-
Notifications
You must be signed in to change notification settings - Fork 52
https communication between winrm service and wsman terminal client
Klaus Kämpf edited this page Jun 3, 2015
·
1 revision
Provided by emilbart@gmail.com
- Configure
WinRm
service on Windows machine. - Read thumbprint from from the Certificate (in MMC double-click on the desired certificate, then choose the Details tab in the Certificate property page and select the Thumbprint field).
- Create HTTPS Listener Instance
winrm create winrm/config/Listener?Address=*+Transport=HTTPS @{Hostname="server.openwsman.com";CertificateThumbprint="b8a584ad2e5852c6fcdfb0922a5795c0d8552435"}
where:
- IP is the TCP/IP address of the Listener system.
- Port is the TCP/IP port that the Listener is to listen to requests on.
- Hostname is the name of the system as it appears in the Certificate.
- CertificateThumbprint is the thumbprint copied from the Certificates MMC Snap-in from the previous section. Note that you must remove the spaces from between the two-digit hex values in the thumbprint as it appears in the Certificate dialog box.
To list listeners: winrm enumerate winrm/config/listener
$ wsman enumerate -h server.openwsman.com --port 5986 --cacert=hostname.pem --username wsman -p secret -d 6 --auth basic http://schemas.microsoft.com/wbem/wsman/1/wmi/root/cimv2/Win32_PerfRawData_PerfOS_Memory
If you don't want to verify server certificate add -V
option.