Preparing Windows servers / workstations for run command operations via account set access request
The (agtnt
) connector can execute remote PowerShell scripts via an account set access check-out on a Windows server or workstation. Additional preparation is required on both the Bravura Security Fabric and the Windows target system, as described in this section.
Bravura Security Fabric server
To prepare the Bravura Security Fabric server, execute the following PowerShell commands on the server:
Note
Ensure you launch Windows PowerShell as an Administrator.
Ensure the Windows Remote Management service (WinRM) is running:
start-service winrm
Set the execution policy and permissions.
Set-ExecutionPolicy RemoteSigned -Force Set-Item wsman:\\localhost\\Client\\TrustedHosts -value *
Windows server /workstation target system
To prepare the Windows NT target:
Ensure the network connection type is set to either Domain or Private.
Execute the following PowerShell commands on the target.
Note
Ensure you launch Windows PowerShell as an Administrator.
Ensure the Windows Remote Management service is running:
start-service winrm
Allow remote administration:
Enable-PSRemoting -Force
Troubleshooting
If the connector returns an Access Denied error message when a user attempts to run a command from Bravura Security Fabric , you need to grant the account running the commands "Execute Methods" in Windows WMI.
If you receive the error message 0x80004027-CO_E_CLASS_DISABLED see the following: