Updated: Step by Step Guide to Setting Up System Center Configuration Manager to Support Management and Installation of the ConfigMgr Client on Mac OS Computers
Published Sep 30 2019 06:27 PM 2,230 Views
Microsoft

First published on TECHNET on Oct 04, 2014

Authored by Clifton Hughes


I have recently had several requests asking about the support for managing Mac OSx computers in System Center 2012 R2 Configuration Manager, so I went to work in my lab and successfully set this up. There were so many different articles around the needed certificates, roles, client settings, etc... that I felt it would help to have it all documented in a single place. I hope you find this information useful.


I followed this documentation on TechNet to deploy the needed certs and roles in ConfigMgr 2012 R2
https://docs.microsoft.com/en-us/previous-versions/system-center/system-center-2012-R2/gg682023(v=te... and I had to manually configure the Mac computer’s hosts file for resolving the Servername.lab.local FQDN, this would not be needed in a production environment, it was due to my Virtual Lab not being on the same LAN as my MacBook.

First we need to create and issue and request/install the three certificates/templates required for supporting Mac OSx clients with System Center 2012 R2 Configuration Manager:


Deploying the Web Server Certificate for Site Systems that Run IIS


Creating and Issuing the Web Server Certificate Template on the Certification Authority

This procedure creates a certificate template for Configuration Manager site systems and adds it to the certification authority.

To create and issue the web server certificate template on the certification authority

  1. Create a security group named ConfigMgr IIS Servers that contains the member servers to install System Center 2012 Configuration Manager site systems that will run IIS.
  2. On the member server that has Certificate Services installed, in the Certification Authority console, right-click Certificate Templates and click Manage to load the Certificate Templates console.
  3. In the results pane, right-click the entry that displays Web Server in the column Template Display Name, and then click Duplicate Template.
  4. In the Duplicate Template dialog box, ensure that Windows 2003 Server, Enterprise Edition is selected, and then click OK.
    NOTE: Do not select Windows 2008 Server, Enterprise Edition.
  5. In the Properties of New Template dialog box, on the General tab, enter a template name to generate the web certificates that will be used on Configuration Manager site systems, such as ConfigMgr Web Server Certificate.
  6. Click the Subject Name tab, and make sure that Supply in the request is selected.
  7. Click the Security tab, and remove the Enroll permission from the security groups Domain Admins and Enterprise Admins.
  8. Click Add, enter ConfigMgr IIS Servers in the text box, and then click OK.
  9. Select the Enroll permission for this group, and do not clear the Read permission.
  10. Click OK, and close the Certificate Templates Console.
  11. In the Certification Authority console, right-click Certificate Templates, click New, and then click Certificate Template to Issue.
  12. In the Enable Certificate Templates dialog box, select the new template that you have just created, ConfigMgr Web Server Certificate, and then click OK.
  13. If you do not need to create and issue any more certificate, close Certification Authority.


Requesting the Web Server Certificate

This procedure allows you to specify the intranet and Internet FQDN values that will be configured in the site system server properties, and then installs the web server certificate on to the member server that runs IIS.

 

