activedirectorycsdsc
Version information
This version is compatible with:
- Puppet Enterprise 2023.2.x, 2023.1.x, 2023.0.x, 2021.7.x, 2021.6.x, 2021.5.x, 2021.4.x, 2021.3.x, 2021.2.x, 2021.1.x, 2021.0.x, 2019.8.x, 2019.7.x, 2019.5.x, 2019.4.x, 2019.3.x, 2019.2.x, 2019.1.x, 2019.0.x
- Puppet >= 6.0.0 < 8.0.0
Start using this module
Add this module to your Puppetfile:
mod 'dsc-activedirectorycsdsc', '5.0.0-0-2'
Learn more about managing modules with a PuppetfileDocumentation
activedirectorycsdsc
Table of Contents
Description
This is an auto-generated module, using the Puppet DSC Builder to vendor and expose the ActiveDirectoryCSDsc PowerShell module's DSC resources as Puppet resources. The functionality of this module comes entirely from the vendored PowerShell resources, which are pinned at v5.0.0. The PowerShell module describes itself like this:
DSC resources for installing, uninstalling and configuring Certificate Services components in Windows Server.
For information on troubleshooting to determine whether any encountered problems are with the Puppet wrapper or the DSC resource, see the troubleshooting section below.
Requirements
This module, like all auto-generated Puppetized DSC modules, relies on two important technologies in the Puppet stack: the Puppet Resource API and the puppetlabs/pwshlib Puppet module.
The Resource API provides a simplified option for writing types and providers and is responsible for how this module is structured. The Resource API ships inside of Puppet starting with version 6. While it is technically possible to add the Resource API functionality to Puppet 5.5.x, the DSC functionality has not been tested in this setup. For more information on the Resource API, review the documentation.
The module also depends on the pwshlib module. This Puppet module includes two important things: the ruby-pwsh library for running PowerShell code from ruby and the base provider for DSC resources, which this module leverages.
All of the actual work being done to call the DSC resources vendored with this module is in this file from the pwshlib module. This is important for troubleshooting and bug reporting, but doesn't impact your use of the module except that the end result will be that nothing works, as the dependency is not installed alongside this module!
Long File Path Support
Several PowerShell modules with DSC Resources end up with very long file paths once vendored, many of which exceed the 260 character limit for file paths. Luckily in Windows 10 (build 1607+), Windows Server 2016 (build 1607+), and Windows Server 2019 there is now an option for supporting long file paths transparently!
We strongly recommend enabling long file path support on any machines using this module to avoid path length issues.
You can set this value using the Puppet registry_value
resource:
registry_value { 'HKLM\System\CurrentControlSet\Control\FileSystem\LongPathsEnabled':
ensure => 'present',
data => [1],
provider => 'registry',
type => 'dword',
}
You can also set this value outside of Puppet by following the Microsoft documentation.
Usage
You can specify any of the DSC resources from this module like a normal Puppet resource in your manifests. The examples below use DSC resources from from the PowerShellGet repository, regardless of what module you're looking at here; the syntax, not the specifics, is what's important.
For reference documentation about the DSC resources exposed in this module, see the Reference Forge tab, or the REFERENCE.md file.
# Include a meaningful title for your resource declaration
dsc_psrepository { 'Add team module repo':
dsc_name => 'foo',
dsc_ensure => present,
# This location is nonsense, can be any valid folder on your
# machine or in a share, any location the SourceLocation param
# for the DSC resource will accept.
dsc_sourcelocation => 'C:\Program Files',
# You must always pass an enum fully lower-cased;
# Puppet is case sensitive even when PowerShell isn't
dsc_installationpolicy => untrusted,
}
dsc_psrepository { 'Trust public gallery':
dsc_name => 'PSGallery',
dsc_ensure => present,
dsc_installationpolicy => trusted,
}
dsc_psmodule { 'Make Ruby manageable via uru':
dsc_name => 'RubyInstaller',
dsc_ensure => present,
}
Credentials
Credentials are always specified as a hash of the username and password for the account. The password must use the Puppet Sensitive type; this ensures that logs and reports redact the password, displaying it instead as <Sensitive [value redacted]>.
dsc_psrepository { 'PowerShell Gallery':
dsc_name => 'psgAllery',
dsc_installationpolicy => 'Trusted',
dsc_psdscrunascredential => {
user => 'apple',
password => Sensitive('foobar'),
},
}
CIM Instances
Because the CIM instances for DSC resources are fully mapped, the types actually explain fairly precisely what the shape of each CIM instance has to be - and, moreover, the type definition means that you get checking at catalog compile time. Puppet parses CIM instances are structured hashes (or arrays of structured hashes) that explicitly declare their keys and the valid types of values for each key.
So, for the dsc_accesscontrolentry
property of the dsc_ntfsaccessentry
type, which has a MOF type of NTFSAccessControlList[]
, Puppet defines the CIM instance as:
Array[Struct[{
accesscontrolentry => Array[Struct[{
accesscontroltype => Enum['Allow', 'Deny'],
inheritance => Enum['This folder only', 'This folder subfolders and files', 'This folder and subfolders', 'This folder and files', 'Subfolders and files only', 'Subfolders only', 'Files only'],
ensure => Enum['Present', 'Absent'],
cim_instance_type => 'NTFSAccessControlEntry',
filesystemrights => Array[Enum['AppendData', 'ChangePermissions', 'CreateDirectories', 'CreateFiles', 'Delete', 'DeleteSubdirectoriesAndFiles', 'ExecuteFile', 'FullControl', 'ListDirectory', 'Modify', 'Read', 'ReadAndExecute', 'ReadAttributes', 'ReadData', 'ReadExtendedAttributes', 'ReadPermissions', 'Synchronize', 'TakeOwnership', 'Traverse', 'Write', 'WriteAttributes', 'WriteData', 'WriteExtendedAttributes']]
}]],
forceprincipal => Optional[Boolean],
principal => Optional[String],
}]]
A valid example of that in a puppet manifest looks like this:
dsc_accesscontrollist => [
{
accesscontrolentry => [
{
accesscontroltype => 'Allow',
inheritance => 'This folder only',
ensure => 'Present',
filesystemrights => 'ChangePermissions',
cim_instance_type => 'NTFSAccessControlEntry',
},
],
principal => 'veryRealUserName',
},
]
For more information about using a built module, check out our narrative documentation.
Properties
Note that the only properties specified in a resource declaration which are passed to Invoke-Dsc are all prepended with dsc.
If a property does _not start with dsc_ it is used to control how Puppet interacts with DSC/other Puppet resources - for example,
specifying a unique name for the resource for Puppet to distinguish between declarations or Puppet metaparameters (notifies,
before, etc).
Validation Mode
By default, these resources use the property validation mode, which checks whether or not the resource is in the desired state the same way most Puppet resources are validated;
by comparing the properties returned from the system with those specified in the manifest.
Sometimes, however, this is insufficient;
many DSC Resources return data that does not compare properly to the desired state (some are missing properties, others are malformed, some simply cannot be strictly compared).
In these cases, you can set the validation mode to resource
, which falls back on calling Invoke-DscResource
with the Test
method and trusts that result.
When using the resource
validation mode, the resource is tested once and will then treat all properties of that resource as in sync (if the result returned true
) or not in sync.
This loses the granularity of change reporting for the resource but prevents flapping and unexpected behavior.
# This will flap because the DSC resource never returns name in SecurityPolicyDsc v2.10.0.0
dsc_securityoption { 'Enforce Anonoymous SID Translation':
dsc_name => 'Enforce Anonymous SID Translation',
dsc_network_access_allow_anonymous_sid_name_translation => 'Disabled',
}
# This will idempotently apply
dsc_psrepository { 'PowerShell Gallery':
validation_mode => 'resource',
dsc_name => 'Enforce Anonymous SID Translation',
dsc_network_access_allow_anonymous_sid_name_translation => 'Disabled',
}
It is important to note that this feature is only supported with a version of puppetlabs-pwshlib
equal to or higher than 0.9.0
, in which the supporting code for the DSC Base Provider to implement custom insync was shipped.
Finally, while this module's metadata says that the supported Puppet versions are 6.0.0 and up, the implementation of the validation_mode
parameter relies on the custom_insync
feature of the Puppet Resource API.
