Reblogged from my company blog: https://tech.xenit.se/just-enough-administration-rds/
—
The Problem?
Microsoft RDS has limitations when delegating access, in fact there is no built-in access delegation whatsoever!
The solution? Powershell!
A Just enough Administration (JEA) endpoint, also known as a Constrained Powershell Endpoint.
The endpoint is restricted to only access List collection, list users and subsequently force logoff users. The endpoint configuration to only accept users from a certain AD group.
To configure endpoint, run the following code on all connection brokers. The script is somewhat generalized for easy adaptability. The main parts are in the parameters where we configure who can run, using which account and also what cmdlet are available in the constrained session.
<#
.Synopsis
Short description
.DESCRIPTION
.NOTES
Name: Create-JEA-RDS-Endpoint.ps1
Author: Vikingur Saemundsson
Date Created: 2017-11-20
Version History:
2017-11-20 - Vikingur Saemundsson
Initial Creation
Xenit AB
#>
[cmdletbinding()]
Param(
[String]$Name = 'Xenit.JEA.RDS.Servicedesk',
[String]$Path = 'C:\Xenit\RDS\LogoffEndpoint',
[Array]$VisibleCmdlets = $("Get-RDSessionCollection","Get-RDSessionHost","Get-RDUserSession","Invoke-RDUserLogoff","Where-object"),
[String]$AdGroup = 'Servicedesk Ad group',
[Parameter(Mandatory=$true)]
[String]$ServiceAccount,
[Array]$Modules = 'RemoteDesktop',
[String]$Author = 'Vikingur Saemundsson',
[String]$Company = 'Xenit AB'
)
Try{
$ADGroupSID = (Get-ADGroup $AdGroup).SID
If(-not(Test-Path -Path $Path -PathType Container)){
New-Item -Path $Path -ItemType Directory -Force
}
$LockdownScript = @'
Get-Command | Where Visibility -eq 'Public' | ForEach-Object {
if ( $_.Name -notin $CmdsToExclude ) {
$_.Visibility = 'Private'
}
}
'@
'$CmdsToExclude = @("Get-Command", "Out-Default", "Exit-PSSession", "Measure-Object", "Select-Object" , "Get-FormatData"{0})' -f (($VisibleCmdlets | ForEach-Object{",`"$_`""}) -join '') | Out-File "$Path\LockdownScript.ps1"
$LockdownScript | Out-File "$Path\LockdownScript.ps1" -Append
$Modules += 'Microsoft.PowerShell.Core'
$Modules += 'Microsoft.PowerShell.Management'
$Modules += 'Microsoft.PowerShell.Security'
$Modules += 'Microsoft.PowerShell.Utility'
$Modules += 'Microsoft.PowerShell.Diagnostics'
$Modules += 'Microsoft.PowerShell.Host'
$ConfigFileParams = @{
Path ="$Path\$Name.pssc"
ModulesToImport = $Modules
ScriptsToProcess = "$Path\LockdownScript.ps1"
CompanyName = $Company
Author = $Author
Copyright = "(c) $((Get-Date).Year) $Company. All rights reserved."
SessionType = 'Default'
LanguageMode = "ConstrainedLanguage"
ExecutionPolicy = 'Bypass'
}
$SessionConfigParams = @{
RunAsCredential = $ServiceAccount
Name = $Name
Path = $ConfigFileParams.Path
UseSharedProcess = $true
SecurityDescriptorSddl = "O:BAG:DUD:AI(A;;GX;;;$ADGroupSID)"
Confirm = $false
}
If(Get-PSSessionConfiguration -Name $SessionConfigParams.Name -ErrorAction SilentlyContinue){
Unregister-PSSessionConfiguration -Name $SessionConfigParams.Name -Confirm:$false
}
New-PSSessionConfigurationFile @ConfigFileParams
Register-PSSessionConfiguration @SessionConfigParams
}
Catch{
Write-Error $_
}
The frontend application code is not posted in the blog.
