IIRC, each named configuration has a discrete HTTP URL, and at least for JEA (which is the recommended method), it's PSRP-only. Jordan's got a PSRP layer prototyped for pywinrm that we'll likely be merging soon, so the protocol end of things is getting workable, it's just a matter of how to sanely lock down the module stuff. My early experiments with PSRP a long time ago showed that it'd be quite a bit slower than naked WinRM, too, so we'd probably want to keep both options available unless we do some fancier connection pooling or something to cut down on the extra PSRP chatter.
I've been kicking around a couple of ideas on how we might be able to enable JEA sanely. The one I like the best is to build a tool that can either wrap Ansible modules directly in a rolecap PS module, or define a custom rolecap executor function that includes a list of "allowed" modules (which would need to be code-signed by Ansible or the org). In the second case, the executor runs in the unrestricted context, so would verify that the module is on the list and that the signature is valid (ie, the module code hasn't been hacked by the caller), then run it. I like the second option better, since it'd better allow for upgrades of Ansible without updating the rolecap stuff, but securely implementing code-signing on modules in an open-source project is a big ball of wax.
Anyway, plenty of discussion to have here in the coming months...
-Matt