The custom_insync
feature first shipped in the puppet-resource_api
version 1.8.14
, which itself is only included in Puppet versions equal to or newer than 6.23.0
and 7.8.0
for the 6x and 7x platforms respectively.
Using this module against older Puppet versions will result in a warning (example below) and only use the default property-by-property change reporting, regardless of the setting of validation_mode
.
Warning: Unknown feature detected: ["custom_insync"]
Troubleshooting
In general, there are three broad categories of problems:
- Problems with the way the underlying DSC resource works.
- Problems with the type definition, where you can't specify a valid set of properties for the DSC resource
- Problems with calling the underlying DSC resource - the parameters aren't being passed correctly or the resource can't be found
Unfortunately, problems with the way the underlying DSC resource works are something we can't help directly with. You'll need to file an issue with the upstream maintainers for the PowerShell module.
Problems with the type definition are when a value that should be valid according to the DSC resource's documentation and code is not accepted by the Puppet wrapper. If and when you run across one of these, please file an issue with the Puppet DSC Builder; this is where the conversion happens and once we know of a problem we can fix it and regenerate the Puppet modules. To help us identify the issue, please specify the DSC module, version, resource, property and values that are giving you issues. Once a fix is available we will regenerate and release updated versions of this Puppet wrapper.
Problems with calling the underlying DSC resource become apparent by comparing <value passed in in puppet>
with <value received by DSC>
.
In this case, please file an issue with the puppetlabs/pwshlib module, which is where the DSC base provider actually lives.
We'll investigate and prioritize a fix and update the puppetlabs/pwshlib module.
Updating to the pwshlib version with the fix will immediately take advantage of the improved functionality without waiting for this module to be reconverted and published.
For specific information on troubleshooting a generated module, check the troubleshooting guide for the puppet.dsc module.
Known Limitations
Currently, because of the way Puppet caches files on agents, use of the legacy puppetlabs-dsc
module is not compatible with this or any auto-generated DSC module.
Inclusion of both will lead to pluginsync conflicts.
Configuring the LCM
In order for a Puppetized DSC module to function, the DSC Local Configuration Manager (LCM) RefreshMode
must be set to either Push
or Disabled
.
The default value for RefreshMode
in WMF 5.0 and WMF 5.1 is Push
- so if it has not been set to anything else then there is no action needed on your part.
However if the value of the LCM has been set to anything other than Push
then the module will not function and so the value must either be changed back or disabled.
The Puppetized DSC modules use the Invoke-DscResource
cmdlet to invoke DSC Resources of the target machine.
If the RefreshMode
is set to Pull
, DSC Resources will only run from a DSC Pull Server - in this setting DSC does not allow any DSC Resources to be run interactively on the host.
Module Installation
If you're using this module with Puppet Enterprise and Code Manager, everything should "just work" - no errors or issues acquiring and deploying this or any Puppetized DSC module to nodes.
Unfortunately, due a bug in minitar which prevents it from unpacking archives with long file paths, both r10k
and serverless Puppet (via puppet module install
) methods of installing modules with long path names will fail.
In short, minitar is unable to unpack modules that contain long file paths (though it can create them).
