Expiring Group Memberships
As a systems administrator working with Active Directory your probably proficient in granting access to network resources. How good are you at removing permissions once the access is no longer needed? Probably not as good. Enter Expiring Group Membership in Active Directory. You can specify how long an object belongs in a group. Active Directory handles the removal for you.
To use Expiring Group Memberships, make sure that the feature is enabled in your forest. This is a feature added in Server 2016 and is not on by default.
## If Enabled EnabledScopes
## won't be empty
$Forest = Get-ADForest
Get-ADOptionalFeature -Identity 'Privileged Access Management Feature'
## Enable Privileged Access
$enableADOptionalFeatureSplat = @{
Scope = 'ForestOrConfigurationSet'
Target = $Forest
Identity = 'Privileged Access Management Feature'
}
Enable-ADOptionalFeature @enableADOptionalFeatureSplat
Existing groups should work but if you don’t have one, create a group now.
$newADGroupSplat = @{
GroupCategory = 'Security'
DisplayName = "Temporary Membership"
GroupScope = 'Global'
Name = 'TempGroup'
}
New-ADGroup @newADGroupSplat
Now add the membership using the MemberTimeToLive parameter.
$addADGroupMemberSplat = @{
Members = 'ngetchell'
MemberTimeToLive = ( New-Timespan -Days 365)
Identity = 'TempGroup'
}
Add-ADGroupMember @addADGroupMemberSplat
Expiring Membership Report
Now to generate a report to show off a members and their membership timespan. You could even pipe to Excel if you’d prefer.
Get-ADGroup -Identity TempGroup -ShowMemberTimeToLive -Properties members |
Select-Object -ExpandProperty members |
ForEach-Object {
if ( $_ -match '<TTL=' ) {
$ttlstring, $DN = $_ -split '>'
[int]$ttl = $ttlstring -replace '<TTL='
$Timespan = New-Timespan -Seconds $ttl
[pscustomobject]@{
MemberDN = $DN -replace "^,", ""
TTL = $Timespan
ExpiryDate = $((Get-Date).Add($Timespan))
}
}
else {
[pscustomobject]@{
MemberDN = $_
TTL = 0
ExpiryDate = 0
}
}
} | Export-Excel -Path ~\Desktop\ExpiringGroupMembers.xlsx