You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> The `UseTestCertificate` parameter should only be used in a private test environment. For a
199
200
> secure production environment, we recommend using a valid certificate that has been signed by
200
201
> a CA.
@@ -221,8 +222,9 @@ the Secure Sockets Layer (SSL) certificate.
221
222
222
223
> [!NOTE]
223
224
> You cannot sign in until users have been granted access to the website by adding authorization
224
-
> rules. For more information, see [configure a restrictive authorization rule](#configure-a-restrictive-authorization-rule)
225
-
> and [Authorization Rules and Security Features of Windows PowerShell Web Access](authorization-rules-and-security-features-of-windows-powershell-web-access.md).
225
+
> rules. For more information, see
226
+
> [configure a restrictive authorization rule](#configure-a-restrictive-authorization-rule) and
227
+
> [Authorization Rules and Security Features of Windows PowerShell Web Access](authorization-rules-and-security-features-of-windows-powershell-web-access.md).
226
228
227
229
#### To configure the Windows PowerShell Web Access gateway with a genuine certificate by using Install-PswaWebApplication and IIS Manager
228
230
@@ -273,8 +275,10 @@ the Secure Sockets Layer (SSL) certificate.
273
275
274
276
> [!NOTE]
275
277
> You cannot sign in until users have been granted access to the website by adding authorization
276
-
> rules. For more information, see [Configure a restrictive authorization rule](#configure-a-restrictive-authorization-rule),
277
-
> in this topic, and [Authorization Rules and Security Features of Windows PowerShell Web Access](authorization-rules-and-security-features-of-windows-powershell-web-access.md).
278
+
> rules. For more information, see
279
+
> [Configure a restrictive authorization rule](#configure-a-restrictive-authorization-rule), in
280
+
> this topic, and
281
+
> [Authorization Rules and Security Features of Windows PowerShell Web Access](authorization-rules-and-security-features-of-windows-powershell-web-access.md).
278
282
279
283
### Configure a restrictive authorization rule
280
284
@@ -336,7 +340,8 @@ gateway in IIS Manager.
336
340
1. If Server Manager is already open, go on to the next step. If Server Manager is not already
337
341
open, open it by doing one of the following.
338
342
339
-
- On the Windows desktop, start Server Manager by clicking **Server Manager** in the Windows taskbar.
343
+
- On the Windows desktop, start Server Manager by clicking **Server Manager** in the Windows
344
+
taskbar.
340
345
- On the Windows **Start** screen, click **Server Manager**.
341
346
342
347
2. On the **Manage** menu, click **Add Roles and Features**.
@@ -418,7 +423,7 @@ gateway as a root website.
418
423
[To configure an SSL certificate in IIS Manager](#to-configure-an-ssl-certificate-in-iis-manager)
With the website selected in the tree pane, double-click **SSL Settings** in the content pane.
424
429
Select **Require SSL**, and then in the **Actions** pane, click **Apply**. Optionally, in the
@@ -536,9 +541,11 @@ gateway as a root website.
536
541
`https://<gateway_server_name>`. You should not need to add **/pswa** to the URL.
537
542
538
543
> [!NOTE]
539
-
> You cannot sign in until users have been granted access to the website
540
-
> by adding authorization rules. For more information, see [Configure a restrictive authorization rule](#configure-a-restrictive-authorization-rule),
541
-
> in this topic, and [Authorization Rules and Security Features of Windows PowerShell Web Access](authorization-rules-and-security-features-of-windows-powershell-web-access.md).
544
+
> You cannot sign in until users have been granted access to the website by adding authorization
545
+
> rules. For more information, see
546
+
> [Configure a restrictive authorization rule](#configure-a-restrictive-authorization-rule), in
547
+
> this topic, and
548
+
> [Authorization Rules and Security Features of Windows PowerShell Web Access](authorization-rules-and-security-features-of-windows-powershell-web-access.md).
542
549
543
550
### Configuring a restrictive authorization rule
544
551
@@ -562,7 +569,7 @@ For more detail about Windows PowerShell Web Access authorization rules and secu
562
569
- On the Windows **Start** screen, right-click **Windows PowerShell**, and then click
563
570
**Run as Administrator**.
564
571
565
-
1.Optional step for restricting user access by using session configurations:
572
+
1. Optional step for restricting user access by using session configurations:
566
573
567
574
Verify that session configurations that you want to use in your rules already exist. If they
568
575
have not yet been created, use instructions for creating session configurations in
@@ -574,7 +581,7 @@ For more detail about Windows PowerShell Web Access authorization rules and secu
574
581
575
582
This authorization rule allows a specific user access to one computer on the network to which
576
583
they typically have access, with access to a specific session configuration that is scoped to
577
-
the user'™s typical scripting and cmdlet needs.
584
+
the user'™s typical scripting and cmdlet needs.
578
585
579
586
In the following example, a user named `JSmith` in the `Contoso` domain is granted access to
580
587
manage the computer `Contoso_214`, and use a session configuration named `NewAdminsOnly`.
@@ -611,9 +618,9 @@ valid SSL certificate from a CA.
611
618
[GeoTrust](https://www.geotrust.com/). The certificate's common name must match the host header
612
619
in the request.
613
620
614
-
For example, if the client browser requests `http://www.contoso.com/`, then the common name must
615
-
also be `http://www.contoso.com/`. This is the most secure and recommended option for providing
616
-
the Windows PowerShell Web Access gateway with a certificate.
621
+
For example, if the client browser requests `http://www.contoso.com/`, then the common name
622
+
must also be `http://www.contoso.com/`. This is the most secure and recommended option for
623
+
providing the Windows PowerShell Web Access gateway with a certificate.
617
624
618
625
- Click **Create a Self-Signed Certificate** to create a certificate that you can use
619
626
immediately, and have signed later by a CA if desired. Specify a friendly name for the
0 commit comments