First, ensure that the network requirements are in place for this PowerShell host:
- DNS record must be correct for the hostname contacted
- Ensure the port 5985 / 5986 is open from Orchestrator to the PowerShell host
- Ensure the PowerShell host is powered on and responding
- Ensure that HTTP or HTTPS traffic is permitted for this connection, as appropriate
Workaround:
To change the configuration of WinRM to allow encrypted traffic:
-
Run this command to set the default WinRM configuration values.
c:\> winrm quickconfig
-
You can run this optional command to check whether a listener is running and verify the default ports:
c:\> winrm e winrm/config/listener
Note: The default ports are 5985 for HTTP and 5986 for HTTPS.
-
Enable basic authentication on the WinRM service:
-
Run this command to check whether basic authentication is allowed:
c:\> winrm get winrm/config
-
Run this command to enable basic authentication:
c:\> winrm set winrm/config/service/auth '@{Basic="true"}'
-
Run this command to allow transfer of unencrypted data on the WinRM service:
c:\> winrm set winrm/config/service '@{AllowUnencrypted="true"}'
-
Enable basic authentication on the WinRM client:
-
Run this command to check whether basic authentication is allowed:
c:\> winrm get winrm/config
-
Run the following command to enable basic authentication:
c:\> winrm set winrm/config/client/auth '@{Basic="true"}'
-
Run this command to allow transfer of unencrypted data on the WinRM client:
c:\> winrm set winrm/config/client '@{AllowUnencrypted="true"}'
-
If the WinRM host machine is in an external domain, run this command to specify the trusted
hosts:
c:\> winrm set winrm/config/client '@{TrustedHosts="host1, host2, host3"}'
-
Run this command to test the connection to the WinRM service:
c:\> winrm identify -r:http://winrm_server:5985 -auth:basic -u:user_name -p:password -
encoding:utf-8
Note: For more information to resolve this using HTTPS authentication, see
Configuring WinRM