[英]How to trust a Certificate in Powershell derived of a CA
i want to workaround this massage: 我想解决这种按摩:
Do you want to run software from this untrusted publisher?
File Z:\temp.ps1 is published by CN="NAME", DC=Domain, DC=DE and is not trusted on your system. Only run scripts from
trusted publishers.
The ExecutionPolicy of the Powershell is AllSigned. Powershell的ExecutionPolicy已全部签名。 The Certificate is derived of a CA.cert, which is actually in the trusted ca root cert store. 该证书派生自CA.cert,该证书实际上位于受信任的ca根证书存储中。 This should be enaugh to trust my sining-cert ?! 相信我的犯罪证明应该是笑吗?! But on the first run of a singed script i got this question. 但是在一个单一脚本的第一次运行中,我遇到了这个问题。 So without adding every derived singing-cert per GPO or whaterver to every computer, how to force to accept derived certs? 因此,在不按GPO或每台计算机添加每个派生唱歌证书的情况下,如何强制接受派生证书?
The thing with code signing is, you need to import the certificate used for the signature at to your local "trusted publisher" store, to get rid of the warning message. 使用代码签名的事情是,您需要将用于签名的证书导入到您本地的“受信任的发布者”商店,以消除警告消息。
You can do this with Import-Certificate
or prefferebale via GPO, if you're in a domain environment. 如果您在域环境中,则可以通过GPO使用Import-Certificate
或prefferebale进行此操作。
声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.