When you add a certificate store in Keyfactor Command using an extension from Keyfactor‘s GitHub that relies on WinRM, you are given the option to choose whether to secure the channel to the target hosting the certificate store with . If you select True, Microsoft Windows Remote Management (WinRM) on the target needs to be running on HTTPS and to have been configured with a certificate for WinRM. If you select False, WinRM on the target needs to be running on HTTP. By default, WinRM HTTP uses port 5985 and WinRM HTTPS uses port 5986. WinRM HTTPS is not enabled out-of-the box.
Make sure that any firewalls between the Universal Orchestrator, Keyfactor Command, and the remote target allow communications over port TCP 5985 or 5986, depending on your SSL selection, or the alternate port you've configured for WinRM on the target if you're not using the default WinRM port(s).
You can use the Test-WSMan and Test-netConnection PowerShell cmdlets on the Universal Orchestrator to validate that communication can occur between the Universal Orchestrator and the remote target in the manner you are intending to configure it (SSL or not SSL). For example, for SSL using the default port (where websrvr38.keyexample.com is your remote target):
Test-netConnection -ComputerName "websrvr38.keyexample.com" -port 5986
Output from this command should look something like this if the connection completes successfully:
ComputerName : websrvr38.keyexample.com
RemoteAddress : 192.168.216.38
RemotePort : 5986
InterfaceAlias : Ethernet0
SourceAddress : 192.168.216.42
TcpTestSucceeded : True
And:
Test-WSMan -ComputerName websrvr38.keyexample.com -UseSSL
Output from this command should look something like this if the connection completes successfully:
wsmid : http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd
ProtocolVersion : http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd
ProductVendor : Microsoft Corporation
ProductVersion : OS: 0.0.0 SP: 0.0 Stack: 3.0
On the remote target, you can use the following WinRM command to check the configuration of WinRM , whether it has been configured to support HTTPS, whether it has a certificate configured for HTTPS, and the ports in use:
winrm enumerate winrm/config/listener
Output from this command should look something like this if both HTTP and HTTPS are configured for WinRM (notice the port for HTTPS and the certificate thumbprint indicating a certificate has been configured for WinRM on HTTPS):
Listener
Address = *
Transport = HTTP
Port = 5985
Hostname
Enabled = true
URLPrefix = wsman
CertificateThumbprint
ListeningOn = 192.168.216.42, 127.0.0.1, ::1, fe80::21e1:ab7e:9c35:5550%3
Listener
Address = *
Transport = HTTPS
Port = 5986
Hostname = websrvr42.keyexample.com
Enabled = true
URLPrefix = wsman
CertificateThumbprint = 79ee047d673da83cea87ba779761b0ec2b9217f8
ListeningOn = 192.168.216.42, 127.0.0.1, ::1, fe80::21e1:ab7e:9c35:5550%3
For troubleshooting help, see Remote Management Helpful Tools. For more information about configuring WinRM for HTTPS, see: