access Directory" -Colour Yellow + Write-LogMessage -Type INFO -Message "Configuring Workspace ONE Access Directory: Password Expiration Policy for instance ($($wsaFqdn))" $StatusMsg = Update-WsaPasswordExpiration -server $wsaFqdn -user admin -pass $wsaAdminPass -maxDays $customPolicy.wsaDirectory.passwordExpiration.passwordLifetime -warnDays $customPolicy.wsaDirectory.passwordExpiration.passwordReminder -reminderDays $customPolicy.wsaDirectory.passwordExpiration.passwordReminderFrequency -tempPasswordHours $customPolicy.wsaDirectory.passwordExpiration.temporaryPassword -WarningAction SilentlyContinue -ErrorAction SilentlyContinue -WarningVariable WarnMsg -ErrorVariable ErrorMsg if ( $StatusMsg ) { Write-LogMessage -Type INFO -Message "$StatusMsg" } if ( $WarnMsg ) { Write-LogMessage -Type WARNING -Message $WarnMsg -Colour Magenta } if ( $ErrorMsg ) { Write-LogMessage -Type ERROR -Message $ErrorMsg -Colour Red } - Write-LogMessage -Type INFO -Message "Configuring Workspace ONE Access Local Directory: Password Complexity Policy for instance ($($wsaFqdn))" + Write-LogMessage -Type INFO -Message "Configuring Workspace ONE Access Directory: Password Complexity Policy for instance ($($wsaFqdn))" $StatusMsg = Update-WsaPasswordComplexity -server $wsaFqdn -user admin -pass $wsaAdminPass -minLength $customPolicy.wsaDirectory.passwordComplexity.minLength -minLowercase $customPolicy.wsaDirectory.passwordComplexity.minLowercase -minUppercase $customPolicy.wsaDirectory.passwordComplexity.minUppercase -minNumeric $customPolicy.wsaDirectory.passwordComplexity.minNumerical -minSpecial $customPolicy.wsaDirectory.passwordComplexity.minSpecial -maxIdenticalAdjacent $customPolicy.wsaDirectory.passwordComplexity.maxIdenticalAdjacent -maxPreviousCharacters $customPolicy.wsaDirectory.passwordComplexity.history -history $customPolicy.wsaDirectory.passwordComplexity.history -WarningAction SilentlyContinue -ErrorAction SilentlyContinue -WarningVariable WarnMsg -ErrorVariable ErrorMsg if ( $StatusMsg ) { Write-LogMessage -Type INFO -Message "$StatusMsg" } if ( $WarnMsg ) { Write-LogMessage -Type WARNING -Message $WarnMsg -Colour Magenta } if ( $ErrorMsg ) { Write-LogMessage -Type ERROR -Message $ErrorMsg -Colour Red } - Write-LogMessage -Type INFO -Message "Configuring Workspace ONE Access Local Directory: Account Lockout Policy for instance ($($wsaFqdn))" + Write-LogMessage -Type INFO -Message "Configuring Workspace ONE Access Directory: Account Lockout Policy for instance ($($wsaFqdn))" $StatusMsg = Update-WsaAccountLockout -server $wsaFqdn -user admin -pass $wsaAdminPass -failures $customPolicy.wsaDirectory.accountLockout.maxFailures -failureInterval $customPolicy.wsaDirectory.accountLockout.failedAttemptInterval -unlockInterval $customPolicy.wsaDirectory.accountLockout.unlockInterval -WarningAction SilentlyContinue -ErrorAction SilentlyContinue -WarningVariable WarnMsg -ErrorVariable ErrorMsg if ( $StatusMsg ) { Write-LogMessage -Type INFO -Message "$StatusMsg" } if ( $WarnMsg ) { Write-LogMessage -Type WARNING -Message $WarnMsg -Colour Magenta } if ( $ErrorMsg ) { Write-LogMessage -Type ERROR -Message $ErrorMsg -Colour Red } - Write-LogMessage -Type INFO -Message "Completed Configuring Password Policies for Workspace ONE Access Local Directory" -Colour Yellow + Write-LogMessage -Type INFO -Message "Completed Configuring Password Policies for Workspace ONE Access Directory" -Colour Yellow # Workspace ONE Access Local User Password Policies Write-LogMessage -Type INFO -Message "Configuring Password Policies for Workspace ONE Access Local Users" -Colour Yellow @@ -1148,7 +1148,7 @@ Function Get-PasswordPolicyDefault { .DESCRIPTION The Get-PasswordPolicyDefault cmdlet returns the default password policy settings, it can also be used to - generate the base JSON file used with Password Policy Manager. Default settings for VMware products include: + generate the base JSON file used with Password Policy. Default settings for VMware products include: - VMware SDDC Manager - VMware ESX - VMware vCenter Single Sign-On @@ -1218,342 +1218,342 @@ Function Get-PasswordPolicyDefault { } # Add VCF version into JSON file - $vcfVersion = New-Object -TypeName psobject - $vcfVersion | Add-Member -notepropertyname 'vcfVersion' -notepropertyvalue $version + $vcfVersion = New-Object -TypeName PSObject + $vcfVersion | Add-Member -NotePropertyName 'vcfVersion' -NotePropertyValue $version # Build Default ESX Password Policy Settings - $esxiPasswordExpiration = New-Object -TypeName psobject - $esxiPasswordExpiration | Add-Member -notepropertyname 'maxDays' -notepropertyvalue "99999" - $esxiPasswordComplexity = New-Object -TypeName psobject - $esxiPasswordComplexity | Add-Member -notepropertyname 'policy' -notepropertyvalue "retry=3 min=disabled,disabled,disabled,7,7" - $esxiPasswordComplexity | Add-Member -notepropertyname 'history' -notepropertyvalue "0" - $esxiAccountLockout = New-Object -TypeName psobject - $esxiAccountLockout | Add-Member -notepropertyname 'maxFailures' -notepropertyvalue "5" - $esxiAccountLockout | Add-Member -notepropertyname 'unlockInterval' -notepropertyvalue "900" - $esxiPasswordPolicy = New-Object -TypeName psobject - $esxiPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $esxiPasswordExpiration - $esxiPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $esxiPasswordComplexity - $esxiPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $esxiAccountLockout + $esxiPasswordExpiration = New-Object -TypeName PSObject + $esxiPasswordExpiration | Add-Member -NotePropertyName 'maxDays' -NotePropertyValue "99999" + $esxiPasswordComplexity = New-Object -TypeName PSObject + $esxiPasswordComplexity | Add-Member -NotePropertyName 'policy' -NotePropertyValue "retry=3 min=disabled,disabled,disabled,7,7" + $esxiPasswordComplexity | Add-Member -NotePropertyName 'history' -NotePropertyValue "0" + $esxiAccountLockout = New-Object -TypeName PSObject + $esxiAccountLockout | Add-Member -NotePropertyName 'maxFailures' -NotePropertyValue "5" + $esxiAccountLockout | Add-Member -NotePropertyName 'unlockInterval' -NotePropertyValue "900" + $esxiPasswordPolicy = New-Object -TypeName PSObject + $esxiPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $esxiPasswordExpiration + $esxiPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $esxiPasswordComplexity + $esxiPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $esxiAccountLockout # Build Default vCenter Single Sign-On Password Policy Settings - $ssoPasswordExpiration = New-Object -TypeName psobject - $ssoPasswordExpiration | Add-Member -notepropertyname 'maxDays' -notepropertyvalue "90" - $ssoPasswordComplexity = New-Object -TypeName psobject - $ssoPasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "8" - $ssoPasswordComplexity | Add-Member -notepropertyname 'maxLength' -notepropertyvalue "20" - $ssoPasswordComplexity | Add-Member -notepropertyname 'minAlphabetic' -notepropertyvalue "2" - $ssoPasswordComplexity | Add-Member -notepropertyname 'minLowercase' -notepropertyvalue "1" - $ssoPasswordComplexity | Add-Member -notepropertyname 'minUppercase' -notepropertyvalue "1" - $ssoPasswordComplexity | Add-Member -notepropertyname 'minNumerical' -notepropertyvalue "1" - $ssoPasswordComplexity | Add-Member -notepropertyname 'minSpecial' -notepropertyvalue "1" - $ssoPasswordComplexity | Add-Member -notepropertyname 'maxIdenticalAdjacent' -notepropertyvalue "1" - $ssoPasswordComplexity | Add-Member -notepropertyname 'history' -notepropertyvalue "5" - $ssoAccountLockout = New-Object -TypeName psobject - $ssoAccountLockout | Add-Member -notepropertyname 'maxFailures' -notepropertyvalue "5" - $ssoAccountLockout | Add-Member -notepropertyname 'unlockInterval' -notepropertyvalue "900" - $ssoAccountLockout | Add-Member -notepropertyname 'failedAttemptInterval' -notepropertyvalue "180" - $ssoPasswordPolicy = New-Object -TypeName psobject - $ssoPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $ssoPasswordExpiration - $ssoPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $ssoPasswordComplexity - $ssoPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $ssoAccountLockout + $ssoPasswordExpiration = New-Object -TypeName PSObject + $ssoPasswordExpiration | Add-Member -NotePropertyName 'maxDays' -NotePropertyValue "90" + $ssoPasswordComplexity = New-Object -TypeName PSObject + $ssoPasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "8" + $ssoPasswordComplexity | Add-Member -NotePropertyName 'maxLength' -NotePropertyValue "20" + $ssoPasswordComplexity | Add-Member -NotePropertyName 'minAlphabetic' -NotePropertyValue "2" + $ssoPasswordComplexity | Add-Member -NotePropertyName 'minLowercase' -NotePropertyValue "1" + $ssoPasswordComplexity | Add-Member -NotePropertyName 'minUppercase' -NotePropertyValue "1" + $ssoPasswordComplexity | Add-Member -NotePropertyName 'minNumerical' -NotePropertyValue "1" + $ssoPasswordComplexity | Add-Member -NotePropertyName 'minSpecial' -NotePropertyValue "1" + $ssoPasswordComplexity | Add-Member -NotePropertyName 'maxIdenticalAdjacent' -NotePropertyValue "1" + $ssoPasswordComplexity | Add-Member -NotePropertyName 'history' -NotePropertyValue "5" + $ssoAccountLockout = New-Object -TypeName PSObject + $ssoAccountLockout | Add-Member -NotePropertyName 'maxFailures' -NotePropertyValue "5" + $ssoAccountLockout | Add-Member -NotePropertyName 'unlockInterval' -NotePropertyValue "900" + $ssoAccountLockout | Add-Member -NotePropertyName 'failedAttemptInterval' -NotePropertyValue "180" + $ssoPasswordPolicy = New-Object -TypeName PSObject + $ssoPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $ssoPasswordExpiration + $ssoPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $ssoPasswordComplexity + $ssoPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $ssoAccountLockout # Build Default vCenter Password Policy Settings - $vcenterPasswordExpiration = New-Object -TypeName psobject - $vcenterPasswordExpiration | Add-Member -notepropertyname 'maxDays' -notepropertyvalue "90" - $vcenterPasswordExpiration | Add-Member -notepropertyname 'minDays' -notepropertyvalue "0" - $vcenterPasswordExpiration | Add-Member -notepropertyname 'warningDays' -notepropertyvalue "7" - $vcenterPasswordPolicy = New-Object -TypeName psobject - $vcenterPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $vcenterPasswordExpiration + $vcenterPasswordExpiration = New-Object -TypeName PSObject + $vcenterPasswordExpiration | Add-Member -NotePropertyName 'maxDays' -NotePropertyValue "90" + $vcenterPasswordExpiration | Add-Member -NotePropertyName 'minDays' -NotePropertyValue "0" + $vcenterPasswordExpiration | Add-Member -NotePropertyName 'warningDays' -NotePropertyValue "7" + $vcenterPasswordPolicy = New-Object -TypeName PSObject + $vcenterPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $vcenterPasswordExpiration # Build Default vCenter Local Users Password Policy Settings - $vcenterLocalPasswordExpiration = New-Object -TypeName psobject - $vcenterLocalPasswordExpiration | Add-Member -notepropertyname 'maxDays' -notepropertyvalue "90" - $vcenterLocalPasswordExpiration | Add-Member -notepropertyname 'minDays' -notepropertyvalue "0" - $vcenterLocalPasswordExpiration | Add-Member -notepropertyname 'warningDays' -notepropertyvalue "7" - $vcenterLocalPasswordExpiration | Add-Member -notepropertyname 'email' -notepropertyvalue "" - $vcenterLocalPasswordComplexity = New-Object -TypeName psobject - $vcenterLocalPasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "6" - $vcenterLocalPasswordComplexity | Add-Member -notepropertyname 'minLowercase' -notepropertyvalue "-1" - $vcenterLocalPasswordComplexity | Add-Member -notepropertyname 'minUppercase' -notepropertyvalue "-1" - $vcenterLocalPasswordComplexity | Add-Member -notepropertyname 'minNumerical' -notepropertyvalue "-1" - $vcenterLocalPasswordComplexity | Add-Member -notepropertyname 'minSpecial' -notepropertyvalue "-1" - $vcenterLocalPasswordComplexity | Add-Member -notepropertyname 'minUnique' -notepropertyvalue "4" - $vcenterLocalPasswordComplexity | Add-Member -notepropertyname 'history' -notepropertyvalue "5" - $vcenterLocalAccountLockout = New-Object -TypeName psobject - $vcenterLocalAccountLockout | Add-Member -notepropertyname 'maxFailures' -notepropertyvalue "3" - $vcenterLocalAccountLockout | Add-Member -notepropertyname 'unlockInterval' -notepropertyvalue "900" - $vcenterLocalAccountLockout | Add-Member -notepropertyname 'rootUnlockInterval' -notepropertyvalue "300" - $vcenterLocalPasswordPolicy = New-Object -TypeName psobject - $vcenterLocalPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $vcenterLocalPasswordExpiration - $vcenterLocalPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $vcenterLocalPasswordComplexity - $vcenterLocalPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $vcenterLocalAccountLockout + $vcenterLocalPasswordExpiration = New-Object -TypeName PSObject + $vcenterLocalPasswordExpiration | Add-Member -NotePropertyName 'maxDays' -NotePropertyValue "90" + $vcenterLocalPasswordExpiration | Add-Member -NotePropertyName 'minDays' -NotePropertyValue "0" + $vcenterLocalPasswordExpiration | Add-Member -NotePropertyName 'warningDays' -NotePropertyValue "7" + $vcenterLocalPasswordExpiration | Add-Member -NotePropertyName 'email' -NotePropertyValue "" + $vcenterLocalPasswordComplexity = New-Object -TypeName PSObject + $vcenterLocalPasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "6" + $vcenterLocalPasswordComplexity | Add-Member -NotePropertyName 'minLowercase' -NotePropertyValue "-1" + $vcenterLocalPasswordComplexity | Add-Member -NotePropertyName 'minUppercase' -NotePropertyValue "-1" + $vcenterLocalPasswordComplexity | Add-Member -NotePropertyName 'minNumerical' -NotePropertyValue "-1" + $vcenterLocalPasswordComplexity | Add-Member -NotePropertyName 'minSpecial' -NotePropertyValue "-1" + $vcenterLocalPasswordComplexity | Add-Member -NotePropertyName 'minUnique' -NotePropertyValue "4" + $vcenterLocalPasswordComplexity | Add-Member -NotePropertyName 'history' -NotePropertyValue "5" + $vcenterLocalAccountLockout = New-Object -TypeName PSObject + $vcenterLocalAccountLockout | Add-Member -NotePropertyName 'maxFailures' -NotePropertyValue "3" + $vcenterLocalAccountLockout | Add-Member -NotePropertyName 'unlockInterval' -NotePropertyValue "900" + $vcenterLocalAccountLockout | Add-Member -NotePropertyName 'rootUnlockInterval' -NotePropertyValue "300" + $vcenterLocalPasswordPolicy = New-Object -TypeName PSObject + $vcenterLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $vcenterLocalPasswordExpiration + $vcenterLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $vcenterLocalPasswordComplexity + $vcenterLocalPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $vcenterLocalAccountLockout # Build Default NSX Manager Local Users Password Policy Settings - $nsxManagerPasswordExpiration = New-Object -TypeName psobject - $nsxManagerPasswordExpiration | Add-Member -notepropertyname 'maxDays' -notepropertyvalue "90" - $nsxManagerPasswordComplexity = New-Object -TypeName psobject + $nsxManagerPasswordExpiration = New-Object -TypeName PSObject + $nsxManagerPasswordExpiration | Add-Member -NotePropertyName 'maxDays' -NotePropertyValue "90" + $nsxManagerPasswordComplexity = New-Object -TypeName PSObject if ($version -ge "5.0") { - $nsxManagerPasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "12" + $nsxManagerPasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "12" } else { - $nsxManagerPasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "15" + $nsxManagerPasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "15" } - $nsxManagerPasswordComplexity | Add-Member -notepropertyname 'minLowercase' -notepropertyvalue "-1" - $nsxManagerPasswordComplexity | Add-Member -notepropertyname 'minUppercase' -notepropertyvalue "-1" - $nsxManagerPasswordComplexity | Add-Member -notepropertyname 'minNumerical' -notepropertyvalue "-1" - $nsxManagerPasswordComplexity | Add-Member -notepropertyname 'minSpecial' -notepropertyvalue "-1" - $nsxManagerPasswordComplexity | Add-Member -notepropertyname 'minUnique' -notepropertyvalue "0" - $nsxManagerPasswordComplexity | Add-Member -notepropertyname 'retries' -notepropertyvalue "3" + $nsxManagerPasswordComplexity | Add-Member -NotePropertyName 'minLowercase' -NotePropertyValue "-1" + $nsxManagerPasswordComplexity | Add-Member -NotePropertyName 'minUppercase' -NotePropertyValue "-1" + $nsxManagerPasswordComplexity | Add-Member -NotePropertyName 'minNumerical' -NotePropertyValue "-1" + $nsxManagerPasswordComplexity | Add-Member -NotePropertyName 'minSpecial' -NotePropertyValue "-1" + $nsxManagerPasswordComplexity | Add-Member -NotePropertyName 'minUnique' -NotePropertyValue "0" + $nsxManagerPasswordComplexity | Add-Member -NotePropertyName 'retries' -NotePropertyValue "3" if ($version -ge "5.0") { - $nsxManagerPasswordComplexity | Add-Member -notepropertyname 'maxLength' -notepropertyvalue "128" - $nsxManagerPasswordComplexity | Add-Member -notepropertyname 'maxSequence' -notepropertyvalue "0" - $nsxManagerPasswordComplexity | Add-Member -notepropertyname 'maxRepeat' -notepropertyvalue "0" - $nsxManagerPasswordComplexity | Add-Member -notepropertyname 'passwordRemembrance' -notepropertyvalue "0" - $nsxManagerPasswordComplexity | Add-Member -notepropertyname 'hashAlgorithm' -notepropertyvalue "sha512" + $nsxManagerPasswordComplexity | Add-Member -NotePropertyName 'maxLength' -NotePropertyValue "128" + $nsxManagerPasswordComplexity | Add-Member -NotePropertyName 'maxSequence' -NotePropertyValue "0" + $nsxManagerPasswordComplexity | Add-Member -NotePropertyName 'maxRepeat' -NotePropertyValue "0" + $nsxManagerPasswordComplexity | Add-Member -NotePropertyName 'passwordRemembrance' -NotePropertyValue "0" + $nsxManagerPasswordComplexity | Add-Member -NotePropertyName 'hashAlgorithm' -NotePropertyValue "sha512" } - $nsxManagerAccountLockout = New-Object -TypeName psobject - $nsxManagerAccountLockout | Add-Member -notepropertyname 'apiMaxFailures' -notepropertyvalue "5" - $nsxManagerAccountLockout | Add-Member -notepropertyname 'apiUnlockInterval' -notepropertyvalue "900" - $nsxManagerAccountLockout | Add-Member -notepropertyname 'apiRestInterval' -notepropertyvalue "180" - $nsxManagerAccountLockout | Add-Member -notepropertyname 'cliMaxFailures' -notepropertyvalue "5" - $nsxManagerAccountLockout | Add-Member -notepropertyname 'cliUnlockInterval' -notepropertyvalue "900" - $nsxManagerPasswordPolicy = New-Object -TypeName psobject - $nsxManagerPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $nsxManagerPasswordExpiration - $nsxManagerPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $nsxManagerPasswordComplexity - $nsxManagerPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $nsxManagerAccountLockout + $nsxManagerAccountLockout = New-Object -TypeName PSObject + $nsxManagerAccountLockout | Add-Member -NotePropertyName 'apiMaxFailures' -NotePropertyValue "5" + $nsxManagerAccountLockout | Add-Member -NotePropertyName 'apiUnlockInterval' -NotePropertyValue "900" + $nsxManagerAccountLockout | Add-Member -NotePropertyName 'apiRestInterval' -NotePropertyValue "180" + $nsxManagerAccountLockout | Add-Member -NotePropertyName 'cliMaxFailures' -NotePropertyValue "5" + $nsxManagerAccountLockout | Add-Member -NotePropertyName 'cliUnlockInterval' -NotePropertyValue "900" + $nsxManagerPasswordPolicy = New-Object -TypeName PSObject + $nsxManagerPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $nsxManagerPasswordExpiration + $nsxManagerPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $nsxManagerPasswordComplexity + $nsxManagerPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $nsxManagerAccountLockout # Build Default NSX Edge Local Users Password Policy Settings - $nsxEdgePasswordExpiration = New-Object -TypeName psobject - $nsxEdgePasswordExpiration | Add-Member -notepropertyname 'maxDays' -notepropertyvalue "90" - $nsxEdgePasswordComplexity = New-Object -TypeName psobject - $nsxEdgePasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "15" - $nsxEdgePasswordComplexity | Add-Member -notepropertyname 'minLowercase' -notepropertyvalue "-1" - $nsxEdgePasswordComplexity | Add-Member -notepropertyname 'minUppercase' -notepropertyvalue "-1" - $nsxEdgePasswordComplexity | Add-Member -notepropertyname 'minNumerical' -notepropertyvalue "-1" - $nsxEdgePasswordComplexity | Add-Member -notepropertyname 'minSpecial' -notepropertyvalue "-1" - $nsxEdgePasswordComplexity | Add-Member -notepropertyname 'minUnique' -notepropertyvalue "0" - $nsxEdgePasswordComplexity | Add-Member -notepropertyname 'retries' -notepropertyvalue "3" - $nsxEdgeAccountLockout = New-Object -TypeName psobject - $nsxEdgeAccountLockout | Add-Member -notepropertyname 'cliMaxFailures' -notepropertyvalue "5" - $nsxEdgeAccountLockout | Add-Member -notepropertyname 'cliUnlockInterval' -notepropertyvalue "900" - $nsxEdgePasswordPolicy = New-Object -TypeName psobject - $nsxEdgePasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $nsxEdgePasswordExpiration - $nsxEdgePasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $nsxEdgePasswordComplexity - $nsxEdgePasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $nsxEdgeAccountLockout + $nsxEdgePasswordExpiration = New-Object -TypeName PSObject + $nsxEdgePasswordExpiration | Add-Member -NotePropertyName 'maxDays' -NotePropertyValue "90" + $nsxEdgePasswordComplexity = New-Object -TypeName PSObject + $nsxEdgePasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "15" + $nsxEdgePasswordComplexity | Add-Member -NotePropertyName 'minLowercase' -NotePropertyValue "-1" + $nsxEdgePasswordComplexity | Add-Member -NotePropertyName 'minUppercase' -NotePropertyValue "-1" + $nsxEdgePasswordComplexity | Add-Member -NotePropertyName 'minNumerical' -NotePropertyValue "-1" + $nsxEdgePasswordComplexity | Add-Member -NotePropertyName 'minSpecial' -NotePropertyValue "-1" + $nsxEdgePasswordComplexity | Add-Member -NotePropertyName 'minUnique' -NotePropertyValue "0" + $nsxEdgePasswordComplexity | Add-Member -NotePropertyName 'retries' -NotePropertyValue "3" + $nsxEdgeAccountLockout = New-Object -TypeName PSObject + $nsxEdgeAccountLockout | Add-Member -NotePropertyName 'cliMaxFailures' -NotePropertyValue "5" + $nsxEdgeAccountLockout | Add-Member -NotePropertyName 'cliUnlockInterval' -NotePropertyValue "900" + $nsxEdgePasswordPolicy = New-Object -TypeName PSObject + $nsxEdgePasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $nsxEdgePasswordExpiration + $nsxEdgePasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $nsxEdgePasswordComplexity + $nsxEdgePasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $nsxEdgeAccountLockout # Build Default SDDC Manager Local Users Password Policy Settings - $sddcManagerPasswordExpiration = New-Object -TypeName psobject - $sddcManagerPasswordExpiration | Add-Member -notepropertyname 'maxDays' -notepropertyvalue "90" - $sddcManagerPasswordExpiration | Add-Member -notepropertyname 'minDays' -notepropertyvalue "0" - $sddcManagerPasswordExpiration | Add-Member -notepropertyname 'warningDays' -notepropertyvalue "7" - $sddcManagerPasswordComplexity = New-Object -TypeName psobject + $sddcManagerPasswordExpiration = New-Object -TypeName PSObject + $sddcManagerPasswordExpiration | Add-Member -NotePropertyName 'maxDays' -NotePropertyValue "90" + $sddcManagerPasswordExpiration | Add-Member -NotePropertyName 'minDays' -NotePropertyValue "0" + $sddcManagerPasswordExpiration | Add-Member -NotePropertyName 'warningDays' -NotePropertyValue "7" + $sddcManagerPasswordComplexity = New-Object -TypeName PSObject if ($version -ge "5.2") { - $sddcManagerPasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "15" + $sddcManagerPasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "15" } elseif ($version -ge "5.1") { - $sddcManagerPasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "12" + $sddcManagerPasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "12" } else { - $sddcManagerPasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "8" + $sddcManagerPasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "8" } - $sddcManagerPasswordComplexity | Add-Member -notepropertyname 'minLowercase' -notepropertyvalue "-1" - $sddcManagerPasswordComplexity | Add-Member -notepropertyname 'minUppercase' -notepropertyvalue "-1" - $sddcManagerPasswordComplexity | Add-Member -notepropertyname 'minNumerical' -notepropertyvalue "-1" - $sddcManagerPasswordComplexity | Add-Member -notepropertyname 'minSpecial' -notepropertyvalue "-1" - $sddcManagerPasswordComplexity | Add-Member -notepropertyname 'minUnique' -notepropertyvalue "4" - $sddcManagerPasswordComplexity | Add-Member -notepropertyname 'minClass' -notepropertyvalue "4" - $sddcManagerPasswordComplexity | Add-Member -notepropertyname 'maxSequence' -notepropertyvalue "0" - $sddcManagerPasswordComplexity | Add-Member -notepropertyname 'retries' -notepropertyvalue "3" - $sddcManagerPasswordComplexity | Add-Member -notepropertyname 'history' -notepropertyvalue "5" - $sddcManagerAccountLockout = New-Object -TypeName psobject - $sddcManagerAccountLockout | Add-Member -notepropertyname 'maxFailures' -notepropertyvalue "3" - $sddcManagerAccountLockout | Add-Member -notepropertyname 'unlockInterval' -notepropertyvalue "86400" - $sddcManagerAccountLockout | Add-Member -notepropertyname 'rootUnlockInterval' -notepropertyvalue "300" - $sddcManagerPasswordPolicy = New-Object -TypeName psobject - $sddcManagerPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $sddcManagerPasswordExpiration - $sddcManagerPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $sddcManagerPasswordComplexity - $sddcManagerPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $sddcManagerAccountLockout + $sddcManagerPasswordComplexity | Add-Member -NotePropertyName 'minLowercase' -NotePropertyValue "-1" + $sddcManagerPasswordComplexity | Add-Member -NotePropertyName 'minUppercase' -NotePropertyValue "-1" + $sddcManagerPasswordComplexity | Add-Member -NotePropertyName 'minNumerical' -NotePropertyValue "-1" + $sddcManagerPasswordComplexity | Add-Member -NotePropertyName 'minSpecial' -NotePropertyValue "-1" + $sddcManagerPasswordComplexity | Add-Member -NotePropertyName 'minUnique' -NotePropertyValue "4" + $sddcManagerPasswordComplexity | Add-Member -NotePropertyName 'minClass' -NotePropertyValue "4" + $sddcManagerPasswordComplexity | Add-Member -NotePropertyName 'maxSequence' -NotePropertyValue "0" + $sddcManagerPasswordComplexity | Add-Member -NotePropertyName 'retries' -NotePropertyValue "3" + $sddcManagerPasswordComplexity | Add-Member -NotePropertyName 'history' -NotePropertyValue "5" + $sddcManagerAccountLockout = New-Object -TypeName PSObject + $sddcManagerAccountLockout | Add-Member -NotePropertyName 'maxFailures' -NotePropertyValue "3" + $sddcManagerAccountLockout | Add-Member -NotePropertyName 'unlockInterval' -NotePropertyValue "86400" + $sddcManagerAccountLockout | Add-Member -NotePropertyName 'rootUnlockInterval' -NotePropertyValue "300" + $sddcManagerPasswordPolicy = New-Object -TypeName PSObject + $sddcManagerPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $sddcManagerPasswordExpiration + $sddcManagerPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $sddcManagerPasswordComplexity + $sddcManagerPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $sddcManagerAccountLockout # Build Default Workspace ONE Access Local Users Password Policy Settings - $wsaLocalPasswordExpiration = New-Object -TypeName psobject - $wsaLocalPasswordExpiration | Add-Member -notepropertyname 'maxDays' -notepropertyvalue "60" - $wsaLocalPasswordExpiration | Add-Member -notepropertyname 'minDays' -notepropertyvalue "0" - $wsaLocalPasswordExpiration | Add-Member -notepropertyname 'warningDays' -notepropertyvalue "7" - $wsaLocalPasswordComplexity = New-Object -TypeName psobject - $wsaLocalPasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "6" - $wsaLocalPasswordComplexity | Add-Member -notepropertyname 'minLowercase' -notepropertyvalue "0" - $wsaLocalPasswordComplexity | Add-Member -notepropertyname 'minUppercase' -notepropertyvalue "0" - $wsaLocalPasswordComplexity | Add-Member -notepropertyname 'minNumerical' -notepropertyvalue "0" - $wsaLocalPasswordComplexity | Add-Member -notepropertyname 'minSpecial' -notepropertyvalue "0" - $wsaLocalPasswordComplexity | Add-Member -notepropertyname 'maxIdenticalAdjacent' -notepropertyvalue "0" - $wsaLocalPasswordComplexity | Add-Member -notepropertyname 'history' -notepropertyvalue "5" - $wsaLocalPasswordComplexity | Add-Member -notepropertyname 'retries' -notepropertyvalue "3" - $wsaLocalAccountLockout = New-Object -TypeName psobject - $wsaLocalAccountLockout | Add-Member -notepropertyname 'maxFailures' -notepropertyvalue "3" - $wsaLocalAccountLockout | Add-Member -notepropertyname 'unlockInterval' -notepropertyvalue "900" - $wsaLocalAccountLockout | Add-Member -notepropertyname 'rootUnlockInterval' -notepropertyvalue "900" - $wsaLocalPasswordPolicy = New-Object -TypeName psobject - $wsaLocalPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $wsaLocalPasswordExpiration - $wsaLocalPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $wsaLocalPasswordComplexity - $wsaLocalPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $wsaLocalAccountLockout + $wsaLocalPasswordExpiration = New-Object -TypeName PSObject + $wsaLocalPasswordExpiration | Add-Member -NotePropertyName 'maxDays' -NotePropertyValue "60" + $wsaLocalPasswordExpiration | Add-Member -NotePropertyName 'minDays' -NotePropertyValue "0" + $wsaLocalPasswordExpiration | Add-Member -NotePropertyName 'warningDays' -NotePropertyValue "7" + $wsaLocalPasswordComplexity = New-Object -TypeName PSObject + $wsaLocalPasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "6" + $wsaLocalPasswordComplexity | Add-Member -NotePropertyName 'minLowercase' -NotePropertyValue "0" + $wsaLocalPasswordComplexity | Add-Member -NotePropertyName 'minUppercase' -NotePropertyValue "0" + $wsaLocalPasswordComplexity | Add-Member -NotePropertyName 'minNumerical' -NotePropertyValue "0" + $wsaLocalPasswordComplexity | Add-Member -NotePropertyName 'minSpecial' -NotePropertyValue "0" + $wsaLocalPasswordComplexity | Add-Member -NotePropertyName 'maxIdenticalAdjacent' -NotePropertyValue "0" + $wsaLocalPasswordComplexity | Add-Member -NotePropertyName 'history' -NotePropertyValue "5" + $wsaLocalPasswordComplexity | Add-Member -NotePropertyName 'retries' -NotePropertyValue "3" + $wsaLocalAccountLockout = New-Object -TypeName PSObject + $wsaLocalAccountLockout | Add-Member -NotePropertyName 'maxFailures' -NotePropertyValue "3" + $wsaLocalAccountLockout | Add-Member -NotePropertyName 'unlockInterval' -NotePropertyValue "900" + $wsaLocalAccountLockout | Add-Member -NotePropertyName 'rootUnlockInterval' -NotePropertyValue "900" + $wsaLocalPasswordPolicy = New-Object -TypeName PSObject + $wsaLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $wsaLocalPasswordExpiration + $wsaLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $wsaLocalPasswordComplexity + $wsaLocalPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $wsaLocalAccountLockout # Build Default Workspace ONE Access Directory Users Password Policy Settings - $wsaDirectoryPasswordExpiration = New-Object -TypeName psobject - $wsaDirectoryPasswordExpiration | Add-Member -notepropertyname 'passwordLifetime' -notepropertyvalue "0" - $wsaDirectoryPasswordExpiration | Add-Member -notepropertyname 'passwordReminder' -notepropertyvalue "0" - $wsaDirectoryPasswordExpiration | Add-Member -notepropertyname 'passwordReminderFrequency' -notepropertyvalue "0" - $wsaDirectoryPasswordExpiration | Add-Member -notepropertyname 'temporaryPassword' -notepropertyvalue "168" - $wsaDirectoryPasswordComplexity = New-Object -TypeName psobject - $wsaDirectoryPasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "8" - $wsaDirectoryPasswordComplexity | Add-Member -notepropertyname 'minLowercase' -notepropertyvalue "0" - $wsaDirectoryPasswordComplexity | Add-Member -notepropertyname 'minUppercase' -notepropertyvalue "0" - $wsaDirectoryPasswordComplexity | Add-Member -notepropertyname 'minNumerical' -notepropertyvalue "0" - $wsaDirectoryPasswordComplexity | Add-Member -notepropertyname 'minSpecial' -notepropertyvalue "0" - $wsaDirectoryPasswordComplexity | Add-Member -notepropertyname 'maxIdenticalAdjacent' -notepropertyvalue "0" - $wsaDirectoryPasswordComplexity | Add-Member -notepropertyname 'history' -notepropertyvalue "0" - $wsaDirectoryAccountLockout = New-Object -TypeName psobject - $wsaDirectoryAccountLockout | Add-Member -notepropertyname 'maxFailures' -notepropertyvalue "5" - $wsaDirectoryAccountLockout | Add-Member -notepropertyname 'unlockInterval' -notepropertyvalue "900" - $wsaDirectoryAccountLockout | Add-Member -notepropertyname 'failedAttemptInterval' -notepropertyvalue "900" - $wsaDirectoryPasswordPolicy = New-Object -TypeName psobject - $wsaDirectoryPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $wsaDirectoryPasswordExpiration - $wsaDirectoryPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $wsaDirectoryPasswordComplexity - $wsaDirectoryPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $wsaDirectoryAccountLockout + $wsaDirectoryPasswordExpiration = New-Object -TypeName PSObject + $wsaDirectoryPasswordExpiration | Add-Member -NotePropertyName 'passwordLifetime' -NotePropertyValue "0" + $wsaDirectoryPasswordExpiration | Add-Member -NotePropertyName 'passwordReminder' -NotePropertyValue "0" + $wsaDirectoryPasswordExpiration | Add-Member -NotePropertyName 'passwordReminderFrequency' -NotePropertyValue "0" + $wsaDirectoryPasswordExpiration | Add-Member -NotePropertyName 'temporaryPassword' -NotePropertyValue "168" + $wsaDirectoryPasswordComplexity = New-Object -TypeName PSObject + $wsaDirectoryPasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "8" + $wsaDirectoryPasswordComplexity | Add-Member -NotePropertyName 'minLowercase' -NotePropertyValue "0" + $wsaDirectoryPasswordComplexity | Add-Member -NotePropertyName 'minUppercase' -NotePropertyValue "0" + $wsaDirectoryPasswordComplexity | Add-Member -NotePropertyName 'minNumerical' -NotePropertyValue "0" + $wsaDirectoryPasswordComplexity | Add-Member -NotePropertyName 'minSpecial' -NotePropertyValue "0" + $wsaDirectoryPasswordComplexity | Add-Member -NotePropertyName 'maxIdenticalAdjacent' -NotePropertyValue "0" + $wsaDirectoryPasswordComplexity | Add-Member -NotePropertyName 'history' -NotePropertyValue "0" + $wsaDirectoryAccountLockout = New-Object -TypeName PSObject + $wsaDirectoryAccountLockout | Add-Member -NotePropertyName 'maxFailures' -NotePropertyValue "5" + $wsaDirectoryAccountLockout | Add-Member -NotePropertyName 'unlockInterval' -NotePropertyValue "900" + $wsaDirectoryAccountLockout | Add-Member -NotePropertyName 'failedAttemptInterval' -NotePropertyValue "900" + $wsaDirectoryPasswordPolicy = New-Object -TypeName PSObject + $wsaDirectoryPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $wsaDirectoryPasswordExpiration + $wsaDirectoryPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $wsaDirectoryPasswordComplexity + $wsaDirectoryPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $wsaDirectoryAccountLockout # Build Aria Automation Local Users Password Policy Settings - $vraLocalPasswordExpiration = New-Object -TypeName psobject - $vraLocalPasswordExpiration | Add-Member -notepropertyname 'minDays' -notepropertyvalue "0" - $vraLocalPasswordExpiration | Add-Member -notepropertyname 'maxDays' -notepropertyvalue "365" - $vraLocalPasswordExpiration | Add-Member -notepropertyname 'warningDays' -notepropertyvalue "7" - $vraLocalPasswordComplexity = New-Object -TypeName psobject - $vraLocalPasswordComplexity | Add-Member -notepropertyname 'minNumerical' -notepropertyvalue "-1" - $vraLocalPasswordComplexity | Add-Member -notepropertyname 'minUppercase' -notepropertyvalue "-1" - $vraLocalPasswordComplexity | Add-Member -notepropertyname 'minLowercase' -notepropertyvalue "-1" - $vraLocalPasswordComplexity | Add-Member -notepropertyname 'minUnique' -notepropertyvalue "4" - $vraLocalPasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "8" - $vraLocalPasswordComplexity | Add-Member -notepropertyname 'minClass' -notepropertyvalue "4" - $vraLocalPasswordComplexity | Add-Member -notepropertyname 'minSpecial' -notepropertyvalue "-1" - $vraLocalPasswordComplexity | Add-Member -notepropertyname 'retries' -notepropertyvalue "3" - $vraLocalPasswordComplexity | Add-Member -notepropertyname 'maxSequence' -notepropertyvalue "0" - $vraLocalPasswordComplexity | Add-Member -notepropertyname 'history' -notepropertyvalue "5" - $vraLocalAccountLockout = New-Object -TypeName psobject - $vraLocalAccountLockout | Add-Member -notepropertyname 'maxFailures' -notepropertyvalue "3" - $vraLocalAccountLockout | Add-Member -notepropertyname 'unlockInterval' -notepropertyvalue "86400" - $vraLocalAccountLockout | Add-Member -notepropertyname 'rootUnlockInterval' -notepropertyvalue "300" - $vraLocalPasswordPolicy = New-Object -TypeName psobject - $vraLocalPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $vraLocalPasswordExpiration - $vraLocalPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $vraLocalPasswordComplexity - $vraLocalPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $vraLocalAccountLockout + $vraLocalPasswordExpiration = New-Object -TypeName PSObject + $vraLocalPasswordExpiration | Add-Member -NotePropertyName 'minDays' -NotePropertyValue "0" + $vraLocalPasswordExpiration | Add-Member -NotePropertyName 'maxDays' -NotePropertyValue "365" + $vraLocalPasswordExpiration | Add-Member -NotePropertyName 'warningDays' -NotePropertyValue "7" + $vraLocalPasswordComplexity = New-Object -TypeName PSObject + $vraLocalPasswordComplexity | Add-Member -NotePropertyName 'minNumerical' -NotePropertyValue "-1" + $vraLocalPasswordComplexity | Add-Member -NotePropertyName 'minUppercase' -NotePropertyValue "-1" + $vraLocalPasswordComplexity | Add-Member -NotePropertyName 'minLowercase' -NotePropertyValue "-1" + $vraLocalPasswordComplexity | Add-Member -NotePropertyName 'minUnique' -NotePropertyValue "4" + $vraLocalPasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "8" + $vraLocalPasswordComplexity | Add-Member -NotePropertyName 'minClass' -NotePropertyValue "4" + $vraLocalPasswordComplexity | Add-Member -NotePropertyName 'minSpecial' -NotePropertyValue "-1" + $vraLocalPasswordComplexity | Add-Member -NotePropertyName 'retries' -NotePropertyValue "3" + $vraLocalPasswordComplexity | Add-Member -NotePropertyName 'maxSequence' -NotePropertyValue "0" + $vraLocalPasswordComplexity | Add-Member -NotePropertyName 'history' -NotePropertyValue "5" + $vraLocalAccountLockout = New-Object -TypeName PSObject + $vraLocalAccountLockout | Add-Member -NotePropertyName 'maxFailures' -NotePropertyValue "3" + $vraLocalAccountLockout | Add-Member -NotePropertyName 'unlockInterval' -NotePropertyValue "86400" + $vraLocalAccountLockout | Add-Member -NotePropertyName 'rootUnlockInterval' -NotePropertyValue "300" + $vraLocalPasswordPolicy = New-Object -TypeName PSObject + $vraLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $vraLocalPasswordExpiration + $vraLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $vraLocalPasswordComplexity + $vraLocalPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $vraLocalAccountLockout # Build Aria Operations Local Users Password Policy Settings - $vropsLocalPasswordExpiration = New-Object -TypeName psobject - $vropsLocalPasswordExpiration | Add-Member -notepropertyname 'minDays' -notepropertyvalue "0" - $vropsLocalPasswordExpiration | Add-Member -notepropertyname 'maxDays' -notepropertyvalue "365" - $vropsLocalPasswordExpiration | Add-Member -notepropertyname 'warningDays' -notepropertyvalue "7" - $vropsLocalPasswordComplexity = New-Object -TypeName psobject - $vropsLocalPasswordComplexity | Add-Member -notepropertyname 'minNumerical' -notepropertyvalue "-1" - $vropsLocalPasswordComplexity | Add-Member -notepropertyname 'minUppercase' -notepropertyvalue "-1" - $vropsLocalPasswordComplexity | Add-Member -notepropertyname 'minLowercase' -notepropertyvalue "-1" - $vropsLocalPasswordComplexity | Add-Member -notepropertyname 'minUnique' -notepropertyvalue "4" - $vropsLocalPasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "8" - $vropsLocalPasswordComplexity | Add-Member -notepropertyname 'minClass' -notepropertyvalue "4" - $vropsLocalPasswordComplexity | Add-Member -notepropertyname 'minSpecial' -notepropertyvalue "-1" - $vropsLocalPasswordComplexity | Add-Member -notepropertyname 'retries' -notepropertyvalue "3" - $vropsLocalPasswordComplexity | Add-Member -notepropertyname 'maxSequence' -notepropertyvalue "0" - $vropsLocalPasswordComplexity | Add-Member -notepropertyname 'history' -notepropertyvalue "5" - $vropsLocalAccountLockout = New-Object -TypeName psobject - $vropsLocalAccountLockout | Add-Member -notepropertyname 'maxFailures' -notepropertyvalue "3" - $vropsLocalAccountLockout | Add-Member -notepropertyname 'unlockInterval' -notepropertyvalue "900" - $vropsLocalAccountLockout | Add-Member -notepropertyname 'rootUnlockInterval' -notepropertyvalue "900" - $vropsLocalPasswordPolicy = New-Object -TypeName psobject - $vropsLocalPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $vropsLocalPasswordExpiration - $vropsLocalPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $vropsLocalPasswordComplexity - $vropsLocalPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $vropsLocalAccountLockout + $vropsLocalPasswordExpiration = New-Object -TypeName PSObject + $vropsLocalPasswordExpiration | Add-Member -NotePropertyName 'minDays' -NotePropertyValue "0" + $vropsLocalPasswordExpiration | Add-Member -NotePropertyName 'maxDays' -NotePropertyValue "365" + $vropsLocalPasswordExpiration | Add-Member -NotePropertyName 'warningDays' -NotePropertyValue "7" + $vropsLocalPasswordComplexity = New-Object -TypeName PSObject + $vropsLocalPasswordComplexity | Add-Member -NotePropertyName 'minNumerical' -NotePropertyValue "-1" + $vropsLocalPasswordComplexity | Add-Member -NotePropertyName 'minUppercase' -NotePropertyValue "-1" + $vropsLocalPasswordComplexity | Add-Member -NotePropertyName 'minLowercase' -NotePropertyValue "-1" + $vropsLocalPasswordComplexity | Add-Member -NotePropertyName 'minUnique' -NotePropertyValue "4" + $vropsLocalPasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "8" + $vropsLocalPasswordComplexity | Add-Member -NotePropertyName 'minClass' -NotePropertyValue "4" + $vropsLocalPasswordComplexity | Add-Member -NotePropertyName 'minSpecial' -NotePropertyValue "-1" + $vropsLocalPasswordComplexity | Add-Member -NotePropertyName 'retries' -NotePropertyValue "3" + $vropsLocalPasswordComplexity | Add-Member -NotePropertyName 'maxSequence' -NotePropertyValue "0" + $vropsLocalPasswordComplexity | Add-Member -NotePropertyName 'history' -NotePropertyValue "5" + $vropsLocalAccountLockout = New-Object -TypeName PSObject + $vropsLocalAccountLockout | Add-Member -NotePropertyName 'maxFailures' -NotePropertyValue "3" + $vropsLocalAccountLockout | Add-Member -NotePropertyName 'unlockInterval' -NotePropertyValue "900" + $vropsLocalAccountLockout | Add-Member -NotePropertyName 'rootUnlockInterval' -NotePropertyValue "900" + $vropsLocalPasswordPolicy = New-Object -TypeName PSObject + $vropsLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $vropsLocalPasswordExpiration + $vropsLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $vropsLocalPasswordComplexity + $vropsLocalPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $vropsLocalAccountLockout # Build Aria Operations Logs Local Users Password Policy Settings - $vrliLocalPasswordExpiration = New-Object -TypeName psobject - $vrliLocalPasswordExpiration | Add-Member -notepropertyname 'minDays' -notepropertyvalue "0" - $vrliLocalPasswordExpiration | Add-Member -notepropertyname 'maxDays' -notepropertyvalue "365" - $vrliLocalPasswordExpiration | Add-Member -notepropertyname 'warningDays' -notepropertyvalue "7" - $vrliLocalPasswordComplexity = New-Object -TypeName psobject - $vrliLocalPasswordComplexity | Add-Member -notepropertyname 'minNumerical' -notepropertyvalue "-1" - $vrliLocalPasswordComplexity | Add-Member -notepropertyname 'minUppercase' -notepropertyvalue "-1" - $vrliLocalPasswordComplexity | Add-Member -notepropertyname 'minLowercase' -notepropertyvalue "-1" - $vrliLocalPasswordComplexity | Add-Member -notepropertyname 'minUnique' -notepropertyvalue "4" - $vrliLocalPasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "8" - $vrliLocalPasswordComplexity | Add-Member -notepropertyname 'minClass' -notepropertyvalue "4" - $vrliLocalPasswordComplexity | Add-Member -notepropertyname 'minSpecial' -notepropertyvalue "-1" - $vrliLocalPasswordComplexity | Add-Member -notepropertyname 'retries' -notepropertyvalue "3" - $vrliLocalPasswordComplexity | Add-Member -notepropertyname 'maxSequence' -notepropertyvalue "0" - $vrliLocalPasswordComplexity | Add-Member -notepropertyname 'history' -notepropertyvalue "5" - $vrliLocalAccountLockout = New-Object -TypeName psobject - $vrliLocalAccountLockout | Add-Member -notepropertyname 'maxFailures' -notepropertyvalue "3" - $vrliLocalAccountLockout | Add-Member -notepropertyname 'unlockInterval' -notepropertyvalue "900" - $vrliLocalAccountLockout | Add-Member -notepropertyname 'rootUnlockInterval' -notepropertyvalue "900" - $vrliLocalPasswordPolicy = New-Object -TypeName psobject - $vrliLocalPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $vrliLocalPasswordExpiration - $vrliLocalPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $vrliLocalPasswordComplexity - $vrliLocalPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $vrliLocalAccountLockout + $vrliLocalPasswordExpiration = New-Object -TypeName PSObject + $vrliLocalPasswordExpiration | Add-Member -NotePropertyName 'minDays' -NotePropertyValue "0" + $vrliLocalPasswordExpiration | Add-Member -NotePropertyName 'maxDays' -NotePropertyValue "365" + $vrliLocalPasswordExpiration | Add-Member -NotePropertyName 'warningDays' -NotePropertyValue "7" + $vrliLocalPasswordComplexity = New-Object -TypeName PSObject + $vrliLocalPasswordComplexity | Add-Member -NotePropertyName 'minNumerical' -NotePropertyValue "-1" + $vrliLocalPasswordComplexity | Add-Member -NotePropertyName 'minUppercase' -NotePropertyValue "-1" + $vrliLocalPasswordComplexity | Add-Member -NotePropertyName 'minLowercase' -NotePropertyValue "-1" + $vrliLocalPasswordComplexity | Add-Member -NotePropertyName 'minUnique' -NotePropertyValue "4" + $vrliLocalPasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "8" + $vrliLocalPasswordComplexity | Add-Member -NotePropertyName 'minClass' -NotePropertyValue "4" + $vrliLocalPasswordComplexity | Add-Member -NotePropertyName 'minSpecial' -NotePropertyValue "-1" + $vrliLocalPasswordComplexity | Add-Member -NotePropertyName 'retries' -NotePropertyValue "3" + $vrliLocalPasswordComplexity | Add-Member -NotePropertyName 'maxSequence' -NotePropertyValue "0" + $vrliLocalPasswordComplexity | Add-Member -NotePropertyName 'history' -NotePropertyValue "5" + $vrliLocalAccountLockout = New-Object -TypeName PSObject + $vrliLocalAccountLockout | Add-Member -NotePropertyName 'maxFailures' -NotePropertyValue "3" + $vrliLocalAccountLockout | Add-Member -NotePropertyName 'unlockInterval' -NotePropertyValue "900" + $vrliLocalAccountLockout | Add-Member -NotePropertyName 'rootUnlockInterval' -NotePropertyValue "900" + $vrliLocalPasswordPolicy = New-Object -TypeName PSObject + $vrliLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $vrliLocalPasswordExpiration + $vrliLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $vrliLocalPasswordComplexity + $vrliLocalPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $vrliLocalAccountLockout # Build Aria Suite Lifecycle Local Users Password Policy Settings - $vrslcmLocalPasswordExpiration = New-Object -TypeName psobject - $vrslcmLocalPasswordExpiration | Add-Member -notepropertyname 'minDays' -notepropertyvalue "0" - $vrslcmLocalPasswordExpiration | Add-Member -notepropertyname 'maxDays' -notepropertyvalue "365" - $vrslcmLocalPasswordExpiration | Add-Member -notepropertyname 'warningDays' -notepropertyvalue "7" - $vrslcmLocalPasswordComplexity = New-Object -TypeName psobject - $vrslcmLocalPasswordComplexity | Add-Member -notepropertyname 'minNumerical' -notepropertyvalue "-1" - $vrslcmLocalPasswordComplexity | Add-Member -notepropertyname 'minUppercase' -notepropertyvalue "-1" - $vrslcmLocalPasswordComplexity | Add-Member -notepropertyname 'minLowercase' -notepropertyvalue "-1" - $vrslcmLocalPasswordComplexity | Add-Member -notepropertyname 'minUnique' -notepropertyvalue "4" - $vrslcmLocalPasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "8" - $vrslcmLocalPasswordComplexity | Add-Member -notepropertyname 'minClass' -notepropertyvalue "4" - $vrslcmLocalPasswordComplexity | Add-Member -notepropertyname 'minSpecial' -notepropertyvalue "-1" - $vrslcmLocalPasswordComplexity | Add-Member -notepropertyname 'retries' -notepropertyvalue "3" - $vrslcmLocalPasswordComplexity | Add-Member -notepropertyname 'maxSequence' -notepropertyvalue "0" - $vrslcmLocalPasswordComplexity | Add-Member -notepropertyname 'history' -notepropertyvalue "5" - $vrslcmLocalAccountLockout = New-Object -TypeName psobject - $vrslcmLocalAccountLockout | Add-Member -notepropertyname 'maxFailures' -notepropertyvalue "3" - $vrslcmLocalAccountLockout | Add-Member -notepropertyname 'unlockInterval' -notepropertyvalue "900" - $vrslcmLocalAccountLockout | Add-Member -notepropertyname 'rootUnlockInterval' -notepropertyvalue "900" - $vrslcmLocalPasswordPolicy = New-Object -TypeName psobject - $vrslcmLocalPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $vrslcmLocalPasswordExpiration - $vrslcmLocalPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $vrslcmLocalPasswordComplexity - $vrslcmLocalPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $vrslcmLocalAccountLockout + $vrslcmLocalPasswordExpiration = New-Object -TypeName PSObject + $vrslcmLocalPasswordExpiration | Add-Member -NotePropertyName 'minDays' -NotePropertyValue "0" + $vrslcmLocalPasswordExpiration | Add-Member -NotePropertyName 'maxDays' -NotePropertyValue "365" + $vrslcmLocalPasswordExpiration | Add-Member -NotePropertyName 'warningDays' -NotePropertyValue "7" + $vrslcmLocalPasswordComplexity = New-Object -TypeName PSObject + $vrslcmLocalPasswordComplexity | Add-Member -NotePropertyName 'minNumerical' -NotePropertyValue "-1" + $vrslcmLocalPasswordComplexity | Add-Member -NotePropertyName 'minUppercase' -NotePropertyValue "-1" + $vrslcmLocalPasswordComplexity | Add-Member -NotePropertyName 'minLowercase' -NotePropertyValue "-1" + $vrslcmLocalPasswordComplexity | Add-Member -NotePropertyName 'minUnique' -NotePropertyValue "4" + $vrslcmLocalPasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "8" + $vrslcmLocalPasswordComplexity | Add-Member -NotePropertyName 'minClass' -NotePropertyValue "4" + $vrslcmLocalPasswordComplexity | Add-Member -NotePropertyName 'minSpecial' -NotePropertyValue "-1" + $vrslcmLocalPasswordComplexity | Add-Member -NotePropertyName 'retries' -NotePropertyValue "3" + $vrslcmLocalPasswordComplexity | Add-Member -NotePropertyName 'maxSequence' -NotePropertyValue "0" + $vrslcmLocalPasswordComplexity | Add-Member -NotePropertyName 'history' -NotePropertyValue "5" + $vrslcmLocalAccountLockout = New-Object -TypeName PSObject + $vrslcmLocalAccountLockout | Add-Member -NotePropertyName 'maxFailures' -NotePropertyValue "3" + $vrslcmLocalAccountLockout | Add-Member -NotePropertyName 'unlockInterval' -NotePropertyValue "900" + $vrslcmLocalAccountLockout | Add-Member -NotePropertyName 'rootUnlockInterval' -NotePropertyValue "900" + $vrslcmLocalPasswordPolicy = New-Object -TypeName PSObject + $vrslcmLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $vrslcmLocalPasswordExpiration + $vrslcmLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $vrslcmLocalPasswordComplexity + $vrslcmLocalPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $vrslcmLocalAccountLockout # Build Aria Operations for Networks Local Users Password Policy Settings - $vrniLocalPasswordExpiration = New-Object -TypeName psobject - $vrniLocalPasswordExpiration | Add-Member -notepropertyname 'minDays' -notepropertyvalue "0" - $vrniLocalPasswordExpiration | Add-Member -notepropertyname 'maxDays' -notepropertyvalue "365" - $vrniLocalPasswordExpiration | Add-Member -notepropertyname 'warningDays' -notepropertyvalue "7" - $vrniLocalPasswordComplexity = New-Object -TypeName psobject - $vrniLocalPasswordComplexity | Add-Member -notepropertyname 'minNumerical' -notepropertyvalue "-1" - $vrniLocalPasswordComplexity | Add-Member -notepropertyname 'minUppercase' -notepropertyvalue "-1" - $vrniLocalPasswordComplexity | Add-Member -notepropertyname 'minLowercase' -notepropertyvalue "-1" - $vrniLocalPasswordComplexity | Add-Member -notepropertyname 'minUnique' -notepropertyvalue "4" - $vrniLocalPasswordComplexity | Add-Member -notepropertyname 'minLength' -notepropertyvalue "8" - $vrniLocalPasswordComplexity | Add-Member -notepropertyname 'minClass' -notepropertyvalue "4" - $vrniLocalPasswordComplexity | Add-Member -notepropertyname 'minSpecial' -notepropertyvalue "-1" - $vrniLocalPasswordComplexity | Add-Member -notepropertyname 'retries' -notepropertyvalue "3" - $vrniLocalPasswordComplexity | Add-Member -notepropertyname 'maxSequence' -notepropertyvalue "0" - $vrniLocalPasswordComplexity | Add-Member -notepropertyname 'history' -notepropertyvalue "5" - $vrniLocalAccountLockout = New-Object -TypeName psobject - $vrniLocalAccountLockout | Add-Member -notepropertyname 'maxFailures' -notepropertyvalue "3" - $vrniLocalAccountLockout | Add-Member -notepropertyname 'unlockInterval' -notepropertyvalue "900" - $vrniLocalAccountLockout | Add-Member -notepropertyname 'rootUnlockInterval' -notepropertyvalue "900" - $vrniLocalPasswordPolicy = New-Object -TypeName psobject - $vrniLocalPasswordPolicy | Add-Member -notepropertyname 'passwordExpiration' -notepropertyvalue $vrniLocalPasswordExpiration - $vrniLocalPasswordPolicy | Add-Member -notepropertyname 'passwordComplexity' -notepropertyvalue $vrniLocalPasswordComplexity - $vrniLocalPasswordPolicy | Add-Member -notepropertyname 'accountLockout' -notepropertyvalue $vrniLocalAccountLockout + $vrniLocalPasswordExpiration = New-Object -TypeName PSObject + $vrniLocalPasswordExpiration | Add-Member -NotePropertyName 'minDays' -NotePropertyValue "0" + $vrniLocalPasswordExpiration | Add-Member -NotePropertyName 'maxDays' -NotePropertyValue "365" + $vrniLocalPasswordExpiration | Add-Member -NotePropertyName 'warningDays' -NotePropertyValue "7" + $vrniLocalPasswordComplexity = New-Object -TypeName PSObject + $vrniLocalPasswordComplexity | Add-Member -NotePropertyName 'minNumerical' -NotePropertyValue "-1" + $vrniLocalPasswordComplexity | Add-Member -NotePropertyName 'minUppercase' -NotePropertyValue "-1" + $vrniLocalPasswordComplexity | Add-Member -NotePropertyName 'minLowercase' -NotePropertyValue "-1" + $vrniLocalPasswordComplexity | Add-Member -NotePropertyName 'minUnique' -NotePropertyValue "4" + $vrniLocalPasswordComplexity | Add-Member -NotePropertyName 'minLength' -NotePropertyValue "8" + $vrniLocalPasswordComplexity | Add-Member -NotePropertyName 'minClass' -NotePropertyValue "4" + $vrniLocalPasswordComplexity | Add-Member -NotePropertyName 'minSpecial' -NotePropertyValue "-1" + $vrniLocalPasswordComplexity | Add-Member -NotePropertyName 'retries' -NotePropertyValue "3" + $vrniLocalPasswordComplexity | Add-Member -NotePropertyName 'maxSequence' -NotePropertyValue "0" + $vrniLocalPasswordComplexity | Add-Member -NotePropertyName 'history' -NotePropertyValue "5" + $vrniLocalAccountLockout = New-Object -TypeName PSObject + $vrniLocalAccountLockout | Add-Member -NotePropertyName 'maxFailures' -NotePropertyValue "3" + $vrniLocalAccountLockout | Add-Member -NotePropertyName 'unlockInterval' -NotePropertyValue "900" + $vrniLocalAccountLockout | Add-Member -NotePropertyName 'rootUnlockInterval' -NotePropertyValue "900" + $vrniLocalPasswordPolicy = New-Object -TypeName PSObject + $vrniLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordExpiration' -NotePropertyValue $vrniLocalPasswordExpiration + $vrniLocalPasswordPolicy | Add-Member -NotePropertyName 'passwordComplexity' -NotePropertyValue $vrniLocalPasswordComplexity + $vrniLocalPasswordPolicy | Add-Member -NotePropertyName 'accountLockout' -NotePropertyValue $vrniLocalAccountLockout # Build Final Default Password Policy Object - $defaultConfig = New-Object -TypeName psobject - $defaultConfig | Add-Member -notepropertyname 'vcf' -notepropertyvalue $vcfVersion - $defaultConfig | Add-Member -notepropertyname 'esxi' -notepropertyvalue $esxiPasswordPolicy - $defaultConfig | Add-Member -notepropertyname 'sso' -notepropertyvalue $ssoPasswordPolicy - $defaultConfig | Add-Member -notepropertyname 'vcenterServer' -notepropertyvalue $vcenterPasswordPolicy - $defaultConfig | Add-Member -notepropertyname 'vcenterServerLocal' -notepropertyvalue $vcenterLocalPasswordPolicy - $defaultConfig | Add-Member -notepropertyname 'nsxManager' -notepropertyvalue $nsxManagerPasswordPolicy - $defaultConfig | Add-Member -notepropertyname 'nsxEdge' -notepropertyvalue $nsxEdgePasswordPolicy - $defaultConfig | Add-Member -notepropertyname 'sddcManager' -notepropertyvalue $sddcManagerPasswordPolicy - $defaultConfig | Add-Member -notepropertyname 'wsaLocal' -notepropertyvalue $wsaLocalPasswordPolicy - $defaultConfig | Add-Member -notepropertyname 'wsaDirectory' -notepropertyvalue $wsaDirectoryPasswordPolicy + $defaultConfig = New-Object -TypeName PSObject + $defaultConfig | Add-Member -NotePropertyName 'vcf' -NotePropertyValue $vcfVersion + $defaultConfig | Add-Member -NotePropertyName 'esxi' -NotePropertyValue $esxiPasswordPolicy + $defaultConfig | Add-Member -NotePropertyName 'sso' -NotePropertyValue $ssoPasswordPolicy + $defaultConfig | Add-Member -NotePropertyName 'vcenterServer' -NotePropertyValue $vcenterPasswordPolicy + $defaultConfig | Add-Member -NotePropertyName 'vcenterServerLocal' -NotePropertyValue $vcenterLocalPasswordPolicy + $defaultConfig | Add-Member -NotePropertyName 'nsxManager' -NotePropertyValue $nsxManagerPasswordPolicy + $defaultConfig | Add-Member -NotePropertyName 'nsxEdge' -NotePropertyValue $nsxEdgePasswordPolicy + $defaultConfig | Add-Member -NotePropertyName 'sddcManager' -NotePropertyValue $sddcManagerPasswordPolicy + $defaultConfig | Add-Member -NotePropertyName 'wsaLocal' -NotePropertyValue $wsaLocalPasswordPolicy + $defaultConfig | Add-Member -NotePropertyName 'wsaDirectory' -NotePropertyValue $wsaDirectoryPasswordPolicy $defaultConfig | Add-Member -notepropertyName 'ariaAutomation' -notepropertyValue $vraLocalPasswordPolicy $defaultConfig | Add-Member -notepropertyName 'ariaLifecycle' -notepropertyValue $vrslcmLocalPasswordPolicy $defaultConfig | Add-Member -notepropertyName 'ariaOperations' -notepropertyValue $vropsLocalPasswordPolicy @@ -1648,8 +1648,8 @@ Function checkEmailString { Function Test-PasswordPolicyConfig { Param ( - [Parameter (Mandatory = $false)] [ValidateNotNullOrEmpty()] [psobject]$customConfig, - [Parameter (Mandatory = $true)] [ValidateNotNullOrEmpty()] [psobject]$version + [Parameter (Mandatory = $false)] [ValidateNotNullOrEmpty()] [PSObject]$customConfig, + [Parameter (Mandatory = $true)] [ValidateNotNullOrEmpty()] [PSObject]$version ) # Import default configuration JSON for compare parameters @@ -2118,7 +2118,7 @@ Function Save-ClarityReportNavigation { @@ -2132,17 +2132,19 @@ Function Save-ClarityReportNavigation {Standalone Workspace ONE Access Not Requested
' + $wsaLocalPasswordPolicyObject = $wsaLocalPasswordPolicyObject | ConvertTo-Html -Fragment -PreContent $preHtmlContent -PostContent 'Local Workspace ONE Access Not Requested
' } else { $wsaLocalPasswordPolicyObject = $wsaLocalPasswordPolicyObject | Sort-Object 'System' | ConvertTo-Html -Fragment -PreContent $preHtmlContent -As Table } @@ -9522,13 +9528,13 @@ Function Get-AriaLocalUserPasswordExpiration { $allLocalUserExpirationObject = New-Object System.Collections.ArrayList foreach ($user in $localUser) { if ($localUserPasswordExpiration = Get-LocalUserPasswordExpiration -vmName $vmName -guestUser $guestUser -guestPassword $guestPassword -localUser $user -sudo) { - $localUserExpirationObject = New-Object -TypeName psobject - $localUserExpirationObject | Add-Member -notepropertyname "Workload Domain" -notepropertyvalue $domain - $localUserExpirationObject | Add-Member -notepropertyname "System" -notepropertyvalue $vmName - $localUserExpirationObject | Add-Member -notepropertyname "User" -notepropertyvalue $user - $localUserExpirationObject | Add-Member -notepropertyname "Min Days" -notepropertyvalue $(($localUserPasswordExpiration | Where-Object { $_.Setting -match "Minimum number of days between password change" }).Value) - $localUserExpirationObject | Add-Member -notepropertyname "Max Days" -notepropertyvalue $(($localUserPasswordExpiration | Where-Object { $_.Setting -match "Maximum number of days between password change" }).Value) - $localUserExpirationObject | Add-Member -notepropertyname "Warning Days" -notepropertyvalue $(($localUserPasswordExpiration | Where-Object { $_.Setting -match "Number of days of warning before password expires" }).Value) + $localUserExpirationObject = New-Object -TypeName PSObject + $localUserExpirationObject | Add-Member -NotePropertyName "Workload Domain" -NotePropertyValue $domain + $localUserExpirationObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vmName + $localUserExpirationObject | Add-Member -NotePropertyName "User" -NotePropertyValue $user + $localUserExpirationObject | Add-Member -NotePropertyName "Min Days" -NotePropertyValue $(($localUserPasswordExpiration | Where-Object { $_.Setting -match "Minimum number of days between password change" }).Value) + $localUserExpirationObject | Add-Member -NotePropertyName "Max Days" -NotePropertyValue $(($localUserPasswordExpiration | Where-Object { $_.Setting -match "Maximum number of days between password change" }).Value) + $localUserExpirationObject | Add-Member -NotePropertyName "Warning Days" -NotePropertyValue $(($localUserPasswordExpiration | Where-Object { $_.Setting -match "Number of days of warning before password expires" }).Value) $allLocalUserExpirationObject += $localUserExpirationObject } else { Write-Error "Unable to retrieve password expiration policy for local user ($user) from Virtual Machine ($vmName): PRE_VALIDATION_FAILED" @@ -9539,13 +9545,13 @@ Function Get-AriaLocalUserPasswordExpiration { $allLocalUserExpirationObject = New-Object System.Collections.ArrayList foreach ($user in $localUser) { if ($localUserPasswordExpiration = Get-LocalUserPasswordExpiration -vmName $vmName -guestUser $guestUser -guestPassword $guestPassword -localUser $user) { - $localUserExpirationObject = New-Object -TypeName psobject - $localUserExpirationObject | Add-Member -notepropertyname "Workload Domain" -notepropertyvalue $domain - $localUserExpirationObject | Add-Member -notepropertyname "System" -notepropertyvalue $vmName - $localUserExpirationObject | Add-Member -notepropertyname "User" -notepropertyvalue $user - $localUserExpirationObject | Add-Member -notepropertyname "Min Days" -notepropertyvalue $(($localUserPasswordExpiration | Where-Object { $_.Setting -match "Minimum number of days between password change" }).Value) - $localUserExpirationObject | Add-Member -notepropertyname "Max Days" -notepropertyvalue $(($localUserPasswordExpiration | Where-Object { $_.Setting -match "Maximum number of days between password change" }).Value) - $localUserExpirationObject | Add-Member -notepropertyname "Warning Days" -notepropertyvalue $(($localUserPasswordExpiration | Where-Object { $_.Setting -match "Number of days of warning before password expires" }).Value) + $localUserExpirationObject = New-Object -TypeName PSObject + $localUserExpirationObject | Add-Member -NotePropertyName "Workload Domain" -NotePropertyValue $domain + $localUserExpirationObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vmName + $localUserExpirationObject | Add-Member -NotePropertyName "User" -NotePropertyValue $user + $localUserExpirationObject | Add-Member -NotePropertyName "Min Days" -NotePropertyValue $(($localUserPasswordExpiration | Where-Object { $_.Setting -match "Minimum number of days between password change" }).Value) + $localUserExpirationObject | Add-Member -NotePropertyName "Max Days" -NotePropertyValue $(($localUserPasswordExpiration | Where-Object { $_.Setting -match "Maximum number of days between password change" }).Value) + $localUserExpirationObject | Add-Member -NotePropertyName "Warning Days" -NotePropertyValue $(($localUserPasswordExpiration | Where-Object { $_.Setting -match "Number of days of warning before password expires" }).Value) $allLocalUserExpirationObject += $localUserExpirationObject } else { Write-Error "Unable to retrieve password expiration policy for local user ($user) from Virtual Machine ($vmName): PRE_VALIDATION_FAILED" @@ -9665,19 +9671,19 @@ Function Get-AriaLocalUserPasswordComplexity { if ([regex]::Matches($output.ScriptOutput, 'remember=[-]?[0-9]+')) { $history = (([regex]::Matches($output.ScriptOutput, 'remember=[-]?[0-9]+').Value) -Split ('='))[-1] } } - $passwordComplexityObject = New-Object -TypeName psobject - $passwordComplexityObject | Add-Member -notepropertyname "System" -notepropertyvalue $vmName - if ($minNumerical) { $passwordComplexityObject | Add-Member -notepropertyname "Min Numerical" -notepropertyvalue $minNumerical } - if ($minUppercase) { $passwordComplexityObject | Add-Member -notepropertyname "Min Uppercase" -notepropertyvalue $minUppercase } - if ($minLowercase) { $passwordComplexityObject | Add-Member -notepropertyname "Min Lowercase" -notepropertyvalue $minLowercase } - if ($minSpecial) { $passwordComplexityObject | Add-Member -notepropertyname "Min Special" -notepropertyvalue $minSpecial } - if ($minLen) { $passwordComplexityObject | Add-Member -notepropertyname "Min Length" -notepropertyvalue $minLen } - if ($minClass) { $passwordComplexityObject | Add-Member -notepropertyname "Min Class" -notepropertyvalue $minClass } - if ($minUnique) { $passwordComplexityObject | Add-Member -notepropertyname "Min Unique" -notepropertyvalue $minUnique } - if ($maxSequence) { $passwordComplexityObject | Add-Member -notepropertyname "Max Sequence" -notepropertyvalue $maxSequence } - if ($maxRepeat) { $passwordComplexityObject | Add-Member -notepropertyname "Max Repeat" -notepropertyvalue $maxRepeat } - if ($retry) { $passwordComplexityObject | Add-Member -notepropertyname "Max Retries" -notepropertyvalue $retry } - if ($history) { $passwordComplexityObject | Add-Member -notepropertyname "History" -notepropertyvalue $history } + $passwordComplexityObject = New-Object -TypeName PSObject + $passwordComplexityObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vmName + if ($minNumerical) { $passwordComplexityObject | Add-Member -NotePropertyName "Min Numerical" -NotePropertyValue $minNumerical } + if ($minUppercase) { $passwordComplexityObject | Add-Member -NotePropertyName "Min Uppercase" -NotePropertyValue $minUppercase } + if ($minLowercase) { $passwordComplexityObject | Add-Member -NotePropertyName "Min Lowercase" -NotePropertyValue $minLowercase } + if ($minSpecial) { $passwordComplexityObject | Add-Member -NotePropertyName "Min Special" -NotePropertyValue $minSpecial } + if ($minLen) { $passwordComplexityObject | Add-Member -NotePropertyName "Min Length" -NotePropertyValue $minLen } + if ($minClass) { $passwordComplexityObject | Add-Member -NotePropertyName "Min Class" -NotePropertyValue $minClass } + if ($minUnique) { $passwordComplexityObject | Add-Member -NotePropertyName "Min Unique" -NotePropertyValue $minUnique } + if ($maxSequence) { $passwordComplexityObject | Add-Member -NotePropertyName "Max Sequence" -NotePropertyValue $maxSequence } + if ($maxRepeat) { $passwordComplexityObject | Add-Member -NotePropertyName "Max Repeat" -NotePropertyValue $maxRepeat } + if ($retry) { $passwordComplexityObject | Add-Member -NotePropertyName "Max Retries" -NotePropertyValue $retry } + if ($history) { $passwordComplexityObject | Add-Member -NotePropertyName "History" -NotePropertyValue $history } Return $passwordComplexityObject } Catch { Write-Error $_.Exception.Message @@ -9751,11 +9757,11 @@ Function Get-AriaLocalUserAccountLockout { if ([regex]::Matches($output.ScriptOutput, 'unlock_time=[-]?