Before you deploy the Configuration Manager client for
Linux and UNIX, review the information in this section to help you
plan for a successful deployment.
Use the following information to determine the
prerequisites you must have in place to successfully install the
client for Linux and UNIX.
Dependencies External to Configuration
Manager:
The following tables describe the required UNIX and
Linux operating systems and package dependencies.
Red Hat Enterprise Linux ES Release 4
Required package |
Description |
Minimum version |
glibc
|
C Standard Libraries
|
2.3.4-2
|
Openssl
|
OpenSSL Libraries; Secure Network Communications Protocol
|
0.9.7a-43.1
|
PAM
|
Pluggable Authentication Modules
|
0.77-65.1
|
Red Hat Enterprise Linux Server release 5.1
(Tikanga)
Required package |
Description |
Minimum version |
glibc
|
C Standard Libraries
|
2.5-12
|
Openssl
|
OpenSSL Libraries; Secure Network Communications Protocol
|
0.9.8b-8.3.el5
|
PAM
|
Pluggable Authentication Modules
|
0.99.6.2-3.14.el5
|
Red Hat Enterprise Linux Server release 6
Required package |
Description |
Minimum version |
glibc
|
C Standard Libraries
|
2.12-1.7
|
Openssl
|
OpenSSL Libraries; Secure Network Communications Protocol
|
1.0.0-4
|
PAM
|
Pluggable Authentication Modules
|
1.1.1-4
|
Solaris 9 SPARC
Required package |
Description |
Minimum version |
Required operating system patch
|
PAM memory leak
|
112960-48
|
SUNWlibC
|
Sun Workshop Compilers Bundled libC (sparc)
|
5.9,REV=2002.03.18
|
SUNWlibms
|
Forte Developer Bundled Shared libm (sparc)
|
5.9,REV=2001.12.10
|
OpenSSL
|
SMCosslg (sparc)
Sun does not provide a version of OpenSSL for Solaris 9 SPARC.
There is a version available from Sunfreeware.
|
0.9.7g
|
PAM
|
Pluggable Authentication Modules
SUNWcsl, Core Solaris, (Shared Libs) (sparc)
|
11.9.0,REV=2002.04.06.15.27
|
Solaris 10 SPARC
Required package |
Description |
Minimum version |
Required operating system patch
|
PAM memory leak
|
117463-05
|
SUNWlibC
|
Sun Workshop Compilers Bundled libC (sparc)
|
5.10, REV=2004.12.22
|
SUNWlibms
|
Math & Microtasking Libraries (Usr) (sparc)
|
5.10, REV=2004.11.23
|
SUNWlibmsr
|
Math & Microtasking Libraries (Root) (sparc)
|
5.10, REV=2004.11.23
|
SUNWcslr
|
Core Solaris Libraries (Root) (sparc)
|
11.10.0, REV=2005.01.21.15.53
|
SUNWcsl
|
Core Solaris Libraries (Root) (sparc)
|
11.10.0, REV=2005.01.21.15.53
|
OpenSSL
|
SUNopenssl-librararies (Usr)
Sun provides the OpenSSL libraries for Solaris 10 SPARC. They
are bundled with the operating system.
