MECM Installation series

The installation and configuration of a full MECM setup is a complex hence time consuming activity.
I have slides these steps in multiple blog articles to create a better overview

Introduction

We will need certificates for the following MECM related components:

  1. Root certificate
  2. CMG Web Server certificate
  3. MECM Web Server certificate (optional, required for https PKI)
  4. Client certificate (optional, required for https PKI)

MECM Required certificates

Now this is getting interesting and potential difficult, as MECM presents you with different http/https/PKI options and if one is set wrong you will end up with issues which are hard to troubleshoot

  • Download pending = wrong client connections setting on management point
  • Downloading forever = wrong communication setting on distribution point(s)

There are three options:

 Enhanced HTTP without CMGEnhanced HTTP with CMGFull PKI with CMG
ComplexitySimpleMediumComplex
Required certificates– Root certificate – Root certificate- MECM CMG Webserver certificate – Root certificate- MECM CMG Webserver certificate- Client certificate 
Management PointGeneral Setting – HTTP (means enhanced)- Option NOT set to Allow Configuration Manager cloud management gateway traffic – HTTP (means enhanced)- Option set to Allow Configuration Manager cloud management gateway traffic- Option set to Allow intranet and Internet connections – HTTPS
– Option set to Allow Configuration Manager cloud management gateway traffic- Option set to Allow intranet and Internet connections 
Distribution PointCommunication Setting– HTTP (= enhanced)- Option set to Create self signed certificate– HTTP (= enhanced)- Option set to Create self signed certificate– HTTPS
(Note: Client MUST have a valid PKI client certificate)
Microsoft documentationhttps://learn.microsoft.com/en-us/mem/configmgr/core/plan-design/hierarchy/enhanced-http https://learn.microsoft.com/en-us/mem/configmgr/core/plan-design/security/plan-for-certificates

Installation of Certificate Authority

A certificate authority (CA) is needed for MECM as it depends on internal certificate (such as root certificate)
The following guide is a “quick” setup of a CA setup, and for enterprise environments not recommended as it doesn’t follow the best practices.
For more information see https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831574(v=ws.11)

Before we begin, make sure your account is a member of the Domain Admins and Enterprise Admins groups. We need to have temporary Enterprise Admins, after we are done you need to remove this membership for security best practices

  1. Launch Server Manager
  2. In the menu, click on Manager > Add Roles and Features
  3. Before You Begin
  4. Installation Type
  5. Server Selection
  6. Server Roles
  7. Server Roles / Select Active Directory Certificate Services
  8. Features
  9. AD CS
  10. AD CS / Role Services
    For now we only need Certificate Authority
    (See other guides for Network Device Enrollment Service for other functionality such as Wifi authentication for MEM managed AAD devices)
  11. Confirmation
    Click on install, and do not close the wizard

Certificates

Now that the CA is installed, we are going to create the required certificates and template

Root certificate

Export the trusted root certificate

  1. Start the Certification Authority app via the start menu on the CA server
  2. Right-mouse click on the node and select properties
  3. Click on [View certificate]
  4. Go to Details
  5. select Copy to File…
  6. Next (leave as DER)
  7. Next

    (On the MECM server create the E:\Dowloads\Certificates directory and copy this file)
  8. Click OK and Finish

MECM CMG Web server certificate template

We need to create a CMG certificate template which we can request on the MECM server and is going to be used for the CMG.

  1. Start the Certification Authority app via the start menu on the CA server
  2. Go to Certificate templates > Manage
  3. Select the “Web Server” template and via right mouse click select Duplicate Template
  4. Keep Windows Server 2003
  5. Click on [General] and name the display name “MECM CMG Certificate”
  6. Click on [Request Handling] and select “Allow private key to be exported”
  7. Click on [Security] and remove the Enroll permission (uncheck) for Enterprise Admins
  8. Add the “MECM-Servers” group and select Read and Enroll permissions
  9. Click OK and OK. After this the MECM CMG Certificate template is created

Now we must enable this new template

  1. Start the Certification Authority Management console (certsrv.mmc)
  2. Select the “MECM CMG Certificate” to enable it

Determine MECM CMG Web server FQDN

First we need to determine a unique FQDN name for the CMG before we are able to issue and use the CMG Web server certificate.

First Microsoft used to use the .cloudapp.net domain, unfortunately since the VM Scale set for CMG the region is in the domain name ( .{region}.cloudapp.azure.com).
So first determine in which region your CMG will be located, in my example I used the UK South Azure region.

Now you know in which region you want to host your CMG, you need to check if this name is still available:

rviersel@MacBook ~ % nslookup nameavailable.uksouth.cloudapp.azure.com
Server:		84.116.46.22
Address:	84.116.46.22#53

** server can't find nameavailable.uksouth.cloudapp.azure.com: NXDOMAIN

rviersel@MacBook ~ % nslookup sendsiercmg.uksouth.cloudapp.azure.com  
Server:		84.116.46.22
Address:	84.116.46.22#53

Non-authoritative answer:
Name:	sendsiercmg.uksouth.cloudapp.azure.com
Address: 51.143.232.101

rviersel@MacBook ~ % 

As you can see (as example) the FQDN “nameavailable.uksouth.cloudapp.azure.com” is still available as the nslookup command could not find any associated IP address with that record.
As example, if the FQDN would already have been taken by somebody else, it will return a associated IP address (sendsier.uksouth.cloudapp.azure.com which I used for this MECM guide).

MECM CMG Web server certificate

Now that you have confirmed the FQDN for the CMG is still available we can issue a CMG web server certificate.

  1. Switch to the MECM Server to request the certificate, start the Management Console (mmc)
    Via the menu choose File > Add/Remove Snap-in…
    Click on Certificates and click Add
  2. Select Computer account
  3. Finish
  4. OK
  5. Expand Personal > Certificates
  6. Right mouse click on Certificates folder and under the All Tasks select “Request New Certificate…”
  7. Next
  8. Next
  9. Click on the blue link “More information is required to enroll for this certificate”
  10. s
  11. Provide the following information
    Subject name:
    Type: select [Common name]
    Value: {hostname}.{region}.cloudapp.azure.com (eg: sendsiercmg.uksouth.cloudapp.azure.com)

    Alternate name:
    Type: select [DNS]
    Value: {hostname}.{region}.cloudapp.azure.com (eg: sendsiercmg.uksouth.cloudapp.azure.com)

  12. Select [General]
    Friendly name: MECM CMG Certificate
    Description: MECM CMG Certificate
  13. Now enroll (issue) this certificate, click on Enroll
  14. Finish
  15. As you can see the certificate is now issued, but we need to export this as a PFX certificate file to be imported when creating the CMG from the MECM console.
  16. Export as PFX
    Right mouse click on the certificate and under All Tasks select Export…
  17. Next
  18. Select “Yes, export the private key”, Next
  19. Change to PFX and select “Include all certificates in the certification path if possible” and deselect “Enable certificate privacy”,Next
  20. Select Password and provide a secure strong password (and save it to your password manager!), Next
  21. Save it to “E:\Downloads\Certificates\MECM CMG Web.pfx”
  22. Finish
  23. OK

Leave a Comment

Your email address will not be published. Required fields are marked *