[0-9]+')) { $unlockInterval = (([regex]::Matches($output.ScriptOutput, 'unlock_time=[-]?[0-9]+').Value) -Split ('='))[-1] } } - $accountLockoutObject = New-Object -TypeName psobject - $accountLockoutObject | Add-Member -notepropertyname "System" -notepropertyvalue $vmName - if ($failures) { $accountLockoutObject | Add-Member -notepropertyname "Max Failures" -notepropertyvalue $failures } - if ($unlockInterval) { $accountLockoutObject | Add-Member -notepropertyname "Unlock Interval (sec)" -notepropertyvalue $unlockInterval } - if ($rootUnlockInterval) { $accountLockoutObject | Add-Member -notepropertyname "Root Unlock Interval (sec)" -notepropertyvalue $rootUnlockInterval } + $accountLockoutObject = New-Object -TypeName PSObject + $accountLockoutObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vmName + if ($failures) { $accountLockoutObject | Add-Member -NotePropertyName "Max Failures" -NotePropertyValue $failures } + if ($unlockInterval) { $accountLockoutObject | Add-Member -NotePropertyName "Unlock Interval (sec)" -NotePropertyValue $unlockInterval } + if ($rootUnlockInterval) { $accountLockoutObject | Add-Member -NotePropertyName "Root Unlock Interval (sec)" -NotePropertyValue $rootUnlockInterval } Return $accountLockoutObject } Catch { Write-Error $_.Exception.Message @@ -9871,12 +9877,12 @@ Function Request-AriaLocalUserPasswordExpiration { } $allvrslcmPasswordExpirationObject = New-Object System.Collections.ArrayList if ($vrslcmPasswordExpiration = Get-AriaLocalUserPasswordExpiration -server $server -user $user -pass $pass -domain $domain.name -vmName $vcfVrslcmDetails.fqdn.split('.')[0] -guestUser $vcfVrslcmDetails.rootUser -guestPassword $vcfVrslcmDetails.rootPassword -localUser "root") { - $vrslcmPasswordExpirationObject = New-Object -TypeName psobject - $vrslcmPasswordExpirationObject | Add-Member -notepropertyname "System" -notepropertyvalue $vrslcmPasswordExpiration.system - $vrslcmPasswordExpirationObject | Add-Member -notepropertyname "Local User" -notepropertyvalue "root" - $vrslcmPasswordExpirationObject | Add-Member -notepropertyname "Minimum (days)" $(if ($vrslcmPasswordExpiration.'Min Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordExpiration.'Min Days') -ne $requiredConfig.minDays) { "$($vrslcmPasswordExpiration.'Min Days') [ $($requiredConfig.minDays) ]" } else { "$($vrslcmPasswordExpiration.'Min Days')" } } else { "$($vrslcmPasswordExpiration.'Min Days')" }) }) - $vrslcmPasswordExpirationObject | Add-Member -notepropertyname "Maximum (days)" $(if ($vrslcmPasswordExpiration.'Max Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordExpiration.'Max Days') -ne $requiredConfig.maxDays) { "$($vrslcmPasswordExpiration.'Max Days') [ $($requiredConfig.maxDays) ]" } else { "$($vrslcmPasswordExpiration.'Max Days')" } } else { "$($vrslcmPasswordExpiration.'Max Days')" }) }) - $vrslcmPasswordExpirationObject | Add-Member -notepropertyname "Warning (days)" $(if ($vrslcmPasswordExpiration.'Warning Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordExpiration.'Warning Days') -ne $requiredConfig.warningDays) { "$($vrslcmPasswordExpiration.'Warning Days') [ $($requiredConfig.warningDays) ]" } else { "$($vrslcmPasswordExpiration.'Warning Days')" } } else { "$($vrslcmPasswordExpiration.'Warning Days')" }) }) + $vrslcmPasswordExpirationObject = New-Object -TypeName PSObject + $vrslcmPasswordExpirationObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vrslcmPasswordExpiration.system + $vrslcmPasswordExpirationObject | Add-Member -NotePropertyName "Local User" -NotePropertyValue "root" + $vrslcmPasswordExpirationObject | Add-Member -NotePropertyName "Minimum (days)" $(if ($vrslcmPasswordExpiration.'Min Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordExpiration.'Min Days') -ne $requiredConfig.minDays) { "$($vrslcmPasswordExpiration.'Min Days') [ $($requiredConfig.minDays) ]" } else { "$($vrslcmPasswordExpiration.'Min Days')" } } else { "$($vrslcmPasswordExpiration.'Min Days')" }) }) + $vrslcmPasswordExpirationObject | Add-Member -NotePropertyName "Maximum (days)" $(if ($vrslcmPasswordExpiration.'Max Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordExpiration.'Max Days') -ne $requiredConfig.maxDays) { "$($vrslcmPasswordExpiration.'Max Days') [ $($requiredConfig.maxDays) ]" } else { "$($vrslcmPasswordExpiration.'Max Days')" } } else { "$($vrslcmPasswordExpiration.'Max Days')" }) }) + $vrslcmPasswordExpirationObject | Add-Member -NotePropertyName "Warning (days)" $(if ($vrslcmPasswordExpiration.'Warning Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordExpiration.'Warning Days') -ne $requiredConfig.warningDays) { "$($vrslcmPasswordExpiration.'Warning Days') [ $($requiredConfig.warningDays) ]" } else { "$($vrslcmPasswordExpiration.'Warning Days')" } } else { "$($vrslcmPasswordExpiration.'Warning Days')" }) }) $allvrslcmPasswordExpirationObject += $vrslcmPasswordExpirationObject } else { Write-Error "Unable to retrieve password expiration policy from VMware Aria Suite Lifecycle ($node): PRE_VALIDATION_FAILED" @@ -9899,23 +9905,23 @@ Function Request-AriaLocalUserPasswordExpiration { $vropspassword = (Get-vRSLCMProductPassword -productId vrops -nodeFqdn $node -vrslcmRootPass $vcfVrslcmDetails.rootPassword) $vropsusername = (Get-vRSLCMLockerPassword -vmid $vropspassword.passwordvmid).userName if ($vropsPasswordExpiration = Get-AriaLocalUserPasswordExpiration -server $server -user $user -pass $pass -domain $domain.name -vmName $node.split('.')[0] -guestUser $vropsusername -guestPassword $vropspassword.password -localUser "root") { - $vropsPasswordExpirationObject = New-Object -TypeName psobject - $vropsPasswordExpirationObject | Add-Member -notepropertyname "System" -notepropertyvalue $vropsPasswordExpiration.system - $vropsPasswordExpirationObject | Add-Member -notepropertyname "Local User" -notepropertyvalue "root" - $vropsPasswordExpirationObject | Add-Member -notepropertyname "Minimum (days)" $(if ($vropsPasswordExpiration.'Min Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordExpiration.'Min Days') -ne $requiredConfig.minDays) { "$($vropsPasswordExpiration.'Min Days') [ $($requiredConfig.minDays) ]" } else { "$($vropsPasswordExpiration.'Min Days')" } } else { "$($vropsPasswordExpiration.'Min Days')" }) }) - $vropsPasswordExpirationObject | Add-Member -notepropertyname "Maximum (days)" $(if ($vropsPasswordExpiration.'Max Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordExpiration.'Max Days') -ne $requiredConfig.maxDays) { "$($vropsPasswordExpiration.'Max Days') [ $($requiredConfig.maxDays) ]" } else { "$($vropsPasswordExpiration.'Max Days')" } } else { "$($vropsPasswordExpiration.'Max Days')" }) }) - $vropsPasswordExpirationObject | Add-Member -notepropertyname "Warning (days)" $(if ($vropsPasswordExpiration.'Warning Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordExpiration.'Warning Days') -ne $requiredConfig.warningDays) { "$($vropsPasswordExpiration.'Warning Days') [ $($requiredConfig.warningDays) ]" } else { "$($vropsPasswordExpiration.'Warning Days')" } } else { "$($vropsPasswordExpiration.'Warning Days')" }) }) + $vropsPasswordExpirationObject = New-Object -TypeName PSObject + $vropsPasswordExpirationObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vropsPasswordExpiration.system + $vropsPasswordExpirationObject | Add-Member -NotePropertyName "Local User" -NotePropertyValue "root" + $vropsPasswordExpirationObject | Add-Member -NotePropertyName "Minimum (days)" $(if ($vropsPasswordExpiration.'Min Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordExpiration.'Min Days') -ne $requiredConfig.minDays) { "$($vropsPasswordExpiration.'Min Days') [ $($requiredConfig.minDays) ]" } else { "$($vropsPasswordExpiration.'Min Days')" } } else { "$($vropsPasswordExpiration.'Min Days')" }) }) + $vropsPasswordExpirationObject | Add-Member -NotePropertyName "Maximum (days)" $(if ($vropsPasswordExpiration.'Max Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordExpiration.'Max Days') -ne $requiredConfig.maxDays) { "$($vropsPasswordExpiration.'Max Days') [ $($requiredConfig.maxDays) ]" } else { "$($vropsPasswordExpiration.'Max Days')" } } else { "$($vropsPasswordExpiration.'Max Days')" }) }) + $vropsPasswordExpirationObject | Add-Member -NotePropertyName "Warning (days)" $(if ($vropsPasswordExpiration.'Warning Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordExpiration.'Warning Days') -ne $requiredConfig.warningDays) { "$($vropsPasswordExpiration.'Warning Days') [ $($requiredConfig.warningDays) ]" } else { "$($vropsPasswordExpiration.'Warning Days')" } } else { "$($vropsPasswordExpiration.'Warning Days')" }) }) $allvropsPasswordExpirationObject += $vropsPasswordExpirationObject } else { Write-Error "Unable to retrieve password expiration policy from VMware Aria Operations ($node): PRE_VALIDATION_FAILED" } if ($vropsPasswordExpiration = Get-AriaLocalUserPasswordExpiration -server $server -user $user -pass $pass -domain $domain.name -vmName $node.split('.')[0] -guestUser $vropsusername -guestPassword $vropspassword.password -localUser "admin") { - $vropsPasswordExpirationObject = New-Object -TypeName psobject - $vropsPasswordExpirationObject | Add-Member -notepropertyname "System" -notepropertyvalue $vropsPasswordExpiration.system - $vropsPasswordExpirationObject | Add-Member -notepropertyname "Local User" -notepropertyvalue "admin" - $vropsPasswordExpirationObject | Add-Member -notepropertyname "Minimum (days)" $(if ($vropsPasswordExpiration.'Min Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordExpiration.'Min Days') -ne $requiredConfig.minDays) { "$($vropsPasswordExpiration.'Min Days') [ $($requiredConfig.minDays) ]" } else { "$($vropsPasswordExpiration.'Min Days')" } } else { "$($vropsPasswordExpiration.'Min Days')" }) }) - $vropsPasswordExpirationObject | Add-Member -notepropertyname "Maximum (days)" $(if ($vropsPasswordExpiration.'Max Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordExpiration.'Max Days') -ne $requiredConfig.maxDays) { "$($vropsPasswordExpiration.'Max Days') [ $($requiredConfig.maxDays) ]" } else { "$($vropsPasswordExpiration.'Max Days')" } } else { "$($vropsPasswordExpiration.'Max Days')" }) }) - $vropsPasswordExpirationObject | Add-Member -notepropertyname "Warning (days)" $(if ($vropsPasswordExpiration.'Warning Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordExpiration.'Warning Days') -ne $requiredConfig.warningDays) { "$($vropsPasswordExpiration.'Warning Days') [ $($requiredConfig.warningDays) ]" } else { "$($vropsPasswordExpiration.'Warning Days')" } } else { "$($vropsPasswordExpiration.'Warning Days')" }) }) + $vropsPasswordExpirationObject = New-Object -TypeName PSObject + $vropsPasswordExpirationObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vropsPasswordExpiration.system + $vropsPasswordExpirationObject | Add-Member -NotePropertyName "Local User" -NotePropertyValue "admin" + $vropsPasswordExpirationObject | Add-Member -NotePropertyName "Minimum (days)" $(if ($vropsPasswordExpiration.'Min Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordExpiration.'Min Days') -ne $requiredConfig.minDays) { "$($vropsPasswordExpiration.'Min Days') [ $($requiredConfig.minDays) ]" } else { "$($vropsPasswordExpiration.'Min Days')" } } else { "$($vropsPasswordExpiration.'Min Days')" }) }) + $vropsPasswordExpirationObject | Add-Member -NotePropertyName "Maximum (days)" $(if ($vropsPasswordExpiration.'Max Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordExpiration.'Max Days') -ne $requiredConfig.maxDays) { "$($vropsPasswordExpiration.'Max Days') [ $($requiredConfig.maxDays) ]" } else { "$($vropsPasswordExpiration.'Max Days')" } } else { "$($vropsPasswordExpiration.'Max Days')" }) }) + $vropsPasswordExpirationObject | Add-Member -NotePropertyName "Warning (days)" $(if ($vropsPasswordExpiration.'Warning Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordExpiration.'Warning Days') -ne $requiredConfig.warningDays) { "$($vropsPasswordExpiration.'Warning Days') [ $($requiredConfig.warningDays) ]" } else { "$($vropsPasswordExpiration.'Warning Days')" } } else { "$($vropsPasswordExpiration.'Warning Days')" }) }) $allvropsPasswordExpirationObject += $vropsPasswordExpirationObject } else { Write-Error "Unable to retrieve password expiration policy from VMware Aria Operations ($node): PRE_VALIDATION_FAILED" @@ -9938,12 +9944,12 @@ Function Request-AriaLocalUserPasswordExpiration { foreach ($node in $vrlinodes) { $vrlipassword = (Get-vRSLCMProductPassword -productId vrli -nodeFqdn $node -vrslcmRootPass $vcfVrslcmDetails.rootPassword) if ($vrliPasswordExpiration = Get-AriaLocalUserPasswordExpiration -server $server -user $user -pass $pass -domain $domain.name -vmName $node.split('.')[0] -guestUser root -guestPassword $vrlipassword.password -localUser "root") { - $vrliPasswordExpirationObject = New-Object -TypeName psobject - $vrliPasswordExpirationObject | Add-Member -notepropertyname "System" -notepropertyvalue $vrliPasswordExpiration.system - $vrliPasswordExpirationObject | Add-Member -notepropertyname "Local User" -notepropertyvalue "root" - $vrliPasswordExpirationObject | Add-Member -notepropertyname "Minimum (days)" $(if ($vrliPasswordExpiration.'Min Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordExpiration.'Min Days') -ne $requiredConfig.minDays) { "$($vrliPasswordExpiration.'Min Days') [ $($requiredConfig.minDays) ]" } else { "$($vrliPasswordExpiration.'Min Days')" } } else { "$($vrliPasswordExpiration.'Min Days')" }) }) - $vrliPasswordExpirationObject | Add-Member -notepropertyname "Maximum (days)" $(if ($vrliPasswordExpiration.'Max Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordExpiration.'Max Days') -ne $requiredConfig.maxDays) { "$($vrliPasswordExpiration.'Max Days') [ $($requiredConfig.maxDays) ]" } else { "$($vrliPasswordExpiration.'Max Days')" } } else { "$($vrliPasswordExpiration.'Max Days')" }) }) - $vrliPasswordExpirationObject | Add-Member -notepropertyname "Warning (days)" $(if ($vrliPasswordExpiration.'Warning Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordExpiration.'Warning Days') -ne $requiredConfig.warningDays) { "$($vrliPasswordExpiration.'Warning Days') [ $($requiredConfig.warningDays) ]" } else { "$($vrliPasswordExpiration.'Warning Days')" } } else { "$($vrliPasswordExpiration.'Warning Days')" }) }) + $vrliPasswordExpirationObject = New-Object -TypeName PSObject + $vrliPasswordExpirationObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vrliPasswordExpiration.system + $vrliPasswordExpirationObject | Add-Member -NotePropertyName "Local User" -NotePropertyValue "root" + $vrliPasswordExpirationObject | Add-Member -NotePropertyName "Minimum (days)" $(if ($vrliPasswordExpiration.'Min Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordExpiration.'Min Days') -ne $requiredConfig.minDays) { "$($vrliPasswordExpiration.'Min Days') [ $($requiredConfig.minDays) ]" } else { "$($vrliPasswordExpiration.'Min Days')" } } else { "$($vrliPasswordExpiration.'Min Days')" }) }) + $vrliPasswordExpirationObject | Add-Member -NotePropertyName "Maximum (days)" $(if ($vrliPasswordExpiration.'Max Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordExpiration.'Max Days') -ne $requiredConfig.maxDays) { "$($vrliPasswordExpiration.'Max Days') [ $($requiredConfig.maxDays) ]" } else { "$($vrliPasswordExpiration.'Max Days')" } } else { "$($vrliPasswordExpiration.'Max Days')" }) }) + $vrliPasswordExpirationObject | Add-Member -NotePropertyName "Warning (days)" $(if ($vrliPasswordExpiration.'Warning Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordExpiration.'Warning Days') -ne $requiredConfig.warningDays) { "$($vrliPasswordExpiration.'Warning Days') [ $($requiredConfig.warningDays) ]" } else { "$($vrliPasswordExpiration.'Warning Days')" } } else { "$($vrliPasswordExpiration.'Warning Days')" }) }) $allvrliPasswordExpirationObject += $vrliPasswordExpirationObject } else { Write-Error "Unable to retrieve password expiration policy from VMware Aria Operations for Logs ($node): PRE_VALIDATION_FAILED" @@ -9968,23 +9974,23 @@ Function Request-AriaLocalUserPasswordExpiration { $vrnivmid = $vrninodedata.supportPassword.Split(':')[2] $vrnipassword = (Get-vRSLCMProductPassword -productId vrni -vmid $vrnivmid -vrslcmRootPass $vcfVrslcmDetails.rootPassword) if ($vrniPasswordExpiration = Get-AriaLocalUserPasswordExpiration -server $server -user $user -pass $pass -domain $domain.name -vmName $node.vmname -guestUser support -guestPassword $vrnipassword.password -localUser "support" -sudo) { - $vrniPasswordExpirationObject = New-Object -TypeName psobject - $vrniPasswordExpirationObject | Add-Member -notepropertyname "System" -notepropertyvalue $vrniPasswordExpiration.system - $vrniPasswordExpirationObject | Add-Member -NotePropertyName "Local User" -notepropertyvalue "support" - $vrniPasswordExpirationObject | Add-Member -notepropertyname "Minimum (days)" $(if ($vrniPasswordExpiration.'Min Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordExpiration.'Min Days') -ne $requiredConfig.minDays) { "$($vrniPasswordExpiration.'Min Days') [ $($requiredConfig.minDays) ]" } else { "$($vrniPasswordExpiration.'Min Days')" } } else { "$($vrniPasswordExpiration.'Min Days')" }) }) - $vrniPasswordExpirationObject | Add-Member -notepropertyname "Maximum (days)" $(if ($vrniPasswordExpiration.'Max Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordExpiration.'Max Days') -ne $requiredConfig.maxDays) { "$($vrniPasswordExpiration.'Max Days') [ $($requiredConfig.maxDays) ]" } else { "$($vrniPasswordExpiration.'Max Days')" } } else { "$($vrniPasswordExpiration.'Max Days')" }) }) - $vrniPasswordExpirationObject | Add-Member -notepropertyname "Warning (days)" $(if ($vrniPasswordExpiration.'Warning Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordExpiration.'Warning Days') -ne $requiredConfig.warningDays) { "$($vrniPasswordExpiration.'Warning Days') [ $($requiredConfig.warningDays) ]" } else { "$($vrniPasswordExpiration.'Warning Days')" } } else { "$($vrniPasswordExpiration.'Warning Days')" }) }) + $vrniPasswordExpirationObject = New-Object -TypeName PSObject + $vrniPasswordExpirationObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vrniPasswordExpiration.system + $vrniPasswordExpirationObject | Add-Member -NotePropertyName "Local User" -NotePropertyValue "support" + $vrniPasswordExpirationObject | Add-Member -NotePropertyName "Minimum (days)" $(if ($vrniPasswordExpiration.'Min Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordExpiration.'Min Days') -ne $requiredConfig.minDays) { "$($vrniPasswordExpiration.'Min Days') [ $($requiredConfig.minDays) ]" } else { "$($vrniPasswordExpiration.'Min Days')" } } else { "$($vrniPasswordExpiration.'Min Days')" }) }) + $vrniPasswordExpirationObject | Add-Member -NotePropertyName "Maximum (days)" $(if ($vrniPasswordExpiration.'Max Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordExpiration.'Max Days') -ne $requiredConfig.maxDays) { "$($vrniPasswordExpiration.'Max Days') [ $($requiredConfig.maxDays) ]" } else { "$($vrniPasswordExpiration.'Max Days')" } } else { "$($vrniPasswordExpiration.'Max Days')" }) }) + $vrniPasswordExpirationObject | Add-Member -NotePropertyName "Warning (days)" $(if ($vrniPasswordExpiration.'Warning Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordExpiration.'Warning Days') -ne $requiredConfig.warningDays) { "$($vrniPasswordExpiration.'Warning Days') [ $($requiredConfig.warningDays) ]" } else { "$($vrniPasswordExpiration.'Warning Days')" } } else { "$($vrniPasswordExpiration.'Warning Days')" }) }) $allvrniPasswordExpirationObject += $vrniPasswordExpirationObject } else { Write-Error "Unable to retrieve password expiration policy from VMware Aria Operations for Networks ($node): PRE_VALIDATION_FAILED" } if ($vrniPasswordExpiration = Get-AriaLocalUserPasswordExpiration -server $server -user $user -pass $pass -domain $domain.name -vmName $node.vmName -guestUser support -guestPassword $vrnipassword.password -localUser "consoleuser" -sudo) { - $vrniPasswordExpirationObject = New-Object -TypeName psobject - $vrniPasswordExpirationObject | Add-Member -notepropertyname "System" -notepropertyvalue $vrniPasswordExpiration.system - $vrniPasswordExpirationObject | Add-Member -NotePropertyName "Local User" -notepropertyvalue "consoleuser" - $vrniPasswordExpirationObject | Add-Member -notepropertyname "Minimum (days)" $(if ($vrniPasswordExpiration.'Min Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordExpiration.'Min Days') -ne $requiredConfig.minDays) { "$($vrniPasswordExpiration.'Min Days') [ $($requiredConfig.minDays) ]" } else { "$($vrniPasswordExpiration.'Min Days')" } } else { "$($vrniPasswordExpiration.'Min Days')" }) }) - $vrniPasswordExpirationObject | Add-Member -notepropertyname "Maximum (days)" $(if ($vrniPasswordExpiration.'Max Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordExpiration.'Max Days') -ne $requiredConfig.maxDays) { "$($vrniPasswordExpiration.'Max Days') [ $($requiredConfig.maxDays) ]" } else { "$($vrniPasswordExpiration.'Max Days')" } } else { "$($vrniPasswordExpiration.'Max Days')" }) }) - $vrniPasswordExpirationObject | Add-Member -notepropertyname "Warning (days)" $(if ($vrniPasswordExpiration.'Warning Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordExpiration.'Warning Days') -ne $requiredConfig.warningDays) { "$($vrniPasswordExpiration.'Warning Days') [ $($requiredConfig.warningDays) ]" } else { "$($vrniPasswordExpiration.'Warning Days')" } } else { "$($vrniPasswordExpiration.'Warning Days')" }) }) + $vrniPasswordExpirationObject = New-Object -TypeName PSObject + $vrniPasswordExpirationObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vrniPasswordExpiration.system + $vrniPasswordExpirationObject | Add-Member -NotePropertyName "Local User" -NotePropertyValue "consoleuser" + $vrniPasswordExpirationObject | Add-Member -NotePropertyName "Minimum (days)" $(if ($vrniPasswordExpiration.'Min Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordExpiration.'Min Days') -ne $requiredConfig.minDays) { "$($vrniPasswordExpiration.'Min Days') [ $($requiredConfig.minDays) ]" } else { "$($vrniPasswordExpiration.'Min Days')" } } else { "$($vrniPasswordExpiration.'Min Days')" }) }) + $vrniPasswordExpirationObject | Add-Member -NotePropertyName "Maximum (days)" $(if ($vrniPasswordExpiration.'Max Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordExpiration.'Max Days') -ne $requiredConfig.maxDays) { "$($vrniPasswordExpiration.'Max Days') [ $($requiredConfig.maxDays) ]" } else { "$($vrniPasswordExpiration.'Max Days')" } } else { "$($vrniPasswordExpiration.'Max Days')" }) }) + $vrniPasswordExpirationObject | Add-Member -NotePropertyName "Warning (days)" $(if ($vrniPasswordExpiration.'Warning Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordExpiration.'Warning Days') -ne $requiredConfig.warningDays) { "$($vrniPasswordExpiration.'Warning Days') [ $($requiredConfig.warningDays) ]" } else { "$($vrniPasswordExpiration.'Warning Days')" } } else { "$($vrniPasswordExpiration.'Warning Days')" }) }) $allvrniPasswordExpirationObject += $vrniPasswordExpirationObject } else { Write-Error "Unable to retrieve password expiration policy from VMware Aria Operations for Networks ($node): PRE_VALIDATION_FAILED" @@ -10008,12 +10014,12 @@ Function Request-AriaLocalUserPasswordExpiration { $vrapassword = (Get-vRSLCMProductPassword -productId vra -nodeFqdn $node -vrslcmRootPass $vcfVrslcmDetails.rootPassword) $vrausername = (Get-vRSLCMLockerPassword -vmid $vrapassword.passwordvmid).userName if ($vraPasswordExpiration = Get-AriaLocalUserPasswordExpiration -server $server -user $user -pass $pass -domain $domain.name -vmName $node.split('.')