As a workaround, you can retrieve DSC modules from the forge via PowerShell and 7zip:
$ModuleAuthor = 'dsc'
$ModuleName = 'xremotedesktopsessionhost'
$ModuleVersion = '2.0.0-0-1'
$ArchiveFileName = "$ModuleAuthor-$ModuleName-$ModuleVersion.tar.gz"
$DownloadUri = "https://forge.puppet.com/v3/files/$ArchiveFileName"
# Download the module tar.gz to the current directory
Invoke-WebRequest -Uri $DownloadUri -OutFile ./$ArchiveFileName
# Use 7zip to extract the module to the current directory
& 7z x $ArchiveFileName -so | & 7z x -aoa -si -ttar
Reference
Table of Contents
Resource types
dsc_adcsauthorityinformationaccess
: The DSC AdcsAuthorityInformationAccess resource type. Automatically generated from version 5.0.0dsc_adcscertificationauthority
: The DSC AdcsCertificationAuthority resource type. Automatically generated from version 5.0.0dsc_adcscertificationauthoritysettings
: The DSC AdcsCertificationAuthoritySettings resource type. Automatically generated from version 5.0.0dsc_adcsenrollmentpolicywebservice
: The DSC AdcsEnrollmentPolicyWebService resource type. Automatically generated from version 5.0.0dsc_adcsonlineresponder
: The DSC AdcsOnlineResponder resource type. Automatically generated from version 5.0.0dsc_adcstemplate
: The DSC AdcsTemplate resource type. Automatically generated from version 5.0.0dsc_adcswebenrollment
: The DSC AdcsWebEnrollment resource type. Automatically generated from version 5.0.0
Resource types
dsc_adcsauthorityinformationaccess
The DSC AdcsAuthorityInformationAccess resource type. Automatically generated from version 5.0.0
Properties
The following properties are available in the dsc_adcsauthorityinformationaccess
type.
dsc_aiauri
Data type: Optional[Array[String]]
Specifies the list of URIs that should be included in the AIA extension of the issued certificate.
dsc_allowrestartservice
Data type: Optional[Boolean]
Allows the Certificate Authority service to be restarted if changes are made. Defaults to false.
dsc_ocspuri
Data type: Optional[Array[String]]
Specifies the list of URIs that should be included in the Online Responder OCSP extension of the issued certificate.
Parameters
The following parameters are available in the dsc_adcsauthorityinformationaccess
type.
dsc_issingleinstance
namevar
Data type: Enum['Yes']
Specifies the resource is a single instance, the value must be 'Yes'.
dsc_psdscrunascredential
Data type: Optional[Struct[{ user => String[1], password => Sensitive[String[1]] }]]
name
namevar
Data type: String
Description of the purpose for this resource declaration.
validation_mode
Data type: Enum[property, resource]
Whether to check if the resource is in the desired state by property (default) or using Invoke-DscResource in Test mode (resource).
Default value: property
dsc_adcscertificationauthority
The DSC AdcsCertificationAuthority resource type. Automatically generated from version 5.0.0
Properties
The following properties are available in the dsc_adcscertificationauthority
type.
dsc_cacommonname
Data type: Optional[String]
Specifies the certification authority common name.
dsc_cadistinguishednamesuffix
Data type: Optional[String]
Specifies the certification authority distinguished name suffix.
dsc_catype
Data type: Enum['EnterpriseRootCA', 'EnterpriseSubordinateCA', 'StandaloneRootCA', 'StandaloneSubordinateCA']
Specifies the type of certification authority to install. The possible values are EnterpriseRootCA, EnterpriseSubordinateCA, StandaloneRootCA, or StandaloneSubordinateCA.
dsc_certfile
Data type: Optional[String]
Specifies the file name of certification authority PKCS 12 formatted certificate file.
dsc_certificateid
Data type: Optional[String]
Specifies the thumbprint or serial number of certification authority certificate.
dsc_cryptoprovidername
Data type: Optional[String]
The name of the cryptographic service provider or key storage provider that is used to generate or store the private key for the CA.
dsc_databasedirectory
Data type: Optional[String]
Specifies the folder location of the certification authority database.
dsc_ensure
Data type: Optional[Enum['Present', 'Absent']]
Specifies whether the Certificate Authority should be installed or uninstalled.
dsc_hashalgorithmname
Data type: Optional[String]
Specifies the signature hash algorithm used by the certification authority.
dsc_ignoreunicode
Data type: Optional[Boolean]
Specifies that Unicode characters are allowed in certification authority name string.
dsc_keycontainername
Data type: Optional[String]
Specifies the name of an existing private key container.
dsc_keylength
Data type: Optional[Integer[0, 4294967295]]
Specifies the bit length for new certification authority key.
dsc_logdirectory
Data type: Optional[String]
Specifies the folder location of the certification authority database log.
dsc_outputcertrequestfile
Data type: Optional[String]
Specifies the folder location for certificate request file.
dsc_overwriteexistingcainds
Data type: Optional[Boolean]
Specifies that the computer object in the Active Directory Domain Service domain should be overwritten with the same computer name.
