Files
macOS_IntuneManagement/Extensions/MSALAuthentication.psm1
Mikael Karlsson 95bd8fc07c 3.2.0
2021-08-15 20:54:37 +10:00

1464 lines
57 KiB
PowerShell

<#
.SYNOPSIS
Module for Authentication
.DESCRIPTION
This module manages Authentication for the application with MSAL. It is also responsible for displaying the Profile Picture control of he logged in user.
.NOTES
Author: Mikael Karlsson
#>
function Get-ModuleVersion
{
'3.0.5'
}
$global:msalAuthenticator = $null
function Invoke-InitializeModule
{
$script:MSALAllApps = @()
$global:MSALToken = $null
$global:MSALAuthority = $null
$script:AccessableTenants = $null
$global:SkipTokenCacheHelperEx = $null
$global:appSettingSections += (New-Object PSObject -Property @{
Title = "MSAL"
Id = "MSAL"
Values = @()
Priority = 8
})
Add-SettingsObject (New-Object PSObject -Property @{
Title = "MSAL Library File"
Key = "MSALDLL"
Type = "File"
Description = "Full path to the Microsoft.Identity.Client.dll file"
}) "MSAL"
Add-SettingsObject (New-Object PSObject -Property @{
Title = "Remember Login"
Key = "CacheMSALToken"
Type = "Boolean"
DefaultValue = $true
Description = "Store the MSAL token in an encrypted file an automatically log on at next logon. Store in the users profile and can only be decrypted by the user that created it. Note: Requires restart"
}) "MSAL"
Add-SettingsObject (New-Object PSObject -Property @{
Title = "Get Tenant List"
Key = "GetTenantList"
Type = "Boolean"
DefaultValue = $false
Description = "Get a list of all tenants the current user has access to. Only used when the user has access to multiple tenants. This may cause duplicate login/consent prompts first time"
}) "MSAL"
Add-SettingsObject (New-Object PSObject -Property @{
Title = "Use Default Permissions"
Key = "UseDefaultPermissions"
Type = "Boolean"
DefaultValue = $false
Description = "Default permissions of the selected app will be used when logging on. Some objects might not be accessable"
}) "MSAL"
Add-SettingsObject (New-Object PSObject -Property @{
Title = "Add Azure Role Read permissions"
Key = "AzureADRoleRead"
Type = "Boolean"
DefaultValue = $false
Description = "Request Azure AD Role read permission when getting the token. This can be use to resolve the SIDs to Azure Roles for the wids property on the Access Token. Note: This might trigger a consent prompt"
}) "MSAL"
Add-MSALPrereq
#$script:MSALDLLMissing = $true #!!!!
}
function Get-MSALAuthenticationObject
{
if(-not $global:msalAuthenticator)
{
$global:msalAuthenticator = New-Object PSObject -Property @{
Title = "MSAL"
SilentLogin = { Connect-MSALUser -Silent @args; }
Login = { Connect-MSALUser @args }
Logout = { Disconnect-MSALUser }
ProfilePicture = { Get-MSALProfileEllipse @args }
ShowErrors = { Show-MSALError }
Permissions = @("openid","profile","email","User.ReadWrite.All","Group.ReadWrite.All") #"RoleManagement.Read.Directory"
}
}
$global:msalAuthenticator
}
function Clear-MSALCurentUserVaiables
{
$global:MSALAuthority = $null
}
function Get-MSALCurrentApp
{
$global:appObj
}
function Set-MSALCurrentApp
{
param($appInfoObj)
$global:appObj = $appInfoObj
}
function Get-MSALUserInfo
{
if($global:MSALToken)
{
Write-Log "Get current user"
$tmpMe = MSGraph\Invoke-GraphRequest -Url "ME" -SkipAuthentication -ODataMetadata "Skip"
if($tmpMe.creationType -ne "Invitation")
{
### Only get user info from home tenant
$global:Me = $tmpMe
Write-Log "Get profile picture"
$global:profilePhoto = "$($env:LOCALAPPDATA)\CloudAPIPowerShellManagement\$($global:Me.Id).jpeg"
MSGraph\Invoke-GraphRequest "me/photos/48x48/`$value" -OutFile $global:profilePhoto -SkipAuthentication | Out-Null
}
Write-Log "Get organization info"
$global:Organization = (MSGraph\Invoke-GraphRequest -Url "Organization" -SkipAuthentication -ODataMetadata "Skip").Value
}
else
{
$global:Me = $null
$global:profilePhoto = $null
$global:Organization = $null
}
Show-AuthenticationInfo
}
function Show-MSALError
{
if($script:MSALDLLMissing -ne $true) { return }
$script:msalPreReqForm = Get-XamlObject ($global:AppRootFolder + "\Xaml\MSALPreReqForm.xaml") -AddVariables
$isAdmin = Get-IsAdmin
if($isAdmin)
{
Set-XamlProperty $script:msalPreReqForm "chkCurrentUser" "IsChecked" $false
}
$powerShellGet = Get-Module "PowerShellGet" -ListAvailable -ErrorAction SilentlyContinue | Sort -Property Version -Descending | Select -First 1
if($powerShellGet -and $powerShellGet.Version -gt [Version]"2.0.0")
{
$global:installPowerShellGet = $false
Write-Log "PowerShellGet $($powerShellGet.Version) detected. No need to install package"
Set-XamlProperty $script:msalPreReqForm "spPowerShellGet" "Visibility" "Collapsed"
}
else
{
if($powerShellGet)
{
Write-Log "PowerShellGet $($powerShellGet.Version) detected. Module needs to be updated" 2
}
else
{
Write-Log "PowerShellGet is missing. It needs to be installed" 2
}
$global:installPowerShellGet = $true
}
$pkgNuGet = Get-PackageProvider | Where Name -eq "NuGet"
if($pkgNuGet -and $pkgNuGet.Version -ge [Version]"2.8.5.201")
{
Write-Log "NuGet $($pkgNuGet.Version) detected. No need to install package"
Set-XamlProperty $script:msalPreReqForm "spNuGet" "Visibility" "Collapsed"
$global:installNuGet = $false
}
else
{
$global:installNuGet = $true
if($isAdmin)
{
Set-XamlProperty $script:msalPreReqForm "txtNotAdmin" "Visibility" "Collapsed"
}
else
{
Set-XamlProperty $script:msalPreReqForm "chkInstallNuGet" "Visibility" "Collapsed"
Set-XamlProperty $script:msalPreReqForm "btnInstallMSALPS" "IsEnabled" $false
Set-XamlProperty $script:msalPreReqForm "btnInstallAz" "IsEnabled" $false
}
if($pkgNuGet)
{
Write-Log "NuGet $($pkgNuGet.Version) detected. Pakage needs to be updated" 2
}
else
{
Write-Log "NuGet is missing. It needs to be installed" 2
}
}
Add-XamlEvent $script:msalPreReqForm "btnInstallMSALPS" "add_click" {
Install-MSALDependencyModule "MSAL.PS" $this
}
Add-XamlEvent $script:msalPreReqForm "btnInstallAz" "add_click" {
