Connecting to remote server failed with the following error message : The WinRM client cannot process the
request. If the authentication scheme is different from Kerberos, or if the client computer is not joined to a domain,
then HTTPS transport must be used or the destination machine must be added to the TrustedHosts configuration setting.
Use winrm.cmd to configure TrustedHosts. Note that computers in the TrustedHosts list might not be authenticated. You c
an get more information about that by running the following command: winrm help config. For more information, see the
about_Remote_Troubleshooting Help topic.
+ CategoryInfo : OpenError: (:) [], PSRemotingTransportException
+ FullyQualifiedErrorId : PSSessionStateBroken
打开 gpedit.msc,原文在这里
http://dustinhatch.tumblr.com/post/24589312635/enable-powershell-remoting-with-credssp-using-group
Windows PowerShell 2.0 has significantly improved the command-line experience for Windows administration, both for servers and clients. What makes it even better, though, is PowerShell Remoting, which uses Windows Remote Management (WinRM) to send commands between PowerShell sessions on different computers. WinRM is an implementation of WS-Management, an open, standardized SOAP-based web services protocol. In many ways, PowerShell Remoting is similar to SSH, although arguably less mature.
Manual Configuration
Enable PowerShell Remoting Manually
Enabling PowerShell 2.0 Remoting is simple, just run the following command from an elevated PowerShell session:
Enable-PSRemoting -Force
Once that’s done, you can start using it to execute PowerShell commands from a remote host:
Invoke-Command -ComputerName $remotehost -Command { Write-Host "Hello, world!" }
Or, you can open an interactive session on the remote computer:
Enter-PSSession -ComputerName $remotehost
Enable CredSSP Manually
CredSSP is a Security Support Provider introduced with Windows Vista that enables credential delegation. In other words, it allows the remote host to access the credentials that were used to authenticate the user, and pass them on to a third host. For example, when using either basic or Kerberos authentication (the default) when connecting to a remote PowerShell session, the user would not have access to a separate file server. When using CredSSP, however, the session credentials can be passed through to the file server.
To enable