Quest Software provides PowerShell users with the possibility to manage Active Directory quickly and easily through their free Active Directory cmdlets. I love using PowerShell to get the exact information I need, using a single line of code. The following oneliner for instance returns the description of a server:
(Get-QADComputer -Name TESTSERVER -Credential $(Get-Credential TESTDOMAIN\TESTUSER)).Description
Isn’t that way cooler then opening Active Directory Users and Computers, searching for the server and opening the properties dialog? It might not be faster of less work, but it does exactly what I want. I think it’s pretty elegant.
I found a strange flaw in the way the Quest cmdlets handle my credentials though.
The native PowerShell Get-Credential command allows you to supply network credentials, when connecting to remote computers for example. As a security precaution, your password is stored in a secure manner. Check this out:
PS D:\> $cred = Get-Credential TESTDOMAIN\TESTUSER (a dialog box pops up and asks me to supply my password)
PS D:\> $cred.password
As you can see, PowerShell does not allow me to read the contents of the password property.
The stored credentials allow me to authenticate against a remote server. So while this WMI query fails:
PS D:\> Get-WmiObject Win32_OperatingSystem -ComputerName TESTSERVER
Get-WmiObject : Access is denied. (Exception from HRESULT: 0×80070005 (E_ACCESSDENIED))
At line:1 char:14
+ Get-WmiObject <<<< Win32_OperatingSystem -ComputerName TESTSERVER
This works like a charm:
PS D:\> Get-WmiObject Win32_OperatingSystem -ComputerName TESTSERVER -Credential $cred
SystemDirectory : C:\WINNT\system32
Organization : TESTORG
BuildNumber : 3790
RegisteredUser : TESTORG
SerialNumber : 12345-123-1234567-12345
Version : 5.2.3790
The Quest Active Directory cmdlets also allow me to use these stored credentials to connect to Active Directory:
PS D:\> $computer = Get-QADComputer -Name testcomputer -Credential $cred
Name Type DN
—- —- –
TESTSERVER computer CN=TESTSERVER,DC=TESTDOMAIN,DC=LOCAL
That’s just great! But I found out recently that the object returned by this command has a property called NetworkCredential:
PS D:\> $computer | Format-List -Property NetworkCredential
NetworkCredential : System.Net.NetworkCredential
Now let’s take a look at the value of this property:
PS D:\> $computer.NetworkCredential | Format-List -Property *
UserName : TESTUSER
Password : SecretPassword!
Domain : TESTDOMAIN
Hey, what the hell!? That’s my password! I thought it was secret!