Skip to content

Commit a2f387f

Browse files
author
Thomas Raya
authored
Merge pull request #7665 from MicrosoftDocs/main
OOB Publish
2 parents a454c23 + 6ce7e6e commit a2f387f

4 files changed

Lines changed: 91 additions & 17 deletions

File tree

Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
---
2+
title: Client registration fails after updating to Configuration Manager current branch, version 2203
3+
titleSuffix: Configuration Manager
4+
description: Client registration fails in Configuration Manager 2203
5+
ms.date: 05/23/2022
6+
ms.prod: configuration-manager
7+
ms.technology: configmgr-core
8+
ms.topic: reference
9+
ms.assetid: 18919f4e-e479-484a-902f-6d49c58c1448
10+
author: bhuney
11+
ms.author: brianhun
12+
manager: dougeby
13+
---
14+
# Registration fails for PKI clients after updating to Configuration Manager current branch, version 2203
15+
16+
*Applies to: Configuration Manager (current branch, version 2203)*
17+
18+
## Summary of KB14480034
19+
After updating to Configuration Manager current branch, version 2203, the registration process fails for clients using public key infrastructure (PKI) for client authentication if they are unable to authenticate against the domain. This affects the following scenarios:
20+
21+
- Newly installed workgroup clients using PKI.
22+
- Clients that are joining an AD or Azure AD domain for the first time, generating a new device identity.
23+
- Existing clients that are trying to renew their client authentication certificate.
24+
25+
When this issue happens, the following error is logged in the DDM.log file on the site server for each affected client.
26+
```textgit s
27+
ClientIdentity is not a hex string
28+
The registration record is not valid. Bad RDR
29+
```
30+
The .RDR file(s) will be moved to *..\auth\ddm.box\regreq\bad_ddrs* on the site server.
31+
32+
## Update information for Microsoft Endpoint Configuration Manager, version 2203
33+
An update to resolve this issue is available in the **Updates and Servicing** node of the Configuration Manager console for environments that installed version 2203.
34+
Customers using the early update ring version must first install the following update:
35+
- KB [13953025](../../hotfix/2203/13953025.md): Update for Microsoft Endpoint Configuration Manager version 2203, early update ring
36+
37+
Members of the Technology Adoption Program (TAP) must first apply the private TAP rollup.
38+
39+
#### Update replacement information
40+
This update does not replace any previously released updates.
41+
42+
#### Restart information
43+
This update does not require a computer restart or a [site reset](../../core/servers/manage/modify-your-infrastructure.md#bkmk_reset) after installation.
44+
45+
### Additional installation information
46+
After you install this update on a primary site, pre-existing secondary sites must be manually updated. To update a secondary site in the Configuration Manager console, select **Administration** > **Site Configuration** > **Sites** > **Recover Secondary Site**, and then select the secondary site. The primary site then reinstalls that secondary site by using the updated files. Configurations and settings for the secondary site are not affected by this reinstallation. The new, upgraded, and reinstalled secondary sites under that primary site automatically receive this update.
47+
48+
Run the following SQL Server command on the site database to check whether the update version of a secondary site matches that of its parent primary site:
49+
```sql
50+
select dbo.fnGetSecondarySiteCMUpdateStatus ('SiteCode_of_secondary_site')
51+
```
52+
If the value 1 is returned, the site is up to date, with all the hotfixes applied on its parent primary site.
53+
54+
If the value 0 is returned, the site has not installed all the fixes that are applied to the primary site, and you should use the **Recover Secondary Site** option to update the secondary site.
55+
56+
## Version information
57+
No major components are updated with this release.
58+
59+
## File information
60+
File information is available in the downloadable [KB14480034_FileList.txt](https://aka.ms/KB14480034_FileList) text file.
61+
62+
## Release history
63+
- May 23, 2022: Initial hotfix release
64+
65+
## References
66+
[Updates and servicing for Configuration Manager](../../core/servers/manage/updates.md)

memdocs/configmgr/hotfix/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@ items:
77
href: 2203/13174460.md
88
- name: KB 13953025 Early update ring
99
href: 2203/13953025.md
10+
- name: KB 14480034 Client registration fails in Configuration Manager 2203
11+
href: 2203/14480034.md
1012
- name: Version 2111
1113
items:
1214
- name: KB 10096997 Summary of changes in 2111

memdocs/intune/developer/app-sdk-ios.md

Lines changed: 14 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 02/28/2022
10+
ms.date: 05/23/2022
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: developer
@@ -172,26 +172,32 @@ In `- startProvidingItemAtURL:completionHandler:` check if you should encrypt fi
172172

173173
In `- importDocumentAtURL:toParentItemIdentifier:completionHandler:` check whether the file is encrypted using `isFileEncrytped:` API in `IntuneMAMFileProtectionManager`. If it is then decrypt it using `decryptFile:toCopyPath:` API of `IntuneMAMFileProtectionManager`.
174174

175-
## Configure MSAL
175+
## Setup MSAL
176176

177177
The Intune App SDK uses the [Microsoft Authentication Library](https://github.com/AzureAD/microsoft-authentication-library-for-objc) for its authentication and conditional launch scenarios. It also relies on MSAL to register the user identity with the MAM service for management without device enrollment scenarios.
178178

179179
### Set up and configure an AAD app registration
180180
MSAL requires apps to [register](/azure/active-directory/develop/quickstart-register-app) with Azure Active Directory (AAD) and create a unique client ID and redirect URI, to guarantee the security of the tokens granted to the app. If your application already uses MSAL for its own authentication, then there should already be an AAD app registration/client ID/redirect URI associated with the app.
181181