Install-MSALDependencyModule "Az" $this
}
Show-ModalForm "MSAL Errors" $script:msalPreReqForm
}
function Install-MSALDependencyModule
{
param($moduleToInstall, $button)
$forceUserInstallation = $false
if($global:chkCurrentUser.IsChecked -eq $false -and (Get-IsAdmin) -eq $false)
{
if([System.Windows.MessageBox]::Show("Module will be install for system but current user is not Admin`n`nDo you want to install modules as user instead?`n`nNo will abort the installation", "Not admin!", "YesNo", "Warning") -eq "Yes")
{
$forceUserInstallation = $true
}
else
{
return
}
}
$installExtra = ""
if($global:installNuGet)
{
$installExtra += "`nNuGet will also be installed"
}
if($global:installPowerShellGet)
{
$installExtra += "`nPowerShellGet module will also be installed"
}
if($installExtra) { $installExtra = "`nAdditional installs:`n$($installExtra)" }
if([System.Windows.MessageBox]::Show("Are you sure you want to install the $moduleToInstall module?$($installExtra)", "Install module?", "YesNo", "Question") -ne "Yes") { return }
# Force TLS 1.2
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
if($global:installNuGet)
{
Write-Status "Install NuGet package provider"
try
{
Install-PackageProvider -Name NuGet -Force #-MinimumVersion 2.8.5.201
if($? -eq $false)
{
throw $global:error[0]
}
}
catch
{
Write-Log "Failed to install package provider NuGet. Error: $($_.Exception.Message)" 3
[System.Windows.MessageBox]::Show("Failed to install Nuget`n`nThe $moduleToInstall module cannot be installed.`n`nTry installing the module manually and then restart the appliaction.", "Failed!", "OK", "Error") | Out-Null
return
}
}
if($global:installPowerShellGet)
{
Write-Status "Install PowerShellGet module"
try
{
$params = @{}
if($global:chkCurrentUser.IsChecked -or $forceUserInstallation) { $params.Add("Scope", "CurrentUser") }
Install-Module -Name PowerShellGet -Force -AllowClobber @params #-MinimumVersion 2.8.5.201
if($? -eq $false)
{
throw $global:error[0]
}
}
catch
{
Write-Log "Failed to install PowerShellGet module. Error: $($_.Exception.Message)" 3
[System.Windows.MessageBox]::Show("Failed to install PowerShellGet module`n`nThe $moduleToInstall module cannot be installed.`n`nTry installing the module manually and then restart the appliaction.", "Failed!", "OK", "Error") | Out-Null
return
}
}
$params = @{}
$params.Add("Name", $moduleToInstall)
$params.Add("Force", $true)
if($global:chkAllowClobber.IsChecked) { $params.Add("AllowClobber", $true) }
if($global:chkCurrentUser.IsChecked -or $forceUserInstallation) { $params.Add("Scope", "CurrentUser") }
if($global:chkSkipPublisherCheck.IsChecked) { $params.Add("SkipPublisherCheck", $true) }
#if($global:chkAcceptLicense.IsChecked) { $params.Add("AcceptLicense", $true) }
$installError = ""
Write-Status "Install module $moduleToInstall"
try
{
$mod = Install-Module @params -ErrorAction SilentlyContinue #-PassThru
if($? -eq $false)
{
throw $global:error[0]
}
}
catch
{
$installError = "Error: $($_.Exception.Message)`n`n"
Write-Log "Failed to install module. Error: $($_.Exception.Message)" 3
}
$checkModule = ?: ($moduleToInstall -eq "Az") "Az.Accounts" $moduleToInstall
if(-not $mod) { $mod = Get-Module $checkModule -ListAvailable }
Write-Status ""
if($mod)
{
$script:MSALDLLMissing = $false
Add-MSALPrereq
}
if(-not $mod)
{
[System.Windows.MessageBox]::Show("Failed to install the $moduleToInstall module`n`n$($installError)Try installing the module manually and then restart the appliaction.", "Failed!", "OK", "Error") | Out-Null
}
elseif($mod -and $script:MSALDLLMissing)
{
[System.Windows.MessageBox]::Show("The $moduleToInstall module was installed successfully`n`nBut the app failed to load the MSAL DLL.`n`nPlease reastart the app and try again", "Failed!", "OK", "Warning") | Out-Null
}
else
{
[System.Windows.MessageBox]::Show("The $moduleToInstall was installed successfully!`n", "Success!", "OK", "Info") | Out-Null
}
Show-ModalObject
}
function Add-MSALPrereq
{
$msalPath = ""
# Path stored in settings
$msalPath = (Get-SettingValue "MSALDLL")
if($msalPath -and ([IO.File]::Exists($msalPath)) -eq $false -and ([IO.Path]::GetFileName($msalPath)) -ne "Microsoft.Identity.Client.dll")
{
Write-Log "Microsoft.Identity.Client.dll file is either missing or pointing to the wrong file name"
$msalPath = ""
}
# Check if located in app folder
$tmpPath = "$($global:AppRootFolder)\Microsoft.Identity.Client.dll"
if(-not $msalPath -and ([IO.File]::Exists($tmpPath)))
{
$msalPath = $tmpPath
}
# Check Az module
if(-not $msalPath)
{
$module = Get-Module Az.Accounts -ListAvailable
if($module)
{
# Use the latest version and first path in case it is install for both the user and device
$module = $module | Sort -Property Version -Descending | Select -First 1
$tmpPath = (([IO.Path]::GetDirectoryName(($module.Path | Select -First 1 ))) + "\PreloadAssemblies\Microsoft.Identity.Client.dll")
if(([IO.File]::Exists($tmpPath)))
{
$msalPath = $tmpPath
}
}
}
# Check MSAL.PS module
if(-not $msalPath)
{
$module = Get-Module MSAL.PS -ListAvailable
$module = $module | Sort -Property Version -Descending | Select -First 1
$folderMSAL = Get-ChildItem -Path ([IO.Path]::GetDirectoryName($module.Path)) -Filter "Microsoft.Identity.Client*" | ?{ $_.PSIsContainer } | Sort -Property Version -Descending | Select -First 1
if([IO.File]::Exists(($folderMSAL.FullName + "\net45\Microsoft.Identity.Client.dll")))
{
$msalPath = ($folderMSAL.FullName + "\net45\Microsoft.Identity.Client.dll")
}
}
if(-not $msalPath)
{
$script:MSALDLLMissing = $true
Write-Log "Could not find Microsoft.Identity.Client.dll. Install the latest Az or MSAL.PS module or download MSAL library" 3
return
}
$fi = [IO.FileInfo]$msalPath
[void] [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
Write-Log "Using MSAL file $msalPath. Version: $($fi.VersionInfo.FileVersion)"
[void][System.Reflection.Assembly]::LoadFile($msalPath)
