brooklyn-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bostko <...@git.apache.org>
Subject [GitHub] brooklyn-docs pull request: Details about using CredSSP in Windows
Date Sat, 26 Mar 2016 00:19:07 GMT
Github user bostko commented on a diff in the pull request:

    https://github.com/apache/brooklyn-docs/pull/36#discussion_r57504722
  
    --- Diff: guide/yaml/winrm/index.md ---
    @@ -289,11 +289,24 @@ When a script is run over WinRM, the credentials under which the
script are run
     solution is to obtain a new set of credentials within the script and use those credentials
to 
     required commands.
     
    -Certain Windows registry keys must be reconfigured in order to support re-authentication.
For 
    -clouds that support an init script, Brooklyn can take care of this at instance boot time,
as part 
    -of the setup script. For clouds where an init script is not (currently) supported, such
as Azure, 
    -it is assumed that the VM is already correctly configured. Please ensure that Brooklyn's
changes 
    -are compatible with your organisation's security policy.
    +The WinRM client uses Negotiate+NTLM to authenticate against the machine.
    +This mechanism applies certain restrictions to executing commands on the windows host.
    +
    +For this reason you should enable CredSSP on the windows host which grants all privileges
available to the user.
    + https://technet.microsoft.com/en-us/library/hh849719.aspx#sectionSection4
    +
    +To use `Invoke-Command -Authentication CredSSP` the Windows Machine has to have:
    +- Up and running WinRM over http
    --- End diff --
    
    I am saying that is must have http enabled.


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastructure@apache.org or file a JIRA ticket
with INFRA.
---

Mime
View raw message