-
Notifications
You must be signed in to change notification settings - Fork 0
/
New-UsersFromCSV.ps1
121 lines (95 loc) · 5.04 KB
/
New-UsersFromCSV.ps1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
$csv = Import-CSV "C:\Users\testo\Desktop\_.txt" -Delimiter "`t"
[Reflection.Assembly]::LoadWithPartialName("System.Web")
# Create OU's and dept's
$departments = New-Object System.Collections.ArrayList
$region = $csv[0].Region
if (!(test-path "AD:\OU=$region,OU=Access,OU=SibGroups,DC=xxx,DC=xxx"))
{New-ADOrganizationalUnit -Name $region -Path "OU=Access,OU=SibGroups,DC=xxx,DC=xxx"}
foreach ($_ in $csv) {
[void]$departments.add($_.department)
if ($_.Department.Length -ge 64) {
$_.Department = $_.Department.Substring(0,64)
}
if (!(test-path "AD:\OU=$region,OU=StaffRegions,OU=SibUsers,DC=xxx,DC=xxx"))
{New-ADOrganizationalUnit -Name $region -Path "OU=StaffRegions,OU=SibUsers,DC=xxx,DC=xxx"}
if (!(test-path "AD:\OU=$($_.City),OU=$region,OU=StaffRegions,OU=SibUsers,DC=xxx,DC=xxx"))
{New-ADOrganizationalUnit -Name $_.City -Path "OU=$region,OU=StaffRegions,OU=SibUsers,DC=xxx,DC=xxx"}
if (!(test-path "AD:\OU=$($_.Department),OU=$($_.City),OU=$region,OU=StaffRegions,OU=SibUsers,DC=xxx,DC=xxx"))
{New-ADOrganizationalUnit -Name $_.Department -Path "OU=$($_.City),OU=$region,OU=StaffRegions,OU=SibUsers,DC=xxx,DC=xxx"}
}
$departmentsunique = $departments | select -Unique
#region Creating Users
# Create User
foreach ($_ in $csv) {
if ($_.Department.Length -ge 64) {
$_.Department = $_.Department.Substring(0,64)
}
[string]$password = $null
[string]$path = "OU=$($_.Department),OU=$($_.City),OU=$region,OU=StaffRegions,OU=SibUsers,DC=xxx,DC=xxx"
$ADuser = Get-ADUser -Filter "sAMAccountName -eq '$($_.SamAccountName)'"
$pattern = "^(?=.*[^a-zA-Z])(?=.*[a-z])(?=.*[A-Z])\S{8,}$"
while (!($password -match $pattern)) {
$password = [System.Web.Security.Membership]::GeneratePassword(9,2)
}
$args = @{
DisplayName = $_.DisplayName
GivenName = $_.GivenName
Surname = $_.sn
SamAccountName = $_.SamAccountName
UserPrincipalName = $($_.SamAccountName + "@xxx.xxx")
Department = $_.Department
Title = $_.Title
City = $_.City
Office = $_.Office
MobilePhone = $_.MobilePhone
OfficePhone = $_.telephoneNumber
Name = $_.DisplayName
Company = "xxx"
Path = $path
State = $region
}
if ($ADuser) {
"$(Get-Date -Format hh:mm:ss)[error]: User exists $ADUser" | Out-File c:\log.txt -Append
}
else {
Try {
New-ADUser @args -PassThru | ForEach-Object {
$_ | Set-ADAccountPassword -Reset -NewPassword (ConvertTo-SecureString -Force -AsPlainText $password )
$_ | Enable-ADAccount
"$(Get-Date -Format hh:mm:ss): $($_.samaccountname) with $password created" | Out-File c:\log.txt -Append
}}
Catch {
"$(Get-Date -Format hh:mm:ss)[error]: Failed creating user $($_.TargetObject)" | Out-File c:\log.txt -Append
}}}
# Add Manager
foreach ($_ in $csv) {
Get-ADUser $_.samaccountname | Set-ADUser -Manager $(Get-ADUser -Filter "Name -eq '$($_.manager)'" -ea 0)
}
#endregion
#region Creating and Populating Groups
# Create Groups
New-ADGroup -Name "$region" -SamAccountName "$region" -GroupScope Global -GroupCategory Security -Path "OU=Role,OU=SibGroups,DC=xxx,DC=xxx"
$pathgrp = "OU=$region,OU=Access,OU=SibGroups,DC=xxx,DC=xxx"
foreach ($department in $departmentsunique) {
$groupshortname = $null
[regex]::Matches($department, '\b[а-я]', 'IgnoreCase') | % { $groupshortname += $_.Value }
$groupname = $region + '_' + $groupshortname
New-ADGroup -Name $groupname -DisplayName $("$region $department") -GroupScope Global -GroupCategory Security -Path "OU=Role,OU=SibGroups,DC=xxx,DC=xxx"
New-ADGroup -Name $("FS_G_" + $groupname + "_LS") -DisplayName $("FS_G_" + $region + $department + "_LS") -GroupScope DomainLocal -GroupCategory Security -Path $pathgrp
New-ADGroup -Name $("FS_G_" + $groupname + "_RO") -DisplayName $("FS_G_" + $region + $department + "_RO") -GroupScope DomainLocal -GroupCategory Security -Path $pathgrp
New-ADGroup -Name $("FS_G_" + $groupname + "_WR") -DisplayName $("FS_G_" + $region + $department + "_WR") -GroupScope DomainLocal -GroupCategory Security -Path $pathgrp
Add-ADPrincipalGroupMembership -Identity $("FS_G_" + $groupname + "_RO") -MemberOf $("FS_G_" + $groupname + "_LS")
Add-ADPrincipalGroupMembership -Identity $("FS_G_" + $groupname + "_WR") -MemberOf $("FS_G_" + $groupname + "_LS")
Add-ADPrincipalGroupMembership -Identity $("FS_G_" + $groupname + "_WR") -MemberOf $("FS_G_" + $groupname + "_RO")
Add-ADPrincipalGroupMembership -Identity $groupname -MemberOf $("FS_G_" + $groupname + '_WR')
}
#Assign Users to Groups
foreach ($_ in $csv) {
$groupshortname = $null
[regex]::Matches($department, '\b[а-я]', 'IgnoreCase') | % { $groupshortname += $_.Value }
$user = Get-ADUser -Filter "sAMAccountName -eq '$($_.SamAccountName)'"
$group = Get-ADGroup -Filter "sAMAccountName -eq '$($region + '_' + $groupshortname)'"
Add-ADGroupMember $group –Member $user
Add-ADGroupMember $region -Member $user
}
#endregion