PoshCode Archive  Artifact [e8c6acd193]

Artifact e8c6acd193174d944217bc0f0db0c66e5e8d632334425569d31584ce0de1ebfc:

  • File Generates-an-CSR-certificate-request-.ps1 — part of check-in [c585a8f81a] at 2018-06-10 13:54:49 on branch trunk — Generates an CSR certificate request powershell (user: Pavel_Kandratsyeu size: 8321)

# encoding: ascii
# api: powershell
# title: 
# description: Generates an CSR certificate request powershell
# version: 0.1
# type: script
# author: Pavel_Kandratsyeu
# license: CC0
# x-poshcode-id: 5400
# x-archived: 2016-02-14T00:03:15
#
#
<#
.SYNOPSIS
Generates an offline PKCS#10 certificate request

.DESCRIPTION
The script generates an offline PKCS#10 certificate request and save it to *.req file. 
Offline request is the request that is saved to a file and is submitted to CA server by using out of band means. 
Once the certificate is issued, it is installed on the original computer.

.LINK
http://en-us.sysadmins.lv/Lists/Posts/Post.aspx?List=332991f0-bfed-4143-9eea-f521167d287c&ID=74
http://msdn.microsoft.com/en-us/library/aa374863(v=vs.85).aspx
http://www.css-security.com/blog/creating-a-self-signed-ssl-certificate-using-powershell/

.NOTES 
Created: 02-Sept-2014
Updated: 03-Sept-2014
Author: Pavel_Kandratsyeu@epam.com
#>

[CmdletBinding()] 
param (

	[Parameter(
		HelpMessage = "Enter Subject of Certificate e.g. *.qa.infogen.cc",
		Mandatory = $true,
		Position = 0, 
		ValueFromPipelineByPropertyName = $true
	)]
	[ValidateNotNullOrEmpty()]
	[String]$SubjectName,

	[Parameter(
		HelpMessage = "Enter Subject Alternative Name e.g. *.owa.epam.com", 
		Mandatory = $false,
		ValueFromPipelineByPropertyName = $true 
	)]
	[ValidateNotNullOrEmpty()]
	[string[]]$AlternativeName,

	[Parameter(
		HelpMessage = "Enter Key Usage Extension e.g. 'DigitalSignature', 'KeyEncipherment'",
		Mandatory = $false, 
		ValueFromPipelineByPropertyName = $true
	)]
	[ValidateSet(
		"None", "KeyEncipherment", "EncipherOnly", "CrlSign", "KeyCertSign", "KeyAgreement", 
		"DataEncipherment", "KeyEncipherment", "NonRepudiation", "DigitalSignature", "DecipherOnly"
	)]
	[String[]]$KeyUsage = ("DigitalSignature", "KeyEncipherment"),

	[Parameter(
		HelpMessage = "Enter Extended Key Usage (application policies) e.g. 'Server Authentication', 'Client Authentication'",
		Mandatory = $false, 
		ValueFromPipelineByPropertyName = $true
	)]
	[ValidateSet(
		"Time Stamping", "Microsoft Trust List Signing", "Microsoft Time Stamping", "IP security end system", "IP security tunnel termination", "IP security user",
		"Encrypting File System", "Windows Hardware Driver Verification", "Windows System Component Verification", "OEM Windows System Component Verification",
		"Embedded Windows System Component Verification", "Key Pack Licenses", "License Server Verification", "Smart Card Logon", "Digital Rights", "Qualified Subordination",
		"Key Recovery", "Document Signing", "IP security IKE intermediate", "File Recovery", "Root List Signer", "All application policies",
		"Directory Service Email Replication", "Certificate Request Agent", "Key Recovery Agent", "Private Key Archival", "Lifetime Signing", "OCSP Signing", "Any Purpose",
		"KDC Authentication", "Kernel Mode Code Signing", "CTL Usage", "Revoked List Signer", "Early Launch Antimalware Driver", "Disallowed List", "HAL Extension",
		"Endorsement Key Certificate", "Platform Certificate", "Attestation Identity Key Certificate", "Windows Kits Component", "Windows RT Verification",
		"Protected Process Light Verification", "Windows TCB Component", "Protected Process Verification", "Windows Store", "Dynamic Code Generator", "Microsoft Publisher",
		"Windows Third Party Application Component", "Windows Software Extension Verification", "System Health Authentication", "Domain Name System (DNS) Server Trust", 
		"BitLocker Drive Encryption", "BitLocker Data Recovery Agent", "Windows Update"
	)]
	[String[]]$ExtendedKeyUsage = ("Server Authentication", "Client Authentication"),

	[Parameter( 
		Mandatory = $false 
	)]
	[ValidateNotNullOrEmpty()]
	[string]$ProviderName = ("Microsoft RSA SChannel Cryptographic Provider"),

	[Parameter( 
		Mandatory = $false 
	)]
	[ValidateSet(
		"sha256", "sha384", "sha512", "sha1", "md5", "md4", "md2"
	)]
	[string]$HashAlgorithm,