[System.Collections.Generic.List[string]] $RequiredAssemblies = New-Object System.Collections.Generic.List[string]
$RequiredAssemblies.Add($msalPath)
$RequiredAssemblies.Add('System.Security.dll')
try
{
Add-Type -Path ($global:AppRootFolder + "\CS\TokenCacheHelperEx.cs") -ReferencedAssemblies $RequiredAssemblies
}
catch
{
$global:SkipTokenCacheHelperEx = $true
Write-LogError "Failed to compile TokenCacheHelperEx. The access token will not be cached. Check write access to the CS folder and ASR policies" $_.Exception
}
}
function Get-MsalAuthenticationToken
{
param($aquireTokenObj)
$script:authenticationFailure = $null
$script:errorInfo = $null
$authResult = $null
try
{
$tokenSource = New-Object System.Threading.CancellationTokenSource
$taskAuthenticationResult = $aquireTokenObj.ExecuteAsync($tokenSource.Token)
try
{
while (!$taskAuthenticationResult.IsCompleted)
{
# Login hung on rare occations
# Workaround: Added DoEvents
[System.Windows.Forms.Application]::DoEvents()
Start-Sleep -Seconds 1
}
}
finally
{
if (-not $taskAuthenticationResult.IsCompleted)
{
$tokenSource.Cancel()
}
$tokenSource.Dispose()
}
## Parse task results
if ($taskAuthenticationResult.IsFaulted)
{
# ToDo Check if: $taskAuthenticationResult.Exception.InnerException -is [Microsoft.Identity.Client.MsalUiRequiredException]
if($taskAuthenticationResult.Exception.InnerException.ResponseBody)
{
try
{
$script:errorInfo = $taskAuthenticationResult.Exception.InnerException.ResponseBody | ConvertFrom-Json
}
catch { }
}
$script:authenticationFailure = ?? $taskAuthenticationResult.Exception.InnerException $taskAuthenticationResult.Exception
if($script:errorInfo.error_description)
{
Write-LogError "Failed to login. Error: $($script:errorInfo.error). Description: $($script:errorInfo.error_description)" 3
}
else
{
Write-LogError "Failed to login" (?? $taskAuthenticationResult.Exception.InnerException $taskAuthenticationResult.Exception)
}
}
if ($taskAuthenticationResult.IsCanceled)
{
Write-Log "The login was canceled" 2
}
else
{
$authResult = $taskAuthenticationResult.Result
}
}
catch
{
$script:authenticationFailure = ?? $_.Exception.InnerException $_.Exception
Write-LogError "Failed to authenticate" (?? $_.Exception.InnerException $_.Exception)
}
$authResult
}
function Get-MSALApp
{
param($appInfo)
$msalApp = $script:MSALAllApps | Where { $_.ClientId -eq $appInfo.ClientID -and (-not $appInfo.RedirectUri -or $_.AppConfig.RedirectUri -eq $appInfo.RedirectUri)}
if(-not $msalApp)
{
Write-Log "Add MSAL App $($appInfo.ClientID) $((?? $appInfo.TenantId $appInfo.Authority))"
$appBuilder = [Microsoft.Identity.Client.PublicClientApplicationBuilder]::Create($appInfo.ClientID)
if($appInfo.TenantId) { [void]$appBuilder.WithAuthority("https://login.microsoftonline.com/$($appInfo.TenantId)/") }
elseif ($appInfo.Authority) { [void]$appBuilder.WithAuthority($appInfo.Authority) }
if($appInfo.RedirectUri) { [void]$appBuilder.WithRedirectUri($appInfo.RedirectUri) }
[void] $appBuilder.WithClientName("CloudAPIPowerShellManagement")
[void] $appBuilder.WithClientVersion($PSVersionTable.PSVersion)
$msalApp = $appBuilder.Build()
if($global:SkipTokenCacheHelperEx -ne $true -and (Get-SettingValue "CacheMSALToken"))
{
[TokenCacheHelperEx]::EnableSerialization($msalApp.UserTokenCache, "%LOCALAPPDATA%\CloudAPIPowerShellManagement\msalcahce.bin3")
}
$script:MSALAllApps += $msalApp
}
return $msalApp
}
function Connect-MSALUser
{
param(
#[Parameter(Mandatory = $false, ParameterSetName = 'Silent')]
[switch]
$Silent,
#[Parameter(Mandatory = $false, ParameterSetName = 'Silent')]
[switch]
$ForceRefresh,
#[Parameter(Mandatory = $false, ParameterSetName = 'Interactive')]
[switch]
$Interactive,
$Account
)
# No login during first time the app is started
if($global:FirstTimeRunning -and $global:MainAppStarted -eq $false) { return }
Write-LogDebug "Authenticate"
if(-not $global:appObj.ClientId)
{
Write-Log "Application id is missing. Cannot authenticate" 3
return
}
if(-not $global:appObj.TenantId -and -not $global:appObj.Authority)
{
Write-Log "Tenant id/Authority is missing. Cannot authenticate" 3
return
}
if ($global:SkipTokenCacheHelperEx -ne $true -and -not ("TokenCacheHelperEx" -as [type]))
{
Add-MSALPrereq
}
#if (-not ("TokenCacheHelperEx" -as [type]))
#{
# Write-Log "Failed to compile TokenCacheHelperEx class"
# return
#}
$curTicks = $global:MSALToken.ExpiresOn.LocalDateTime.Ticks
$currentLoggedInUserApp = ($global:MSALToken.Account.HomeAccountId.Identifier + $global:MSALToken.TenantId + $global:MSALApp.ClientId)
$currentLoggedInUserId = $global:MSALToken.Account.HomeAccountId.Identifier
if($Interactive -eq $true)
{
Clear-MSALCurentUserVaiables
$global:MSALToken = $null
}
if((Get-SettingValue "UseDefaultPermissions") -eq $true -or ($global:currentViewObject.ViewInfo.Permissions | measure).Count -eq 0)
{
[string[]] $Scopes = "https://graph.microsoft.com/.default"
$useDefaultPermissions = $true
}
else
{
#$Scopes = [string[]]$global:PermissionScope
$reqScopes = [string[]]$global:msalAuthenticator.Permissions
$useDefaultPermissions = $false
$resolveRoles = ((Get-SettingValue "AzureADRoleRead" $false) -eq $true)
if($resolveRoles -and $global:msalAuthenticator.Permissions -notcontains "RoleManagement.Read.Directory")
{
# Adds the required permission for reading AAD directory roles
$reqScopes += "RoleManagement.Read.Directory"
}
$script:curViewPermissions = $global:currentViewObject.ViewInfo.Permissions
foreach($tmpScope in $script:curViewPermissions)
{
if($reqScopes -notcontains $tmpScope) { $reqScopes += $tmpScope }
}
$Scopes = [String[]]$reqScopes
}
$global:MSALApp = Get-MSALApp $global:appObj
$loginHint = ""
$global:MSALAccounts = $global:MSALApp.GetAccountsAsync().GetAwaiter().GetResult()
if($Account)
{
$loginHint = $global:MSALAccounts | Where UserName -eq $Account
if($global:MSALToken -and $global:MSALToken.Account.UserName -ne $Account)