182-
Developers should [grant their new or existing app registration access to the Intune MAM service](../developer/app-sdk-get-started.md#give-your-app-access-to-the-intune-app-protection-service-optional), to ensure the application is able to successfully acquire MAM policies.
182+
If your app does not already use MSAL, you will need to configure an app registration in AAD and specify the client ID and redirect URI that the Intune SDK should use.
183183

184-
### Link to MSAL binaries
184+
If your app currently uses ADAL to authenticate users, see [Migrate applications to MSAL for iOS and macOS](/azure/active-directory/develop/migrate-objc-adal-msal) for more information on migrating your app from ADAL to MSAL.
185185

186186
It is recommended that your app links to the latest release of [MSAL](https://github.com/AzureAD/microsoft-authentication-library-for-objc/releases).
187187

188-
Follow [these instructions](https://github.com/AzureAD/microsoft-authentication-library-for-objc#installation) to link your app to the MSAL binaries.
188+
### Link MSAL to Your Project
189189

190-
1. If your app does not have any keychain access groups defined, add the app's bundle ID as the first group.
190+
Follow the [installation](https://github.com/AzureAD/microsoft-authentication-library-for-objc#installation) section to put the MSAL binaries in your app.
191191

192-
2. Enable MSAL single sign-on (SSO) by adding `com.microsoft.adalcache` to the keychain access groups.
192+
### Configure MSAL
193193

194-
3. In the case you are explicitly setting the MSAL shared cache keychain group, make sure it is set to `<appidprefix>.com.microsoft.adalcache`. MSAL will set this for you unless you override it. If you want to specify a custom keychain group to replace `com.microsoft.adalcache`, specify that in the Info.plist file under IntuneMAMSettings, by using the key `ADALCacheKeychainGroupOverride`.
194+
Follow the [configuration](https://github.com/AzureAD/microsoft-authentication-library-for-objc#configuring-msal) section to configure MSAL. Make sure you follow all the steps in the configuration section. Disregard step one if your app is already registered in AAD.
195+
196+
The points below contain additional information to configure MSAL and link to it. Follow these if they apply to your application.
197+
198+
* If your app does not have any keychain access groups defined, add the app's bundle ID as the first group.
199+
* Enable MSAL single sign-on (SSO) by adding `com.microsoft.adalcache` to the keychain access groups.
200+
* In the case you are explicitly setting the MSAL shared cache keychain group, make sure it is set to `<appidprefix>.com.microsoft.adalcache`. MSAL will set this for you unless you override it. If you want to specify a custom keychain group to replace `com.microsoft.adalcache`, specify that in the Info.plist file under IntuneMAMSettings, by using the key `ADALCacheKeychainGroupOverride`.
195201

196202

197203
### Configure MSAL settings for the Intune App SDK

memdocs/intune/user-help/you-need-to-enable-secure-boot-windows.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
# required metadata
33

44
title: Enable Secure Boot on Windows devices - Microsoft Intune | Microsoft Docs
5-
description: Learn how to make your device compliant again by enabling Secure Boot.
5+
description: Learn how to make your enrolled device compliant again by enabling Secure Boot.
66
keywords:
77
author: lenewsad
88
ms.author: lanewsad
99
manager: dougeby
10-
ms.date: 10/04/2021
10+
ms.date: 05/23/2022
1111
ms.topic: end-user-help
1212
ms.prod:
1313
ms.localizationpriority: high
@@ -31,18 +31,19 @@ ms.collection:
3131
---
3232

3333

34-
# Enable Secure Boot on Windows device
34+
# Enable Secure Boot on enrolled Windows device
3535

36-
Secure Boot is a security standard developed by members of the PC industry to help make sure that a device boots using only software that is trusted by the original equipment manufacturer (OEM). Your organization's device management policies might require you to enable it before you access their internal resources.
36+
Secure Boot is a security standard developed by members of the PC industry to help ensure that a device boots using only software that's trusted by the original equipment manufacturer (OEM). Your organization's device management policies may require you to enable it on your enrolled Windows device. Devices that don't meet this requirement may be unable to access work or school resources.
3737

38-
If you're using a mobile device, contact your support person and they'll help enable Secure Boot for you.
38+
## Enable Secure Boot
39+
If your enrolled device is a mobile device, contact your support person and they'll help enable Secure Boot for you.
3940

40-
If you're using a PC, you can either:
41+
If your enrolled device is a PC, you can either:
4142

4243
* Contact your support person for help.
4344
* Enable Secure Boot from the PC BIOS menu. For step-by-step instructions, see [Re-enable Secure Boot](/windows-hardware/manufacture/desktop/disabling-secure-boot#re-enable-secure-boot).
4445

45-
### Check Secure Boot status
46+
## Check Secure Boot status
4647
To check the status of Secure Boot on your PC:
4748

4849
1. Go to Start.
@@ -53,5 +54,4 @@ To check the status of Secure Boot on your PC:
5354
## Next steps
5455

5556
* For more detailed information about the Secure Boot feature, see the [Windows Developer Hardware docs](/windows-hardware/manufacture/desktop/secure-boot-landing).
56-
57-
* Still need help? Contact your support person. For contact information, check the [Company Portal website](https://go.microsoft.com/fwlink/?linkid=2010980).
57+
* Still need help? Contact your support person if you're having trouble enabling Secure Boot or if it appears enabled already. Sign in to the [Company Portal website](https://go.microsoft.com/fwlink/?linkid=2010980) to check for your support person's contact information.

0 commit comments

Comments
 (0)