[0] -guestUser $vrausername -guestPassword $vrapassword.password -localUser "root") { - $vraPasswordExpirationObject = New-Object -TypeName psobject - $vraPasswordExpirationObject | Add-Member -notepropertyname "System" -notepropertyvalue $vraPasswordExpiration.system - $vraPasswordExpirationObject | Add-Member -notepropertyname "Local User" -notepropertyvalue "root" - $vraPasswordExpirationObject | Add-Member -notepropertyname "Minimum (days)" $(if ($vraPasswordExpiration.'Min Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordExpiration.'Min Days') -ne $requiredConfig.minDays) { "$($vraPasswordExpiration.'Min Days') [ $($requiredConfig.minDays) ]" } else { "$($vraPasswordExpiration.'Min Days')" } } else { "$($vraPasswordExpiration.'Min Days')" }) }) - $vraPasswordExpirationObject | Add-Member -notepropertyname "Maximum (days)" $(if ($vraPasswordExpiration.'Max Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordExpiration.'Max Days') -ne $requiredConfig.maxDays) { "$($vraPasswordExpiration.'Max Days') [ $($requiredConfig.maxDays) ]" } else { "$($vraPasswordExpiration.'Max Days')" } } else { "$($vraPasswordExpiration.'Max Days')" }) }) - $vraPasswordExpirationObject | Add-Member -notepropertyname "Warning (days)" $(if ($vraPasswordExpiration.'Warning Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordExpiration.'Warning Days') -ne $requiredConfig.warningDays) { "$($vraPasswordExpiration.'Warning Days') [ $($requiredConfig.warningDays) ]" } else { "$($vraPasswordExpiration.'Warning Days')" } } else { "$($vraPasswordExpiration.'Warning Days')" }) }) + $vraPasswordExpirationObject = New-Object -TypeName PSObject + $vraPasswordExpirationObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vraPasswordExpiration.system + $vraPasswordExpirationObject | Add-Member -NotePropertyName "Local User" -NotePropertyValue "root" + $vraPasswordExpirationObject | Add-Member -NotePropertyName "Minimum (days)" $(if ($vraPasswordExpiration.'Min Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordExpiration.'Min Days') -ne $requiredConfig.minDays) { "$($vraPasswordExpiration.'Min Days') [ $($requiredConfig.minDays) ]" } else { "$($vraPasswordExpiration.'Min Days')" } } else { "$($vraPasswordExpiration.'Min Days')" }) }) + $vraPasswordExpirationObject | Add-Member -NotePropertyName "Maximum (days)" $(if ($vraPasswordExpiration.'Max Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordExpiration.'Max Days') -ne $requiredConfig.maxDays) { "$($vraPasswordExpiration.'Max Days') [ $($requiredConfig.maxDays) ]" } else { "$($vraPasswordExpiration.'Max Days')" } } else { "$($vraPasswordExpiration.'Max Days')" }) }) + $vraPasswordExpirationObject | Add-Member -NotePropertyName "Warning (days)" $(if ($vraPasswordExpiration.'Warning Days' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordExpiration.'Warning Days') -ne $requiredConfig.warningDays) { "$($vraPasswordExpiration.'Warning Days') [ $($requiredConfig.warningDays) ]" } else { "$($vraPasswordExpiration.'Warning Days')" } } else { "$($vraPasswordExpiration.'Warning Days')" }) }) $allvraPasswordExpirationObject += $vraPasswordExpirationObject } else { Write-Error "Unable to retrieve password expiration policy from VMware Aria Automation ($node): PRE_VALIDATION_FAILED" @@ -10041,12 +10047,12 @@ Function Request-AriaLocalUserPasswordExpiration { if (Test-WsaConnection -server $node) { if (Test-WsaAuthentication -server $node -user $vidmdirectoryusername -pass $vidmdirectorypassword.password) { if ($vidmPasswordExpiration = Get-WsaPasswordPolicy) { - $vidmPasswordExpirationObject = New-Object -TypeName psobject - $vidmPasswordExpirationObject | Add-Member -notepropertyname "System" -notepropertyvalue ($node.Split("."))[-0] - $vidmPasswordExpirationObject | Add-Member -notepropertyname "Password Lifetime (days)" -notepropertyvalue $(if ($vidmdrift) { if (($vidmPasswordExpiration.passwordTtlInHours / 24) -ne $requiredConfig.passwordLifetime) { "$(($vidmPasswordExpiration.passwordTtlInHours / 24)) [ $($requiredConfig.passwordLifetime) ]" } else { "$(($vidmPasswordExpiration.passwordTtlInHours / 24))" } } else { "$(($vidmPasswordExpiration.passwordTtlInHours / 24))" }) - $vidmPasswordExpirationObject | Add-Member -notepropertyname "Password Reminder (days)" -notepropertyvalue $(if ($vidmdrift) { if (($vidmPasswordExpiration.notificationThreshold / 24 / 3600 / 1000) -ne $requiredConfig.passwordReminder) { "$(($vidmPasswordExpiration.notificationThreshold / 24 / 3600 / 1000)) [ $($requiredConfig.passwordReminder) ]" } else { "$(($vidmPasswordExpiration.notificationThreshold / 24 / 3600 / 1000))" } } else { "$(($vidmPasswordExpiration.notificationThreshold / 24 / 3600 / 1000))" }) - $vidmPasswordExpirationObject | Add-Member -notepropertyname "Temporary Password (hours)" -notepropertyvalue $(if ($vidmdrift) { if ($vidmPasswordExpiration.tempPasswordTtl -ne $requiredConfig.temporaryPassword) { "$($vidmPasswordExpiration.tempPasswordTtl) [ $($requiredConfig.temporaryPassword) ]" } else { "$($vidmPasswordExpiration.tempPasswordTtl)" } } else { "$($vidmPasswordExpiration.tempPasswordTtl)" }) - $vidmPasswordExpirationObject | Add-Member -notepropertyname "Password Reminder Frequency (days)" -notepropertyvalue $(if ($vidmdrift) { if (($vidmPasswordExpiration.notificationInterval / 24 / 3600 / 1000) -ne $requiredConfig.temporaryPassword) { "$(($vidmPasswordExpiration.notificationInterval / 24 / 3600 / 1000)) [ $($requiredConfig.temporaryPassword) ]" } else { "$(($vidmPasswordExpiration.notificationInterval / 24 / 3600 / 1000))" } } else { "$(($vidmPasswordExpiration.notificationInterval / 24 / 3600 / 1000))" }) + $vidmPasswordExpirationObject = New-Object -TypeName PSObject + $vidmPasswordExpirationObject | Add-Member -NotePropertyName "System" -NotePropertyValue ($node.Split("."))[-0] + $vidmPasswordExpirationObject | Add-Member -NotePropertyName "Password Lifetime (days)" -NotePropertyValue $(if ($vidmdrift) { if (($vidmPasswordExpiration.passwordTtlInHours / 24) -ne $requiredConfig.passwordLifetime) { "$(($vidmPasswordExpiration.passwordTtlInHours / 24)) [ $($requiredConfig.passwordLifetime) ]" } else { "$(($vidmPasswordExpiration.passwordTtlInHours / 24))" } } else { "$(($vidmPasswordExpiration.passwordTtlInHours / 24))" }) + $vidmPasswordExpirationObject | Add-Member -NotePropertyName "Password Reminder (days)" -NotePropertyValue $(if ($vidmdrift) { if (($vidmPasswordExpiration.notificationThreshold / 24 / 3600 / 1000) -ne $requiredConfig.passwordReminder) { "$(($vidmPasswordExpiration.notificationThreshold / 24 / 3600 / 1000)) [ $($requiredConfig.passwordReminder) ]" } else { "$(($vidmPasswordExpiration.notificationThreshold / 24 / 3600 / 1000))" } } else { "$(($vidmPasswordExpiration.notificationThreshold / 24 / 3600 / 1000))" }) + $vidmPasswordExpirationObject | Add-Member -NotePropertyName "Temporary Password (hours)" -NotePropertyValue $(if ($vidmdrift) { if ($vidmPasswordExpiration.tempPasswordTtl -ne $requiredConfig.temporaryPassword) { "$($vidmPasswordExpiration.tempPasswordTtl) [ $($requiredConfig.temporaryPassword) ]" } else { "$($vidmPasswordExpiration.tempPasswordTtl)" } } else { "$($vidmPasswordExpiration.tempPasswordTtl)" }) + $vidmPasswordExpirationObject | Add-Member -NotePropertyName "Password Reminder Frequency (days)" -NotePropertyValue $(if ($vidmdrift) { if (($vidmPasswordExpiration.notificationInterval / 24 / 3600 / 1000) -ne $requiredConfig.temporaryPassword) { "$(($vidmPasswordExpiration.notificationInterval / 24 / 3600 / 1000)) [ $($requiredConfig.temporaryPassword) ]" } else { "$(($vidmPasswordExpiration.notificationInterval / 24 / 3600 / 1000))" } } else { "$(($vidmPasswordExpiration.notificationInterval / 24 / 3600 / 1000))" }) $allvidmPasswordDirectoryExpirationObject += $vidmPasswordExpirationObject } else { Write-Error "Unable to retrieve password expiration policy from Workspace ONE Access instance ($node): PRE_VALIDATION_FAILED" @@ -10173,20 +10179,20 @@ Function Request-AriaLocalUserPasswordComplexity { } $allvrslcmPasswordComplexityObject = New-Object System.Collections.ArrayList if ($vrslcmPasswordComplexity = Get-AriaLocalUserPasswordComplexity -vmName $vcfVrslcmDetails.fqdn.split('.')[0] -guestUser $vcfVrslcmDetails.rootUser -guestPassword $vcfVrslcmDetails.rootPassword -product vrslcm) { - $vrslcmPasswordComplexityObject = New-Object -TypeName psobject - $vrslcmPasswordComplexityObject | Add-Member -notepropertyname "System" -notepropertyvalue $vrslcmPasswordComplexity.system - $vrslcmPasswordComplexityObject | Add-Member -notepropertyname "Min Numerical" $(if ($vrslcmPasswordComplexity.'Min Numerical' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Min Numerical').trim() -ne $requiredConfig.minNumerical.trim()) { "$($vrslcmPasswordComplexity.'Min Numerical') [ $($requiredConfig.minNumerical) ]" } else { "$($vrslcmPasswordComplexity.'Min Numerical')" } } else { "$($vrslcmPasswordComplexity.'Min Numerical')" }) }) - $vrslcmPasswordComplexityObject | Add-Member -notepropertyname "Min Uppercase" $(if ($vrslcmPasswordComplexity.'Min Uppercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Min Uppercase').trim() -ne $requiredConfig.minUppercase.trim()) { "$($vrslcmPasswordComplexity.'Min Uppercase') [ $($requiredConfig.minUppercase) ]" } else { "$($vrslcmPasswordComplexity.'Min Uppercase')" } } else { "$($vrslcmPasswordComplexity.'Min Uppercase')" }) }) - $vrslcmPasswordComplexityObject | Add-Member -notepropertyname "Min Lowercase" $(if ($vrslcmPasswordComplexity.'Min Lowercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Min Lowercase').trim() -ne $requiredConfig.minLowercase.trim()) { "$($vrslcmPasswordComplexity.'Min Lowercase') [ $($requiredConfig.minLowercase) ]" } else { "$($vrslcmPasswordComplexity.'Min Lowercase')" } } else { "$($vrslcmPasswordComplexity.'Min Uppercase')" }) }) - $vrslcmPasswordComplexityObject | Add-Member -notepropertyname "Min Special" $(if ($vrslcmPasswordComplexity.'Min Special' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Min Special').trim() -ne $requiredConfig.minSpecial.trim()) { "$($vrslcmPasswordComplexity.'Min Special') [ $($requiredConfig.minSpecial) ]" } else { "$($vrslcmPasswordComplexity.'Min Special')" } } else { "$($vrslcmPasswordComplexity.'Min Special')" }) }) - $vrslcmPasswordComplexityObject | Add-Member -notepropertyname "Min Length" $(if ($vrslcmPasswordComplexity.'Min Length' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Min Length').trim() -ne $requiredConfig.minLength.trim()) { "$($vrslcmPasswordComplexity.'Min Length') [ $($requiredConfig.minLength) ]" } else { "$($vrslcmPasswordComplexity.'Min Length')" } } else { "$($vrslcmPasswordComplexity.'Min Length')" }) }) - $vrslcmPasswordComplexityObject | Add-Member -notepropertyname "Min Unique" $(if ($vrslcmPasswordComplexity.'Min Unique' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Min Unique').trim() -ne $requiredConfig.minUnique.trim()) { "$($vrslcmPasswordComplexity.'Min Unique') [ $($requiredConfig.minUnique) ]" } else { "$($vrslcmPasswordComplexity.'Min Unique')" } } else { "$($vrslcmPasswordComplexity.'Min Unique')" }) }) - $vrslcmPasswordComplexityObject | Add-Member -notepropertyname "Min Class" $(if ($vrslcmPasswordComplexity.'Min Class' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Min Class').trim() -ne $requiredConfig.minClass.trim()) { "$($vrslcmPasswordComplexity.'Min Class') [ $($requiredConfig.minClass) ]" } else { "$($vrslcmPasswordComplexity.'Min Class')" } } else { "$($vrslcmPasswordComplexity.'Min Class')" }) }) + $vrslcmPasswordComplexityObject = New-Object -TypeName PSObject + $vrslcmPasswordComplexityObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vrslcmPasswordComplexity.system + $vrslcmPasswordComplexityObject | Add-Member -NotePropertyName "Min Numerical" $(if ($vrslcmPasswordComplexity.'Min Numerical' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Min Numerical').trim() -ne $requiredConfig.minNumerical.trim()) { "$($vrslcmPasswordComplexity.'Min Numerical') [ $($requiredConfig.minNumerical) ]" } else { "$($vrslcmPasswordComplexity.'Min Numerical')" } } else { "$($vrslcmPasswordComplexity.'Min Numerical')" }) }) + $vrslcmPasswordComplexityObject | Add-Member -NotePropertyName "Min Uppercase" $(if ($vrslcmPasswordComplexity.'Min Uppercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Min Uppercase').trim() -ne $requiredConfig.minUppercase.trim()) { "$($vrslcmPasswordComplexity.'Min Uppercase') [ $($requiredConfig.minUppercase) ]" } else { "$($vrslcmPasswordComplexity.'Min Uppercase')" } } else { "$($vrslcmPasswordComplexity.'Min Uppercase')" }) }) + $vrslcmPasswordComplexityObject | Add-Member -NotePropertyName "Min Lowercase" $(if ($vrslcmPasswordComplexity.'Min Lowercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Min Lowercase').trim() -ne $requiredConfig.minLowercase.trim()) { "$($vrslcmPasswordComplexity.'Min Lowercase') [ $($requiredConfig.minLowercase) ]" } else { "$($vrslcmPasswordComplexity.'Min Lowercase')" } } else { "$($vrslcmPasswordComplexity.'Min Uppercase')" }) }) + $vrslcmPasswordComplexityObject | Add-Member -NotePropertyName "Min Special" $(if ($vrslcmPasswordComplexity.'Min Special' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Min Special').trim() -ne $requiredConfig.minSpecial.trim()) { "$($vrslcmPasswordComplexity.'Min Special') [ $($requiredConfig.minSpecial) ]" } else { "$($vrslcmPasswordComplexity.'Min Special')" } } else { "$($vrslcmPasswordComplexity.'Min Special')" }) }) + $vrslcmPasswordComplexityObject | Add-Member -NotePropertyName "Min Length" $(if ($vrslcmPasswordComplexity.'Min Length' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Min Length').trim() -ne $requiredConfig.minLength.trim()) { "$($vrslcmPasswordComplexity.'Min Length') [ $($requiredConfig.minLength) ]" } else { "$($vrslcmPasswordComplexity.'Min Length')" } } else { "$($vrslcmPasswordComplexity.'Min Length')" }) }) + $vrslcmPasswordComplexityObject | Add-Member -NotePropertyName "Min Unique" $(if ($vrslcmPasswordComplexity.'Min Unique' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Min Unique').trim() -ne $requiredConfig.minUnique.trim()) { "$($vrslcmPasswordComplexity.'Min Unique') [ $($requiredConfig.minUnique) ]" } else { "$($vrslcmPasswordComplexity.'Min Unique')" } } else { "$($vrslcmPasswordComplexity.'Min Unique')" }) }) + $vrslcmPasswordComplexityObject | Add-Member -NotePropertyName "Min Class" $(if ($vrslcmPasswordComplexity.'Min Class' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Min Class').trim() -ne $requiredConfig.minClass.trim()) { "$($vrslcmPasswordComplexity.'Min Class') [ $($requiredConfig.minClass) ]" } else { "$($vrslcmPasswordComplexity.'Min Class')" } } else { "$($vrslcmPasswordComplexity.'Min Class')" }) }) if ($vrslcmPasswordComplexity -match "Max Sequence") { - $vrslcmPasswordComplexityObject | Add-Member -notepropertyname "Max Sequence" $(if ($vrslcmPasswordComplexity.'Max Sequence' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Max Sequence').trim() -ne $requiredConfig.maxSequence.trim()) { "$($vrslcmPasswordComplexity.'Max Sequence') [ $($requiredConfig.maxSequence) ]" } else { "$($vrslcmPasswordComplexity.'Max Sequence')" } } else { "$($vrslcmPasswordComplexity.'Max Sequence')" }) }) + $vrslcmPasswordComplexityObject | Add-Member -NotePropertyName "Max Sequence" $(if ($vrslcmPasswordComplexity.'Max Sequence' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Max Sequence').trim() -ne $requiredConfig.maxSequence.trim()) { "$($vrslcmPasswordComplexity.'Max Sequence') [ $($requiredConfig.maxSequence) ]" } else { "$($vrslcmPasswordComplexity.'Max Sequence')" } } else { "$($vrslcmPasswordComplexity.'Max Sequence')" }) }) } - $vrslcmPasswordComplexityObject | Add-Member -notepropertyname "Max Retries" $(if ($vrslcmPasswordComplexity.'Max Retries' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Max Retries').trim() -ne $requiredConfig.retries.trim()) { "$($vrslcmPasswordComplexity.'Max Retries') [ $($requiredConfig.retries) ]" } else { "$($vrslcmPasswordComplexity.'Max Retries')" } } else { "$($vrslcmPasswordComplexity.'Max Retries')" }) }) - $vrslcmPasswordComplexityObject | Add-Member -notepropertyname "History" $(if ($vrslcmPasswordComplexity.History -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.History).trim() -ne $requiredConfig.history.trim()) { "$($vrslcmPasswordComplexity.History) [ $($requiredConfig.history) ]" } else { "$($vrslcmPasswordComplexity.History)" } } else { "$($vrslcmPasswordComplexity.History)" }) }) + $vrslcmPasswordComplexityObject | Add-Member -NotePropertyName "Max Retries" $(if ($vrslcmPasswordComplexity.'Max Retries' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.'Max Retries').trim() -ne $requiredConfig.retries.trim()) { "$($vrslcmPasswordComplexity.'Max Retries') [ $($requiredConfig.retries) ]" } else { "$($vrslcmPasswordComplexity.'Max Retries')" } } else { "$($vrslcmPasswordComplexity.'Max Retries')" }) }) + $vrslcmPasswordComplexityObject | Add-Member -NotePropertyName "History" $(if ($vrslcmPasswordComplexity.History -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmPasswordComplexity.History).trim() -ne $requiredConfig.history.trim()) { "$($vrslcmPasswordComplexity.History) [ $($requiredConfig.history) ]" } else { "$($vrslcmPasswordComplexity.History)" } } else { "$($vrslcmPasswordComplexity.History)" }) }) $allvrslcmPasswordComplexityObject += $vrslcmPasswordComplexityObject } else { Write-Error "Unable to retrieve password expiration policy from VMware Aria Suite Lifecycle ($node): PRE_VALIDATION_FAILED" @@ -10209,18 +10215,18 @@ Function Request-AriaLocalUserPasswordComplexity { $vropspassword = (Get-vRSLCMProductPassword -productId vrops -nodeFqdn $node -vrslcmRootPass $vcfVrslcmDetails.rootPassword) $vropsusername = (Get-vRSLCMLockerPassword -vmid $vropspassword.passwordvmid).userName if ($vropsPasswordComplexity = Get-AriaLocalUserPasswordComplexity -vmName $node.split('.')[0] -guestUser $vropsusername -guestPassword $vropspassword.password -product vrops) { - $vropsPasswordComplexityObject = New-Object -TypeName psobject - $vropsPasswordComplexityObject | Add-Member -notepropertyname "System" -notepropertyvalue $vropsPasswordComplexity.system - $vropsPasswordComplexityObject | Add-Member -notepropertyname "Min Numerical" $(if ($vropsPasswordComplexity.'Min Numerical' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Min Numerical').trim() -ne $requiredConfig.minNumerical.trim()) { "$($vropsPasswordComplexity.'Min Numerical') [ $($requiredConfig.minNumerical) ]" } else { "$($vropsPasswordComplexity.'Min Numerical')" } } else { "$($vropsPasswordComplexity.'Min Numerical')" }) }) - $vropsPasswordComplexityObject | Add-Member -notepropertyname "Min Uppercase" $(if ($vropsPasswordComplexity.'Min Uppercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Min Uppercase').trim() -ne $requiredConfig.minUppercase.trim()) { "$($vropsPasswordComplexity.'Min Uppercase') [ $($requiredConfig.minUppercase) ]" } else { "$($vropsPasswordComplexity.'Min Uppercase')" } } else { "$($vropsPasswordComplexity.'Min Uppercase')" }) }) - $vropsPasswordComplexityObject | Add-Member -notepropertyname "Min Lowercase" $(if ($vropsPasswordComplexity.'Min Lowercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Min Lowercase').trim() -ne $requiredConfig.minLowercase.trim()) { "$($vropsPasswordComplexity.'Min Lowercase') [ $($requiredConfig.minLowercase) ]" } else { "$($vropsPasswordComplexity.'Min Lowercase')" } } else { "$($vropsPasswordComplexity.'Min Uppercase')" }) }) - $vropsPasswordComplexityObject | Add-Member -notepropertyname "Min Special" $(if ($vropsPasswordComplexity.'Min Special' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Min Special').trim() -ne $requiredConfig.minSpecial.trim()) { "$($vropsPasswordComplexity.'Min Special') [ $($requiredConfig.minSpecial) ]" } else { "$($vropsPasswordComplexity.'Min Special')" } } else { "$($vropsPasswordComplexity.'Min Special')" }) }) - $vropsPasswordComplexityObject | Add-Member -notepropertyname "Min Length" $(if ($vropsPasswordComplexity.'Min Length' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Min Length').trim() -ne $requiredConfig.minLength.trim()) { "$($vropsPasswordComplexity.'Min Length') [ $($requiredConfig.minLength) ]" } else { "$($vropsPasswordComplexity.'Min Length')" } } else { "$($vropsPasswordComplexity.'Min Length')" }) }) - $vropsPasswordComplexityObject | Add-Member -notepropertyname "Min Class" $(if ($vropsPasswordComplexity.'Min Class' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Min Class').trim() -ne $requiredConfig.minClass.trim()) { "$($vropsPasswordComplexity.'Min Class') [ $($requiredConfig.minClass) ]" } else { "$($vropsPasswordComplexity.'Min Class')" } } else { "$($vropsPasswordComplexity.'Min Class')" }) }) - $vropsPasswordComplexityObject | Add-Member -notepropertyname "Min Unique" $(if ($vropsPasswordComplexity.'Min Unique' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Min Unique').trim() -ne $requiredConfig.minUnique.trim()) { "$($vropsPasswordComplexity.'Min Unique') [ $($requiredConfig.minUnique) ]" } else { "$($vropsPasswordComplexity.'Min Unique')" } } else { "$($vropsPasswordComplexity.'Min Unique')" }) }) - $vropsPasswordComplexityObject | Add-Member -notepropertyname "Max Retries" $(if ($vropsPasswordComplexity.'Max Retries' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Max Retries').trim() -ne $requiredConfig.retries.trim()) { "$($vropsPasswordComplexity.'Max Retries') [ $($requiredConfig.retries) ]" } else { "$($vropsPasswordComplexity.'Max Retries')" } } else { "$($vropsPasswordComplexity.'Max Retries')" }) }) - $vropsPasswordComplexityObject | Add-Member -notepropertyname "Max Repeat" $(if ($vropsPasswordComplexity.'Max Repeat' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Max Repeat') -ne $requiredConfig.maxRepeat) { "$($vropsPasswordComplexity.'Max Repeat') [ $($requiredConfig.maxSequence) ]" } else { "$($vropsPasswordComplexity.'Max Repeat')" } } else { "$($vropsPasswordComplexity.'Max Repeat')" }) }) - $vropsPasswordComplexityObject | Add-Member -notepropertyname "History" $(if ($vropsPasswordComplexity.History -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.History).trim() -ne $requiredConfig.history.trim()) { "$($vropsPasswordComplexity.History) [ $($requiredConfig.history) ]" } else { "$($vropsPasswordComplexity.History)" } } else { "$($vropsPasswordComplexity.History)" }) }) + $vropsPasswordComplexityObject = New-Object -TypeName PSObject + $vropsPasswordComplexityObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vropsPasswordComplexity.system + $vropsPasswordComplexityObject | Add-Member -NotePropertyName "Min Numerical" $(if ($vropsPasswordComplexity.'Min Numerical' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Min Numerical').trim() -ne $requiredConfig.minNumerical.trim()) { "$($vropsPasswordComplexity.'Min Numerical') [ $($requiredConfig.minNumerical) ]" } else { "$($vropsPasswordComplexity.'Min Numerical')" } } else { "$($vropsPasswordComplexity.'Min Numerical')" }) }) + $vropsPasswordComplexityObject | Add-Member -NotePropertyName "Min Uppercase" $(if ($vropsPasswordComplexity.'Min Uppercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Min Uppercase').trim() -ne $requiredConfig.minUppercase.trim()) { "$($vropsPasswordComplexity.'Min Uppercase') [ $($requiredConfig.minUppercase) ]" } else { "$($vropsPasswordComplexity.'Min Uppercase')" } } else { "$($vropsPasswordComplexity.'Min Uppercase')" }) }) + $vropsPasswordComplexityObject | Add-Member -NotePropertyName "Min Lowercase" $(if ($vropsPasswordComplexity.'Min Lowercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Min Lowercase').trim() -ne $requiredConfig.minLowercase.trim()) { "$($vropsPasswordComplexity.'Min Lowercase') [ $($requiredConfig.minLowercase) ]" } else { "$($vropsPasswordComplexity.'Min Lowercase')" } } else { "$($vropsPasswordComplexity.'Min Uppercase')" }) }) + $vropsPasswordComplexityObject | Add-Member -NotePropertyName "Min Special" $(if ($vropsPasswordComplexity.'Min Special' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Min Special').trim() -ne $requiredConfig.minSpecial.trim()) { "$($vropsPasswordComplexity.'Min Special') [ $($requiredConfig.minSpecial) ]" } else { "$($vropsPasswordComplexity.'Min Special')" } } else { "$($vropsPasswordComplexity.'Min Special')" }) }) + $vropsPasswordComplexityObject | Add-Member -NotePropertyName "Min Length" $(if ($vropsPasswordComplexity.'Min Length' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Min Length').trim() -ne $requiredConfig.minLength.trim()) { "$($vropsPasswordComplexity.'Min Length') [ $($requiredConfig.minLength) ]" } else { "$($vropsPasswordComplexity.'Min Length')" } } else { "$($vropsPasswordComplexity.'Min Length')" }) }) + $vropsPasswordComplexityObject | Add-Member -NotePropertyName "Min Class" $(if ($vropsPasswordComplexity.'Min Class' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Min Class').trim() -ne $requiredConfig.minClass.trim()) { "$($vropsPasswordComplexity.'Min Class') [ $($requiredConfig.minClass) ]" } else { "$($vropsPasswordComplexity.'Min Class')" } } else { "$($vropsPasswordComplexity.'Min Class')" }) }) + $vropsPasswordComplexityObject | Add-Member -NotePropertyName "Min Unique" $(if ($vropsPasswordComplexity.'Min Unique' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Min Unique').trim() -ne $requiredConfig.minUnique.trim()) { "$($vropsPasswordComplexity.'Min Unique') [ $($requiredConfig.minUnique) ]" } else { "$($vropsPasswordComplexity.'Min Unique')" } } else { "$($vropsPasswordComplexity.'Min Unique')" }) }) + $vropsPasswordComplexityObject | Add-Member -NotePropertyName "Max Retries" $(if ($vropsPasswordComplexity.'Max Retries' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Max Retries').trim() -ne $requiredConfig.retries.trim()) { "$($vropsPasswordComplexity.'Max Retries') [ $($requiredConfig.retries) ]" } else { "$($vropsPasswordComplexity.'Max Retries')" } } else { "$($vropsPasswordComplexity.'Max Retries')" }) }) + $vropsPasswordComplexityObject | Add-Member -NotePropertyName "Max Repeat" $(if ($vropsPasswordComplexity.'Max Repeat' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.'Max Repeat') -ne $requiredConfig.maxRepeat) { "$($vropsPasswordComplexity.'Max Repeat') [ $($requiredConfig.maxSequence) ]" } else { "$($vropsPasswordComplexity.'Max Repeat')" } } else { "$($vropsPasswordComplexity.'Max Repeat')" }) }) + $vropsPasswordComplexityObject | Add-Member -NotePropertyName "History" $(if ($vropsPasswordComplexity.History -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsPasswordComplexity.History).trim() -ne $requiredConfig.history.trim()) { "$($vropsPasswordComplexity.History) [ $($requiredConfig.history) ]" } else { "$($vropsPasswordComplexity.History)" } } else { "$($vropsPasswordComplexity.History)" }) }) $allvropsPasswordComplexityObject += $vropsPasswordComplexityObject } else { Write-Error "Unable to retrieve password expiration policy from VMware Aria Operations ($node): PRE_VALIDATION_FAILED" @@ -10243,18 +10249,18 @@ Function Request-AriaLocalUserPasswordComplexity { foreach ($node in $vrlinodes) { $vrlipassword = (Get-vRSLCMProductPassword -productId vrli -nodeFqdn $node -vrslcmRootPass $vcfVrslcmDetails.rootPassword) if ($vrliPasswordComplexity = Get-AriaLocalUserPasswordComplexity -vmName $node.split('.')[0] -guestUser root -guestPassword $vrlipassword.password -product vrli) { - $vrliPasswordComplexityObject = New-Object -TypeName psobject - $vrliPasswordComplexityObject | Add-Member -notepropertyname "System" -notepropertyvalue $vrliPasswordComplexity.system - $vrliPasswordComplexityObject | Add-Member -notepropertyname "Min Numerical" $(if ($vrliPasswordComplexity.'Min Numerical' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Min Numerical').trim() -ne $requiredConfig.minNumerical.trim()) { "$($vrliPasswordComplexity.'Min Numerical') [ $($requiredConfig.minNumerical) ]" } else { "$($vrliPasswordComplexity.'Min Numerical')" } } else { "$($vrliPasswordComplexity.'Min Numerical')" }) }) - $vrliPasswordComplexityObject | Add-Member -notepropertyname "Min Uppercase" $(if ($vrliPasswordComplexity.'Min Uppercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Min Uppercase').trim() -ne $requiredConfig.minUppercase.trim()) { "$($vrliPasswordComplexity.'Min Uppercase') [ $($requiredConfig.minUppercase) ]" } else { "$($vrliPasswordComplexity.'Min Uppercase')" } } else { "$($vrliPasswordComplexity.'Min Uppercase')" }) }) - $vrliPasswordComplexityObject | Add-Member -notepropertyname "Min Lowercase" $(if ($vrliPasswordComplexity.'Min Lowercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Min Lowercase').trim() -ne $requiredConfig.minLowercase.trim()) { "$($vrliPasswordComplexity.'Min Lowercase') [ $($requiredConfig.minLowercase) ]" } else { "$($vrliPasswordComplexity.'Min Lowercase')" } } else { "$($vrliPasswordComplexity.'Min Uppercase')" }) }) - $vrliPasswordComplexityObject | Add-Member -notepropertyname "Min Special" $(if ($vrliPasswordComplexity.'Min Special' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Min Special').trim() -ne $requiredConfig.minSpecial.trim()) { "$($vrliPasswordComplexity.'Min Special') [ $($requiredConfig.minSpecial) ]" } else { "$($vrliPasswordComplexity.'Min Special')" } } else { "$($vrliPasswordComplexity.'Min Special')" }) }) - $vrliPasswordComplexityObject | Add-Member -notepropertyname "Min Length" $(if ($vrliPasswordComplexity.'Min Length' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Min Length').trim() -ne $requiredConfig.minLength.trim()) { "$($vrliPasswordComplexity.'Min Length') [ $($requiredConfig.minLength) ]" } else { "$($vrliPasswordComplexity.'Min Length')" } } else { "$($vrliPasswordComplexity.'Min Length')" }) }) - $vrliPasswordComplexityObject | Add-Member -notepropertyname "Min Class" $(if ($vrliPasswordComplexity.'Min Class' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Min Class').trim() -ne $requiredConfig.minClass.trim()) { "$($vrliPasswordComplexity.'Min Class') [ $($requiredConfig.minClass) ]" } else { "$($vrliPasswordComplexity.'Min Class')" } } else { "$($vrliPasswordComplexity.'Min Class')" }) }) - $vrliPasswordComplexityObject | Add-Member -notepropertyname "Min Unique" $(if ($vrliPasswordComplexity.'Min Unique' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Min Unique').trim() -ne $requiredConfig.minUnique.trim()) { "$($vrliPasswordComplexity.'Min Unique') [ $($requiredConfig.minUnique) ]" } else { "$($vrliPasswordComplexity.'Min Unique')" } } else { "$($vrliPasswordComplexity.'Min Unique')" }) }) - $vrliPasswordComplexityObject | Add-Member -notepropertyname "Max Retries" $(if ($vrliPasswordComplexity.'Max Retries' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Max Retries').trim() -ne $requiredConfig.retries.trim()) { "$($vrliPasswordComplexity.'Max Retries') [ $($requiredConfig.retries) ]" } else { "$($vrliPasswordComplexity.'Max Retries')" } } else { "$($vrliPasswordComplexity.'Max Retries')" }) }) - $vrliPasswordComplexityObject | Add-Member -notepropertyname "Max Repeat" $(if ($vrliPasswordComplexity.'Max Repeat' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Max Repeat').trim() -ne $requiredConfig.maxSequence.trim()) { "$($vrliPasswordComplexity.'Max Repeat') [ $($requiredConfig.maxSequence) ]" } else { "$($vrliPasswordComplexity.'Max Repeat')" } } else { "$($vrliPasswordComplexity.'Max Repeat')" }) }) - $vrliPasswordComplexityObject | Add-Member -notepropertyname "History" $(if ($vrliPasswordComplexity.History -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.History).trim() -ne $requiredConfig.history.trim()) { "$($vrliPasswordComplexity.History) [ $($requiredConfig.history) ]" } else { "$($vrliPasswordComplexity.History)" } } else { "$($vrliPasswordComplexity.History)" }) }) + $vrliPasswordComplexityObject = New-Object -TypeName PSObject + $vrliPasswordComplexityObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vrliPasswordComplexity.system + $vrliPasswordComplexityObject | Add-Member -NotePropertyName "Min Numerical" $(if ($vrliPasswordComplexity.'Min Numerical' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Min Numerical').trim() -ne $requiredConfig.minNumerical.trim()) { "$($vrliPasswordComplexity.'Min Numerical') [ $($requiredConfig.minNumerical) ]" } else { "$($vrliPasswordComplexity.'Min Numerical')" } } else { "$($vrliPasswordComplexity.'Min Numerical')" }) }) + $vrliPasswordComplexityObject | Add-Member -NotePropertyName "Min Uppercase" $(if ($vrliPasswordComplexity.'Min Uppercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Min Uppercase').trim() -ne $requiredConfig.minUppercase.trim()) { "$($vrliPasswordComplexity.'Min Uppercase') [ $($requiredConfig.minUppercase) ]" } else { "$($vrliPasswordComplexity.'Min Uppercase')" } } else { "$($vrliPasswordComplexity.'Min Uppercase')" }) }) + $vrliPasswordComplexityObject | Add-Member -NotePropertyName "Min Lowercase" $(if ($vrliPasswordComplexity.'Min Lowercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Min Lowercase').trim() -ne $requiredConfig.minLowercase.trim()) { "$($vrliPasswordComplexity.'Min Lowercase') [ $($requiredConfig.minLowercase) ]" } else { "$($vrliPasswordComplexity.'Min Lowercase')" } } else { "$($vrliPasswordComplexity.'Min Uppercase')" }) }) + $vrliPasswordComplexityObject | Add-Member -NotePropertyName "Min Special" $(if ($vrliPasswordComplexity.'Min Special' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Min Special').trim() -ne $requiredConfig.minSpecial.trim()) { "$($vrliPasswordComplexity.'Min Special') [ $($requiredConfig.minSpecial) ]" } else { "$($vrliPasswordComplexity.'Min Special')" } } else { "$($vrliPasswordComplexity.'Min Special')" }) }) + $vrliPasswordComplexityObject | Add-Member -NotePropertyName "Min Length" $(if ($vrliPasswordComplexity.'Min Length' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Min Length').trim() -ne $requiredConfig.minLength.trim()) { "$($vrliPasswordComplexity.'Min Length') [ $($requiredConfig.minLength) ]" } else { "$($vrliPasswordComplexity.'Min Length')" } } else { "$($vrliPasswordComplexity.'Min Length')" }) }) + $vrliPasswordComplexityObject | Add-Member -NotePropertyName "Min Class" $(if ($vrliPasswordComplexity.'Min Class' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Min Class').trim() -ne $requiredConfig.minClass.trim()) { "$($vrliPasswordComplexity.'Min Class') [ $($requiredConfig.minClass) ]" } else { "$($vrliPasswordComplexity.'Min Class')" } } else { "$($vrliPasswordComplexity.'Min Class')" }) }) + $vrliPasswordComplexityObject | Add-Member -NotePropertyName "Min Unique" $(if ($vrliPasswordComplexity.'Min Unique' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Min Unique').trim() -ne $requiredConfig.minUnique.trim()) { "$($vrliPasswordComplexity.'Min Unique') [ $($requiredConfig.minUnique) ]" } else { "$($vrliPasswordComplexity.'Min Unique')" } } else { "$($vrliPasswordComplexity.'Min Unique')" }) }) + $vrliPasswordComplexityObject | Add-Member -NotePropertyName "Max Retries" $(if ($vrliPasswordComplexity.'Max Retries' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Max Retries').trim() -ne $requiredConfig.retries.trim()) { "$($vrliPasswordComplexity.'Max Retries') [ $($requiredConfig.retries) ]" } else { "$($vrliPasswordComplexity.'Max Retries')" } } else { "$($vrliPasswordComplexity.'Max Retries')" }) }) + $vrliPasswordComplexityObject | Add-Member -NotePropertyName "Max Repeat" $(if ($vrliPasswordComplexity.'Max Repeat' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.'Max Repeat').trim() -ne $requiredConfig.maxSequence.trim()) { "$($vrliPasswordComplexity.'Max Repeat') [ $($requiredConfig.maxSequence) ]" } else { "$($vrliPasswordComplexity.'Max Repeat')" } } else { "$($vrliPasswordComplexity.'Max Repeat')" }) }) + $vrliPasswordComplexityObject | Add-Member -NotePropertyName "History" $(if ($vrliPasswordComplexity.History -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliPasswordComplexity.History).trim() -ne $requiredConfig.history.trim()) { "$($vrliPasswordComplexity.History) [ $($requiredConfig.history) ]" } else { "$($vrliPasswordComplexity.History)" } } else { "$($vrliPasswordComplexity.History)" }) }) $allvrliPasswordComplexityObject += $vrliPasswordComplexityObject } else { Write-Error "Unable to retrieve password expiration policy from VMware Aria Operations for Logs ($node): PRE_VALIDATION_FAILED" @@ -10279,16 +10285,16 @@ Function Request-AriaLocalUserPasswordComplexity { $vrnivmid = $vrninodedata.supportPassword.Split(':')[2] $vrnipassword = (Get-vRSLCMProductPassword -productId vrni -vmid $vrnivmid -vrslcmRootPass $vcfVrslcmDetails.rootPassword) if ($vrniPasswordComplexity = Get-AriaLocalUserPasswordComplexity -vmName $node.vmname -guestUser support -guestPassword $vrnipassword.password -product vrni) { - $vrniPasswordComplexityObject = New-Object -TypeName psobject - $vrniPasswordComplexityObject | Add-Member -notepropertyname "System" -notepropertyvalue $vrniPasswordComplexity.system - $vrniPasswordComplexityObject | Add-Member -notepropertyname "Min Numerical" $(if ($vrniPasswordComplexity.'Min Numerical' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.'Min Numerical').trim() -ne $requiredConfig.minNumerical.trim()) { "$($vrniPasswordComplexity.'Min Numerical') [ $($requiredConfig.minNumerical) ]" } else { "$($vrniPasswordComplexity.'Min Numerical')" } } else { "$($vrniPasswordComplexity.'Min Numerical')" }) }) - $vrniPasswordComplexityObject | Add-Member -notepropertyname "Min Uppercase" $(if ($vrniPasswordComplexity.'Min Uppercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.'Min Uppercase').trim() -ne $requiredConfig.minUppercase.trim()) { "$($vrniPasswordComplexity.'Min Uppercase') [ $($requiredConfig.minUppercase) ]" } else { "$($vrniPasswordComplexity.'Min Uppercase')" } } else { "$($vrniPasswordComplexity.'Min Uppercase')" }) }) - $vrniPasswordComplexityObject | Add-Member -notepropertyname "Min Lowercase" $(if ($vrniPasswordComplexity.'Min Lowercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.'Min Lowercase').trim() -ne $requiredConfig.minLowercase.trim()) { "$($vrniPasswordComplexity.'Min Lowercase') [ $($requiredConfig.minLowercase) ]" } else { "$($vrniPasswordComplexity.'Min Lowercase')" } } else { "$($vrniPasswordComplexity.'Min Uppercase')" }) }) - $vrniPasswordComplexityObject | Add-Member -notepropertyname "Min Special" $(if ($vrniPasswordComplexity.'Min Special' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.'Min Special').trim() -ne $requiredConfig.minSpecial.trim()) { "$($vrniPasswordComplexity.'Min Special') [ $($requiredConfig.minSpecial) ]" } else { "$($vrniPasswordComplexity.'Min Special')" } } else { "$($vrniPasswordComplexity.'Min Special')" }) }) - $vrniPasswordComplexityObject | Add-Member -notepropertyname "Min Length" $(if ($vrniPasswordComplexity.'Min Length' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.'Min Length').trim() -ne $requiredConfig.minLength.trim()) { "$($vrniPasswordComplexity.'Min Length') [ $($requiredConfig.minLength) ]" } else { "$($vrniPasswordComplexity.'Min Length')" } } else { "$($vrniPasswordComplexity.'Min Length')" }) }) - $vrniPasswordComplexityObject | Add-Member -notepropertyname "Min Unique" $(if ($vrniPasswordComplexity.'Min Unique' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.'Min Unique').trim() -ne $requiredConfig.minUnique.trim()) { "$($vrniPasswordComplexity.'Min Unique') [ $($requiredConfig.minUnique) ]" } else { "$($vrniPasswordComplexity.'Min Unique')" } } else { "$($vrniPasswordComplexity.'Min Unique')" }) }) - $vrniPasswordComplexityObject | Add-Member -notepropertyname "Max Retries" $(if ($vrniPasswordComplexity.'Max Retries' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.'Max Retries').trim() -ne $requiredConfig.retries.trim()) { "$($vrniPasswordComplexity.'Max Retries') [ $($requiredConfig.retries) ]" } else { "$($vrniPasswordComplexity.'Max Retries')" } } else { "$($vrniPasswordComplexity.'Max Retries')" }) }) - $vrniPasswordComplexityObject | Add-Member -notepropertyname "History" $(if ($vrniPasswordComplexity.History -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.History).trim() -ne $requiredConfig.history.trim()) { "$($vrniPasswordComplexity.History) [ $($requiredConfig.history) ]" } else { "$($vrniPasswordComplexity.History)" } } else { "$($vrniPasswordComplexity.History)" }) }) + $vrniPasswordComplexityObject = New-Object -TypeName PSObject + $vrniPasswordComplexityObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vrniPasswordComplexity.system + $vrniPasswordComplexityObject | Add-Member -NotePropertyName "Min Numerical" $(if ($vrniPasswordComplexity.'Min Numerical' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.'Min Numerical').trim() -ne $requiredConfig.minNumerical.trim()) { "$($vrniPasswordComplexity.'Min Numerical') [ $($requiredConfig.minNumerical) ]" } else { "$($vrniPasswordComplexity.'Min Numerical')" } } else { "$($vrniPasswordComplexity.'Min Numerical')" }) }) + $vrniPasswordComplexityObject | Add-Member -NotePropertyName "Min Uppercase" $(if ($vrniPasswordComplexity.'Min Uppercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.'Min Uppercase').trim() -ne $requiredConfig.minUppercase.trim()) { "$($vrniPasswordComplexity.'Min Uppercase') [ $($requiredConfig.minUppercase) ]" } else { "$($vrniPasswordComplexity.'Min Uppercase')" } } else { "$($vrniPasswordComplexity.'Min Uppercase')" }) }) + $vrniPasswordComplexityObject | Add-Member -NotePropertyName "Min Lowercase" $(if ($vrniPasswordComplexity.'Min Lowercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.'Min Lowercase').trim() -ne $requiredConfig.minLowercase.trim()) { "$($vrniPasswordComplexity.'Min Lowercase') [ $($requiredConfig.minLowercase) ]" } else { "$($vrniPasswordComplexity.'Min Lowercase')" } } else { "$($vrniPasswordComplexity.'Min Uppercase')" }) }) + $vrniPasswordComplexityObject | Add-Member -NotePropertyName "Min Special" $(if ($vrniPasswordComplexity.'Min Special' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.'Min Special').trim() -ne $requiredConfig.minSpecial.trim()) { "$($vrniPasswordComplexity.'Min Special') [ $($requiredConfig.minSpecial) ]" } else { "$($vrniPasswordComplexity.'Min Special')" } } else { "$($vrniPasswordComplexity.'Min Special')" }) }) + $vrniPasswordComplexityObject | Add-Member -NotePropertyName "Min Length" $(if ($vrniPasswordComplexity.'Min Length' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.'Min Length').trim() -ne $requiredConfig.minLength.trim()) { "$($vrniPasswordComplexity.'Min Length') [ $($requiredConfig.minLength) ]" } else { "$($vrniPasswordComplexity.'Min Length')" } } else { "$($vrniPasswordComplexity.'Min Length')" }) }) + $vrniPasswordComplexityObject | Add-Member -NotePropertyName "Min Unique" $(if ($vrniPasswordComplexity.'Min Unique' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.'Min Unique').trim() -ne $requiredConfig.minUnique.trim()) { "$($vrniPasswordComplexity.'Min Unique') [ $($requiredConfig.minUnique) ]" } else { "$($vrniPasswordComplexity.'Min Unique')" } } else { "$($vrniPasswordComplexity.'Min Unique')" }) }) + $vrniPasswordComplexityObject | Add-Member -NotePropertyName "Max Retries" $(if ($vrniPasswordComplexity.'Max Retries' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.'Max Retries').trim() -ne $requiredConfig.retries.trim()) { "$($vrniPasswordComplexity.'Max Retries') [ $($requiredConfig.retries) ]" } else { "$($vrniPasswordComplexity.'Max Retries')" } } else { "$($vrniPasswordComplexity.'Max Retries')" }) }) + $vrniPasswordComplexityObject | Add-Member -NotePropertyName "History" $(if ($vrniPasswordComplexity.History -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrniPasswordComplexity.History).trim() -ne $requiredConfig.history.trim()) { "$($vrniPasswordComplexity.History) [ $($requiredConfig.history) ]" } else { "$($vrniPasswordComplexity.History)" } } else { "$($vrniPasswordComplexity.History)" }) }) $allvrniPasswordComplexityObject += $vrniPasswordComplexityObject } else { Write-Error "Unable to retrieve password expiration policy from VMware Aria Operations for Networks ($node): PRE_VALIDATION_FAILED" @@ -10312,22 +10318,22 @@ Function Request-AriaLocalUserPasswordComplexity { $vrapassword = (Get-vRSLCMProductPassword -productId vra -nodeFqdn $node -vrslcmRootPass $vcfVrslcmDetails.rootPassword) $vrausername = (Get-vRSLCMLockerPassword -vmid $vrapassword.passwordvmid).userName if ($vraPasswordComplexity = Get-AriaLocalUserPasswordComplexity -vmName $node.split('.')