You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -33,7 +33,7 @@ Received response `https://InternalMP.contoso.com/SMS_MP/.sms_aut?MPLIST2&CM1` f
33
33
34
34
### Cause
35
35
36
-
The CMG connection point requires a [server authentication certificate](/mem/configmgr/core/clients/manage/cmg/certificates-for-cloud-management-gateway#bkmk_clientauth) to securely forward client requests to an HTTPS management point. If the server authentication certificate is missing, configured incorrectly, or invalid, status code 403 is returned. In scenarios in which the Management Point (MP) operates in enhanced HTTP mode with token-based authentication, the certificate isn't required but is always recommended.
36
+
The CMG connection point requires a [server authentication certificate](/mem/configmgr/core/clients/manage/cmg/certificates-for-cloud-management-gateway#bkmk_clientauth) to securely forward client requests to an HTTPS management point. If the server authentication certificate is missing, misconfigured, or invalid, status code 403 is returned. In scenarios wh the Management Point (MP) operates in enhanced HTTP mode with token-based authentication, the certificate isn't required but is always recommended.
37
37
38
38
### Resolution
39
39
@@ -42,7 +42,7 @@ To resolve this issue, generate a [server authentication certificate](/mem/confi
42
42
> [!NOTE]
43
43
> In the certificate, computers must have a unique value in the **Subject Name** or **Subject Alternative Name** field.
44
44
45
-
### How to verify CMG has a server certificate
45
+
### How to verify the CMG has a server certificate
46
46
47
47
After you enable verbose logging, the **SMS_Cloud_ProxyConnector.log** file will show the list of available certificates on the server. To verify if a valid server authentication certificate to establish communication between the CMG connection point and the management point exists, check the number of certificates in the **Filtered cert count with client auth:** line. See the following log for an example:
48
48
@@ -76,7 +76,7 @@ In the following log file, error messages that resemble the following entries ar
76
76
77
77
### Cause
78
78
79
-
There's a mismatch between the Internet Information Services (IIS) bindings and the management point in HTTP mode. If the management point is moved from HTTPS mode to enhanced HTTP mode, without cleaning the bindings, the Configuration Management client might not be able to configure an **SMS Role SSL certificate**, which is used in enhanced HTTP mode. In other situations, an incorrect certificate (expired or revoked) exists in the IIS bindings and needs to be cleaned.
79
+
There's a mismatch between the Internet Information Services (IIS) bindings and the management point in HTTP mode. If the management point is moved from HTTPS mode to enhanced HTTP mode without cleaning the bindings, the Configuration Management client might be unable to configure an **SMS Role SSL certificate** used in enhanced HTTP mode. In other situations, an incorrect certificate (expired or revoked) exists in the IIS bindings and needs to be cleaned.
80
80
81
81
### Resolution
82
82
@@ -86,9 +86,9 @@ There's a mismatch between the Internet Information Services (IIS) bindings and
86
86
87
87
1. In the right pane, select **Bindings**.
88
88
89
-
1. In the **Site Bindings** dialog box, select the 443 port binding, and then select **Edit**.
89
+
1. In the **Site Bindings** dialog, select the 443 port binding, and then select **Edit**.
90
90
91
-
1. In the **Edit Site Binding** dialog box, select the certificate accordingly:
91
+
1. In the **Edit Site Binding** dialog, select the certificate accordingly:
92
92
93
93
- Enhanced HTTP: **SMS Role SSL certificate**
94
94
@@ -119,35 +119,35 @@ Before the error message, other events might also be logged:
119
119
120
120
> [!NOTE]
121
121
>
122
-
> -`WINHTTP_CALLBACK_STATUS_FLAG_CERT_REV_FAILED` indicates that the `/NoCRLCheck` parameter is missing with the `CCMSetup` command, and the certificate revocation list (CRL) isn't published on the internet.
122
+
> -`WINHTTP_CALLBACK_STATUS_FLAG_CERT_REV_FAILED` indicates that the `/NoCRLCheck` parameter is missing from the `CCMSetup` command, and the certificate revocation list (CRL) isn't published on the Internet.
123
123
>
124
124
> -`WINHTTP_CALLBACK_STATUS_FLAG_INVALID_CA` indicates that the root certificate authority (CA) certificate required to validate the server authentication certificate for a CMG is missing.
125
125
>
126
-
> -`WINHTTP_CALLBACK_STATUS_FLAG_CERT_CN_INVALID` indicates that the host name in the certificate common name is incorrect.
126
+
> -`WINHTTP_CALLBACK_STATUS_FLAG_CERT_CN_INVALID` indicates that the hostname in the certificate common name is incorrect.
127
127
128
128
### Cause
129
129
130
130
This issue occurs if one or more of the following conditions are true:
131
131
132
132
- The client doesn't have the necessary PKI Root CA to validate the server authentication certificate.
133
133
- The certificate presented to the client is incorrect.
134
-
- The CRL that contains the certificate isn't published on the Internet and the client is enforced to validate the CRL.
134
+
- The CRL that contains the certificate isn't published on the Internet, and the client is forced to validate the CRL.
135
135
136
136
### Resolution
137
137
138
138
If you're using a PKI server authentication certificate, follow these steps:
139
139
140
140
1. Make sure that the certificate presented to the client has the expected CMG name. If you're using non-Microsoft services that use certificate pinning and modify the presented certificate, the clients can't validate the server certificate.
141
141
142
-
To verify which certificate is presented, open the following URL in the web browser:
142
+
To verify which certificate is presented, open the following URL in a web browser:
Replace the `<CMGFQDN>` placeholder with your CMG public fully qualified domain name (FQDN) name.
146
+
Replace the `<CMGFQDN>` placeholder with your CMG public fully qualified domain name (FQDN).
147
147
148
-
2. Make sure that the client has the certificate in the Trusted Root Certification Authorities certificate store locally. Otherwise, the client doesn't trust the CMG, even when using Microsoft Entra or token-based authentication. This modern authentication method is only available for the CMG to validate the server authentication, but not in the responses sent from the CMG to the client. When you use a non-Microsoft certificate for the authentication, the client is typically able to validate the public Root CA over the Internet.
148
+
2. Make sure that the client has the certificate in the local Trusted Root Certification Authorities certificate store. Otherwise, the client doesn't trust the CMG, even when using Microsoft Entra or token-based authentication. This modern authentication method is only available for the CMG to validate the server authentication but not for the responses sent from the CMG to the client. When you use a non-Microsoft certificate for authentication, the client can typically validate the public Root CA over the Internet.
149
149
150
-
3. If the CRL isn't published on the Internet, make sure that the site doesn't enforce clients to validate the CRL and disable CRL checking for clients:
150
+
3. If the CRL isn't published on the Internet, make sure that the site doesn't force clients to validate the CRL and disable CRL checking for clients:
151
151
152
152
1. In the Configuration Manager console, navigate to the **Administration** workspace.
153
153
@@ -160,11 +160,11 @@ If you're using a PKI server authentication certificate, follow these steps:
160
160
1. On the **Communication Security** tab, clear the **Clients check the certificate revocation list (CRL) for site systems** checkbox.
161
161
162
162
> [!NOTE]
163
-
> When installing clients from the Internet, make sure that the `/NoCRLCheck` parameter is included with the `CCMSetup` command.
163
+
> When installing clients from the Internet, make sure that the `/NoCRLCheck` parameter is included in the `CCMSetup` command.
164
164
165
165
## Error code 401 (CMGService_Invalid_Token)
166
166
167
-
The client hasn't communicated with the site (via CMG or MP) for more than 30 days, or the `CCMSetup` command is attempting to use an expired token with the `/regtoken` parameter. In the following log files, error messages that resemble the following entries are logged:
167
+
The client hasn't communicated with the site (via the CMG or MP) for more than 30 days, or the `CCMSetup` command is attempting to use an expired token with the `/regtoken` parameter. In the following log files, error messages that resemble the following entries are logged:
168
168
169
169
**Ccmsetup.log**
170
170
@@ -185,7 +185,7 @@ Current time: '10/28/2020 13:05:05'.
185
185
186
186
### Cause
187
187
188
-
This issue occurs because the token is expired or not properly added, renew, and ensure a token is added.
188
+
This issue occurs because the token has expired or wasn't properly added.
189
189
190
190
### Resolution
191
191
@@ -197,10 +197,10 @@ For further troubleshooting, do the following actions:
197
197
198
198
- Check the IIS logs on the management point.
199
199
200
-
In the following sample log, the **403 7** response indicates that the server certificate can't be found:
200
+
In the following sample log, the `403 7` response indicates that the server certificate can't be found:
- Enable verbose logging for the **SMS_Cloud_ProxyConnector.log**log file by setting the `VerboseLogging` registry entry value to `1` under the following registry key, and then restart the SMS_EXECUTIVE service.
204
+
- Enable verbose logging for the **SMS_Cloud_ProxyConnector.log** file by setting the `VerboseLogging` registry entry value to `1` under the following registry key, and then restart the SMS_EXECUTIVE service.
0 commit comments