SCCM Configure Settings for Client PKI certificates ConfigMgr

SCCM Configure Settings for Client PKI certificates ConfigMgr. Setting up Client PKI certificates is one of the essential steps for HTTPS communication from CMG to MP/SUP.

The Public Key Infrastructure (PKI) is a comprehensive system that includes hardware, software, policies, processes, and procedures for establishing, managing, distributing, utilizing, securing, and revoking digital certificates and public keys.

PKI involves various components such as certificate authorities, registration authorities, certificate repositories, and key recovery systems to ensure the reliable and secure exchange of information

This post will show you how to complete the Client PKI setup tasks for Co-management scenarios. Once you have the Root CA, configuring Client PKI certificates is pretty straightforward.

Patch My PC

Video Tutorial – Configure Client PKI Certs

PKI is a system for encrypting and signing data. It makes digital certificates to endorse users, devices, or services. The video tutorial given below will show you how to complete the Client PKI setup tasks for Co-management scenarios.

SCCM Configure Settings for Client PKI certificates ConfigMgr – Video 1

Decision Making – Client PKI

This is a critical decision point for your device management strategy. AAD identity is a better alternative to Client PKI. Even though you have AAD-joined machines, you should have public certs for CMG and CDP. So, you need to decide whether you are going with internal PKI or Public PKI.

Deploying Client PKI Certs to Internet Connected Devices is another important point. Another checkpoint before implementing Client PKI is whether you need to enable Client Check the certificate revocation list (CRL) for site systems or not. I have NOT helped CRL for my lab environment to reduce the overhead.

Configure Settings for Client PKI certificates

There are two sections in Client Computer communication. One is to get the server-side  (site system Settings) ready for the secured (HTTPS), and the other is to configure client computer settings.   Site System Settings  

Select the client computer communication method (HTTP or HTTPS) for the site systems (MP/SUP) that use IIS. To use HTTPS, the server must have a valid PKI web server certificate (server authentication capability).

Client Computer Settings 

Specify settings for client computers when they communicate with site systems that use IIS. When available, use the PKI client certificate (client authentication capability). Public Cert and AAD authentication are other options, as opposed to using Client PKI certificates (as I mentioned in the above section).

Step-by-Step Process to Configure Client PKI Certs

1. In the SCCM CB console, choose Administration.

    2. In the Administration workspace, expand Site Configuration, choose Sites, and then choose the primary site server

    3. Right-click on the Primary site server, choose Properties and choose the Client Computer Communication tab.

      The client Computer Communication tab is available on a primary site only. If you do not see it, check that you are not connected to a CAS or an SCCM secondary site.

      SCCM Configure Settings for Client PKI certificates ConfigMgr - Fig.1
      SCCM Configure Settings for Client PKI certificates ConfigMgr – Fig.1

      4. Choose the HTTPS or HTTP option when you do not require your existing SCCM clients to use PKI certificates. This will also help to implement client PKI for co-management scenarios.

          If you chose HTTPS or HTTP, choose Use client PKI certificate (client authentication capability) when available when you want to use a client PKI certificate for HTTP connections. The client uses this certificate instead of a self-signed certificate to authenticate to site systems. This option is automatically chosen if you choose HTTPS only.

          Clients who are detected on the Internet or configured for Internet-only client management always use a client PKI certificate.

          5. Choose to Use a PKI client certificate (client authentication capability) when available

          6. Choose Modify to configure your chosen client selection method for when more than one valid PKI client certificate is available on a client, and then select OK. I don’t have more than one client PKI certificate; hence I didn’t modify this in my lab environment.

          7. Select or Clear the check box for clients to check the Certificate Revocation List (CRL). As mentioned in the above section of this post, I cleared the check box for CRL to reduce the overhead.

          8. Choose the SET button under the Trusted Root Certification Authorities section. Nonmandatory step for Co-Management scenario.

          9. Browse and Select your Root & Intermediate CA certs from Set Root Certificates windows. I don’t have an intermediate CA cert; hence I uploaded only Root CA.

          Specify trusted root certification authority (CA) certificates for clients, choose Set, import the root CA certificate files, and select OK.

          When you don’t upload Trusted Root CAs in the Trusted Root CA setting on the Client Computer Communication tab, SCCM trusted check but assumes that Trusted Root certificates are otherwise properly implemented on clients and servers in the environment.

          I have not tested this in the latest version of the SCCM CB environment.

          10. Choose OK to close the properties dialog box for the site

          Bonus Tips about Client PKI Certificates

          Following are some of the thought points I have in mind and implemented in my lab environment.

          • Intune can deploy Root CA certs to Internet-connected client devices, or if you have domain-joined machines, you can use group policy to deploy Root CA certs.
          • Use ARM wherever possible to avoid Azure management certs (otherwise, use self-signed certs)
            Server PKI Cert for MP/SUP – IIS HTTPS communication (Or else we can use SCCM generated cert as you can see in the post)
          • Server PKI Cert for CDP/CMG – Client communication
          • Root and Intermediate CA certs uploaded to CMG

          Reference

          We are on WhatsApp. To get the latest step-by-step guides and news updates, Join our Channel. Click here –HTMD WhatsApp.

