Param
(
[
Parameter
(
Mandatory
=
$true
)]
[string]
$CommonName
,
[
Parameter
(
Mandatory
=
$true
)]
[DateTime]
$StartDate
,
[
Parameter
(
Mandatory
=
$true
)]
[DateTime]
$EndDate
,
[
Parameter
(
Mandatory
=
$false
,
HelpMessage
=
"Will overwrite existing certificates"
)]
[Switch]
$Force
,
[
Parameter
(
Mandatory
=
$false
)]
[SecureString]
$Password
)
function
CreateSelfSignedCertificate(){
if
(
$CommonName
.ToLower().StartsWith(
"cn="
))
{
$CommonName
=
$CommonName
.Substring(3)
}
$certs
=
Get-ChildItem
-Path
Cert:\LocalMachine\my |
Where-Object
{
$_
.Subject
-eq
"CN=$CommonName"
}
if
(
$certs
-ne
$null
-and
$certs
.Length
-gt
0)
{
if
(
$Force
)
{
foreach
(
$c
in
$certs
)
{
remove-item
$c
.PSPath
}
}
else
{
Write-Host
-ForegroundColor
Red
"One or more certificates with the same common name (CN=$CommonName) are already located in the local certificate store. Use -Force to remove them"
;
return
$false
}
}
$name
=
new-object
-com
"X509Enrollment.CX500DistinguishedName.1"
$name
.Encode(
"CN=$CommonName"
, 0)
$key
=
new-object
-com
"X509Enrollment.CX509PrivateKey.1"
$key
.ProviderName =
"Microsoft RSA SChannel Cryptographic Provider"
$key
.KeySpec = 1
$key
.Length = 2048
$key
.SecurityDescriptor =
"D:PAI(A;;0xd01f01ff;;;SY)(A;;0xd01f01ff;;;BA)(A;;0x80120089;;;NS)"
$key
.MachineContext = 1
$key
.ExportPolicy = 1
$key
.Create()
$serverauthoid
=
new-object
-com
"X509Enrollment.CObjectId.1"
$serverauthoid
.InitializeFromValue(
"1.3.6.1.5.5.7.3.1"
)
$ekuoids
=
new-object
-com
"X509Enrollment.CObjectIds.1"
$ekuoids
.add(
$serverauthoid
)
$ekuext
=
new-object
-com
"X509Enrollment.CX509ExtensionEnhancedKeyUsage.1"
$ekuext
.InitializeEncode(
$ekuoids
)
$cert
=
new-object
-com
"X509Enrollment.CX509CertificateRequestCertificate.1"
$cert
.InitializeFromPrivateKey(2,
$key
, "
")
$cert.Subject = $name
$cert.Issuer = $cert.Subject
$cert.NotBefore = $StartDate
$cert.NotAfter = $EndDate
$cert.X509Extensions.Add($ekuext)
$cert.Encode()
$enrollment = new-object -com "
X509Enrollment.CX509Enrollment.1
"
$enrollment.InitializeFromRequest($cert)
$certdata = $enrollment.CreateRequest(0)
$enrollment.InstallResponse(2, $certdata, 0, "")
return $true
}
function ExportPFXFile()
{
if($CommonName.ToLower().StartsWith("
cn=
"))
{
# Remove CN from common name
$CommonName = $CommonName.Substring(3)
}
if($Password -eq $null)
{
$Password = Read-Host -Prompt "
Enter Password to protect private key
" -AsSecureString
}
$cert = Get-ChildItem -Path Cert:\LocalMachine\my | where-object{$_.Subject -eq "
CN=
$CommonName
"}
Export-PfxCertificate -Cert $cert -Password $Password -FilePath "
$(
$CommonName
).pfx
"
Export-Certificate -Cert $cert -Type CERT -FilePath "
$CommonName
.cer
"
}
function RemoveCertsFromStore()
{
# Once the certificates have been been exported we can safely remove them from the store
if($CommonName.ToLower().StartsWith("
cn=
"))
{
# Remove CN from common name
$CommonName = $CommonName.Substring(3)
}
$certs = Get-ChildItem -Path Cert:\LocalMachine\my | Where-Object{$_.Subject -eq "
CN=
$CommonName
"}
foreach
(
$c
in
$certs
)
{
remove-item
$c
.PSPath
}
}
if
(CreateSelfSignedCertificate)
{
ExportPFXFile
RemoveCertsFromStore
}