{
# We're logging in with someone else...
Clear-MSALCurentUserVaiables
}
}
# If we force interactive login the skip setting loginHint to force the user select account
if(-not $loginHint -and $Interactive -ne $true)
{
if($global:MSALAccounts)
{
if($global:MSALToken)
{
# Make sure we are logging in with the current user
$loginHint = $global:MSALAccounts | Where { $_.HomeAccountId.Identifier -eq $global:MSALToken.Account.HomeAccountId.Identifier }
}
else
{
$lastUser = Get-Setting "" "LastLoggedOnUser"
if($lastUser)
{
$loginHint = $global:MSALAccounts | Where { $_.HomeAccountId.Identifier -eq $lastUser }
}
if(-not $loginHint)
{
# Try with the first user in the list
$loginHint = $global:MSALAccounts | Select -First 1
}
}
}
}
$prompConsent = $false
$authResult = $null
$tenantId = $global:appObj.TenantId
$authority = ?? $global:MSALAuthority $global:appObj.Authority
try
{
#########################################################################################################
### Silent Login
#########################################################################################################
if($loginHint -and $Interactive -ne $true)
{
$aquireTokenObj = $global:MSALApp.AcquireTokenSilent($Scopes, $loginHint)
if($ForceRefresh) { [void]$aquireTokenObj.WithForceRefresh($ForceRefresh) }
if ($tenantId) { [void] $aquireTokenObj.WithAuthority("https://login.microsoftonline.com/$($TenantId)/") }
if ($authority) { [void]$aquireTokenObj.WithAuthority($authority) }
$authResult = Get-MsalAuthenticationToken $aquireTokenObj
if($script:authenticationFailure -and $script:authenticationFailure -isnot [Microsoft.Identity.Client.MsalUiRequiredException])
{
Write-Log "Authentication failed but not with UI required. Skipping futher authentication"
# Force the user to click Login
# Is this the best way to handle this? Could happen when connection is lost etc.
$global:MSALToken = $null
Get-MSALUserInfo
Clear-MSALCurentUserVaiables
return
}
if($authResult -and $authResult.ExpiresOn.LocalDateTime.Ticks -ne $curTicks)
{
Write-Log "$($authResult.Account.UserName) authenticated successfully (Silent). CorrelationId: $($global:MSALToken.CorrelationId)"
}
else
{
Write-LogDebug "$($authResult.Account.UserName) authenticated successfully (Silent). CorrelationId: $($global:MSALToken.CorrelationId)"
}
#AADSTS65001
if($script:authenticationFailure.Classification -eq "ConsentRequired")
{
$Scopes = [string[]]$reqScopes
}
else
{
if($useDefaultPermissions -eq $false -and $authResult -and ($reqScopes | measure).Count -gt 0 -and $global:promptConsentRequested -notcontains $authResult.TenantId)
{
$missingScopes = @()
foreach($scope in $reqScopes)
{
$tmpScope = $scope.Split('/')[-1]
if($tmpScope -eq ".default") { continue }
if($authResult.Scopes -contains $tmpScope) { continue }
$missingScopes += $tmpScope
Write-LogDebug "Adding missing scope $tmpScope"
}
if($missingScopes)
{
# This will prompt for consent for the missing scopes
$prompConsent = $true
$global:promptConsentRequested += $authResult.TenantId
$Scopes = $authResult.Scopes
$extraScopesToConsent = [string[]]$missingScopes
$loginHint = $authResult.Account
}
}
}
}
}
catch {}
# Interactive login is only allowed once the app has started. Skip if silent login failed during startup
if($global:MainAppStarted -and ((-not $authResult -and $Silent -ne $true) -or $prompConsent))
{
#########################################################################################################
### Interactive Login
#########################################################################################################
Write-Log "Initiate interactive logon"
Write-Log "Scopes: $(($Scopes -join ","))"
$loginHintName = (?? $loginHint.Username $loginHint)
$aquireTokenObj = $global:MSALApp.AcquireTokenInteractive($Scopes)
if ($tenantId)
{
Write-Log "Tenant id: $tenantId"
[void] $aquireTokenObj.WithAuthority("https://login.microsoftonline.com/$tenantId)/")
}
elseif ($authority)
{
Write-Log "Authority: $authority"
[void]$aquireTokenObj.WithAuthority($authority)
}
if($loginHintName)
{
Write-Log "Login hint: $loginHintName"
[void]$AquireTokenObj.WithLoginHint($loginHintName)
}
if($script:authenticationFailure.Claims)
{
Write-Log "Login claims: $($script:authenticationFailure.Claims))"
[void]$AquireTokenObj.WithClaims($script:authenticationFailure.Claims)
}
[IntPtr]$ParentWindow = [System.Diagnostics.Process]::GetCurrentProcess().MainWindowHandle
if ($ParentWindow)
{
[void]$aquireTokenObj.WithParentActivityOrWindow($ParentWindow)
}
# If we need a consent (e.g. App is not approved in the environment), prompt for consent with all reqruied permissions
# Extra scopes to consent is only required when new perissions should be added
if ($script:authenticationFailure.Classification -eq "ConsentRequired")
{
Write-Log "Interactive login with Consent prompt"
[void]$aquireTokenObj.WithPrompt([Microsoft.Identity.Client.Prompt]::Consent)
}
elseif ($extraScopesToConsent)
{
Write-Log "Interactive login with extra scopes consent prompt: $(($extraScopesToConsent -join ","))"
[void] $aquireTokenObj.WithExtraScopesToConsent($extraScopesToConsent)
}
$authResult = Get-MsalAuthenticationToken $aquireTokenObj
if($authResult)
{
Write-Log "$($authResult.Account.UserName) authenticated successfully (Interactively). CorrelationId: $($authResult.CorrelationId)"
}
}
if($currentLoggedInUserId -ne $authResult.Account.HomeAccountId.Identifier)
{
$script:AccessableTenants = $null
if($authResult -and (Get-Setting "" "GetTenantList" $false) -eq $true)
{
#########################################################################################################
### Get tenant list
#########################################################################################################
try
{
Write-Log "Get tennant list"
