WINRM authentication

Welcome Forums General PowerShell Q&A WINRM authentication

This topic contains 3 replies, has 4 voices, and was last updated by

 
Keymaster
4 years, 3 months ago.

  • Author
    Posts
  • #17817

    Participant
    Points: 0
    Rank: Member

    Team,
    I connected a remote PC using WINRM. Using Enter-PSSession -cn . Also seen netmon trace & found only SNTP, TCP & HTTP traffic. Can you pls explain how authecation is worked there using those three Protocol? No kerberos/ntlm found. Even I used ISE New remote powershell tab & result is same . Only found SNTP, TCP & HTTP traffic

  • #17818

    Member
    Points: 0
    Rank: Member

    Assuming your traces are complete, the authentication is probably in the packets you've listed as TCP. TCP is a transport-layer protocol that can carry just about any type of application traffic (including HTTP.)

  • #17819

    Participant
    Points: 0
    Rank: Member

    Sounds correct. Kerberos is over TCP as with most other communication really.

    http://wiki.wireshark.org/Kerberos

  • #17820

    Keymaster
    Points: 1,619
    Helping HandTeam Member
    Rank: Community Hero

    And Remoting itself is HTTP. HTTP is entirely capable of carrying authentication information.

The topic ‘WINRM authentication’ is closed to new replies.