dsc_overwriteexistingdatabase
Data type: Optional[Boolean]
Specifies that the existing certification authority database should be overwritten.
dsc_overwriteexistingkey
Data type: Optional[Boolean]
Overwrite existing key container with the same name
dsc_parentca
Data type: Optional[String]
Specifies the configuration string of the parent certification authority that will certify this CA.
dsc_validityperiod
Data type: Optional[Enum['Hours', 'Days', 'Months', 'Years']]
Specifies the validity period of the certification authority certificate in hours, days, weeks, months or years. If this is a subordinate CA, do not use this parameter, because the validity period is determined by the parent CA.
dsc_validityperiodunits
Data type: Optional[Integer[0, 4294967295]]
Validity period of the certification authority certificate. If this is a subordinate CA, do not specify this parameter because the validity period is determined by the parent CA.
Parameters
The following parameters are available in the dsc_adcscertificationauthority
type.
dsc_certfilepassword
dsc_credential
dsc_issingleinstance
dsc_psdscrunascredential
name
validation_mode
dsc_certfilepassword
Data type: Optional[Struct[{ user => String[1], password => Sensitive[String[1]] }]]
Specifies the password for certification authority certificate file.
dsc_credential
Data type: Optional[Struct[{ user => String[1], password => Sensitive[String[1]] }]]
To install an enterprise certification authority, the computer must be joined to an Active Directory Domain Services domain and a user account that is a member of the Enterprise Admin group is required. To install a standalone certification authority, the computer can be in a workgroup or AD DS domain. If the computer is in a workgroup, a user account that is a member of Administrators is required. If the computer is in an AD DS domain, a user account that is a member of Domain Admins is required.
dsc_issingleinstance
namevar
Data type: Enum['Yes']
Specifies the resource is a single instance, the value must be 'Yes'.
dsc_psdscrunascredential
Data type: Optional[Struct[{ user => String[1], password => Sensitive[String[1]] }]]
name
namevar
Data type: String
Description of the purpose for this resource declaration.
validation_mode
Data type: Enum[property, resource]
Whether to check if the resource is in the desired state by property (default) or using Invoke-DscResource in Test mode (resource).
Default value: property
dsc_adcscertificationauthoritysettings
The DSC AdcsCertificationAuthoritySettings resource type. Automatically generated from version 5.0.0
Properties
The following properties are available in the dsc_adcscertificationauthoritysettings
type.
dsc_auditfilter
Data type: Optional[Array[Enum['StartAndStopADCS', 'BackupAndRestoreCADatabase', 'IssueAndManageCertificateRequests', 'RevokeCertificatesAndPublishCRLs', 'ChangeCASecuritySettings', 'StoreAndRetrieveArchivedKeys', 'ChangeCAConfiguration']]]
Specifies an array of audit categories to enable audit logging for.
dsc_cacertpublicationurls
Data type: Optional[Array[String]]
Specifies an array of Certificate Authority certificate publication URLs, each prepended with an integer representing the type of URL endpoint.
dsc_crloverlapperiod
Data type: Optional[Enum['Hours', 'Days', 'Weeks', 'Months', 'Years']]
Specifies the units of measurement for the certificate revocation list overlap period.
dsc_crloverlapunits
Data type: Optional[Integer[0, 4294967295]]
Specifies the number of units for the certificate revocation list overlap period.
dsc_crlperiod
Data type: Optional[Enum['Hours', 'Days', 'Weeks', 'Months', 'Years']]
Specifies the units of measurement for the certificate revocation period.
dsc_crlperiodunits
Data type: Optional[Integer[0, 4294967295]]
Specifies the number of units for the certificate revocation period.
dsc_crlpublicationurls
Data type: Optional[Array[String]]
Specifies an array of Certificate Revocation List publication URLs, each prepended with an integer representing the type of URL endpoint.
dsc_dsconfigdn
Data type: Optional[String]
Specifies the distinguished name of the directory services configuration object that contains this certificate authority in the Active Directory.
dsc_dsdomaindn
Data type: Optional[String]
Specifies the distinguished name of the directory services object that contains this certificate authority in the Active Directory.
dsc_validityperiod
Data type: Optional[Enum['Hours', 'Days', 'Weeks', 'Months', 'Years']]
Specifies the units of measurement for the validity period of certificates issued by this certificate authority.
dsc_validityperiodunits
Data type: Optional[Integer[0, 4294967295]]
Specifies the number of units for the validity period of certificates issued by this certificate authority.
