Skip to main content

WinRM Node Execution

WinRM Node Execution

These plugins are only applicable to Process Automation deployments on Windows Servers.

There are two plugins:

  • WinRM File Copier: Copies files to the remote node for execution by the Node Executor. This plugin would be used to execute any Script steps in your workflows, or to copy your own files stored on the Process Automation host.
  • WinRM Node Executor Python: Executes the command and script steps.

The plugins can be enabled in the Project Configuration page by selecting the WinRM Node Executor Python and WinRM File Copier as the default Node Executor and File Copiers.

Authentication Types

Authentication can happen in two ways, via trusted domain account or by username and password.

Hosts in Trusted Domain

When all hosts are in a trusted domain, remote execution requires just the username to access the remote hosts. Authentication will be made to the remote nodes as the domain user account that is executing the Rundeck server process.

Username and Password

If all hosts are not in a trusted domain, both username and password are required to access the remote hosts.

Plugin Configuration

Trusted Domain authentication will be used by default, unless a username and password are configured to be used.

You can configure the plugins to use a password via the Key Storage facility when accessing remote hosts.

  • password storage - using a password that is stored in the Key Storage facility.

You can configure the username and password or password storage path at a project-wide level, on a per-node basis or upon job execution.

To pass the credentials upon job execution, it is required for the job to have the following job options:

  • username: to override the username defined in Project or Node settings.
  • winrmpassword: to overrise the password defined in the Project or Node settings. This should be using 'Secure 'Input Type.

Password Storage

Passwords can be stored securely in the Process Automation Keystore facility. These passwords can be stored in a tree like structure to help you organize them any way you wish. The passwords can be referenced using an attribute named "password-storage-path". When Rundeck needs the password, it looks up the file as referenced by the storage path, reads, decrypts, and passes the value to the plugins.

Node Configuration

Each host is configurable via "nodes" in the project resource model. Nodes are defined in terms of attributes.


  • hostname: The hostname of the remote node accessible to the Rundeck server host.
  • username: The login account name to the remote host.
  • password-storage-path: The path to the file containing the password in the keystore. This path will start with "keys/".
  • connectionUri: Alternate connection parameters as a URI. e.g. "https://hostname:port"
  • output-charset: The character encoding used for outputs of the node. Necessary in very specific cases where the output of commands is not printed correctly using the default charset. Default: 'utf-8'

Example resource model definitions

The following example show a node defined using the XML format.

Note the password-storage-path attribute referencing the key path.

 <node name="winhost123"
       output-charset: 'utf-8'.../>

Project Configuration

The Password storage path can be configured at the project level. In the Project Configuration page, set the Password Storage Path to a key path. The path can contain references to information from the node or user who is executing the command, for example:




WinRM Setting to use WinRM Node Executor Plugin

In order to connect Rundeck with remote Windows nodes, it is necessary to set WinRM in both, the server and the remote nodes.

On the rundeck server

winrm quickconfig
winrm set winrm/config/client @{TrustedHosts="*"}

On the remote nodes

winrm quickconfig
​winrm set winrm/config/service/Auth @{Basic="true"}
winrm set winrm/config/service @{AllowUnencrypted="true"}
winrm set winrm/config/winrs @{MaxMemoryPerShellMB="1024"}

Other setting

To enable the execution of remote command:

Set-ExecutionPolicy RemoteSigned

To enable permission to a user to execute remote command:

Set-PSSessionConfiguration -ShowSecurityDescriptorUI -Name Microsoft.PowerShell

Increase the concurrent shell issue:

set-item wsman:\localhost\shell\maxshellsperuser 50

Enable CredSSP Authentication On Windows Domain

On the Rundeck server

Enable CredSSP

Open a powershell windows and run:

Enable-WSManCredSSP -Role "Client" -DelegateComputer "*"

Where is the DNS domain of the target computer


Enable-WSManCredSSP -Role "Client" -DelegateComputer "*"

To enable unencrypted access for the purpose of establishing a connection, run this command on both the Rundeck server and the remote nodes:

winrm/config/service @{AllowUnencrypted="true"}

Allow Delegating Fresh Credentials

  • Click Start, type mmc and then click OK.
  • Click File and then click Add/Remove Snap-in.
  • Click Group Policy Object and then click Add.
  • Select Local Computer and then click Finish.
  • Go to Computer Policy\Administrative Templates\System\Credentials Delegation\Allow Delegating Fresh Credentials → Set to enabled
Enable delegating fresh credentials
Enable delegating fresh credentials
  • Add WSMAN/* to list of computers and check the box for Concatenate OS defaults with input above.
Add servers to list
Add servers to list

Enable CredSSP authentication on Winrm Client

Open a CMD Prompt as an Administrator user and execute:

winrm set winrm/config/client/auth @{CredSSP="true"}

You need to have winrm service configured and running.

On the remote node

Enable CredSSP

Open a powershell windows and run:

Enable-WSManCredSSP -Role "Server"

Make sure that you enable the CredSSP on WinRM Service settings

To get the WinRm Service config:

winrm get winrm/config/service

To enable the CredSSP:

winrm set winrm/config/service/auth @{CredSSP="true"}

To enable unencrypted access for the purpose of establishing a connection, run this command on the Rundeck server and the remote nodes:

winrm/config/service @{AllowUnencrypted="true"}


Using non-administrator user

If you are using a non-administrator user (or a not- domain-administrator user) to execute command to remote nodes, you need to set up the access on the remote machine ( to the user or some of its groups, eg: Domain User group).

To add permissions to non-administrator user to execute remote commands:

Set-PSSessionConfiguration Microsoft.Powershell -ShowSecurityDescriptorUI

Access is denied error

If you get "Access is denied" error when you try to access to a shared folder on the remote node, it is possible that you must use the CredSSP Authentication.

Then, you can define the authentication type like:

<node name="XXXXX"
      description="Windows Server 2012"
      osName="Windows Server 2012"
      username="rundeckuser@Domain.Local" password-storage-path="keys/xxxxx"
      ps-authentication-type="CredSSP" />

If you get this error, you have to change the network category:

WinRM service is already running on this machine.

               Message = WinRM firewall exception will not work since one of the network connection types on this machine is set to Public. Change the network connection type to either Domain or Private and try again.
Error number:  -2144108183 0x80338169

WinRM firewall exception will not work since one of the network connection types on this machine is set to Public. Change the network connection type to either Domain or Private and try again.

Workaround using PowerShell as Administrator User:

# (to get the InterfaceIndex)

Set-NetConnectionProfile -InterfaceIndex [INTERFAZ_INDEX] -NetworkCategory Private

It could be necessary to change the user’s log-on in tomcat service when the remote connection does not work:

Tomcat settings
Tomcat settings

For more information about installing and configuring Windows Remote Nodes, see Windows Remote Nodesopen in new window.

Use utf-8 scripts

If you need to use UTF-8 scripts from an unix instance to a windows node, powershell is unable to identify correctly the encoding of UTF-8 files without bom. You can force the file to be UTF-8 with bom adding the file-copier-add-utf8-bom property to the node:

  description="Windows server node"
  osName="Windows 10"