Explaining the Hyper-V authorization model, part six

Hyper-V uses a role based authorisation model for access checks. This series of articles takes a look at the model; defines the available primitives; and walks through a couple of examples. (Oops, a post I meant to publish back in October last year, only just realized I didn’t make it live!) Quick links: Part1; Part…

1

Explaining the Hyper-V authorization model, part five

Hyper-V uses a role based authorisation model for access checks. This series of articles takes a look at the model; defines the available primitives; and walks through a couple of examples. (I actually wrote most of this many months ago – only finally found the time to post it up!). Quick links: Part1; Part 2;…

1

Explaining the Hyper-V authorization model, part four

Hyper-V uses a role based authorisation model for access checks. This series of articles takes a look at the model; defines the available primitives; and walks through a couple of examples. (I actually wrote most of this series many months ago – only finally found the time to post it up!). Quick links: Part1; Part…

0

Explaining the Hyper-V authorization model, part three

Hyper-V uses a role based authorisation model for access checks. This series of articles takes a look at the model; defines the available primitives; and walks through a couple of examples. (I actually wrote most of this series many months ago – only finally found the time to post it up!). Quick links: Part1; Part…

3

Explaining the Hyper-V authorization model, part two

Hyper-V uses a role based authorisation model for access checks. This series of articles takes a look at the model; defines the available primitives; and walks through a couple of examples. (I actually wrote most of this series many months ago – only finally found the time to post it up!). Quick links: Part1; Part…

4

Explaining the Hyper-V authorization model, part one

Hyper-V uses a role based authorisation model for access checks. This series of articles takes a look at the model; defines the available primitives; and walks through a couple of examples. (I actually wrote most of this series many months ago – only finally found the time to post it up!). Quick links: Part1; Part…

8

Hyper-V Resolving Event ID 4096

Over the break I’ve been taking over Christmas, one of my goals was to move the remainder of my Virtual Server “production” VMs across to Hyper-V. But when nearing completion, I noticed that Server Manager was reporting a role error: Looking at the detail of the event logs, it was Event ID 4096 from Hyper-V-Config…

11

Configure Hyper-V Remote Management in seconds

Update 19th Nov – v0.3 now released!  It has been a little quiet on the blog front, but sometimes, at least in this case, I hope I’ve come up with something worth waiting for. Announcing “HVRemote”…., a tool to “automagically” configure Hyper-V Remote Management. (Amazing what can be done with a few days vacation to…

282

How to use uniquely identify a virtual machine in Hyper-V

When managing a large number of virtual machines, there is often a need to tag it in some way with one or more properties uniquely identifying it for administrative purposes. One example would be to identify a virtual machine as belonging to a person, team or business unit. The Hyper-V WMI namespace has a number…

3