This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
2016 Gordon Young, [email protected] | |
A node.js example for calling the LiebSoft ERPM REST API | |
This Javascript calls the DoLogin2 method | |
and returns an API token for calling further methods | |
*/ | |
var http = require('https'); //Call the API over HTTPS | |
//ignore Self-Signed SSL Certificate in test environment *** NEVER DO THIS IN PRODUCTION *** |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// 2017 [email protected] | |
// A script to query service now | |
process.env.NODE_TLS_REJECT_UNAUTHORIZED = "0"; //ignore the issuer certificate !!NEVER DO THIS IN PROD!!! | |
var https = require('https'); | |
// set up our options | |
var options = { | |
host: 'someplace.service-now.com', | |
port: 443, | |
path:'/api/now/table/sc_request', |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
-- Table: public.persons | |
CREATE TABLE public.persons | |
( | |
personid integer, | |
lastname character varying(255) COLLATE pg_catalog."default", | |
firstname character varying(255) COLLATE pg_catalog."default", | |
address character varying(255) COLLATE pg_catalog."default", | |
city character varying(255) COLLATE pg_catalog."default" | |
) | |
WITH ( |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
__author__ = '[email protected]' | |
import xml.etree.ElementTree as ET # leverage ElementTree to parse the response | |
import http.client # leverage the native HTTP Client | |
VoltageSDAURL = 'voltage-pp-0000.gordonyoung.us' # Set the URL For the Voltage IBA SecureData Appliance | |
PlaintextPAN = '4444555566662222' # Plaintext PAN to protect | |
ProtectionFormat = 'CC' # Data Protection Format to use | |
Identity = '[email protected]' # IBE Identity |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[Version] | |
Signature = "$Windows NT$" | |
[PolicyStatementExtension] | |
Policies = ManagementPolicy | |
Critical = 0 | |
[ManagementPolicy] | |
OID = 2.16.840.1.114171.999.9.9 | |
Notice = "BLAHBLAH stuff about the policy" | |
URL = "http://pki.gordonyoung.us/ACME_Certificate_Policy_and_Certification_Practice_Statement.pdf" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<#:::::::::::::::::::::::::::::::::::::::::::::::: | |
:: 2017 Gordon Young, [email protected] :: | |
:: The purpose of this script :: | |
:: is to perform post installation :: | |
:: of an AD certificate services CA :: | |
::::::::::::::::::::::::::::::::::::::::::::::::::#> | |
## | |
# !!! The AIA and CDP values must be edited per each unique CA !! |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## Load the ServerManager | |
Import-Module ServerManager | |
## Install the ADCS Certification Authority Feature | |
Add-WindowsFeature Adcs-Cert-Authority | |
# Install an issuing ca with the appropriate properties | |
Install-AdcsCertificationAuthority -CAType EnterpriseSubordinateCa -OverwriteExistingDatabase -OverwriteExistingKey -OverwriteExistingCAinDS -CACommonName "ACME DEV Issuing Certification Authority" -CADistinguishedNameSuffix “DC=CORP, DC=ACME,DC=com” -CryptoProviderName "RSA#Microsoft Software Key Storage Provider" -KeyLength 2048 -HashAlgorithmName SHA256 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#Set up some variables for later use. | |
$seperator = "=","," | |
$ADConfiguration = Get-ADRootDSE | Select configurationNamingContext | |
$OIDPath = "AD:\CN=OID,CN=Public Key Services,CN=Services," + $ADConfiguration.configurationNamingContext.ToString() | |
#Pull the AD certificates from the object | |
$computerObject = Get-ADComputer -Filter * | |
#Forced to iterate through each computer so we can manipulate it later | |
ForEach ($computer in $ComputerObject.Name) { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
################################################# | |
# # | |
# A script to submit a batch of CSRs to a CA # | |
# # | |
################################################# | |
## put this script the directory with your certificate signing requetss | |
$files = Get-ChildItem ".\" | |
# be sure to adjust the $cmdArgs to reflect the appropriate certificate template |