如果没有服务器身份验证证书,请咨询证书管理员。 如果你有 Microsoft 证书服务器,则可以使用 Web 证书模板从中HTTPS://<MyDomainCertificateServer>/certsrv请求证书。 安装证书后,键入以下内容以配置 WINRM 以侦听 HTTPS: 控制台 winrm quickconfig -transport:https ...
如果没有服务器身份验证证书,请咨询证书管理员。 如果你有 Microsoft 证书服务器,则可以使用 Web 证书模板从中HTTPS://<MyDomainCertificateServer>/certsrv请求证书。 安装证书后,键入以下内容以配置 WINRM 以侦听 HTTPS: 控制台 winrm quickconfig -transport:https ...
winrm quickconfig -transport:https The above command enabled HTTPS access using the certificate installed on the host. If you want to use a different certificate, you can create a new HTTPS listener and specify the certificate: winrm create winrm/config/listener?Address=*+Transport=HTT...
Address=*+Transport=HTTPS @{Hostname="host_name";CertificateThumbprint="certificate_thumbprint"}4Test the connection.The following command line contains example syntaxfortesting the connection.winrs-r:https://host_name:port_number-u:user_name-p:password hostname"} 就是创建https证书验证了,如果没有...
指定WinRM 侦听器的协议。 可能的值为:http、https。 属性详细信息 certificateUrl 这是已作为机密上传到密钥保管库的证书的 URL。 若要将机密添加到密钥保管库,请参阅将密钥或机密添加到密钥保管库。 在这种情况下,证书必须是以下 JSON 对象的 Base64 编码,该对象以 UTF-8 编码: ...
This is the URL of a certificate that has been uploaded to Key Vault as a secret. For adding a secret to the Key Vault, see Add a key or secret to the key vault. In this case, your certificate needs to be the Base64 encoding of the following JSON Object
You can use the following PowerShell script to create a cert and enable the WinRM HTTPS listener. Unless you are running windows server 2012 R2 or later, you must install makecert.exe from the Windows SDK, otherwise use New-SelfSignedCertificate.$hostname = $Env:ComputerName C:\"Program ...
You can check which certificate thumbprint a WinRM HTTPS listener is bound to using this command: WinRM e winrm/config/listener The remote host is configured. Now you have to export the SSL certificate to a CER file: Export-Certificate -Cert $srvCert -FilePath c:\PS\SSL_PS_Remoting.cer...
winrm set winrm/config/Listener?Address=*+Transport=HTTPS @{Enabled="false"} Add remote machine to the trusted hosts list (used if your computers aren’t on a domain): winrm set winrm/config/client '@{TrustedHosts="workstation64,server1"}' ...
Syntax winrm OPERATION -remote:VALUE [-unencrypted] [-usessl] [-authentication:VALUE] [-username:USERNAME] [-password:PASSWORD] [-certificate:THUMBPRINT] [-proxyaccess:VALUE] [-proxyauth:VALUE] [-proxyusername:USERNAME] [-proxypassword:PASSWORD] Key: -r[emote]:VALUE Identifier of remote system...