Skip to content

https communication between winrm service and wsman terminal client

Klaus Kämpf edited this page Jun 3, 2015 · 1 revision

Provided by emilbart@gmail.com

  1. Configure WinRm service on Windows machine.
  2. Read thumbprint from from the Certificate (in MMC double-click on the desired certificate, then choose the Details tab in the Certificate property page and select the Thumbprint field).
  3. Create HTTPS Listener Instance
winrm create winrm/config/Listener?Address=*+Transport=HTTPS @{Hostname="server.openwsman.com";CertificateThumbprint="b8a584ad2e5852c6fcdfb0922a5795c0d8552435"}

where:

  • IP is the TCP/IP address of the Listener system.
  • Port is the TCP/IP port that the Listener is to listen to requests on.
  • Hostname is the name of the system as it appears in the Certificate.
  • CertificateThumbprint is the thumbprint copied from the Certificates MMC Snap-in from the previous section. Note that you must remove the spaces from between the two-digit hex values in the thumbprint as it appears in the Certificate dialog box.

To list listeners: winrm enumerate winrm/config/listener

Test connection from Linux machine:
$ wsman enumerate -h server.openwsman.com --port 5986 --cacert=hostname.pem --username wsman -p secret -d 6 --auth basic http://schemas.microsoft.com/wbem/wsman/1/wmi/root/cimv2/Win32_PerfRawData_PerfOS_Memory

If you don't want to verify server certificate add -V option.