          Author

          Anoop C Nair is Microsoft MVP! He is a Device Management Admin with more than 20 years of experience (calculation done in 2021) in IT. He is a Blogger, Speaker, and Local User Group HTMD Community leader. His primary focus is Device Management technologies like SCCM 2012, Current Branch, and Intune. He writes about ConfigMgr, Windows 11, Windows 10, Azure AD, Microsoft Intune, Windows 365, AVD, etc.

          14 thoughts on “SCCM Configure Settings for Client PKI certificates ConfigMgr”

          1. Do you need the PKI cert (SCCM Client Cert) to be added to a secondary site if it’s interforest, two-way, transitive trust? Domain A has my primary, but Domain B has my secondary site. Primary uses HTTPS, but secondary is just HTTP. Computers are being assigned the primary site, but the sccm client is not installing, and I think it’s because of the cert. I wonder if I can put that cert into IIS of Domain B – secondary site – will that work? I have separate CAs, and the Domain A admins don’t want me to put the sccm client cert into the CA.

            Reply
          2. Thank you

            We have 1 Primary Site with 3 Distribution Points. Is there a easy way to work out which servers will need the Web Server cert ( IIS ) and which will require the Workstation Authentication cert ?

            Reply
          3. Hi Annop
            Good day
            When i’m trying to register the new ISV certificate i’m getting the following message Failed to submit certificate to site system i tried both CAS and Primary server.

            Reply
          4. hi anoop,

            i have installed PKI to internet based client. the installation is completed. the client is taking MP point. but the certificate information in congratulation manager is none . and am getting below error

            [RegTask] – Client is not registered. Sending registration request for GUID:69F2AF5E-35CD-4DB3-BFB0-C4AAE8B567C3 … ClientIDManagerStartup 9/20/2019 10:47:55 AM 7068 (0x1B9C)
            WPJ Certificate not found ClientIDManagerStartup 9/20/2019 10:47:55 AM 7068 (0x1B9C)
            RegTask: Failed to send registration request message. Error: 0x87d00231 ClientIDManagerStartup 9/20/2019 10:48:01 AM 7068 (0x1B9C)
            RegTask: Failed to send registration request. Error: 0x87d00231 ClientIDManagerStartup 9/20/2019 10:48:01 AM 7068 (0x1B9C)

            Reply
          5. Hi Anoop

            I have Configured the Settings for Client PKI certificates as per your excellent instructions.

            SCCM 2012 is installed in a number of our environments.

            In one of our environments, every computer/server has multiple (in excess of 100) certificates issued using the ConfigMgrClientCertificate template.

            I have tracked down that a scheduled task entitled “SystemTask” under “CertificateServicesClient” generates a new certificate each time it is run, the trigger is on every GPUpdate. This schedule task is the same in all the other environments that only have one certificate per computer/server (this as expected).

            My suspision is that the Scheduled Task checks that the certificate matches a criteria (Inside SCCM this set to “DC = “), in this case the check determines that there is not a certificate that matches and therefore requests a new certificate.

            Can you give me some pointers on what could be causing this issue and hopefully suggestions on how to resolve.

            Regards
            Pete

            Reply
          6. Hi Anoop, thanks for putting out these SCCM resources!

            I’ve setup SCCM 1910 in my lab successfully but run into issues after implementing HTTPS/PKI. My client computers stopped communicating with the SCCM server after I switch it to HTTPS.

            Here’s the error I’m getting from the client’s CcmMessaging.log.

            “Post to http://sccm-server.domain.com/ccm_system/request failed with 0x87d00231.”

            mpcontrol.log seems to show that MP is working.

            “Call to HttpSendRequestSync succeeded for port 443 with status code 200, text: OK”

            Thanks!

            Reply
          7. Hello Anoop,
            I have MECM 2203, where we are pushing client on machines, we are almost done however wanted to implement PKI certificate to use HTTPS. What are the steps to follow? can this be achieved without again pushing clients to the endpoints?

            Reply
          8. Hello Anoop,

            Thanks for your help and your precious work.

            I have a question of principle. How does a client knowns that the site has changed mode? from http to https. The client must receive a policy, right?
            it’s a chicken and egg problem.
            Mp is configured to https only.. and client ask for policy via http..
            just asking myself..

            Reply
          9. Hello Anoop,

            Is the “Specify trusted root certification authority” option on the site settings supposed to allow the SCCM servers to accept client certificates issued by root CAs that aren’t in the SCCM servers’ OSs’ Trusted Root stores?

            We have a dev environment with a separate PKI hierarchy (DEVCA), which is not trusted by the (production) SCCM servers. As I read the docs, importing that CA cert (along with our main production CA cert) into the site settings *should* allow clients to present DEVCA-signed client certs to the DP and MP… without having to have our SCCM servers fully trust the DEVCA at the OS-level. Am I misunderstanding?

            We can’t get this to work, though.. and we opened a case with Microsoft, who is telling us that despite the SCCM documentation, the MP *has* to have the DEVCA in its trusted root store for clients to be able to register…

            Reply

          Leave a Comment