SCCM 2012 Internet based client management

I used the link below to get started. I'm testing now on my test client. The test client is showing Client Certificate: Self-signed. The connection type however is correct: Currently Internet. Also under Internet-based management point. The server name is correct. However when looking at the client's ccmexec.log. It appears to be trying HTTP instead of HTTPS. 

http://www.systemcenterdudes.com/internet-based-client-management/

Thoughts?

April 30th, 2015 2:02pm

If it shows a self-signed certificate the client won't be able to connect. The Internet-based management could be because you've provided it during the installation of the client, or if the client was on the intranet before, received via a client policy.

If you just installed that client while not on the intranet, start with the ClientIDManagerStartup.log. If the client was working before on the intranet, start with the CcmMessaging.log.

Free Windows Admin Tool Kit Click here and download it now
April 30th, 2015 2:12pm

Clients must each have a unique client auth cert from a trusted PKI. Have you issued one of these to this test client?
April 30th, 2015 3:31pm

The ccmmessaging.log is giving errors trying to connect to the "http"
Free Windows Admin Tool Kit Click here and download it now
April 30th, 2015 5:01pm

I went by the above web link. It was by far the easiest article to comprehend. I have SCCM 2012 R2 cu4.

Not sure how the clients get the cert. The template was created as per the web link and the group policy was also created. I left the test client on our network until it picked up the group policy.

So what step is missing from the web link above that I still need to create?

 
April 30th, 2015 5:07pm

No offense but clients getting the cert isn't an SCCM question, it's a PKI one.

That said the doc in the link is pretty complete, but make sure you follow all of the steps and not just the ones with pictures.  Key example: section 1.3.  It _tells_ you to make sure your issuing CA is publishing said templates but there's no accompanying screenshots.

Easiest first step is to RSOP and make sure your workstations are actually getting your enrollment GPOs applied and there's no overriding GPOs or blocked inheritance at play.
Free Windows Admin Tool Kit Click here and download it now
May 1st, 2015 1:34am

That's an artifact in the log and is not indicative of the clients not trying to use https.
May 1st, 2015 8:52am

The GPO is applying just find to the clients. I'm just not getting certs issued to the clients.

We are using a Microsoft CA server to generate the certs. The IIS, DP certs appear to be working just fine.

Where can I look to see what's not happening correctly?

Free Windows Admin Tool Kit Click here and download it now
May 4th, 2015 3:55pm

Just because the GPO is applying doesn't mean you've got your PKI infrastructure set up or configured correctly. No cert, no communication.

Have you reviewed the event logs on the client?

As a side-note, using a generic walk-through to deploy a PKI is a dangerous proposition.

May 5th, 2015 6:03pm

The ClientIDmanagerstartup.log on a test machine has the following entry:

PKI Client Certificate matching SCCM certificate selection criteria is not available

FYI - We do not control the certificate server. Our security section does that task.

Free Windows Admin Tool Kit Click here and download it now
May 6th, 2015 3:45pm

That message is pretty self-explanatory.

Do note though that simply looking at a single line from a log file is not going to help and is generally meaningless ... log files are about context and flow. You need to review much more than just a single line.

May 7th, 2015 6:24pm

I think I may have found the problem. I tried certificate enrollment to install the certificate directly on a client. I got you cannot request a certificate at this time because no certificate types are available. I checked off the show all templates box and my "ConfigMgr 2012 Client Certificate" status is unavailable. "The permissions on the certificate template do allow the current user to enroll for this type of certificate." "You do not have permission to request this type of certificate."

I will work with our security group to see what's not set right. If anybody knows what permissions need to be set and where, that would be great!

Free Windows Admin Tool Kit Click here and download it now
May 8th, 2015 4:09pm

As a follow up, I noticed that everything talks about "computer" permissions but the says "user". Does anybody know if authenticated users needs the enroll and auto-enroll permissions for the client cert template?

If there is a CA forum that deals with this sort of thing. Then please direct me towards it.

    
May 8th, 2015 5:11pm

It all depends on the configuration of the template an the usage of it. If we're talking about the computer authentication certificate than I would expect something like a auto enrollment, as it's probably required by all clients. Again it's all about the requirements and the configuration.

You can find the security forum here: https://social.technet.microsoft.com/Forums/windowsserver/en-US/home?forum=winserversecurity

Free Windows Admin Tool Kit Click here and download it now
May 9th, 2015 1:47am

For configmgr 2012 client cert properties under the general tab. Should "Publish certificate in Active Directory" checkbox be checked? 
May 12th, 2015 3:53pm

Doesn't matter. That is used to distribute public keys to other entities that have access to AD. ConfigMgr doesn't use or rely on this at all.
Free Windows Admin Tool Kit Click here and download it now
May 12th, 2015 4:08pm

I would recommend giving this a read:

https://technet.microsoft.com/en-us/library/gg682023.aspx

May 12th, 2015 5:40pm

William,

I have been to that web site many, many times. Unfortunately it doesn't talk about what to do when it doesn't work. I got Microsoft working on it now. 

Free Windows Admin Tool Kit Click here and download it now
May 13th, 2015 12:39pm

OK.  Keep us posted!
May 13th, 2015 3:52pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics