pki-polaris

Certificate Expiry Monitoring Dashboard using PowerShell

Certificate Expiry Monitoring DashBoard

Polaris is a micro-framework to build the Wep API/s; similar like Flash (Python) but Polaris is having very minimum feathers & that is worked with PowerShell. Polaris Page can be restricted by Active Directory security group & APIs can be publish using SSL for security .

Use case

Solution implementation time

Prerequisites

Description

Implementation Instruction

mkdir c:\temp
cd C:\temp\
git clone https://github.com/21bshwjt/pki-polaris.git
mkdir C:\WebApi\Logs
Copy-Item C:\temp\pki-polaris\* -Recurse C:\WebApi\ -Force -Verbose
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force
Install-Module -Name Polaris -AllowClobber -Force
Install-Module -Name PSWriteHTML -AllowClobber -Force

There are three codes those are created the Dashboard sucessfully . Those are under ‘routes’ , ‘subroutes’ & ‘build-apicache’ folders.

mainpol.ps1 will run the API & that is the only file that needs to be running by Windows Service or Scheduled tasks. Remaining files will be called during the runtime by mainpol.ps1. Use VSCode or ISE for testing . Create Windows Service associated with mainpol.ps1 once all are going good.

[routes]

[subroutes]

Certificate names are missing into the above screenshot because of those are default published Certificates without having Subject name. That will be not the case when new template will be created.

[build-apicache]

How to Test the APIs ?

API Port

Enable SSL

Test the SSL enabled API using PowerShell from the local server.

Troubleshooting on API

Path   : /home
Method : GET

Path   : /certexpiry
Method : GET

Path   : /employees
Method : GET

Path   : /json_payload
Method : GET

Path   : /domaincontroller
Method : GET

JSON Payload


+ Please share your comments & feedbacks.