[0] -guestUser $vrausername -guestPassword $vrapassword.password -product vra) { - $vraPasswordComplexityObject = New-Object -TypeName psobject - $vraPasswordComplexityObject | Add-Member -notepropertyname "System" -notepropertyvalue $vraPasswordComplexity.system - $vraPasswordComplexityObject | Add-Member -notepropertyname "Min Numerical" $(if ($vraPasswordComplexity.'Min Numerical' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Min Numerical').trim() -ne $requiredConfig.minNumerical) { "$($vraPasswordComplexity.'Min Numerical') [ $($requiredConfig.minNumerical) ]" } else { "$($vraPasswordComplexity.'Min Numerical')" } } else { "$($vraPasswordComplexity.'Min Numerical')" }) }) - $vraPasswordComplexityObject | Add-Member -notepropertyname "Min Uppercase" $(if ($vraPasswordComplexity.'Min Uppercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Min Uppercase').trim() -ne $requiredConfig.minUppercase) { "$($vraPasswordComplexity.'Min Uppercase') [ $($requiredConfig.minUppercase) ]" } else { "$($vraPasswordComplexity.'Min Uppercase')" } } else { "$($vraPasswordComplexity.'Min Uppercase')" }) }) - $vraPasswordComplexityObject | Add-Member -notepropertyname "Min Lowercase" $(if ($vraPasswordComplexity.'Min Lowercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Min Lowercase').trim() -ne $requiredConfig.minLowercase) { "$($vraPasswordComplexity.'Min Lowercase') [ $($requiredConfig.minLowercase) ]" } else { "$($vraPasswordComplexity.'Min Lowercase')" } } else { "$($vraPasswordComplexity.'Min Uppercase')" }) }) - $vraPasswordComplexityObject | Add-Member -notepropertyname "Min Unique" $(if ($vraPasswordComplexity.'Min Unique' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Min Unique').trim() -ne $requiredConfig.minUnique) { "$($vraPasswordComplexity.'Min Unique') [ $($requiredConfig.minUnique) ]" } else { "$($vraPasswordComplexity.'Min Unique')" } } else { "$($vraPasswordComplexity.'Min Unique')" }) }) - $vraPasswordComplexityObject | Add-Member -notepropertyname "Min Length" $(if ($vraPasswordComplexity.'Min Length' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Min Length').trim() -ne $requiredConfig.minLength) { "$($vraPasswordComplexity.'Min Length') [ $($requiredConfig.minLength) ]" } else { "$($vraPasswordComplexity.'Min Length')" } } else { "$($vraPasswordComplexity.'Min Length')" }) }) - $vraPasswordComplexityObject | Add-Member -notepropertyname "Min Class" $(if ($vraPasswordComplexity.'Min Class' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Min Class').trim() -ne $requiredConfig.minClass) { "$($vraPasswordComplexity.'Min Class') [ $($requiredConfig.minClass) ]" } else { "$($vraPasswordComplexity.'Min Class')" } } else { "$($vraPasswordComplexity.'Min Class')" }) }) - $vraPasswordComplexityObject | Add-Member -notepropertyname "Min Special" $(if ($vraPasswordComplexity.'Min Special' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Min Special').trim() -ne $requiredConfig.minSpecial) { "$($vraPasswordComplexity.'Min Special') [ $($requiredConfig.minSpecial) ]" } else { "$($vraPasswordComplexity.'Min Special')" } } else { "$($vraPasswordComplexity.'Min Special')" }) }) - $vraPasswordComplexityObject | Add-Member -notepropertyname "Max Retries" $(if ($vraPasswordComplexity.'Max Retries' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Max Retries').trim() -ne $requiredConfig.retries) { "$($vraPasswordComplexity.'Max Retries') [ $($requiredConfig.retries) ]" } else { "$($vraPasswordComplexity.'Max Retries')" } } else { "$($vraPasswordComplexity.'Max Retries')" }) }) + $vraPasswordComplexityObject = New-Object -TypeName PSObject + $vraPasswordComplexityObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vraPasswordComplexity.system + $vraPasswordComplexityObject | Add-Member -NotePropertyName "Min Numerical" $(if ($vraPasswordComplexity.'Min Numerical' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Min Numerical').trim() -ne $requiredConfig.minNumerical) { "$($vraPasswordComplexity.'Min Numerical') [ $($requiredConfig.minNumerical) ]" } else { "$($vraPasswordComplexity.'Min Numerical')" } } else { "$($vraPasswordComplexity.'Min Numerical')" }) }) + $vraPasswordComplexityObject | Add-Member -NotePropertyName "Min Uppercase" $(if ($vraPasswordComplexity.'Min Uppercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Min Uppercase').trim() -ne $requiredConfig.minUppercase) { "$($vraPasswordComplexity.'Min Uppercase') [ $($requiredConfig.minUppercase) ]" } else { "$($vraPasswordComplexity.'Min Uppercase')" } } else { "$($vraPasswordComplexity.'Min Uppercase')" }) }) + $vraPasswordComplexityObject | Add-Member -NotePropertyName "Min Lowercase" $(if ($vraPasswordComplexity.'Min Lowercase' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Min Lowercase').trim() -ne $requiredConfig.minLowercase) { "$($vraPasswordComplexity.'Min Lowercase') [ $($requiredConfig.minLowercase) ]" } else { "$($vraPasswordComplexity.'Min Lowercase')" } } else { "$($vraPasswordComplexity.'Min Uppercase')" }) }) + $vraPasswordComplexityObject | Add-Member -NotePropertyName "Min Unique" $(if ($vraPasswordComplexity.'Min Unique' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Min Unique').trim() -ne $requiredConfig.minUnique) { "$($vraPasswordComplexity.'Min Unique') [ $($requiredConfig.minUnique) ]" } else { "$($vraPasswordComplexity.'Min Unique')" } } else { "$($vraPasswordComplexity.'Min Unique')" }) }) + $vraPasswordComplexityObject | Add-Member -NotePropertyName "Min Length" $(if ($vraPasswordComplexity.'Min Length' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Min Length').trim() -ne $requiredConfig.minLength) { "$($vraPasswordComplexity.'Min Length') [ $($requiredConfig.minLength) ]" } else { "$($vraPasswordComplexity.'Min Length')" } } else { "$($vraPasswordComplexity.'Min Length')" }) }) + $vraPasswordComplexityObject | Add-Member -NotePropertyName "Min Class" $(if ($vraPasswordComplexity.'Min Class' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Min Class').trim() -ne $requiredConfig.minClass) { "$($vraPasswordComplexity.'Min Class') [ $($requiredConfig.minClass) ]" } else { "$($vraPasswordComplexity.'Min Class')" } } else { "$($vraPasswordComplexity.'Min Class')" }) }) + $vraPasswordComplexityObject | Add-Member -NotePropertyName "Min Special" $(if ($vraPasswordComplexity.'Min Special' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Min Special').trim() -ne $requiredConfig.minSpecial) { "$($vraPasswordComplexity.'Min Special') [ $($requiredConfig.minSpecial) ]" } else { "$($vraPasswordComplexity.'Min Special')" } } else { "$($vraPasswordComplexity.'Min Special')" }) }) + $vraPasswordComplexityObject | Add-Member -NotePropertyName "Max Retries" $(if ($vraPasswordComplexity.'Max Retries' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Max Retries').trim() -ne $requiredConfig.retries) { "$($vraPasswordComplexity.'Max Retries') [ $($requiredConfig.retries) ]" } else { "$($vraPasswordComplexity.'Max Retries')" } } else { "$($vraPasswordComplexity.'Max Retries')" }) }) if ($vraPasswordComplexity -match "Max Repeat") { - $vraPasswordComplexityObject | Add-Member -notepropertyname "Max Repeat" $(if ($vraPasswordComplexity.'Max Repeat' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Max Repeat').trim() -ne $requiredConfig.maxRepeat) { "$($vraPasswordComplexity.'Max Repeat') [ $($requiredConfig.maxRepeat) ]" } else { "$($vraPasswordComplexity.'Max Repeat')" } } else { "$($vraPasswordComplexity.'Max Repeat')" }) }) + $vraPasswordComplexityObject | Add-Member -NotePropertyName "Max Repeat" $(if ($vraPasswordComplexity.'Max Repeat' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Max Repeat').trim() -ne $requiredConfig.maxRepeat) { "$($vraPasswordComplexity.'Max Repeat') [ $($requiredConfig.maxRepeat) ]" } else { "$($vraPasswordComplexity.'Max Repeat')" } } else { "$($vraPasswordComplexity.'Max Repeat')" }) }) } else { - $vraPasswordComplexityObject | Add-Member -notepropertyname "Max Sequence" $(if ($vraPasswordComplexity.'Max Sequence' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Max Sequence').trim() -ne $requiredConfig.maxSequence) { "$($vraPasswordComplexity.'Max Sequence') [ $($requiredConfig.maxSequence) ]" } else { "$($vraPasswordComplexity.'Max Sequence')" } } else { "$($vraPasswordComplexity.'Max Sequence')" }) }) + $vraPasswordComplexityObject | Add-Member -NotePropertyName "Max Sequence" $(if ($vraPasswordComplexity.'Max Sequence' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.'Max Sequence').trim() -ne $requiredConfig.maxSequence) { "$($vraPasswordComplexity.'Max Sequence') [ $($requiredConfig.maxSequence) ]" } else { "$($vraPasswordComplexity.'Max Sequence')" } } else { "$($vraPasswordComplexity.'Max Sequence')" }) }) } - $vraPasswordComplexityObject | Add-Member -notepropertyname "History" $(if ($vraPasswordComplexity.History -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.History).trim() -ne $requiredConfig.history) { "$($vraPasswordComplexity.History) [ $($requiredConfig.history) ]" } else { "$($vraPasswordComplexity.History)" } } else { "$($vraPasswordComplexity.History)" }) }) + $vraPasswordComplexityObject | Add-Member -NotePropertyName "History" $(if ($vraPasswordComplexity.History -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraPasswordComplexity.History).trim() -ne $requiredConfig.history) { "$($vraPasswordComplexity.History) [ $($requiredConfig.history) ]" } else { "$($vraPasswordComplexity.History)" } } else { "$($vraPasswordComplexity.History)" }) }) $allvraPasswordComplexityObject += $vraPasswordComplexityObject } else { Write-Error "Unable to retrieve password expiration policy from VMware Aria Automation ($node): PRE_VALIDATION_FAILED" @@ -10357,15 +10363,15 @@ Function Request-AriaLocalUserPasswordComplexity { if (Test-WsaConnection -server $node) { if (Test-WsaAuthentication -server $node -user $vidmdirectoryusername -pass $vidmdirectorypassword.password ) { if ($vidmPasswordDirectoryComplexity = Get-WsaPasswordPolicy) { - $vidmPasswordDirectoryComplexityObject = New-Object -TypeName psobject - $vidmPasswordDirectoryComplexityObject | Add-Member -notepropertyname "System" -notepropertyvalue $node.Split('.')[0] - $vidmPasswordDirectoryComplexityObject | Add-Member -notepropertyname "Min Numerical" $(if ($vidmPasswordDirectoryComplexity.minDigit -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordDirectoryComplexity.minDigit) -ne $requiredConfig.minNumerical) { "$($vidmPasswordDirectoryComplexity.minDigit) [ $($requiredConfig.minNumerical) ]" } else { "$($vidmPasswordDirectoryComplexity.minDigit)" } } else { "$($vidmPasswordDirectoryComplexity.minDigit)" }) }) - $vidmPasswordDirectoryComplexityObject | Add-Member -notepropertyname "Min Uppercase" $(if ($vidmPasswordDirectoryComplexity.minUpper -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordDirectoryComplexity.minUpper) -ne $requiredConfig.minUppercase) { "$($vidmPasswordDirectoryComplexity.minUpper) [ $($requiredConfig.minUppercase) ]" } else { "$($vidmPasswordDirectoryComplexity.minUpper)" } } else { "$($vidmPasswordDirectoryComplexity.minUpper)" }) }) - $vidmPasswordDirectoryComplexityObject | Add-Member -notepropertyname "Min Lowercase" $(if ($vidmPasswordDirectoryComplexity.minLower -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordDirectoryComplexity.minLower) -ne $requiredConfig.minLowercase) { "$($vidmPasswordDirectoryComplexity.minLower) [ $($requiredConfig.minLowercase) ]" } else { "$($vidmPasswordDirectoryComplexity.minLower)" } } else { "$($vidmPasswordDirectoryComplexity.minLower)" }) }) - $vidmPasswordDirectoryComplexityObject | Add-Member -notepropertyname "Max Indentical Characters" $(if ($vidmPasswordDirectoryComplexity.maxConsecutiveIdenticalCharacters -eq $null) { Write-Output "Max Indentical Characters" } else { $(if ($vidmdrift) { if (($vidmPasswordDirectoryComplexity.maxConsecutiveIdenticalCharacters) -ne $requiredConfig.maxIdenticalAdjacent) { "$($vidmPasswordDirectoryComplexity.maxConsecutiveIdenticalCharacters) [ $($requiredConfig.maxIdenticalAdjacent) ]" } else { "$($vidmPasswordDirectoryComplexity.maxConsecutiveIdenticalCharacters)" } } else { "$($vidmPasswordDirectoryComplexity.maxConsecutiveIdenticalCharacters)" }) }) - $vidmPasswordDirectoryComplexityObject | Add-Member -notepropertyname "Min Length" $(if ($vidmPasswordDirectoryComplexity.minLen -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordDirectoryComplexity.minLen) -ne $requiredConfig.minLength) { "$($vidmPasswordDirectoryComplexity.minLen) [ $($requiredConfig.minLength) ]" } else { "$($vidmPasswordDirectoryComplexity.minLen)" } } else { "$($vidmPasswordDirectoryComplexity.minLen)" }) }) - $vidmPasswordDirectoryComplexityObject | Add-Member -notepropertyname "Min Special" $(if ($vidmPasswordDirectoryComplexity.minSpecial -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordDirectoryComplexity.minSpecial) -ne $requiredConfig.minSpecial) { "$($vidmPasswordDirectoryComplexity.minSpecial) [ $($requiredConfig.minSpecial) ]" } else { "$($vidmPasswordDirectoryComplexity.minSpecial)" } } else { "$($vidmPasswordDirectoryComplexity.minSpecial)" }) }) - $vidmPasswordDirectoryComplexityObject | Add-Member -notepropertyname "History" $(if ($vidmPasswordDirectoryComplexity.History -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordDirectoryComplexity.History) -ne $requiredConfig.history) { "$($vidmPasswordDirectoryComplexity.History) [ $($requiredConfig.history) ]" } else { "$($vidmPasswordDirectoryComplexity.History)" } } else { "$($vidmPasswordDirectoryComplexity.History)" }) }) + $vidmPasswordDirectoryComplexityObject = New-Object -TypeName PSObject + $vidmPasswordDirectoryComplexityObject | Add-Member -NotePropertyName "System" -NotePropertyValue $node.Split('.')[0] + $vidmPasswordDirectoryComplexityObject | Add-Member -NotePropertyName "Min Numerical" $(if ($vidmPasswordDirectoryComplexity.minDigit -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordDirectoryComplexity.minDigit) -ne $requiredConfig.minNumerical) { "$($vidmPasswordDirectoryComplexity.minDigit) [ $($requiredConfig.minNumerical) ]" } else { "$($vidmPasswordDirectoryComplexity.minDigit)" } } else { "$($vidmPasswordDirectoryComplexity.minDigit)" }) }) + $vidmPasswordDirectoryComplexityObject | Add-Member -NotePropertyName "Min Uppercase" $(if ($vidmPasswordDirectoryComplexity.minUpper -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordDirectoryComplexity.minUpper) -ne $requiredConfig.minUppercase) { "$($vidmPasswordDirectoryComplexity.minUpper) [ $($requiredConfig.minUppercase) ]" } else { "$($vidmPasswordDirectoryComplexity.minUpper)" } } else { "$($vidmPasswordDirectoryComplexity.minUpper)" }) }) + $vidmPasswordDirectoryComplexityObject | Add-Member -NotePropertyName "Min Lowercase" $(if ($vidmPasswordDirectoryComplexity.minLower -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordDirectoryComplexity.minLower) -ne $requiredConfig.minLowercase) { "$($vidmPasswordDirectoryComplexity.minLower) [ $($requiredConfig.minLowercase) ]" } else { "$($vidmPasswordDirectoryComplexity.minLower)" } } else { "$($vidmPasswordDirectoryComplexity.minLower)" }) }) + $vidmPasswordDirectoryComplexityObject | Add-Member -NotePropertyName "Max Indentical Characters" $(if ($vidmPasswordDirectoryComplexity.maxConsecutiveIdenticalCharacters -eq $null) { Write-Output "Max Indentical Characters" } else { $(if ($vidmdrift) { if (($vidmPasswordDirectoryComplexity.maxConsecutiveIdenticalCharacters) -ne $requiredConfig.maxIdenticalAdjacent) { "$($vidmPasswordDirectoryComplexity.maxConsecutiveIdenticalCharacters) [ $($requiredConfig.maxIdenticalAdjacent) ]" } else { "$($vidmPasswordDirectoryComplexity.maxConsecutiveIdenticalCharacters)" } } else { "$($vidmPasswordDirectoryComplexity.maxConsecutiveIdenticalCharacters)" }) }) + $vidmPasswordDirectoryComplexityObject | Add-Member -NotePropertyName "Min Length" $(if ($vidmPasswordDirectoryComplexity.minLen -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordDirectoryComplexity.minLen) -ne $requiredConfig.minLength) { "$($vidmPasswordDirectoryComplexity.minLen) [ $($requiredConfig.minLength) ]" } else { "$($vidmPasswordDirectoryComplexity.minLen)" } } else { "$($vidmPasswordDirectoryComplexity.minLen)" }) }) + $vidmPasswordDirectoryComplexityObject | Add-Member -NotePropertyName "Min Special" $(if ($vidmPasswordDirectoryComplexity.minSpecial -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordDirectoryComplexity.minSpecial) -ne $requiredConfig.minSpecial) { "$($vidmPasswordDirectoryComplexity.minSpecial) [ $($requiredConfig.minSpecial) ]" } else { "$($vidmPasswordDirectoryComplexity.minSpecial)" } } else { "$($vidmPasswordDirectoryComplexity.minSpecial)" }) }) + $vidmPasswordDirectoryComplexityObject | Add-Member -NotePropertyName "History" $(if ($vidmPasswordDirectoryComplexity.History -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordDirectoryComplexity.History) -ne $requiredConfig.history) { "$($vidmPasswordDirectoryComplexity.History) [ $($requiredConfig.history) ]" } else { "$($vidmPasswordDirectoryComplexity.History)" } } else { "$($vidmPasswordDirectoryComplexity.History)" }) }) $allvidmPasswordDirectoryComplexityObject += $vidmPasswordDirectoryComplexityObject } } @@ -10390,11 +10396,11 @@ Function Request-AriaLocalUserPasswordComplexity { $vidmlocalvmid = $vidmlocalnodedata.vidmRootPassword.Split(':')[2] $vidmlocalpassword = (Get-vRSLCMProductPassword -productId vidm -vmid $vidmlocalvmid -vrslcmRootPass $vcfVrslcmDetails.rootPassword) if ($vidmPasswordLocalComplexity = Get-AriaLocalUserPasswordComplexity -vmName $node.split('.')[0] -guestUser root -guestPassword $vidmlocalpassword.password) { - $vidmPasswordLocalComplexityObject = New-Object -TypeName psobject - $vidmPasswordLocalComplexityObject | Add-Member -notepropertyname "System" -notepropertyvalue $vidmPasswordLocalComplexity.system - $vidmPasswordLocalComplexityObject | Add-Member -notepropertyname "Min Length" $(if ($vidmPasswordLocalComplexity.'Min Length' -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordLocalComplexity.'Min Length') -ne $requiredConfig.minLength) { "$($vidmPasswordLocalComplexity.'Min Length') [ $($requiredConfig.minLength) ]" } else { "$($vidmPasswordLocalComplexity.'Min Length')" } } else { "$($vidmPasswordLocalComplexity.'Min Length')" }) }) - $vidmPasswordLocalComplexityObject | Add-Member -notepropertyname "History" $(if ($vidmPasswordLocalComplexity.History -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordLocalComplexity.History) -ne $requiredConfig.history) { "$($vidmPasswordLocalComplexity.History) [ $($requiredConfig.history) ]" } else { "$($vidmPasswordLocalComplexity.History)" } } else { "$($vidmPasswordLocalComplexity.History)" }) }) - $vidmPasswordLocalComplexityObject | Add-Member -notepropertyname "Max Retries" $(if ($vidmPasswordLocalComplexity.'Max Retries' -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordLocalComplexity.'Max Retries') -ne $requiredConfig.retries) { "$($vidmPasswordLocalComplexity.'Max Retries') [ $($requiredConfig.retries) ]" } else { "$($vidmPasswordLocalComplexity.'Max Retries')" } } else { "$($vidmPasswordLocalComplexity.'Max Retries')" }) }) + $vidmPasswordLocalComplexityObject = New-Object -TypeName PSObject + $vidmPasswordLocalComplexityObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vidmPasswordLocalComplexity.system + $vidmPasswordLocalComplexityObject | Add-Member -NotePropertyName "Min Length" $(if ($vidmPasswordLocalComplexity.'Min Length' -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordLocalComplexity.'Min Length') -ne $requiredConfig.minLength) { "$($vidmPasswordLocalComplexity.'Min Length') [ $($requiredConfig.minLength) ]" } else { "$($vidmPasswordLocalComplexity.'Min Length')" } } else { "$($vidmPasswordLocalComplexity.'Min Length')" }) }) + $vidmPasswordLocalComplexityObject | Add-Member -NotePropertyName "History" $(if ($vidmPasswordLocalComplexity.History -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordLocalComplexity.History) -ne $requiredConfig.history) { "$($vidmPasswordLocalComplexity.History) [ $($requiredConfig.history) ]" } else { "$($vidmPasswordLocalComplexity.History)" } } else { "$($vidmPasswordLocalComplexity.History)" }) }) + $vidmPasswordLocalComplexityObject | Add-Member -NotePropertyName "Max Retries" $(if ($vidmPasswordLocalComplexity.'Max Retries' -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmPasswordLocalComplexity.'Max Retries') -ne $requiredConfig.retries) { "$($vidmPasswordLocalComplexity.'Max Retries') [ $($requiredConfig.retries) ]" } else { "$($vidmPasswordLocalComplexity.'Max Retries')" } } else { "$($vidmPasswordLocalComplexity.'Max Retries')" }) }) $allvidmPasswordLocalComplexityObject += $vidmPasswordLocalComplexityObject } } @@ -10517,11 +10523,11 @@ Function Request-AriaLocalUserAccountLockout { } $allvrslcmAccountLockoutObject = New-Object System.Collections.ArrayList if ($vrslcmAccountLockout = Get-AriaLocalUserAccountLockout -vmName $vcfVrslcmDetails.fqdn.split('.')[0] -guestUser $vcfVrslcmDetails.rootUser -guestPassword $vcfVrslcmDetails.rootPassword ) { - $vrslcmAccountLockoutObject = New-Object -TypeName psobject - $vrslcmAccountLockoutObject | Add-Member -notepropertyname "System" -notepropertyvalue $vrslcmAccountLockout.system - $vrslcmAccountLockoutObject | Add-Member -notepropertyname "Maximum Failures" $(if ($vrslcmAccountLockout.'Max Failures' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmAccountLockout.'Max Failures').trim() -ne $requiredConfig.maxFailures.trim()) { "$($vrslcmAccountLockout.'Max Failures') [ $($requiredConfig.maxFailures) ]" } else { "$($vrslcmAccountLockout.'Max Failures')" } } else { "$($vrslcmAccountLockout.'Max Failures')" }) }) - $vrslcmAccountLockoutObject | Add-Member -notepropertyname "Unlock Interval" $(if ($vrslcmAccountLockout.'Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmAccountLockout.'Unlock Interval (sec)').trim() -ne $requiredConfig.unlockInterval.trim()) { "$($vrslcmAccountLockout.'Unlock Interval (sec)') [ $($requiredConfig.unlockInterval) ]" } else { "$($vrslcmAccountLockout.'Unlock Interval (sec)')" } } else { "$($vrslcmAccountLockout.'Unlock Interval (sec)')" }) }) - $vrslcmAccountLockoutObject | Add-Member -notepropertyname "Root Unlock Interval" $(if ($vrslcmAccountLockout.'Root Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmAccountLockout.'Root Unlock Interval (sec)').trim() -ne $requiredConfig.rootUnlockInterval.trim()) { "$($vrslcmAccountLockout.'Root Unlock Interval (sec)') [ $($requiredConfig.rootUnlockInterval) ]" } else { "$($vrslcmAccountLockout.'Root Unlock Interval (sec)')" } } else { "$($vrslcmAccountLockout.'Root Unlock Interval (sec)')" }) }) + $vrslcmAccountLockoutObject = New-Object -TypeName PSObject + $vrslcmAccountLockoutObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vrslcmAccountLockout.system + $vrslcmAccountLockoutObject | Add-Member -NotePropertyName "Maximum Failures" $(if ($vrslcmAccountLockout.'Max Failures' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmAccountLockout.'Max Failures').trim() -ne $requiredConfig.maxFailures.trim()) { "$($vrslcmAccountLockout.'Max Failures') [ $($requiredConfig.maxFailures) ]" } else { "$($vrslcmAccountLockout.'Max Failures')" } } else { "$($vrslcmAccountLockout.'Max Failures')" }) }) + $vrslcmAccountLockoutObject | Add-Member -NotePropertyName "Unlock Interval" $(if ($vrslcmAccountLockout.'Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmAccountLockout.'Unlock Interval (sec)').trim() -ne $requiredConfig.unlockInterval.trim()) { "$($vrslcmAccountLockout.'Unlock Interval (sec)') [ $($requiredConfig.unlockInterval) ]" } else { "$($vrslcmAccountLockout.'Unlock Interval (sec)')" } } else { "$($vrslcmAccountLockout.'Unlock Interval (sec)')" }) }) + $vrslcmAccountLockoutObject | Add-Member -NotePropertyName "Root Unlock Interval" $(if ($vrslcmAccountLockout.'Root Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrslcmAccountLockout.'Root Unlock Interval (sec)').trim() -ne $requiredConfig.rootUnlockInterval.trim()) { "$($vrslcmAccountLockout.'Root Unlock Interval (sec)') [ $($requiredConfig.rootUnlockInterval) ]" } else { "$($vrslcmAccountLockout.'Root Unlock Interval (sec)')" } } else { "$($vrslcmAccountLockout.'Root Unlock Interval (sec)')" }) }) $allvrslcmAccountLockoutObject += $vrslcmAccountLockoutObject } else { Write-Error "Unable to retrieve password expiration policy from VMware Aria Suite Lifecycle ($vcfVrslcmDetails.fqdn): PRE_VALIDATION_FAILED" @@ -10544,11 +10550,11 @@ Function Request-AriaLocalUserAccountLockout { $vropspassword = (Get-vRSLCMProductPassword -productId vrops -nodeFqdn $node -vrslcmRootPass $vcfVrslcmDetails.rootPassword) $vropsusername = (Get-vRSLCMLockerPassword -vmid $vropspassword.passwordvmid).userName if ($vropsAccountLockout = Get-AriaLocalUserAccountLockout -vmName $node.split('.')[0] -guestUser $vropsusername -guestPassword $vropspassword.password ) { - $vropsAccountLockoutObject = New-Object -TypeName psobject - $vropsAccountLockoutObject | Add-Member -notepropertyname "System" -notepropertyvalue $vropsAccountLockout.system - $vropsAccountLockoutObject | Add-Member -notepropertyname "Maximum Failures" $(if ($vropsAccountLockout.'Max Failures' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsAccountLockout.'Max Failures').trim() -ne $requiredConfig.maxFailures.trim()) { "$($vropsAccountLockout.'Max Failures') [ $($requiredConfig.maxFailures) ]" } else { "$($vropsAccountLockout.'Max Failures')" } } else { "$($vropsAccountLockout.'Max Failures')" }) }) - $vropsAccountLockoutObject | Add-Member -notepropertyname "Unlock Interval" $(if ($vropsAccountLockout.'Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsAccountLockout.'Unlock Interval (sec)').trim() -ne $requiredConfig.unlockInterval.trim()) { "$($vropsAccountLockout.'Unlock Interval (sec)') [ $($requiredConfig.unlockInterval) ]" } else { "$($vropsAccountLockout.'Unlock Interval (sec)')" } } else { "$($vropsAccountLockout.'Unlock Interval (sec)')" }) }) - $vropsAccountLockoutObject | Add-Member -notepropertyname "Root Unlock Interval" $(if ($vropsAccountLockout.'Root Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsAccountLockout.'Root Unlock Interval (sec)').trim() -ne $requiredConfig.rootUnlockInterval.trim()) { "$($vropsAccountLockout.'Root Unlock Interval (sec)') [ $($requiredConfig.rootUnlockInterval) ]" } else { "$($vropsAccountLockout.'Root Unlock Interval (sec)')" } } else { "$($vropsAccountLockout.'Root Unlock Interval (sec)')" }) }) + $vropsAccountLockoutObject = New-Object -TypeName PSObject + $vropsAccountLockoutObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vropsAccountLockout.system + $vropsAccountLockoutObject | Add-Member -NotePropertyName "Maximum Failures" $(if ($vropsAccountLockout.'Max Failures' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsAccountLockout.'Max Failures').trim() -ne $requiredConfig.maxFailures.trim()) { "$($vropsAccountLockout.'Max Failures') [ $($requiredConfig.maxFailures) ]" } else { "$($vropsAccountLockout.'Max Failures')" } } else { "$($vropsAccountLockout.'Max Failures')" }) }) + $vropsAccountLockoutObject | Add-Member -NotePropertyName "Unlock Interval" $(if ($vropsAccountLockout.'Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsAccountLockout.'Unlock Interval (sec)').trim() -ne $requiredConfig.unlockInterval.trim()) { "$($vropsAccountLockout.'Unlock Interval (sec)') [ $($requiredConfig.unlockInterval) ]" } else { "$($vropsAccountLockout.'Unlock Interval (sec)')" } } else { "$($vropsAccountLockout.'Unlock Interval (sec)')" }) }) + $vropsAccountLockoutObject | Add-Member -NotePropertyName "Root Unlock Interval" $(if ($vropsAccountLockout.'Root Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vropsAccountLockout.'Root Unlock Interval (sec)').trim() -ne $requiredConfig.rootUnlockInterval.trim()) { "$($vropsAccountLockout.'Root Unlock Interval (sec)') [ $($requiredConfig.rootUnlockInterval) ]" } else { "$($vropsAccountLockout.'Root Unlock Interval (sec)')" } } else { "$($vropsAccountLockout.'Root Unlock Interval (sec)')" }) }) $allvropsAccountLockoutObject += $vropsAccountLockoutObject } else { Write-Error "Unable to retrieve password expiration policy from Aria Operations ($node): PRE_VALIDATION_FAILED" @@ -10571,11 +10577,11 @@ Function Request-AriaLocalUserAccountLockout { foreach ($node in $vrlinodes) { $vrlipassword = (Get-vRSLCMProductPassword -productId vrli -nodeFqdn $node -vrslcmRootPass $vcfVrslcmDetails.rootPassword) if ($vrliAccountLockout = Get-AriaLocalUserAccountLockout -vmName $node.split('.')[0] -guestUser root -guestPassword $vrlipassword.password ) { - $vrliAccountLockoutObject = New-Object -TypeName psobject - $vrliAccountLockoutObject | Add-Member -notepropertyname "System" -notepropertyvalue $vrliAccountLockout.system - $vrliAccountLockoutObject | Add-Member -notepropertyname "Maximum Failures" $(if ($vrliAccountLockout.'Max Failures' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliAccountLockout.'Max Failures').trim() -ne $requiredConfig.maxFailures.trim()) { "$($vrliAccountLockout.'Max Failures') [ $($requiredConfig.maxFailures) ]" } else { "$($vrliAccountLockout.'Max Failures')" } } else { "$($vrliAccountLockout.'Max Failures')" }) }) - $vrliAccountLockoutObject | Add-Member -notepropertyname "Unlock Interval" $(if ($vrliAccountLockout.'Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliAccountLockout.'Unlock Interval (sec)').trim() -ne $requiredConfig.unlockInterval.trim()) { "$($vrliAccountLockout.'Unlock Interval (sec)') [ $($requiredConfig.unlockInterval) ]" } else { "$($vrliAccountLockout.'Unlock Interval (sec)')" } } else { "$($vrliAccountLockout.'Unlock Interval (sec)')" }) }) - $vrliAccountLockoutObject | Add-Member -notepropertyname "Root Unlock Interval" $(if ($vrliAccountLockout.'Root Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliAccountLockout.'Root Unlock Interval (sec)').trim() -ne $requiredConfig.rootUnlockInterval.trim()) { "$($vrliAccountLockout.'Root Unlock Interval (sec)') [ $($requiredConfig.rootUnlockInterval) ]" } else { "$($vrliAccountLockout.'Root Unlock Interval (sec)')" } } else { "$($vrliAccountLockout.'Root Unlock Interval (sec)')" }) }) + $vrliAccountLockoutObject = New-Object -TypeName PSObject + $vrliAccountLockoutObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vrliAccountLockout.system + $vrliAccountLockoutObject | Add-Member -NotePropertyName "Maximum Failures" $(if ($vrliAccountLockout.'Max Failures' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliAccountLockout.'Max Failures').trim() -ne $requiredConfig.maxFailures.trim()) { "$($vrliAccountLockout.'Max Failures') [ $($requiredConfig.maxFailures) ]" } else { "$($vrliAccountLockout.'Max Failures')" } } else { "$($vrliAccountLockout.'Max Failures')" }) }) + $vrliAccountLockoutObject | Add-Member -NotePropertyName "Unlock Interval" $(if ($vrliAccountLockout.'Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliAccountLockout.'Unlock Interval (sec)').trim() -ne $requiredConfig.unlockInterval.trim()) { "$($vrliAccountLockout.'Unlock Interval (sec)') [ $($requiredConfig.unlockInterval) ]" } else { "$($vrliAccountLockout.'Unlock Interval (sec)')" } } else { "$($vrliAccountLockout.'Unlock Interval (sec)')" }) }) + $vrliAccountLockoutObject | Add-Member -NotePropertyName "Root Unlock Interval" $(if ($vrliAccountLockout.'Root Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vrliAccountLockout.'Root Unlock Interval (sec)').trim() -ne $requiredConfig.rootUnlockInterval.trim()) { "$($vrliAccountLockout.'Root Unlock Interval (sec)') [ $($requiredConfig.rootUnlockInterval) ]" } else { "$($vrliAccountLockout.'Root Unlock Interval (sec)')" } } else { "$($vrliAccountLockout.'Root Unlock Interval (sec)')" }) }) $allvrliAccountLockoutObject += $vrliAccountLockoutObject } else { Write-Error "Unable to retrieve password expiration policy from Aria Operations for Logs ($node): PRE_VALIDATION_FAILED" @@ -10600,7 +10606,7 @@ Function Request-AriaLocalUserAccountLockout { $vrnivmid = $vrninodedata.supportPassword.Split(':')[2] $vrnipassword = (Get-vRSLCMProductPassword -productId vrni -vmid $vrnivmid -vrslcmRootPass $vcfVrslcmDetails.rootPassword) if ($vrniAccountLockout = Get-AriaLocalUserAccountLockout -vmName $node.vmname -guestUser support -guestPassword $vrnipassword.password -product vrni ) { - $vrniAccountLockoutObject = New-Object -TypeName psobject + $vrniAccountLockoutObject = New-Object -TypeName PSObject $vrniAccountLockoutObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vrniAccountLockout.System $vrniAccountLockoutObject | Add-Member -NotePropertyName "Maximum Failures" -NotePropertyValue $(if ($vrniAccountLockout.'Max Failures' -eq $null) { "Not configured." } else { $(if ($drift) { if (($vrniAccountLockout.'Max Failures').trim() -ne $requiredConfig.maxFailures.trim()) { "$($vrniAccountLockout.'Max Failures') [ $($requiredConfig.maxFailures) ]" } else { "$($vrniAccountLockout.'Max Failures')" } } else { "$($vrniAccountLockout.'Max Failures')" }) }) $vrniAccountLockoutObject | Add-Member -NotePropertyName "Unlock Interval" -NotePropertyValue $(if ($vrniAccountLockout.'Unlock Interval (sec)' -eq $null) { "Not configured." } else { $(if ($drift) { if (($vrniAccountLockout.'Unlock Interval (sec)').trim() -ne $requiredConfig.unlockInterval.trim()) { "$($vrniAccountLockout.'Unlock Interval (sec)') [ $($requiredConfig.unlockInterval) ]" } else { "$($vrniAccountLockout.'Unlock Interval (sec)')" } } else { "$($vrniAccountLockout.'Unlock Interval (sec)')" }) }) @@ -10627,11 +10633,11 @@ Function Request-AriaLocalUserAccountLockout { $vrapassword = (Get-vRSLCMProductPassword -productId vra -nodeFqdn $node -vrslcmRootPass $vcfVrslcmDetails.rootPassword) $vrausername = (Get-vRSLCMLockerPassword -vmid $vrapassword.passwordvmid).userName if ($vraAccountLockout = Get-AriaLocalUserAccountLockout -vmName $node.split('.')[0] -guestUser $vrausername -guestPassword $vrapassword.password ) { - $vraAccountLockoutObject = New-Object -TypeName psobject - $vraAccountLockoutObject | Add-Member -notepropertyname "System" -notepropertyvalue $vraAccountLockout.system - $vraAccountLockoutObject | Add-Member -notepropertyname "Maximum Failures" $(if ($vraAccountLockout.'Max Failures' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraAccountLockout.'Max Failures').trim() -ne $requiredConfig.maxFailures.trim()) { "$($vraAccountLockout.'Max Failures') [ $($requiredConfig.maxFailures) ]" } else { "$($vraAccountLockout.'Max Failures')" } } else { "$($vraAccountLockout.'Max Failures')" }) }) - $vraAccountLockoutObject | Add-Member -notepropertyname "Unlock Interval" $(if ($vraAccountLockout.'Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraAccountLockout.'Unlock Interval (sec)').trim() -ne $requiredConfig.unlockInterval.trim()) { "$($vraAccountLockout.'Unlock Interval (sec)') [ $($requiredConfig.unlockInterval) ]" } else { "$($vraAccountLockout.'Unlock Interval (sec)')" } } else { "$($vraAccountLockout.'Unlock Interval (sec)')" }) }) - $vraAccountLockoutObject | Add-Member -notepropertyname "Root Unlock Interval" $(if ($vraAccountLockout.'Root Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraAccountLockout.'Root Unlock Interval (sec)').trim() -ne $requiredConfig.rootUnlockInterval.trim()) { "$($vraAccountLockout.'Root Unlock Interval (sec)') [ $($requiredConfig.rootUnlockInterval) ]" } else { "$($vraAccountLockout.'Root Unlock Interval (sec)')" } } else { "$($vraAccountLockout.'Root Unlock Interval (sec)')" }) }) + $vraAccountLockoutObject = New-Object -TypeName PSObject + $vraAccountLockoutObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vraAccountLockout.system + $vraAccountLockoutObject | Add-Member -NotePropertyName "Maximum Failures" $(if ($vraAccountLockout.'Max Failures' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraAccountLockout.'Max Failures').trim() -ne $requiredConfig.maxFailures.trim()) { "$($vraAccountLockout.'Max Failures') [ $($requiredConfig.maxFailures) ]" } else { "$($vraAccountLockout.'Max Failures')" } } else { "$($vraAccountLockout.'Max Failures')" }) }) + $vraAccountLockoutObject | Add-Member -NotePropertyName "Unlock Interval" $(if ($vraAccountLockout.'Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraAccountLockout.'Unlock Interval (sec)').trim() -ne $requiredConfig.unlockInterval.trim()) { "$($vraAccountLockout.'Unlock Interval (sec)') [ $($requiredConfig.unlockInterval) ]" } else { "$($vraAccountLockout.'Unlock Interval (sec)')" } } else { "$($vraAccountLockout.'Unlock Interval (sec)')" }) }) + $vraAccountLockoutObject | Add-Member -NotePropertyName "Root Unlock Interval" $(if ($vraAccountLockout.'Root Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($drift) { if (($vraAccountLockout.'Root Unlock Interval (sec)').trim() -ne $requiredConfig.rootUnlockInterval.trim()) { "$($vraAccountLockout.'Root Unlock Interval (sec)') [ $($requiredConfig.rootUnlockInterval) ]" } else { "$($vraAccountLockout.'Root Unlock Interval (sec)')" } } else { "$($vraAccountLockout.'Root Unlock Interval (sec)')" }) }) $allvraAccountLockoutObject += $vraAccountLockoutObject } else { Write-Error "Unable to retrieve password expiration policy from VMware Aria Automation ($node): PRE_VALIDATION_FAILED" @@ -10661,11 +10667,11 @@ Function Request-AriaLocalUserAccountLockout { if (Test-WsaConnection -server $node) { if (Test-WsaAuthentication -server $node -user $vidmdirectoryusername -pass $vidmdirectorypassword.password ) { if ($vidmDirectoryAccountLockout = Get-WsaAccountLockout) { - $vidmDirectoryAccountLockoutObject = New-Object -TypeName psobject - $vidmDirectoryAccountLockoutObject | Add-Member -notepropertyname "System" -notepropertyvalue $node.Split('.')[0] - $vidmDirectoryAccountLockoutObject | Add-Member -notepropertyname "Maximum Failures" $(if ($vidmDirectoryAccountLockout.numAttempts -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmDirectoryAccountLockout.numAttempts).trim() -ne $requiredConfig.maxFailures.trim()) { "$($vidmDirectoryAccountLockout.numAttempts) [ $($requiredConfig.maxFailures) ]" } else { "$($vidmDirectoryAccountLockout.numAttempts)" } } else { "$($vidmDirectoryAccountLockout.numAttempts)" }) }) - $vidmDirectoryAccountLockoutObject | Add-Member -notepropertyname "Attempt Interval" $(if ($vidmDirectoryAccountLockout.attemptInterval -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmDirectoryAccountLockout.attemptInterval).trim() -ne $requiredConfig.failedAttemptInterval.trim()) { "$($vidmDirectoryAccountLockout.attemptInterval) [ $($requiredConfig.failedAttemptInterval) ]" } else { "$($vidmDirectoryAccountLockout.attemptInterval)" } } else { "$($vidmDirectoryAccountLockout.attemptInterval)" }) }) - $vidmDirectoryAccountLockoutObject | Add-Member -notepropertyname "Unlock Interval" $(if ($vidmDirectoryAccountLockout.unlockInterval -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmDirectoryAccountLockout.unlockInterval).trim() -ne $requiredConfig.unlockInterval.trim()) { "$($vidmDirectoryAccountLockout.unlockInterval) [ $($requiredConfig.unlockInterval) ]" } else { "$($vidmDirectoryAccountLockout.unlockInterval)" } } else { "$($vidmDirectoryAccountLockout.unlockInterval)" }) }) + $vidmDirectoryAccountLockoutObject = New-Object -TypeName PSObject + $vidmDirectoryAccountLockoutObject | Add-Member -NotePropertyName "System" -NotePropertyValue $node.Split('.')[0] + $vidmDirectoryAccountLockoutObject | Add-Member -NotePropertyName "Maximum Failures" $(if ($vidmDirectoryAccountLockout.numAttempts -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmDirectoryAccountLockout.numAttempts).trim() -ne $requiredConfig.maxFailures.trim()) { "$($vidmDirectoryAccountLockout.numAttempts) [ $($requiredConfig.maxFailures) ]" } else { "$($vidmDirectoryAccountLockout.numAttempts)" } } else { "$($vidmDirectoryAccountLockout.numAttempts)" }) }) + $vidmDirectoryAccountLockoutObject | Add-Member -NotePropertyName "Attempt Interval" $(if ($vidmDirectoryAccountLockout.attemptInterval -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmDirectoryAccountLockout.attemptInterval).trim() -ne $requiredConfig.failedAttemptInterval.trim()) { "$($vidmDirectoryAccountLockout.attemptInterval) [ $($requiredConfig.failedAttemptInterval) ]" } else { "$($vidmDirectoryAccountLockout.attemptInterval)" } } else { "$($vidmDirectoryAccountLockout.attemptInterval)" }) }) + $vidmDirectoryAccountLockoutObject | Add-Member -NotePropertyName "Unlock Interval" $(if ($vidmDirectoryAccountLockout.unlockInterval -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmDirectoryAccountLockout.unlockInterval).trim() -ne $requiredConfig.unlockInterval.trim()) { "$($vidmDirectoryAccountLockout.unlockInterval) [ $($requiredConfig.unlockInterval) ]" } else { "$($vidmDirectoryAccountLockout.unlockInterval)" } } else { "$($vidmDirectoryAccountLockout.unlockInterval)" }) }) $allvidmDirectoryAccountLockoutObject += $vidmDirectoryAccountLockoutObject } } @@ -10690,11 +10696,11 @@ Function Request-AriaLocalUserAccountLockout { $vidmlocalvmid = $vidmlocalnodedata.vidmRootPassword.Split(':')[2] $vidmlocalpassword = (Get-vRSLCMProductPassword -productId vidm -vmid $vidmlocalvmid -vrslcmRootPass $vcfVrslcmDetails.rootPassword) if ($vidmLocalAccountLockout = Get-AriaLocalUserAccountLockout -vmName $node.split('.')[0] -guestUser root -guestPassword $vidmlocalpassword.password) { - $vidmLocalAccountLockoutObject = New-Object -TypeName psobject - $vidmLocalAccountLockoutObject | Add-Member -notepropertyname "System" -notepropertyvalue $vidmLocalAccountLockout.system - $vidmLocalAccountLockoutObject | Add-Member -notepropertyname "Maximum Failures" $(if ($vidmLocalAccountLockout.'Maximum Failures' -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmLocalAccountLockout.'Maximum Failures').trim() -ne $requiredConfig.maxFailures.trim()) { "$($vidmLocalAccountLockout.'Maximum Failures') [ $($requiredConfig.maxFailures) ]" } else { "$($vidmLocalAccountLockout.'Maximum Failures')" } } else { "$($vrliAccountLockout.'Maximum Failures')" }) }) - $vidmLocalAccountLockoutObject | Add-Member -notepropertyname "Unlock Interval" $(if ($vidmLocalAccountLockout.'Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmLocalAccountLockout.'Unlock Interval (sec)').trim() -ne $requiredConfig.unlockInterval.trim()) { "$($vidmLocalAccountLockout.'Unlock Interval (sec)') [ $($requiredConfig.unlockInterval) ]" } else { "$($vidmLocalAccountLockout.'Unlock Interval (sec)')" } } else { "$($vidmLocalAccountLockout.'Unlock Interval (sec)')" }) }) - $vidmLocalAccountLockoutObject | Add-Member -notepropertyname "Root Unlock Interval" $(if ($vidmLocalAccountLockout.'Root Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmLocalAccountLockout.'Root Unlock Interval (sec)').trim() -ne $requiredConfig.rootUnlockInterval.trim()) { "$($vidmLocalAccountLockout.'Root Unlock Interval (sec)') [ $($requiredConfig.rootUnlockInterval) ]" } else { "$($vidmLocalAccountLockout.'Root Unlock Interval (sec)')" } } else { "$($vidmLocalAccountLockout.'Root Unlock Interval (sec)')" }) }) + $vidmLocalAccountLockoutObject = New-Object -TypeName PSObject + $vidmLocalAccountLockoutObject | Add-Member -NotePropertyName "System" -NotePropertyValue $vidmLocalAccountLockout.system + $vidmLocalAccountLockoutObject | Add-Member -NotePropertyName "Maximum Failures" $(if ($vidmLocalAccountLockout.'Maximum Failures' -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmLocalAccountLockout.'Maximum Failures').trim() -ne $requiredConfig.maxFailures.trim()) { "$($vidmLocalAccountLockout.'Maximum Failures') [ $($requiredConfig.maxFailures) ]" } else { "$($vidmLocalAccountLockout.'Maximum Failures')" } } else { "$($vrliAccountLockout.'Maximum Failures')" }) }) + $vidmLocalAccountLockoutObject | Add-Member -NotePropertyName "Unlock Interval" $(if ($vidmLocalAccountLockout.'Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmLocalAccountLockout.'Unlock Interval (sec)').trim() -ne $requiredConfig.unlockInterval.trim()) { "$($vidmLocalAccountLockout.'Unlock Interval (sec)') [ $($requiredConfig.unlockInterval) ]" } else { "$($vidmLocalAccountLockout.'Unlock Interval (sec)')" } } else { "$($vidmLocalAccountLockout.'Unlock Interval (sec)')" }) }) + $vidmLocalAccountLockoutObject | Add-Member -NotePropertyName "Root Unlock Interval" $(if ($vidmLocalAccountLockout.'Root Unlock Interval (sec)' -eq $null) { Write-Output "Not configured." } else { $(if ($vidmdrift) { if (($vidmLocalAccountLockout.'Root Unlock Interval (sec)').trim() -ne $requiredConfig.rootUnlockInterval.trim()) { "$($vidmLocalAccountLockout.'Root Unlock Interval (sec)') [ $($requiredConfig.rootUnlockInterval) ]" } else { "$($vidmLocalAccountLockout.'Root Unlock Interval (sec)')" } } else { "$($vidmLocalAccountLockout.'Root Unlock Interval (sec)')" }) }) $allvidmLocalAccountLockoutObject += $vidmLocalAccountLockoutObject } } @@ -10807,103 +10813,103 @@ Function Publish-AriaLocalUserPasswordPolicy { # VMware Aria Suite Lifecycle if ($resourceTitleCase -eq "Aria Suite Lifecycle") { if ($PsBoundParameters.ContainsKey('drift')) { if ($PsBoundParameters.ContainsKey('policyFile')) { $commandSwitch = " -drift -reportPath '$reportPath' -policyFile '$policyFile'" } else { $commandSwitch = " -drift" } } else { $commandSwitch = "" } - if ($policy -eq "PasswordComplexity") { $pvsCmdlet = "Request-AriaLocalUserPasswordComplexity"; $preHtmlContent = '