Skip to content

Commit c59a89c

Browse files
author
PRMerger6
authored
Merge pull request #41679 from rwike77/thumbprint
added PS connect with thumbprint example
2 parents 9cb45fd + 372cca2 commit c59a89c

File tree

1 file changed

+22
-1
lines changed

1 file changed

+22
-1
lines changed

articles/service-fabric/service-fabric-connect-to-secure-cluster.md

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: dotnet
1313
ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: na
16-
ms.date: 01/10/2018
16+
ms.date: 05/18/2018
1717
ms.author: ryanwi
1818

1919
---
@@ -121,6 +121,27 @@ Connect-serviceFabricCluster -ConnectionEndpoint $ClusterName -KeepAliveInterval
121121
-StoreName My
122122
```
123123

124+
#### Connect using certificate thumbprint
125+
Provide the cluster certificate thumbprint and the thumbprint of the client certificate that has been granted permissions for cluster management. The certificate details must match a certificate on the cluster nodes.
126+
127+
```powershell
128+
Connect-ServiceFabricCluster -ConnectionEndpoint <Cluster FQDN>:19000 `
129+
-KeepAliveIntervalInSec 10 `
130+
-X509Credential -ServerCertThumbprint <Certificate Thumbprint> `
131+
-FindType FindByThumbprint -FindValue <Certificate Thumbprint> `
132+
-StoreLocation CurrentUser -StoreName My
133+
```
134+
135+
*ServerCertThumbprint* is the thumbprint of the server certificate installed on the cluster nodes. *FindValue* is the thumbprint of the admin client certificate. When the parameters are filled in, the command looks like the following example:
136+
137+
```powershell
138+
Connect-ServiceFabricCluster -ConnectionEndpoint clustername.westus.cloudapp.azure.com:19000 `
139+
-KeepAliveIntervalInSec 10 `
140+
-X509Credential -ServerCertThumbprint A8136758F4AB8962AF2BF3F27921BE1DF67F4326 `
141+
-FindType FindByThumbprint -FindValue 71DE04467C9ED0544D021098BCD44C71E183414E `
142+
-StoreLocation CurrentUser -StoreName My
143+
```
144+
124145
### Connect to a secure cluster using Windows Active Directory
125146
If your standalone cluster is deployed using AD security, connect to the cluster by appending the switch "WindowsCredential".
126147

0 commit comments

Comments
 (0)