Skip to content

Commit bbf2b29

Browse files
author
Simonx Xu
committed
Update cmg-communication-error.md
1 parent 1b5d9d6 commit bbf2b29

1 file changed

Lines changed: 7 additions & 7 deletions

File tree

support/mem/configmgr/client-management/cmg-communication-error.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.reviewer: kaushika, bmoran
77
---
88
# Configuration Manager clients fail to communicate with CMG
99

10-
This article provides resolutions for common issues when Configuration Manager clients fail to communicate with a Cloud Management Gateway (CMG).
10+
This article provides solutions for common issues when Configuration Manager clients fail to communicate with a Cloud Management Gateway (CMG).
1111

1212
_Original product version:_   Configuration Manager (current branch)
1313
_Original KB number:_   4503442, 4495265
@@ -37,14 +37,14 @@ The CMG connection point requires a [server authentication certificate](/mem/con
3737

3838
### Resolution
3939

40-
To fix this issue, generate a [server authentication certificate](/mem/configmgr/core/clients/manage/cmg/certificates-for-cloud-management-gateway#bkmk_clientauth) for the CMG connection point.
40+
To resolve this issue, generate a [server authentication certificate](/mem/configmgr/core/clients/manage/cmg/certificates-for-cloud-management-gateway#bkmk_clientauth) for the CMG connection point.
4141

4242
> [!NOTE]
4343
> In the certificate, computers must have a unique value in the **Subject Name** or **Subject Alternative Name** field.
4444
45-
### How to verify CMG has a server certificate?
45+
### How to verify CMG has a server certificate
4646

47-
After you enable verbose logging, the **SMS_Cloud_ProxyConnector.log** file will show the list of available certificates on the server. To verify if a valid server authentication certificate to establish communication between the CMG connection point and the management point exist, check the number of certificates in the **Filtered cert count with client auth:** line. See the following log for an example:
47+
After you enable verbose logging, the **SMS_Cloud_ProxyConnector.log** file will show the list of available certificates on the server. To verify if a valid server authentication certificate to establish communication between the CMG connection point and the management point exists, check the number of certificates in the **Filtered cert count with client auth:** line. See the following log for an example:
4848

4949
**SMS_Cloud_ProxyConnector.log**
5050

@@ -131,13 +131,13 @@ This issue occurs if one or more of the following conditions are true:
131131

132132
- The client doesn't have the necessary PKI Root CA to validate the server authentication certificate.
133133
- The certificate presented to the client is incorrect.
134-
- The CRL that contains the certificate isn't published on the Internet and client is enforced to validate the CRL.
134+
- The CRL that contains the certificate isn't published on the Internet and the client is enforced to validate the CRL.
135135

136136
### Resolution
137137

138138
If you're using a PKI server authentication certificate, follow these steps:
139139

140-
1. Make sure that the certificate presented to client has the expected CMG name. If you're using third-party services that use certificate pining and modify the presented certificate, the clients can't validate the server certificate.
140+
1. Make sure that the certificate presented to the client has the expected CMG name. If you're using third-party services that use certificate pinning and modify the presented certificate, the clients can't validate the server certificate.
141141

142142
To verify which certificate is presented, open the following URL in the web browser:
143143

@@ -193,7 +193,7 @@ To renew the expired token, connect the client to the internal MP directly or re
193193

194194
## More information
195195

196-
For further troubleshooting, of Client to CMG communication issues, we recommend next actions:
196+
For further troubleshooting, do the following actions:
197197

198198
- Check the IIS logs on the management point.
199199

0 commit comments

Comments
 (0)