# Can we reuse the app used for login?
$appBuilder = [Microsoft.Identity.Client.PublicClientApplicationBuilder]::Create($global:appObj.ClientID)
if($tenantId) { [void]$appBuilder.WithAuthority("https://login.microsoftonline.com/$($tenantId)") }
elseif ($authority) { [void]$appBuilder.WithAuthority($authority) }
if($global:appObj.RedirectUri) { [void]$appBuilder.WithRedirectUri($global:appObj.RedirectUri) }
$app = $appBuilder.Build()
if((Get-SettingValue "CacheMSALToken"))
{
[TokenCacheHelperEx]::EnableSerialization($app.UserTokenCache, "%LOCALAPPDATA%\CloudAPIPowerShellManagement\msalcahce.bin3")
}
### Silent login
$tmpScope = [string[]]"https://management.azure.com/user_impersonation"
$tmpResults = Get-MsalAuthenticationToken ($app.AcquireTokenSilent($tmpScope, $authResult.Account))
if(-not $tmpResults -and $global:MainAppStarted -and $script:authenticationFailure -and $script:authenticationFailure -is [Microsoft.Identity.Client.MsalUiRequiredException])
{
### Interactive login
$AquireTokenObj = $app.AcquireTokenInteractive($tmpScope)
#[void]$AquireTokenObj.WithAccount($authResult.Account)
[void]$AquireTokenObj.WithLoginHint($authResult.Account.Username)
$tmpResults = Get-MsalAuthenticationToken $AquireTokenObj
}
if($tmpResults)
{
$Headers = @{
'Content-Type' = 'application/json'
'Authorization' = "Bearer " + $tmpResults.AccessToken
'ExpiresOn' = $tmpResults.ExpiresOn
}
$ret = Invoke-RestMethod "https://management.azure.com/tenants?api-version=2020-01-01" -Headers $Headers
if($ret)
{
$script:AccessableTenants = $ret.Value
}
}
}
catch { }
}
}
Write-LogDebug "Authentication finished $($authResult.Account.UserName)"
$global:MSALToken = $authResult
if($currentLoggedInUserApp -ne ($global:MSALToken.Account.HomeAccountId.Identifier + $global:MSALToken.TenantId + $global:MSALApp.ClientId))
{
if($authResult)
{
Save-Setting "" "LastLoggedOnUser" $authResult.Account.UserName
}
Write-LogDebug "User, tenant or app has changed"
Get-MSALUserInfo
Invoke-ModuleFunction "Invoke-GraphAuthenticationUpdated"
}
}
function Disconnect-MSALUser
{
param($user, [switch]$force, [switch]$PassThru)
$logout = $false
$userLoggedOut = $false
if(-not $user)
{
$logout = $true
if(-not $global:MSALToken.Account) { return }
$user = $global:MSALToken.Account # Logout current user
$global:MSALToken = $null
Clear-MSALCurentUserVaiables # Only clear variables for current user
$msg = "Do you want to remove the token from the cache?"
$title = "Remove token?"
}
else
{
$msg = "Are you sure you want to forget user $($user.UserName)?" #!!!
$title = "Forget user?"
}
# ToDo: Clear browser cache
if($user -and $global:MSALApp -and (Get-SettingValue "CacheMSALToken"))
{
if($force -eq $true -or [System.Windows.MessageBox]::Show($msg, $title, "YesNo", "Question") -eq "Yes")
{
try
{
[void]$global:MSALApp.RemoveAsync($user).GetAwaiter().GetResult()
if($logout -eq $false)
{
Write-Log "User $($user.UserName) removed from cache"
}
$userLoggedOut = $true
}
catch
{
Write-LogError "Failed to remove $($user.UserName) from cache" $_.Exception
}
}
}
if($logout)
{
Get-MSALUserInfo
}
if($PassThru -eq $true)
{
$userLoggedOut
}
}
function Get-MSALProfileEllipse
{
param($size = 32, $fontSize = 20, $Color = "Blue", [Switch]$Popup, $AuthenticationProvider)
Write-LogDebug "Create Profile Ellipse"
if(-not $global:MSALToken -or -not $global:me)
{
#########################################################################################################
### Build login button when no user is logged on
#########################################################################################################
Write-LogDebug "Add login button"
$grd = [System.Windows.Controls.Border]::new()
$icon = Get-XamlObject ($global:AppRootFolder + "\Xaml\Icons\Logon.xaml")
$icon.Width = $size
$icon.Height = $size
$grd.Background = "#01000000"
$grd.Child = $icon
$lnkButton = [System.Windows.Controls.Button]::new()
$lnkButton.Content = $grd
$lnkButton.Cursor = "Hand"
$lnkButton.Style = $window.TryFindResource("ContentButton")
$lnkButton.add_Click({
if($script:MSALDLLMissing)
{
Show-MSALError
return
}
if(($global:MSALAccounts | measure).Count -eq 0)
{
Connect-MSALUser -Interactive
if($global:curObjectType)
{
Show-GraphObjects
}
Write-Status ""
}
else
{
$xaml = Get-Content ($global:AppRootFolder + "\Xaml\LoginPanel.Xaml")
$loginPanel = [Windows.Markup.XamlReader]::Parse($xaml)
$otherLogins = $loginPanel.FindName("grdAccounts")
foreach($account in $global:MSALAccounts)
{
try
{
#########################################################################################################
### Add cached users to the list of logins
#########################################################################################################
$grdAccount = [System.Windows.Controls.Grid]::new()
$cd = [System.Windows.Controls.ColumnDefinition]::new()
$grdAccount.ColumnDefinitions.Add($cd)
$cd = [System.Windows.Controls.ColumnDefinition]::new()
$cd.Width = [double]::NaN
$grdAccount.ColumnDefinitions.Add($cd)
$icon = Get-XamlObject ($global:AppRootFolder + "\Xaml\Icons\LoggedOnUser.xaml")
$icon.Width = 24
$icon.Height = 24
