Skip to content

Commit 1b5d9d6

Browse files
author
Simonx Xu
committed
Update cmg-communication-error.md
1 parent 110d991 commit 1b5d9d6

1 file changed

Lines changed: 6 additions & 6 deletions

File tree

support/mem/configmgr/client-management/cmg-communication-error.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,18 +33,18 @@ Received response `https://InternalMP.contoso.com/SMS_MP/.sms_aut?MPLIST2&CM1` f
3333

3434
### Cause
3535

36-
The CMG connection point requires a [client authentication certificate](/mem/configmgr/core/clients/manage/cmg/certificates-for-cloud-management-gateway#bkmk_clientauth) to securely forward client requests to an HTTPS management point. If the client authentication certificate is missing, configured incorrectly, or invalid, status code 403 is returned. In scenarios in which the Management Point (MP) operates in enhanced HTTP mode with token-based authentication, the certificate isn't required but is always recommended.
36+
The CMG connection point requires a [server authentication certificate](/mem/configmgr/core/clients/manage/cmg/certificates-for-cloud-management-gateway#bkmk_clientauth) to securely forward client requests to an HTTPS management point. If the server authentication certificate is missing, configured incorrectly, or invalid, status code 403 is returned. In scenarios in which the Management Point (MP) operates in enhanced HTTP mode with token-based authentication, the certificate isn't required but is always recommended.
3737

3838
### Resolution
3939

40-
To fix this issue, generate a [client authentication certificate](/mem/configmgr/core/clients/manage/cmg/certificates-for-cloud-management-gateway#bkmk_clientauth) for the CMG connection point.
40+
To fix this issue, generate a [server authentication certificate](/mem/configmgr/core/clients/manage/cmg/certificates-for-cloud-management-gateway#bkmk_clientauth) for the CMG connection point.
4141

4242
> [!NOTE]
4343
> In the certificate, computers must have a unique value in the **Subject Name** or **Subject Alternative Name** field.
4444
45-
### How to verify CMG has a client certificate?
45+
### How to verify CMG has a server certificate?
4646

47-
After you enable verbose logging, the **SMS_Cloud_ProxyConnector.log** file will show the list of available certificates on the server. To verify if a valid client authentication certificate to establish communication between the CMG connection point and the management point exist, check the number of certificates in the **Filtered cert count with client auth:** line. See the following log for an example:
47+
After you enable verbose logging, the **SMS_Cloud_ProxyConnector.log** file will show the list of available certificates on the server. To verify if a valid server authentication certificate to establish communication between the CMG connection point and the management point exist, check the number of certificates in the **Filtered cert count with client auth:** line. See the following log for an example:
4848

4949
**SMS_Cloud_ProxyConnector.log**
5050

@@ -145,7 +145,7 @@ If you're using a PKI server authentication certificate, follow these steps:
145145

146146
Replace the `<CMGFQDN>` placeholder with your CMG public FQDN name.
147147

148-
2. Make sure that the client has the certificate in the Trusted Root Certification Authorities certificate store locally. Otherwise, the client doesn't trust the CMG, even when using Microsoft Entra or token-based authentication. This modern authentication method is only available for the CMG to validate the client authentication, but not in the responses sent from the CMG to the client. When you use a third-party certificate for the authentication, the client is typically able to validate the public Root CA over the Internet.
148+
2. Make sure that the client has the certificate in the Trusted Root Certification Authorities certificate store locally. Otherwise, the client doesn't trust the CMG, even when using Microsoft Entra or token-based authentication. This modern authentication method is only available for the CMG to validate the server authentication, but not in the responses sent from the CMG to the client. When you use a third-party certificate for the authentication, the client is typically able to validate the public Root CA over the Internet.
149149

150150
3. If the CRL isn't published on the Internet, make sure that the site doesn't enforce clients to validate the CRL and disable CRL checking for clients:
151151

@@ -197,7 +197,7 @@ For further troubleshooting, of Client to CMG communication issues, we recommend
197197

198198
- Check the IIS logs on the management point.
199199

200-
In the following sample log, the **403 7** response indicates that the client certificate can't be found:
200+
In the following sample log, the **403 7** response indicates that the server certificate can't be found:
201201

202202
> \<Date> \<Time> \<IP_address_of_MP> GET /SMS_MP/.sms_aut SITESIGNCERT 443 - \<IP_address_of_CMG_connectionpoint> SMS+CCM+5.0 - **403 7** 0 5573 11
203203

0 commit comments

Comments
 (0)