-
Notifications
You must be signed in to change notification settings - Fork 232
/
azure.mgmt.compute.v2022_03_01.models.WinRMListener.yml
83 lines (63 loc) · 3.06 KB
/
azure.mgmt.compute.v2022_03_01.models.WinRMListener.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
### YamlMime:PythonClass
uid: azure.mgmt.compute.v2022_03_01.models.WinRMListener
name: WinRMListener
fullName: azure.mgmt.compute.v2022_03_01.models.WinRMListener
module: azure.mgmt.compute.v2022_03_01.models
inheritances:
- azure.mgmt.compute._serialization.Model
summary: Describes Protocol and thumbprint of Windows Remote Management listener.
constructor:
syntax: 'WinRMListener(*, protocol: str | _models.ProtocolTypes | None = None, certificate_url:
str | None = None, **kwargs: Any)'
keywordOnlyParameters:
- name: protocol
description: 'Specifies the protocol of WinRM listener. `<br>``<br>` Possible
values are: `<br>`**http** `<br>``<br>` **https**. Known values are: "Http"
and "Https".'
types:
- <xref:str>
- <xref:azure.mgmt.compute.v2022_03_01.models.ProtocolTypes>
- name: certificate_url
description: 'This is the URL of a certificate that has been uploaded to Key Vault
as a secret. For adding a secret to the Key Vault, see [Add a key or secret
to the key vault](https://docs.microsoft.com/azure/key-vault/key-vault-get-started/#add).
In this case, your
certificate needs to be It is the Base64 encoding of the following JSON Object
which is encoded
in UTF-8: `<br>``<br>` {`<br>`
"data":"`<Base64-encoded-certificate>`",:code:*<br>* "dataType":"pfx",:code:*<br>*
"password":"`<pfx-file-password>`"`<br>`} `<br>` To install certificates on
a
virtual machine it is recommended to use the [Azure Key Vault virtual machine
extension for
Linux](https://docs.microsoft.com/azure/virtual-machines/extensions/key-vault-linux)
or the
[Azure Key Vault virtual machine extension for Windows](https://docs.microsoft.com/azure/virtual-machines/extensions/key-vault-windows).'
types:
- <xref:str>
variables:
- description: 'Specifies the protocol of WinRM listener. `<br>``<br>` Possible
values are: `<br>`**http** `<br>``<br>` **https**. Known values are: "Http"
and "Https".'
name: protocol
types:
- <xref:str>
- <xref:azure.mgmt.compute.v2022_03_01.models.ProtocolTypes>
- description: 'This is the URL of a certificate that has been uploaded to Key Vault
as
a secret. For adding a secret to the Key Vault, see [Add a key or secret to the
key vault](https://docs.microsoft.com/azure/key-vault/key-vault-get-started/#add).
In this case, your
certificate needs to be It is the Base64 encoding of the following JSON Object
which is encoded
in UTF-8: `<br>``<br>` {`<br>`
"data":"`<Base64-encoded-certificate>`",:code:*<br>* "dataType":"pfx",:code:*<br>*
"password":"`<pfx-file-password>`"`<br>`} `<br>` To install certificates on a
virtual machine it is recommended to use the [Azure Key Vault virtual machine
extension for
Linux](https://docs.microsoft.com/azure/virtual-machines/extensions/key-vault-linux)
or the
[Azure Key Vault virtual machine extension for Windows](https://docs.microsoft.com/azure/virtual-machines/extensions/key-vault-windows).'
name: certificate_url
types:
- <xref:str>