$icon.Margin = "0,0,5,0"
$grdAccount.Children.Add($icon) | Out-Null
$lbObj = [Windows.Markup.XamlReader]::Parse("<TextBlock $wpfNS>$($account.UserName)<LineBreak/>$($account.HomeAccountId.TenantId)</TextBlock>")
$lbObj.SetValue([System.Windows.Controls.Grid]::ColumnProperty,1)
$grdAccount.Children.Add($lbObj) | Out-Null
$lnkButton = [System.Windows.Controls.Button]::new()
$lnkButton.Content = $grdAccount
$lnkButton.Style = $window.TryFindResource("LinkButton")
$lnkButton.Margin = "0,5,0,0"
$lnkButton.Cursor = "Hand"
$lnkButton.Tag = $account
$lnkButton.add_Click({
Write-Status "Logging in with $($this.Tag.UserName)"
Hide-Popup
Clear-MSALCurentUserVaiables
Connect-MSALUser -Account $this.Tag.UserName
if($global:curObjectType)
{
Show-GraphObjects
}
Write-Status ""
})
Add-GridObject $otherLogins $lnkButton
}
catch {}
}
#########################################################################################################
### Add login button
#########################################################################################################
$grdAccount = [System.Windows.Controls.Grid]::new()
$cd = [System.Windows.Controls.ColumnDefinition]::new()
$grdAccount.ColumnDefinitions.Add($cd)
$cd = [System.Windows.Controls.ColumnDefinition]::new()
$cd.Width = [double]::NaN
$grdAccount.ColumnDefinitions.Add($cd)
$icon = Get-XamlObject ($global:AppRootFolder + "\Xaml\Icons\Logon.xaml")
$icon.Width = 24
$icon.Height = 24
$icon.Margin = "0,0,5,0"
$grdAccount.Children.Add($icon) | Out-Null
$lbObj = [Windows.Markup.XamlReader]::Parse("<TextBlock $wpfNS>Sign in with a different account</TextBlock>")
$lbObj.SetValue([System.Windows.Controls.Grid]::ColumnProperty,1)
#$lbObj.Style = $window.TryFindResource("HoverUnderlineStyle")
$grdAccount.Children.Add($lbObj) | Out-Null
$lnkButton = [System.Windows.Controls.Button]::new()
$lnkButton.Content = $grdAccount
$lnkButton.Style = $window.TryFindResource("LinkButton")
$lnkButton.Margin = "0,5,0,0"
$lnkButton.Cursor = "Hand"
$lnkButton.add_Click({
Write-Status "Logging in..."
Hide-Popup
Connect-MSALUser -Interactive
if($global:curObjectType)
{
Show-GraphObjects
}
Write-Status ""
})
Add-GridObject $otherLogins $lnkButton
$loginPanel.Tag = $this.Content
$loginPanel.Add_Loaded({param($obj, $e)
$point = $obj.Tag.TransformToAncestor($window).Transform([System.Windows.Point]::new(0,0));
[System.Windows.Controls.Canvas]::SetLeft($obj,($point.X - $obj.ActualWidth + $obj.Tag.ActualWidth))
[System.Windows.Controls.Canvas]::SetTop($obj,($point.Y + $obj.Tag.ActualHeight))
})
Show-Popup $loginPanel
}
})
return $lnkButton
}
#########################################################################################################
### Build the ellipse image for the Profile Info
#########################################################################################################
if($global:me.givenName -and $global:me.surname)
{
$initials = "$($global:me.givenName[0])$($global:me.surname[0])".ToUpper()
}
elseif($global:me.userPrincipalName)
{
$initials = "$($global:me.userPrincipalName[0])".ToUpper()
}
$grd = [System.Windows.Controls.Grid]::new()
$ellipse = [System.Windows.Shapes.Ellipse]::new()
$ellipse.Width = $size
$ellipse.Height = $size
$ellipse.Fill = $Color
$ellipse.Stroke = "#FFFF00FF"
$ellipse.StrokeThickness = "0"
$grd.Children.Add($ellipse) | Out-Null
$tb = [System.Windows.Controls.TextBlock]::new()
$tb.FontSize = $fontSize
$tb.Foreground = "White"
#$tb.FontFamily=""
$tb.FontWeight = "Bold"
#$tb.TextLineBounds="Tight"
$tb.VerticalAlignment="Center"
$tb.HorizontalAlignment="Center"
#$tb.IsTextScaleFactorEnabled="False"
$tb.Text = $initials
$grd.Children.Add($tb) | Out-Null
if($global:profilePhoto -and [IO.File]::Exists($global:profilePhoto))
{
Write-LogDebug "Create image"
$img = [System.Windows.Media.Imaging.BitmapImage]::new()
$img.BeginInit()
$img.CacheOption = [System.Windows.Media.Imaging.BitmapCacheOption]::OnLoad
$img.UriSource = [System.Uri]::new($global:profilePhoto)
$img.EndInit()
$ib = [System.Windows.Media.ImageBrush]::new()
$ib.ImageSource = $img
$ellipse = [System.Windows.Shapes.Ellipse]::new()
$ellipse.Width = $size
$ellipse.Height = $size
$ellipse.FlowDirection="LeftToRight"
$ellipse.Fill = $ib
$grd.Children.Add($ellipse) | Out-Null
}
if($Popup)
{
# Hide the popup when mouse button is clicked anywhere
$grd.add_MouseLeftButtonDown(({param($obj, $e)
if(-not $global:grdProfileInfo) { return }
Show-Popup $global:grdProfileInfo
}))
try
{
#########################################################################################################
### Build Profile Info for current user
#########################################################################################################
$global:grdProfileInfo = $null
$xaml = Get-Content ($global:AppRootFolder + "\Xaml\ProfileInfo.Xaml")
$global:grdProfileInfo = [Windows.Markup.XamlReader]::Parse($xaml)
$global:grdProfileInfo.Tag = $grd
$grd.Tag = $global:grdProfileInfo
Set-XamlProperty $global:grdProfileInfo "txtOrganization" "Text" $global:Organization.displayName
Set-XamlProperty $global:grdProfileInfo "txtUsername" "Text" $global:me.displayName
