Windows xp remote installation service




















This value represents a string of two-digit hexadecimal values found in the Thumbprint field of the certificate. This string contains the SHA-1 hash of the certificate.

Certificates are used in client certificate-based authentication. Certificates can be mapped only to local user accounts, and they do not work with domain accounts. Specifies the IPv4 and IPv6 addresses that the listener uses. For example: " The following list describes the available configuration settings. The default is kilobytes. The behavior is unsupported if MaxEnvelopeSizekb is set to a value greater than Specifies the maximum time-out, in milliseconds, that can be used for any request other than Pull requests.

The default is Specifies the maximum number of elements that can be used in a Pull response. Specifies the maximum number of concurrent requests that are allowed by the service. Specifies the extra time in milliseconds that the client computer waits to accommodate for network delay time. The default is milliseconds. Allows the client computer to request unencrypted traffic. By default, the client computer requires encrypted network traffic and this setting is False.

Allows the client computer to use Basic authentication. Basic authentication is a scheme in which the user name and password are sent in clear text to the server or proxy. This method is the least secure method of authentication. The default is True. Allows the client to use Digest authentication. Digest authentication is a challenge-response scheme that uses a server-specified data string for the challenge.

Only the client computer can initiate a Digest authentication request. The client computer sends a request to the server to authenticate, and receives a token string from the server.

Then the client computer sends the resource request, including the user name and a cryptographic hash of the password combined with the token string. Allows the client to use client certificate-based authentication. Certificate-based authentication is a scheme in which the server authenticates a client identified by an X certificate. Allows the client to use Kerberos authentication. Kerberos authentication is a scheme in which the client and server mutually authenticate by using Kerberos certificates.

Allows the client to use Negotiate authentication. Negotiate authentication is a scheme in which the client sends a request to the server to authenticate. The Kerberos protocol is selected to authenticate a domain account, and NTLM is selected for local computer accounts. CredSSP enables an application to delegate the user's credentials from the client computer to the target server. The default is False. Specifies the list of remote computers that are trusted.

Other computers in a workgroup or computers in a different domain should be added to this list. The computers in the TrustedHosts list are not authenticated. The client may send credential information to these computers. For more info about how to add computers to the TrustedHosts list, type winrm help config. Visit one. Best Remote Desktop Software.

Remote Desktop Connection Manager. All rights reserved. All trademarks displayed on this web site are the exclusive property of the respective holders. Sign up here. Did you find this article about CRM helpful? Share the wealth! Comodo One Products. Connect with Comodo:.

Microsoft Shared source. Explore Wikis Community Central. Register Don't have an account? Remote Installation Services. View source. History Talk 0. Categories Windows components. Universal Conquest Wiki.



0コメント

  • 1000 / 1000