|
11.10.0,REV=2005.01.21.15.53
|
PAM
|
Pluggable Authentication Modules
SUNWcsr, Core Solaris, (Root) (sparc)
|
11.10.0, REV=2005.01.21.15.53
|
Solaris 10 x86
Required package |
Description |
Minimum version |
Required operating system patch
|
PAM memory leak
|
117464-04
|
SUNWlibC
|
Sun Workshop Compilers Bundled libC (i386)
|
5.10,REV=2004.12.20
|
SUNWlibmsr
|
Math & Microtasking Libraries (Root) (i386)
|
5.10, REV=2004.12.18
|
SUNWcsl
|
Core Solaris, (Shared Libs) (i386)
|
11.10.0,REV=2005.01.21.16.34
|
SUNWcslr
|
Core Solaris Libraries (Root) (i386)
|
11.10.0, REV=2005.01.21.16.34
|
OpenSSL
|
SUNWopenssl-libraries; OpenSSL Libraries (Usr) (i386)
|
11.10.0, REV=2005.01.21.16.34
|
PAM
|
Pluggable Authentication Modules
SUNWcsr Core Solaris, (Root)(i386)
|
11.10.0,REV=2005.01.21.16.34
|
SUSE Linux Enterprise Server 9 (i586)
Required package |
Description |
Minimum version |
Service Pack 4
|
SUSE Linux Enterprise Server 9
|
|
OS Patch lib gcc-41.rpm
|
Standard shared library
|
41-4.1.2_20070115-0.6
|
OS Patch lib stdc++-41.rpm
|
Standard shared library
|
41-4.1.2_20070115-0.6
|
Openssl
|
OpenSSL Libraries; Secure Network Communications Protocol
|
0.9.7d-15.35
|
PAM
|
Pluggable Authentication Modules
|
0.77-221-11
|
SUSE Linux Enterprise Server 10 SP1 (i586)
Required package |
Description |
Minimum version |
glibc-2.4-31.30
|
C Standard shared library
|
2.4-31.30
|
OpenSSL
|
OpenSSL Libraries; Secure Network Communications Protocol
|
0.9.8a-18.15
|
PAM
|
Pluggable Authentication Modules
|
0.99.6.3-28.8
|
SUSE Linux Enterprise Server 11 (i586)
Required package |
Description |
Minimum version |
glibc-2.9-13.2
|
C Standard shared library
|
2.9-13.2
|
PAM
|
Pluggable Authentication Modules
|
pam-1.0.2-20.1
|
Configuration Manager Dependencies: The
following table lists site system roles that support Linux and UNIX
clients. For more information about these site system roles, see
Determine the
Site System Roles for Client Deployment in Configuration
Manager.
Configuration Manager site system |
More information |
Management point
|
Although a management point is not required to install a
Configuration Manager client for Linux and UNIX, you must have a
management point to transfer information between client computers
and Configuration Manager servers. Without a management point, you
cannot manage client computers.
|
Distribution point
|
The distribution point is not required to install a
Configuration Manager client for Linux and UNIX. However, the site
system role is required if you deploy software to Linux and UNIX
servers.
Because the Configuration Manager client for Linux and UNIX does
not support communications that use SMB, the distribution points
you use with the client must support HTTP or HTTPS
communication.
|
Firewall Requirements: Ensure that firewalls do
not block communications across the ports you specify as client
request ports. The client for Linux and UNIX communicates directly
with management points and distribution points.
For information about client communication and request
ports, see the
Configure Request Ports for the Client for Linux and UNIX
section in the How to Install Clients
on Linux and UNIX Computers in Configuration Manager topic.
Linux and UNIX servers you manage with Configuration
Manager operate as workgroup clients and require similar
configurations as Windows-based clients that are in a workgroup.
For information about communications from computers that are in
workgroups, see the Planning
for Communications Across Forests in Configuration Manager
section in the Planning for
Communications in Configuration Manager topic.
Service Location by the client for Linux
and UNIX
The task of locating a site system server that provides
service to clients is referred to as service location. Unlike a
Windows-based client, the client for Linux and UNIX does not use
Active Directory for service location. Additionally, the
Configuration Manager client for Linux and UNIX does not support a
client property that specifies the domain suffix of a management
point. Instead, the client learns about additional site system
servers that provide services to clients from a known management
point you assign when you install the client software.
For more information about service location, see the
Planning for Service Location by Clients section in the
Planning for
Communications in Configuration Manager topic.
For secure and authenticated communications with
Configuration Manager sites, the Configuration Manager client for
Linux and UNIX uses the same model for communication as the
Configuration Manager client for Windows.
When you install the Linux and UNIX client, you can
assign the client a PKI certificate that enables it to use HTTPS to
communicate with Configuration Manager sites. If you do not assign
a PKI certificate, the client creates a self-signed certificate and
communicates only by HTTP.