	[Parameter( 
		Mandatory = $false 
	)]
	[ValidateNotNullOrEmpty()]
	[string]$OutputPath = ([IO.Path]::ChangeExtension($MyInvocation.MyCommand.Path, ".req"))
)

process
{
	if ($AlternativeName)
	{
		[string[]]$AlternativeName += $SubjectName
	}

	[String]$KeyUsage = $KeyUsage -join ","

	[string]$Subject = "CN=$SubjectName,C=US,L=Newtonw,O=EPAM Systems,S=Pennsylvania"

	#region Certificate subject

	$SubjectObj = New-Object -ComObject X509Enrollment.CX500DistinguishedName
	$SubjectObj.Encode($Subject, 0x0)

	# Subject Alternative Names (SAN)
	if ($AlternativeName)
	{
		$IAlternativeNames = New-Object -ComObject X509Enrollment.CAlternativeNames

		foreach ($AN in $AlternativeName) 
		{
			# Instantiate a IAlternativeName object
			$AltName = New-Object -ComObject X509Enrollment.CAlternativeName

			# Initialize the object by using current element
			$AltName.InitializeFromString(0x3,$AN)

			# Add created object to an object of collection of IAlternativeNames
			$IAlternativeNames.Add($AltName)
		}

		# Finally, initialize SAN extension from a collection of Alternative Names
		$SubjectAlternativeName = New-Object -ComObject X509Enrollment.CX509ExtensionAlternativeNames
		$SubjectAlternativeName.InitializeEncode($IAlternativeNames)
	}

	#endregion

	#region Key information

	# Create Private key (generate key pair with IX509PrivateKey interface)
	$PrivateKey = New-Object -ComObject X509Enrollment.CX509PrivateKey -Property @{
		ProviderName = $ProviderName
		MachineContext = $true
		Length = 2048
		KeySpec = 1
		KeyUsage = ([int][Security.Cryptography.X509Certificates.X509KeyUsageFlags]($KeyUsage))
		ExportPolicy = 0x00000001
	}

	$PrivateKey.Create()

	$KeyUsageObj = New-Object -ComObject X509Enrollment.CX509ExtensionKeyUsage
	$KeyUsageObj.InitializeEncode([int][Security.Cryptography.X509Certificates.X509KeyUsageFlags]($KeyUsage))
	$KeyUsageObj.Critical = $true

	#endregion

	#region Certificate usage (Enhanced Key Usage extension)

	$ExtendedKeyUsageObj = New-Object -ComObject X509Enrollment.CX509ExtensionEnhancedKeyUsage
	$ExtendedKeyUsageObj.Critical = $false

	# Create an object from IObjectIds interface that defines methods and properties to manage a collection of IObjectId objects
	$ObjectIDs = New-Object -ComObject X509Enrollment.CObjectIDs

	foreach ($EKU in $ExtendedKeyUsage)
	{
		# Transform current element to an Oid object. This is necessary to retrieve OID value.
		$CryptoObjectId = [Security.Cryptography.Oid]($EKU)
		$ObjectId = New-Object -ComObject X509Enrollment.CObjectID

		# Initialize the object with current Enhanced Key Usage
		$ObjectId.InitializeFromValue($CryptoObjectId.Value)

		# Add the object to the object collection
		$ObjectIDs.Add($ObjectId)
	}

	# When all EKUs are processed, initialized the IX509ExtensionEnhancedKeyUsage with the IObjectIDs collection
	$ExtendedKeyUsageObj.InitializeEncode($ObjectIDs)

	#endregion

	#region PKCS#10 certificate request

	$PKCS10 = New-Object -ComObject X509Enrollment.CX509CertificateRequestPkcs10

	# 0x2 argument for Context parameter indicates that the request is intended for computer (or machine context).
	# StrTemplateName parameter is optional and we pass just empty string.
	$PKCS10.InitializeFromPrivateKey(0x2, $PrivateKey, "")
	$PKCS10.Subject = $SubjectObj

	if ($AlternativeName)
	{
		$PKCS10.X509Extensions.Add($SubjectAlternativeName)
	}

	$PKCS10.X509Extensions.Add($ExtendedKeyUsageObj)
	$PKCS10.X509Extensions.Add($KeyUsageObj)

	if ($HashAlgorithm)
	{
		$HashObjectId = New-Object -ComObject X509Enrollment.CObjectID
		$HashObjectId.InitializeFromValue(([Security.Cryptography.Oid]($HashAlgorithm)).Value)
		$PKCS10.HashAlgorithm = $HashObjectId
	}

	#endregion

	# Create signed request through enrollment interface IX509Enrollment
	$Request = New-Object -ComObject X509Enrollment.CX509Enrollment

	# Provide certificate friendly name, description
	$Request.CertificateFriendlyName = $SubjectName
	$Request.CertificateDescription = $SubjectName

	# Initialize the object from PKCS#10 object:
	$Request.InitializeFromRequest($PKCS10)

	Set-Content -Path $OutputPath -Value ($Request.CreateRequest(0x3)) -Encoding ASCII
}