This step-by-step example deployment, which uses a Windows Server 2008 certification authority (CA), contains procedures to guide you through the process of creating and deploying the public key infrastructure (PKI) certificates that Microsoft System Center 2012 Configuration Manager uses. These procedures use an enterprise certification authority (CA) and certificate templates. The steps are appropriate for a test network only, as a proof of concept.

Because there is no single method of deployment for the required certificates, you must consult your particular PKI deployment documentation for the required procedures and best practices to deploy the required certificates for a production environment. For more information about the certificate requirements, see PKI Certificate Requirements for Configuration Manager.

In This Section

Test Network Requirements

The step-by-step instructions have the following requirements:

  • The test network is running Active Directory Domain Services with Windows Server 2008, and it is installed as a single domain, single forest.

  • You have a member server running Windows Server 2008 Enterprise Edition, which has installed on it the Active Directory Certificate Services role, and it is configured as an enterprise root certification authority (CA).

  • You have one computer that has Windows Server 2008 (Standard Edition or Enterprise Edition) installed on it and that is designated as a member server, and Internet Information Services (IIS) is installed on it. This computer will be the Configuration Manager site system server that you will configure with an intranet FQDN (to support client connections on the intranet) and an Internet FQDN if you must support mobile devices that are enrolled by Configuration Manager and clients on the Internet.

  • You have one Windows Vista client with the latest service pack installed, and this computer is configured with a computer name that comprises ASCII characters and is joined to the domain. This computer will be a Configuration Manager client computer.

  • You can log in with a root domain administrator account or an enterprise domain administrator account and use this account for all procedures in this example deployment.

Overview of the Certificates

The following table lists the types of PKI certificates that might be required for System Center 2012 Configuration Manager and describes how they are used.

Certificate Requirement Certificate Description

Web server certificate for site systems that run IIS

This certificate is used to encrypt data and authenticate the server to clients. It must be installed externally from Configuration Manager on site systems servers that run IIS and that are configured in Configuration Manager to use HTTPS.

For Configuration Manager SP1 only: This certificate might also be required on management points when client notification traffic falls back to using HTTPS.

For the steps to configure and install this certificate, see Deploying the Web Server Certificate for Site Systems that Run IIS in this this topic.

Service certificate for clients to connect to cloud-based distribution points

For Configuration Manager SP1 only:

This certificate is used to encrypt data and authenticate the cloud-based distribution point service to clients. It must be requested, installed, and exported externally from Configuration Manager so that it can be imported when you create a cloud-based distribution point.

For the steps to configure and install this certificate, see Deploying the Service Certificate for Cloud-Based Distribution Points in this this topic.

Note
This certificate is used in conjunction with the Windows Azure management certificate. For more information about the management certificate, see How to Create a Management Certificate and How to Add a Management Certificate to a Windows Azure Subscription in the Windows Azure Platform section of the MSDN Library.

Client certificate for Windows computers

This certificate is used to authenticate Configuration Manager client computers to site systems that are configured to use HTTPS. It can also be used for management points and state migration points to monitor their operational status when they are configured to use HTTPS. It must be installed externally from Configuration Manager on computers.

For the steps to configure and install this certificate, see Deploying the Client Certificate for Windows Computers in this topic.

Client certificate for distribution points

This certificate has two purposes:

  • The certificate is used to authenticate the distribution point to an HTTPS-enabled management point before the distribution point sends status messages.

  • When the Enable PXE support for clients distribution point option is selected, the certificate is sent to computers that PXE boot so that they can connect to a HTTPS-enabled management point during the deployment of the operating system.

For the steps to configure and install this certificate, see Deploying the Client Certificate for Distribution Points in this topic.

Enrollment certificate for mobile devices

This certificate is used to authenticate Configuration Manager mobile device clients to site systems that are configured to use HTTPS. It must be installed as part of mobile device enrollment in Configuration Manager and you select the configured certificate template as a mobile device client setting.

For the steps to configure this certificate, see Deploying the Enrollment Certificate for Mobile Devices in this topic.

Certificates for Intel AMT

There are three certificates that relate to out of band management for Intel AMT-based computers: An AMT provisioning certificate; an AMT web server certificate; and optionally, a client authentication certificate for 802.1X wired or wireless networks.

The AMT provisioning certificate must be installed externally from Configuration Manager on the out of band service point computer, and then you select the installed certificate in the out of band service point properties. The AMT web server certificate and the client authentication certificate are installed during AMT provisioning and management, and you select the configured certificate templates in the out of band management component properties.

For the steps to configure these certificates, see Deploying the Certificates for AMT in this topic.

Client certificate for Mac computers

For Configuration Manager SP1 only:

This certificate is used to authenticate Configuration Manager SP1 Mac computers to management points and distribution points that are configured to support HTTPS.

You can request and install this certificate from a Mac computer when you use Configuration Manager enrollment and select the configured certificate template as a mobile device client setting.

For the steps to configure this certificate, see Deploying the Client Certificate for Mac Computers in this topic.

Deploying the Web Server Certificate for Site Systems that Run IIS

Deploying the Service Certificate for Cloud-Based Distribution Points

Deploying the Client Certificate for Windows Computers

Deploying the Client Certificate for Distribution Points

Deploying the Enrollment Certificate for Mobile Devices

Deploying the Certificates for AMT

Deploying the Client Certificate for Mac Computers

See Also