Madness.
WinRM does session-level encryption using Kerberos in a domain environment unless you force it to use “basic” authentication and specifically set “AllowUnencrypted = true”.
Adding the SSL layer just adds overhead for extremely little benefit.
But to answer your question – you generate a SSL key for computers the same way you do it for users. Via GPO. Just in the computer section of the policy instead of the user section of the policy. There is a default Computer template in your CA, although I strongly recommend you modify it and turn off the “supply subject in request” and turn on “acquire subject from AD”.
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
ntsysadmin+...@googlegroups.com.
To view this discussion visit
https://groups.google.com/d/msgid/ntsysadmin/CAHBr%2B%2BgLH%2BznzAU9%2BFt2UOHHFJDjpL%2B5hxFNFdrwHQQSMSkarg%40mail.gmail.com.