Skip to content

Commit 3a780ee

Browse files
authored
Updates from editor
1 parent b007044 commit 3a780ee

1 file changed

Lines changed: 21 additions & 21 deletions

File tree

support/mem/configmgr/client-management/cmg-communication-error.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Configuration Manager clients can't communicate with CMG
3-
description: Provides details about log files and solutions for common issues when Configuration Manager clients can't communicate with CMG.
4-
ms.date: 02/11/2025
2+
title: Configuration Manager Clients Can't Communicate with CMG
3+
description: Provides details about log files and solutions to common issues when Configuration Manager clients can't communicate with CMG.
4+
ms.date: 02/28/2025
55
ms.custom: sap:Cloud Services\Cloud Management Gateway (CMG)
66
ms.reviewer: kaushika, bmoran
77
---
88
# Configuration Manager clients fail to communicate with CMG
99

10-
This article provides solutions for common issues when Configuration Manager clients fail to communicate with a Cloud Management Gateway (CMG).
10+
This article provides solutions to common issues when Configuration Manager clients fail to communicate with a Cloud Management Gateway (CMG).
1111

1212
_Original product version:_   Configuration Manager (current branch)
1313
_Original KB number:_   4503442, 4495265
@@ -33,7 +33,7 @@ Received response `https://InternalMP.contoso.com/SMS_MP/.sms_aut?MPLIST2&CM1` f
3333

3434
### Cause
3535

36-
The CMG connection point requires a [server authentication certificate](/mem/configmgr/core/clients/manage/cmg/certificates-for-cloud-management-gateway#bkmk_clientauth) to securely forward client requests to an HTTPS management point. If the server authentication certificate is missing, configured incorrectly, or invalid, status code 403 is returned. In scenarios in which the Management Point (MP) operates in enhanced HTTP mode with token-based authentication, the certificate isn't required but is always recommended.
36+
The CMG connection point requires a [server authentication certificate](/mem/configmgr/core/clients/manage/cmg/certificates-for-cloud-management-gateway#bkmk_clientauth) to securely forward client requests to an HTTPS management point. If the server authentication certificate is missing, misconfigured, or invalid, status code 403 is returned. In scenarios wh the Management Point (MP) operates in enhanced HTTP mode with token-based authentication, the certificate isn't required but is always recommended.
3737

3838
### Resolution
3939

@@ -42,7 +42,7 @@ To resolve this issue, generate a [server authentication certificate](/mem/confi
4242
> [!NOTE]
4343
> In the certificate, computers must have a unique value in the **Subject Name** or **Subject Alternative Name** field.
4444
45-
### How to verify CMG has a server certificate
45+
### How to verify the CMG has a server certificate
4646

4747
After you enable verbose logging, the **SMS_Cloud_ProxyConnector.log** file will show the list of available certificates on the server. To verify if a valid server authentication certificate to establish communication between the CMG connection point and the management point exists, check the number of certificates in the **Filtered cert count with client auth:** line. See the following log for an example:
4848

@@ -76,7 +76,7 @@ In the following log file, error messages that resemble the following entries ar
7676

7777
### Cause
7878

79-
There's a mismatch between the Internet Information Services (IIS) bindings and the management point in HTTP mode. If the management point is moved from HTTPS mode to enhanced HTTP mode, without cleaning the bindings, the Configuration Management client might not be able to configure an **SMS Role SSL certificate**, which is used in enhanced HTTP mode. In other situations, an incorrect certificate (expired or revoked) exists in the IIS bindings and needs to be cleaned.
79+
There's a mismatch between the Internet Information Services (IIS) bindings and the management point in HTTP mode. If the management point is moved from HTTPS mode to enhanced HTTP mode without cleaning the bindings, the Configuration Management client might be unable to configure an **SMS Role SSL certificate** used in enhanced HTTP mode. In other situations, an incorrect certificate (expired or revoked) exists in the IIS bindings and needs to be cleaned.
8080

8181
### Resolution
8282

@@ -86,9 +86,9 @@ There's a mismatch between the Internet Information Services (IIS) bindings and
8686

8787
1. In the right pane, select **Bindings**.
8888

89-
1. In the **Site Bindings** dialog box, select the 443 port binding, and then select **Edit**.
89+
1. In the **Site Bindings** dialog, select the 443 port binding, and then select **Edit**.
9090

91-
1. In the **Edit Site Binding** dialog box, select the certificate accordingly:
91+
1. In the **Edit Site Binding** dialog, select the certificate accordingly:
9292

9393
- Enhanced HTTP: **SMS Role SSL certificate**
9494

@@ -119,35 +119,35 @@ Before the error message, other events might also be logged:
119119

120120
> [!NOTE]
121121
>
122-
> - `WINHTTP_CALLBACK_STATUS_FLAG_CERT_REV_FAILED` indicates that the `/NoCRLCheck` parameter is missing with the `CCMSetup` command, and the certificate revocation list (CRL) isn't published on the internet.
122+
> - `WINHTTP_CALLBACK_STATUS_FLAG_CERT_REV_FAILED` indicates that the `/NoCRLCheck` parameter is missing from the `CCMSetup` command, and the certificate revocation list (CRL) isn't published on the Internet.
123123
>
124124
> - `WINHTTP_CALLBACK_STATUS_FLAG_INVALID_CA` indicates that the root certificate authority (CA) certificate required to validate the server authentication certificate for a CMG is missing.
125125
>
126-
> - `WINHTTP_CALLBACK_STATUS_FLAG_CERT_CN_INVALID` indicates that the host name in the certificate common name is incorrect.
126+
> - `WINHTTP_CALLBACK_STATUS_FLAG_CERT_CN_INVALID` indicates that the hostname in the certificate common name is incorrect.
127127
128128
### Cause
129129

130130
This issue occurs if one or more of the following conditions are true:
131131

132132
- The client doesn't have the necessary PKI Root CA to validate the server authentication certificate.
133133
- The certificate presented to the client is incorrect.
134-
- The CRL that contains the certificate isn't published on the Internet and the client is enforced to validate the CRL.
134+
- The CRL that contains the certificate isn't published on the Internet, and the client is forced to validate the CRL.
135135

136136
### Resolution
137137

138138
If you're using a PKI server authentication certificate, follow these steps:
139139

140140
1. Make sure that the certificate presented to the client has the expected CMG name. If you're using non-Microsoft services that use certificate pinning and modify the presented certificate, the clients can't validate the server certificate.
141141

142-
To verify which certificate is presented, open the following URL in the web browser:
142+
To verify which certificate is presented, open the following URL in a web browser:
143143

144144
`https://<CMGFQDN>/CCM_Proxy_MutualAuth/ServiceMetadata`
145145

146-
Replace the `<CMGFQDN>` placeholder with your CMG public fully qualified domain name (FQDN) name.
146+
Replace the `<CMGFQDN>` placeholder with your CMG public fully qualified domain name (FQDN).
147147

148-
2. Make sure that the client has the certificate in the Trusted Root Certification Authorities certificate store locally. Otherwise, the client doesn't trust the CMG, even when using Microsoft Entra or token-based authentication. This modern authentication method is only available for the CMG to validate the server authentication, but not in the responses sent from the CMG to the client. When you use a non-Microsoft certificate for the authentication, the client is typically able to validate the public Root CA over the Internet.
148+
2. Make sure that the client has the certificate in the local Trusted Root Certification Authorities certificate store. Otherwise, the client doesn't trust the CMG, even when using Microsoft Entra or token-based authentication. This modern authentication method is only available for the CMG to validate the server authentication but not for the responses sent from the CMG to the client. When you use a non-Microsoft certificate for authentication, the client can typically validate the public Root CA over the Internet.
149149

150-
3. If the CRL isn't published on the Internet, make sure that the site doesn't enforce clients to validate the CRL and disable CRL checking for clients:
150+
3. If the CRL isn't published on the Internet, make sure that the site doesn't force clients to validate the CRL and disable CRL checking for clients:
151151

152152
1. In the Configuration Manager console, navigate to the **Administration** workspace.
153153

@@ -160,11 +160,11 @@ If you're using a PKI server authentication certificate, follow these steps:
160160
1. On the **Communication Security** tab, clear the **Clients check the certificate revocation list (CRL) for site systems** checkbox.
161161

162162
> [!NOTE]
163-
> When installing clients from the Internet, make sure that the `/NoCRLCheck` parameter is included with the `CCMSetup` command.
163+
> When installing clients from the Internet, make sure that the `/NoCRLCheck` parameter is included in the `CCMSetup` command.
164164
165165
## Error code 401 (CMGService_Invalid_Token)
166166

167-
The client hasn't communicated with the site (via CMG or MP) for more than 30 days, or the `CCMSetup` command is attempting to use an expired token with the `/regtoken` parameter. In the following log files, error messages that resemble the following entries are logged:
167+
The client hasn't communicated with the site (via the CMG or MP) for more than 30 days, or the `CCMSetup` command is attempting to use an expired token with the `/regtoken` parameter. In the following log files, error messages that resemble the following entries are logged:
168168

169169
**Ccmsetup.log**
170170

@@ -185,7 +185,7 @@ Current time: '10/28/2020 13:05:05'.
185185

186186
### Cause
187187

188-
This issue occurs because the token is expired or not properly added, renew, and ensure a token is added.
188+
This issue occurs because the token has expired or wasn't properly added.
189189

190190
### Resolution
191191

@@ -197,10 +197,10 @@ For further troubleshooting, do the following actions:
197197

198198
- Check the IIS logs on the management point.
199199

200-
In the following sample log, the **403 7** response indicates that the server certificate can't be found:
200+
In the following sample log, the `403 7` response indicates that the server certificate can't be found:
201201

202202
> \<Date> \<Time> \<IP_address_of_MP> GET /SMS_MP/.sms_aut SITESIGNCERT 443 - \<IP_address_of_CMG_connectionpoint> SMS+CCM+5.0 - **403 7** 0 5573 11
203203
204-
- Enable verbose logging for the **SMS_Cloud_ProxyConnector.log** log file by setting the `VerboseLogging` registry entry value to `1` under the following registry key, and then restart the SMS_EXECUTIVE service.
204+
- Enable verbose logging for the **SMS_Cloud_ProxyConnector.log** file by setting the `VerboseLogging` registry entry value to `1` under the following registry key, and then restart the SMS_EXECUTIVE service.
205205

206206
`HKLM\SOFTWARE\MICROSOFT\SMS\SMS_CLOUD_PROXYCONNECTOR`

0 commit comments

Comments
 (0)