Clients that are provided a PKI certificate when they
install use HTTPS to communicate with management points. When a
client is unable to locate a management point that supports HTTPS,
it will fall back to use HTTP with the provided PKI
certificate.
When a Linux or UNIX client uses a PKI certificate you
do not have to approve them. When a client uses a self-signed
certificate, review the hierarchy settings for client approval in
the Configuration Manager console. If the client approval method is
not Automatically approve all computers (not recommended),
you must manually approve the client.
For more information about how to manually approve the
client, see the
Managing Clients from the Devices Node section in the How to Manage Clients in
Configuration Manager topic.
For information about how to use certificates in
Configuration Manager, see PKI Certificate
Requirements for Configuration Manager.
About Certificates for use by Linux and
UNIX Servers
The Configuration Manager client for Linux and UNIX
uses a self-signed certificate or an X.509 PKI certificate
just like Windows-based clients. There are no changes to the PKI
requirements for Configuration Manager site systems when you manage
Linux and UNIX clients.
The certificates you use for Linux and UNIX clients
that communicate to Configuration Manager site systems must be in a
Public Key Certificate Standard (PKCS#12) format, and the password
must be known so you can specify it to the client when you specify
the PKI certificate.
The Configuration Manager client for Linux and UNIX
supports a single PKI certificate, and does not support multiple
certificates. Therefore, the certificate selection criteria you
configure for a Configuration Manager site does not apply.
Configuring Certificates for Linux and
UNIX Servers
To configure a Configuration Manager client for Linux
and UNIX servers to use HTTPS communications, you must configure
the client to use a PKI certificate at the time you install the
client. You cannot provision a certificate prior to installation of
the client software.
When you install a client that uses a PKI certificate,
you use the command-line parameter -UsePKICert to specify
the location and name of a PKCS#12 file that contains the PKI
certificate. Additionally you must use the command line parameter
-certpw to specify the password for the certificate.
If you do not specify -UsePKICert, the client
generates a self-signed certificate and attempts to communicate to
site system servers by using HTTP only.
The following Linux and UNIX operating systems that are
supported as clients for Configuration Manager were released with
versions of OpenSSL that do not support SHA-256:
- Red Hat Enterprise Linux Version 4
(x86/x64)
- Solaris Version 9 (SPARC) and Solaris Version
10 (SPARC/x86)
To manage these operating systems with Configuration
Manager, you must install the Configuration Manager client for
Linux and UNIX with a command line switch that directs the client
to skip validation of SHA-256. Configuration Manager clients that
run on these operating system versions operate in a less secure
mode than clients that support SHA-256. This less secure mode of
operation has the following behavior:
- Clients do not validate the site server
signature associated with policy they request from a management
point.
- Clients do not validate the hash for packages
that they download from a distribution point.
Security Note |
The ignoreSHA256validation option allows you to run the
client for Linux and UNIX computers in a less secure mode. This is
intended for use on older platforms that did not include support
for SHA-256. This is a security override and is not recommended by
Microsoft, but is supported for use in a secure and trusted
datacenter environment. |
When the Configuration Manager client for Linux and
UNIX installs, the install script checks the operating system
version. By default, if the operating system version is identified
as having released without a version of OpenSSL that supports
SHA-256, the installation of the Configuration Manager client
fails.
To install the Configuration Manager client on Linux
and UNIX operating systems that did not release with a version of
OpenSSL that supports SHA-256, you must use the install command
line switch ignoreSHA256validation. When you use this
command line option on an applicable Linux or UNIX operating
system, the Configuration Manager client will skip SHA-256
validation and after installation, the client will not use SHA-256
to sign data it submits to site systems by using HTTP. For
information about configuring Linux and UNIX clients to use
certificates, see Planning for
Security and Certificates for Linux and UNIX Servers in this
topic. For information about requiring SHA-256, see the
Configure Signing and Encryption section in the Configuring Security for
Configuration Manager topic.
Note |
The command line option ignoreSHA256validation is
ignored on computers that run a version of Linux and UNIX that
released with versions of OpenSSL that support SHA-256. |