Set-XamlProperty $global:grdProfileInfo "txtLogonName" "Text" $global:me.userPrincipalName
$global:tokenInfo = Get-JWTtoken $global:MSALToken.AccessToken
if($global:tokenInfo)
{
Write-LogDebug "App $($global:tokenInfo.Payload.app_displayname)"
Set-XamlProperty $global:grdProfileInfo "txtAppName" "Text" $global:tokenInfo.Payload.app_displayname
Set-XamlProperty $global:grdProfileInfo "txtAppId" "Text" $global:tokenInfo.Payload.appid
}
$tmpObj = Get-MSALProfileEllipse -size 64 -fontSize 32
$profileGrid = $global:grdProfileInfo.FindName("ProfileInfo")
if($tmpObj -and $profileGrid)
{
$tmpObj.SetValue([System.Windows.Controls.Grid]::RowProperty,1)
$tmpObj.SetValue([System.Windows.Controls.Grid]::RowSpanProperty,2)
}
if($tmpObj)
{
$profileGrid.Children.Add($tmpObj) | Out-Null
}
$global:grdProfileInfo.Add_Loaded({param($obj, $e)
$point = $obj.Tag.TransformToAncestor($window).Transform([System.Windows.Point]::new(0,0));
[System.Windows.Controls.Canvas]::SetLeft($obj,($point.X - $obj.ActualWidth + $obj.Tag.ActualWidth))
[System.Windows.Controls.Canvas]::SetTop($obj,($point.Y + $obj.Tag.ActualHeight))
})
$otherLogins = $global:grdProfileInfo.FindName("grdAccountsAndTenants")
#########################################################################################################
### Add cached users
#########################################################################################################
foreach($account in $global:MSALAccounts)
{
# Skip current logged on user
if($global:MSALToken.Account.Username -eq $Account.Username) { continue }
try
{
$grdAccount = [System.Windows.Controls.Grid]::new()
$cd = [System.Windows.Controls.ColumnDefinition]::new()
$grdAccount.ColumnDefinitions.Add($cd) # Login
$cd = [System.Windows.Controls.ColumnDefinition]::new()
$cd.Width = [double]::NaN
$grdAccount.ColumnDefinitions.Add($cd) # Forget
$grdLogin = [System.Windows.Controls.Grid]::new()
$cd = [System.Windows.Controls.ColumnDefinition]::new()
$grdLogin.ColumnDefinitions.Add($cd)
$cd = [System.Windows.Controls.ColumnDefinition]::new()
$cd.Width = [double]::NaN
$grdLogin.ColumnDefinitions.Add($cd)
$icon = Get-XamlObject ($global:AppRootFolder + "\Xaml\Icons\LoggedOnUser.xaml")
$icon.Width = 24
$icon.Height = 24
$icon.Margin = "0,0,5,0"
$grdLogin.Children.Add($icon) | Out-Null
$lbObj = [Windows.Markup.XamlReader]::Parse("<TextBlock $wpfNS>$($account.UserName)<LineBreak/>$($account.HomeAccountId.TenantId)</TextBlock>")
$lbObj.SetValue([System.Windows.Controls.Grid]::ColumnProperty,1)
$grdLogin.Children.Add($lbObj) | Out-Null
$lnkButton = [System.Windows.Controls.Button]::new()
$lnkButton.Content = $grdLogin
$lnkButton.Style = $window.TryFindResource("LinkButton")
$lnkButton.Margin = "0,5,0,0"
$lnkButton.Cursor = "Hand"
$lnkButton.Tag = $account
$lnkButton.add_Click({
Write-Status "Logging in with $($this.Tag.UserName)"
Hide-Popup
Clear-MSALCurentUserVaiables
Connect-MSALUser -Account $this.Tag.UserName
if($global:curObjectType)
{
Show-GraphObjects
}
Write-Status ""
})
$grdAccount.Children.Add($lnkButton) | Out-Null
# Add Forget user icon
$icon = Get-XamlObject ($global:AppRootFolder + "\Xaml\Icons\Bin.xaml")
$icon.Width = 16
$icon.Height = 16
$icon.Margin = "5,5,0,0"
$lnkButton = [System.Windows.Controls.Button]::new()
$lnkButton.ToolTip = "Forget"
$lnkButton.Content = $icon
$lnkButton.Style = $window.TryFindResource("LinkButton")
$lnkButton.Margin = "0,5,0,0"
$lnkButton.Cursor = "Hand"
$lnkButton.Tag = $account
$lnkButton.SetValue([System.Windows.Controls.Grid]::ColumnProperty,1)
$lnkButton.add_Click({
Write-Status "Logging out $($this.Tag.UserName)"
if((Disconnect-MSALUser $this.Tag -PassThru))
{
$this.Parent.Parent.Children.Remove($this.Parent)
}
Write-Status ""
})
$grdAccount.Children.Add($lnkButton) | Out-Null
Add-GridObject $otherLogins $grdAccount
}
catch {}
}
#########################################################################################################
### Add login with another user
#########################################################################################################
$grdAccount = [System.Windows.Controls.Grid]::new()
$cd = [System.Windows.Controls.ColumnDefinition]::new()
$grdAccount.ColumnDefinitions.Add($cd)
$cd = [System.Windows.Controls.ColumnDefinition]::new()
$cd.Width = [double]::NaN
$grdAccount.ColumnDefinitions.Add($cd)
$icon = Get-XamlObject ($global:AppRootFolder + "\Xaml\Icons\Logon.xaml")
$icon.Width = 24
$icon.Height = 24
$icon.Margin = "0,0,5,0"
$grdAccount.Children.Add($icon) | Out-Null
$lbObj = [Windows.Markup.XamlReader]::Parse("<TextBlock $wpfNS>Sign in with a different account</TextBlock>")
$lbObj.SetValue([System.Windows.Controls.Grid]::ColumnProperty,1)
#$lbObj.Style = $window.TryFindResource("HoverUnderlineStyle")
$grdAccount.Children.Add($lbObj) | Out-Null
$lnkButton = [System.Windows.Controls.Button]::new()
$lnkButton.Content = $grdAccount
$lnkButton.Style = $window.TryFindResource("LinkButton")
$lnkButton.Margin = "0,5,0,0"
$lnkButton.Cursor = "Hand"
$lnkButton.Tag = $account
$lnkButton.add_Click({
Write-Status "Logging in..."
