Chapter 13. Remoting: configuring applications and services

 

This chapter covers:

  • 13.1 Remoting infrastructure in depth
  • 13.2 Building custom remoting services
  • 13.3 Summary

He who is outside his door already has a hard part of his journey behind him.

Dutch proverb

In chapter 12, we explained how you can use PowerShell’s remoting capabilities to monitor and manage remote computers. Now we’re going to switch from service consumer to remote service/application creator. Our goal is that, by the end of this chapter, you’ll be able to build your own custom remoting services with PowerShell. But before you can start building those services, we need to look at some additional background material.

Our first topic is how PowerShell remoting works. We’ll pay special attention to Web Services for Management (WSMan) and see how it fits into this infrastructure. You’ll learn how to manage the Windows WSMan implementation using cmdlets and the WSMan provider. This material will help you to understand and debug issues in the infrastructure.

If you want your services to be usable, among other aspects you need to be sure that they’re secure and reliable. Among the factors related to security that you must take into account are authentication (who’s connecting to the service) and authorization (what they’re allowed to do).

13.1. Remoting Infrastructure in Depth

13.2. Building Custom Remoting Services

13.3. Summary