Export (0) Print
Expand All
Expand Minimize

AuthenticationMechanism Enumeration

Defines the types of authentication used to create a PSSession on a computer. This class is introduced in Windows PowerShell 2.0.


Namespace: System.Management.Automation.Runspaces
Assembly: System.Management.Automation (in System.Management.Automation.dll)

'Usage
Dim instance As AuthenticationMechanism

[SuppressMessageAttribute("Microsoft.Naming", "CA1724:TypeNamesShouldNotMatchNamespaces")] 
[SuppressMessageAttribute("Microsoft.Design", "CA1027:MarkEnumsWithFlags")] 
public enum AuthenticationMechanism
/** @attribute SuppressMessageAttribute("Microsoft.Naming", "CA1724:TypeNamesShouldNotMatchNamespaces") */ 
/** @attribute SuppressMessageAttribute("Microsoft.Design", "CA1027:MarkEnumsWithFlags") */ 
public enum AuthenticationMechanism
SuppressMessageAttribute("Microsoft.Naming", "CA1724:TypeNamesShouldNotMatchNamespaces") 
SuppressMessageAttribute("Microsoft.Design", "CA1027:MarkEnumsWithFlags") 
public enum AuthenticationMechanism

Member nameDescription
BasicThe connection is made using Basic authentication. This field is introduced in Windows PowerShell 2.0.
CredsspThe connection is made using Credential Security Service Provider (CredSSP) authentication, which allows the user to delegate credentials. This type of authentication is designed for commands that require a second hop, that is, they run on one computer, but then they connect to other computers to collect data or run additional commands. This field is introduced in Windows PowerShell 2.0.
DefaultThe connection is made using the authentication mechanism specified by the transport being used. In the case of Web Services for Management (WSMan) protocol, either Negotiate or Kerberos is used. This field is introduced in Windows PowerShell 2.0.
DigestThe connection is made using Digest authentication. Digest authentication operates much like Basic authentication. However, unlike Basic authentication, Digest authentication transmits credentials across the network as a hash value, also known as a message digest. The user name and password cannot be deciphered from the hash value. In comparison, Basic authentication sends a Base 64 encoded password, essentially in clear text, across the network. This field is introduced in Windows PowerShell 2.0.
KerberosThe connection is made using Kerberos authentication.
NegotiateThe connection is made using Kerberos or NT LAN Manager (NTLM). The server uses Kerberos to authenticate a domain account and NTLM for local computer accounts. The user name should be specified in the form domain\username for domain users or servername\username for a local users on a server computer. This field is introduced in Windows PowerShell 2.0.
NegotiateWithImplicitCredentialThe connection is made using the credentials cached on the PSSession computer. This field is introduced in Windows PowerShell 2.0.

 

Target Platforms


Show:
© 2015 Microsoft