Hide-Popup
Connect-MSALUser -Interactive
if($global:curObjectType)
{
Show-GraphObjects
}
Write-Status ""
})
Add-GridObject $otherLogins $lnkButton
if(($script:AccessableTenants | measure).Count -gt 1)
{
#########################################################################################################
### Add switch to another tenant
#########################################################################################################
$lbObj = [Windows.Markup.XamlReader]::Parse("<TextBlock $wpfNS><Bold>Tenants:</Bold></TextBlock>")
$lbObj.Margin = "0,5,0,0"
Add-GridObject $otherLogins $lbObj
foreach($tenant in $script:AccessableTenants)
{
try
{
$lbObj = [Windows.Markup.XamlReader]::Parse("<TextBlock $wpfNS HorizontalAlignment=`"Stretch`"><Bold>$($tenant.DisplayName)</Bold><LineBreak/>$($tenant.defaultDomain)<LineBreak/>$($tenant.tenantId)</TextBlock>")
if($tenant.tenantId -ne $global:MSALToken.TenantId)
{
$lbObj.Style = $window.TryFindResource("HoverUnderlineStyleWithBackground")
$lbObj.HorizontalAlignment = "Stretch"
$lnkButton = [System.Windows.Controls.Button]::new()
$lnkButton.Content = $lbObj
$lnkButton.HorizontalAlignment = "Stretch"
$lnkButton.Style = $window.TryFindResource("ContentButton")
$lnkButton.Margin = "0,5,0,0"
$lnkButton.Cursor = "Hand"
$lnkButton.Tag = $tenant
$lnkButton.add_Click({
Write-Status "Logging in to $($this.Tag.DisplayName)"
# Set authority to selected tenant
$global:MSALAuthority = "https://login.microsoftonline.com/$($this.Tag.tenantId)/"
Hide-Popup
Connect-MSALUser -Account $global:MSALToken.Account.Username
if($global:curObjectType)
{
Show-GraphObjects
}
Write-Status ""
})
Add-GridObject $otherLogins $lnkButton
}
else
{
$lbObj.Background = $window.TryFindResource("SelectedRowBackgroundColor")
$lbObj.Margin = "0,5,0,0"
Add-GridObject $otherLogins $lbObj
}
}
catch {}
}
}
#########################################################################################################
### Add event handling
#########################################################################################################
Add-XamlEvent $tmpObj "lnkTokeninfo" "add_Click" {
#Hide-Popup
$tokenArr = @()
foreach($prop in ($global:MSALToken | GM | Where MemberType -eq Property))
{
if($prop.Name -in @("AccessToken", "IdToken")) { continue }
elseif($prop.Name -eq "Scopes") { $value = ($global:MSALToken.Scopes -join "`n")}
elseif($prop.Name -in @("ExpiresOn", "ExtendedExpiresOn")) { $value = $global:MSALToken."$($prop.Name)".LocalDateTime }
else { $value = $global:MSALToken."$($prop.Name)"}
$tokenArr += New-Object PSObject -Property @{
Name=$prop.Name
Value=$value
}
}
$dg = [System.Windows.Controls.DataGrid]::new()
$dg.ItemsSource = ($tokenArr | Select Name, Value)
Show-ModalForm "Token info" $dg
}
Add-XamlEvent $tmpObj "lnkAccessTokenInfo" "add_Click" {
#Hide-Popup
Show-MSALDecodedToken (Get-JWTtoken $global:MSALToken.AccessToken) "Access Token Info"
}
Add-XamlEvent $tmpObj "lnkIdTokenInfo" "add_Click" {
#Hide-Popup
Show-MSALDecodedToken (Get-JWTtoken $global:MSALToken.IdToken) "Id Token Info"
}
Add-XamlEvent $tmpObj "lnkForceRefresh" "add_Click" {
Write-Status "Refreshing the token"
Connect-MSALUser -ForceRefresh
if(-not $global:MSALToken)
{
# Refresh failed. User was logged out
Show-GraphObjects
Hide-Popup
}
Write-Status ""
}
Add-XamlEvent $tmpObj "lnkLogout" "add_Click" {
Hide-Popup
Disconnect-MSALUser
if($global:curObjectType)
{
Show-GraphObjects
}
}
}
catch {
Write-LogError "Failed to create profile information object. Error: " $_.Exception
}
}
$grd
}
function Show-MSALDecodedToken {
param (
$tokenData,
$title
)
$tokenArr = @()
foreach($prop in ($tokenData.Header | GM | Where MemberType -eq NoteProperty))
{
$tokenArr += New-Object PSObject -Property @{
Name=$prop.Name
Value=$tokenData.Header."$($prop.Name)"
}
}
foreach($prop in ($tokenData.Payload | GM | Where MemberType -eq NoteProperty))
{
if($prop.Name -in @("exp","iat","nbf","xms_tcdt"))
{
$value =[datetime]::new(1970, 1, 1, 0, 0, 0, 0, "UTC").AddSeconds(($tokenData.Payload."$($prop.Name)")).ToLocalTime()
}
elseif($prop.Name -in @("acrs","amr"))
{
$value = $tokenData.Payload."$($prop.Name)" -join ";"
}
elseif($prop.Name -in @("wids"))
{
if(-not $script:aadRoles)
{
# This will fail if RoleManagement.Read.Directory permission is not granted. Use -NoError to hide any problems
$script:aadRoles = (Invoke-GraphRequest -url "/directoryRoles?`$select=roleTemplateId,displayName" -ODataMetadata "minimal" -Noerror).value
}
$wids = @()
foreach($wid in $tokenData.Payload."$($prop.Name)")
{
$text = $wid
$role = ($script:aadRoles | where roleTemplateId -eq $wid)
if($role)
{
$text = ($text + " ($($role.displayName))")
}
$wids += $text
}
$value = $wids -join "`n"
#$value = $tokenData.Payload."$($prop.Name)" -join "`n"
}
elseif($prop.Name -in @("scp"))
{
$value = $tokenData.Payload."$($prop.Name)" -replace " ","`n"
}
else
{
$value = $tokenData.Payload."$($prop.Name)"
}
$tokenArr += New-Object PSObject -Property @{
Name=$prop.Name
Value=$value
}
}
$dg = [System.Windows.Controls.DataGrid]::new()
$dg.ItemsSource = ($tokenArr | Select Name, Value)
Show-ModalForm $title $dg
}
Export-ModuleMember -alias * -function *