Chapter 27. Setting up constrained remoting endpoints

The ability to create constrained endpoints has existed since PowerShell v2, but PowerShell v3 makes them easier to create and makes them an effective way to set up delegated administration capabilities within your environment. We’ll walk you through the complete process of creating and configuring these and give you some ideas for how you might utilize them in your own organization.

27.1. Refresher: Remoting architecture

Figure 27.1 provides a quick overview of PowerShell’s Remoting architecture. You use the Web Services for Management (WS-MAN) protocol to communicate between computers (or even between two services on the same computer). WS-MAN utilizes either HTTP or HTTPS, with HTTP ...

Get Learn PowerShell Toolmaking in a Month of Lunches now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.