Parameters
The following parameters are available in the dsc_adcscertificationauthoritysettings
type.
dsc_issingleinstance
namevar
Data type: Enum['Yes']
Specifies the resource is a single instance, the value must be 'Yes'.
dsc_psdscrunascredential
Data type: Optional[Struct[{ user => String[1], password => Sensitive[String[1]] }]]
name
namevar
Data type: String
Description of the purpose for this resource declaration.
validation_mode
Data type: Enum[property, resource]
Whether to check if the resource is in the desired state by property (default) or using Invoke-DscResource in Test mode (resource).
Default value: property
dsc_adcsenrollmentpolicywebservice
The DSC AdcsEnrollmentPolicyWebService resource type. Automatically generated from version 5.0.0
Properties
The following properties are available in the dsc_adcsenrollmentpolicywebservice
type.
dsc_ensure
Data type: Optional[Enum['Present', 'Absent']]
Specifies whether the Certificate Enrollment Policy Web feature should be installed or uninstalled. Defaults to Present.
dsc_keybasedrenewal
Data type: Optional[Boolean]
Configures the Certificate Enrollment Policy Web Service to operate in key-based renewal mode. Defaults to False.
dsc_sslcertthumbprint
Data type: String
Specifies the thumbprint of the certificate used by Internet Information Service (IIS) to enable support for required Secure Sockets Layer (SSL).
Parameters
The following parameters are available in the dsc_adcsenrollmentpolicywebservice
type.
dsc_authenticationtype
namevar
Data type: Enum['Certificate', 'Kerberos', 'UserName']
Specifies the authentication type used by the Certificate Enrollment Policy Web Service.
dsc_credential
Data type: Optional[Struct[{ user => String[1], password => Sensitive[String[1]] }]]
If the Certificate Enrollment Policy Web service is configured to use Standalone certification authority, then an account that is a member of the local Administrators on the CA is required. If the Certificate Enrollment Policy Web service is configured to use an Enterprise CA, then an account that is a member of Domain Admins is required.
dsc_psdscrunascredential
Data type: Optional[Struct[{ user => String[1], password => Sensitive[String[1]] }]]
name
namevar
Data type: String
Description of the purpose for this resource declaration.
validation_mode
Data type: Enum[property, resource]
Whether to check if the resource is in the desired state by property (default) or using Invoke-DscResource in Test mode (resource).
Default value: property
dsc_adcsonlineresponder
The DSC AdcsOnlineResponder resource type. Automatically generated from version 5.0.0
Properties
The following properties are available in the dsc_adcsonlineresponder
type.
dsc_ensure
Data type: Optional[Enum['Present', 'Absent']]
Specifies whether the Online Responder feature should be installed or uninstalled.
Parameters
The following parameters are available in the dsc_adcsonlineresponder
type.
dsc_credential
Data type: Optional[Struct[{ user => String[1], password => Sensitive[String[1]] }]]
If the Online Responder service is configured to use Standalone certification authority, then an account that is a member of the local Administrators on the CA is required. If the Online Responder service is configured to use an Enterprise CA, then an account that is a member of Domain Admins is required.
dsc_issingleinstance
namevar
Data type: Enum['Yes']
Specifies the resource is a single instance, the value must be 'Yes'
dsc_psdscrunascredential
Data type: Optional[Struct[{ user => String[1], password => Sensitive[String[1]] }]]
name
namevar
Data type: String
Description of the purpose for this resource declaration.
validation_mode
Data type: Enum[property, resource]
Whether to check if the resource is in the desired state by property (default) or using Invoke-DscResource in Test mode (resource).
Default value: property
dsc_adcstemplate
The DSC AdcsTemplate resource type. Automatically generated from version 5.0.0
Properties
The following properties are available in the dsc_adcstemplate
type.
dsc_ensure
Data type: Optional[Enum['Present', 'Absent']]
Specifies whether the CA Template should be added or removed.
Parameters
The following parameters are available in the dsc_adcstemplate
type.
dsc_name
namevar
Data type: String
Specifies the name of the CA template
dsc_psdscrunascredential
Data type: Optional[Struct[{ user => String[1], password => Sensitive[String[1]] }]]
name
namevar
Data type: String
Description of the purpose for this resource declaration.
validation_mode
Data type: Enum[property, resource]
Whether to check if the resource is in the desired state by property (default) or using Invoke-DscResource in Test mode (resource).
Default value: property
dsc_adcswebenrollment
The DSC AdcsWebEnrollment resource type. Automatically generated from version 5.0.0
Properties
The following properties are available in the dsc_adcswebenrollment
type.
dsc_caconfig
Data type: Optional[String]
CAConfig parameter string. Do not specify this if there is a local CA installed.
dsc_ensure
Data type: Optional[Enum['Present', 'Absent']]
Specifies whether the Web Enrollment feature should be installed or uninstalled.
Parameters
The following parameters are available in the dsc_adcswebenrollment
type.
dsc_credential
Data type: Optional[Struct[{ user => String[1], password => Sensitive[String[1]] }]]
If the Web Enrollment service is configured to use Standalone certification authority, then an account that is a member of the local Administrators on the CA is required. If the Web Enrollment service is configured to use an Enterprise CA, then an account that is a member of Domain Admins is required.
dsc_issingleinstance
namevar
Data type: Enum['Yes']
Specifies the resource is a single instance, the value must be 'Yes'
dsc_psdscrunascredential
Data type: Optional[Struct[{ user => String[1], password => Sensitive[String[1]] }]]
name
namevar
Data type: String
Description of the purpose for this resource declaration.
validation_mode
Data type: Enum[property, resource]
Whether to check if the resource is in the desired state by property (default) or using Invoke-DscResource in Test mode (resource).
Default value: property
[5.0.0] - 2020-06-20
Changed
- Updated common function
Test-DscParameterState
to support ordered comparison of arrays by copying function and tests fromComputerManagementDsc
. - Added new resource AdcsAuthorityInformationAccess - see Issue #101.
- BREAKING CHANGE: Deprecate AdcsOcspExtension. This has been superceeded by AdcsAuthorityInformationAccess.
- AdcsCertificateAuthoritySettings:
- Correct types returned by
CRLPeriodUnits
andAuditFilter
properties from Get-TargetResource.
- Correct types returned by
- Updated module ownership to DSC Community.
- BREAKING CHANGE: Changed resource prefix from MSFT to DSC.
- Updated to use continuous delivery pattern using Azure DevOps - Fixes Issue #105.
- Fixed build badge IDs - Fixes Issue #108.
- Corrected MOF formatting of
DSC_AdcsAuthorityInformationAccess.schema.mof
to fix issue with auto documentation generation. - Updated CI pipeline files.
- No longer run integration tests when running the build task
test
, e.g..\build.ps1 -Task test
. To manually run integration tests, run the following:.\build.ps1 -Tasks test -PesterScript 'tests/Integration' -CodeCoverageThreshold 0
- Removed unused files repository - Fixes Issue #112.
- Change Azure DevOps Pipeline definition to include
source/*
- Fixes Issue #114. - Updated pipeline to use
latest
version ofModuleBuilder
- Fixes Issue #115. - Merge
HISTORIC_CHANGELOG.md
intoCHANGELOG.md
- Fixes Issue #115. - Fixed build failures caused by changes in
ModuleBuilder
module v1.7.0 by changingCopyDirectories
toCopyPaths
- Fixes Issue #119. - Updated to use the common module DscResource.Common - Fixes Issue #117.
- Pin
Pester
module to 4.10.1 because Pester 5.0 is missing code coverage - Fixes Issue #118.
Added
- Added build task
Generate_Conceptual_Help
to generate conceptual help for the DSC resource. - Added build task
Generate_Wiki_Content
to generate the wiki content that can be used to update the GitHub Wiki.
Dependencies
- puppetlabs/pwshlib (>= 0.9.0 < 2.0.0)