Hi Jordan.  Thanks for the information.

I tried CredSSP (and kerberos) and both give me a:
fatal: [<HOST_NAME>]: FAILED! => {
    "changed": false,
    "module_stderr": "#< CLIXML\r\n",
    "module_stdout": "",
    "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error",
    "rc": 1
}

I've enabled CredSSP on the agent via:

Enable-WSManCredSSP -Role Server -Force

and I am able to ping with credssp enabled:
$ ansible all -i hosts -m win_ping
<HOST_NAME> | SUCCESS => {
    "changed": false,
    "ping": "pong"
}


Ben

On Tuesday, November 5, 2019 at 2:48:16 AM UTC-8, Jordan Borean wrote:
>
> By default a network login on Windows does not have the users password 
> available so it cannot take advantage of things that are encrypted with 
> their credentials. This includes things like the Windows credential manager 
> so it’s unable to find the password for your remote URL. You either need to 
> connect with credssp auth or use become on the task with the users explicit 
> credentials to bypass this. 
>
> Thanks 
>
> Jordan 

-- 
You received this message because you are subscribed to the Google Groups 
"Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/ansible-project/cc5a681d-8460-4b3e-9db7-f62d1ed225f9%40googlegroups.com.

Reply via email to