  1. Restart the member server that runs IIS, to ensure that the computer can access the certificate template that you created, by using the Read and Enroll permissions that you configured.
  2. Click Start, click Run, and type mmc.exe. In the empty console, click File, and then click Add/Remove Snap-in.
  3. In the Add or Remove Snap-ins dialog box, select Certificates from the list of Available snap-ins, and then click Add.
  4. In the Certificate snap-in dialog box, select Computer account, and then click Next.
  5. In the Select Computer dialog box, ensure Local computer: (the computer this console is running on) is selected, and then click Finish.
  6. In the Add or Remove Snap-ins dialog box, click OK.
  7. In the console, expand Certificates (Local Computer), and then click Personal.
  8. Right-click Certificates, click All Tasks, and then click Request New Certificate.
  9. On the Before You Begin page, click Next.
  10. If you see the Select Certificate Enrollment Policy page, click Next.
  11. On the Request Certificates page, identify the ConfigMgr Web Server Certificate from the list of displayed certificates, and then click More information is required to enroll for this certificate. Click here to configure settings.
  12. In the Certificate Properties dialog box, in the Subject tab, do not make any changes to the Subject name. This means that the Value box for the Subject name section remains blank. Instead, from the Alternative name section, click the Type drop-down list, and then select DNS. Update, 09/04/2017 going through this process again with SCCM Current Branch 1706 and macOS Sierra version 10.12.6, I had to provide the Subject Name and the DNS FQDN for the Mac SCCM Client to trust the Root Certificate Authority in my lab, even though I had installed the Trusted Root CA cert into the User and System keychains. Once I requested the Web Server Cert with the Subject Name as the FQDN of the HTTPS MP/DP, and modified it in IIS to use this newly imported certificate, then the Mac SCCM Client was able to check in and it showed up in SCCM current Branch as a client!
  13. In the Value box, specify the FQDN values that you will specify in the Configuration Manager site system properties, and then click OK to close the Certificate Properties dialog box.
    Examples:  If the site system will only accept client connections from the intranet, and the intranet FQDN of the site system server is server1.internal.contoso.com:  Type server1.internal.contoso.com, and then click Add. If the site system will accept client connections from the intranet and the Internet, and the intranet FQDN of the site system server is server1.internal.contoso.com and the Internet FQDN of the site system server is server.contoso.com:   Type server1.internal.contoso.com, and then click Add. And then type server.contoso.com, and then click Add. Note: It does not matter in which order you specify the FQDNs for Configuration Manager. However, check that all devices that will use the certificate, such as mobile devices and proxy web servers, can use a certificate SAN and multiple values in the SAN. If devices have limited support for SAN values in certificates, you might have to change the order of the FQDNs or use the Subject value instead.
  14. On the Request Certificates page, select ConfigMgr Web Server Certificate from the list of displayed certificates, and then click Enroll.
  15. On the Certificates Installation Results page, wait until the certificate is installed, and then click Finish.
  16. Close Certificates (Local Computer).


Configuring IIS to Use the Web Server Certificate

This procedure binds the installed certificate to the IIS Default Web Site.

 

  1. On the member server that has IIS installed, click Start, click Programs, click Administrative Tools, and then click Internet Information Services (IIS) Manager.
  2. Expand Sites, right-click Default Web Site, and then select Edit Bindings.
  3. Click the https entry, and then click Edit.
  4. In the Edit Site Binding dialog box, select the certificate that you requested by using the ConfigMgr Web Server Certificates template, and then click OK. Note: If you are not sure which is the correct certificate, select one, and then click View. This allows you to compare the selected certificate details with the certificates that are displayed with the Certificates snap-in. For example, the Certificates snap-in displays the certificate template that was used to request the certificate. You can then compare the certificate thumbprint of the certificate that was requested with the ConfigMgr Web Server Certificates template with the certificate thumbprint of the certificate currently selected in the Edit Site Binding dialog box. Update 09/04/2017 If you put the FQDN of the HTTPS MP/DP Server into the Subject Name field using the common name property, then it will show up as that name in the drop down when you edit the https binding.
  5. Click OK in the Edit Site Binding dialog box, and then click Close.
  6. Close Internet Information Services (IIS) Manager.


The member server is now provisioned with a Configuration Manager web server certificate. Important: When you install the Configuration Manager site system server on this computer, make sure that you specify the same FQDNs in the site system properties as you specified when you requested the certificate.



Deploying the Client Certificate for Distribution Points

Creating and Issuing a Custom Workstation Authentication Certificate Template on the Certification Authority

This procedure creates a custom certificate template for Configuration Manager distribution points that allows the private key to be exported, and adds the certificate template to the certification authority.

Note : This procedure uses a different certificate template from the certificate template that you created for client computers, because although both certificates require client authentication capability, the certificate for distribution points requires that the private key is exported. As a security best practice, do not configure certificate templates to allow the private key to be exported unless this configuration is required. The distribution point requires this configuration because you must import the certificate as a file, rather than select it from the certificate store. By creating a new certificate template for this certificate, you can restrict which computers request a certificate that allows the private key to be exported. In our example deployment, this will be the security group that you previously created for Configuration Manager site system servers that run IIS. On a production network that distributes the IIS site system roles, consider creating a new security group for the servers that run distribution points so that you can restrict the certificate to just these site system servers. You might also consider adding the following modifications for this certificate:

 

• Require approval to install the certificate, for additional security.

• Increase the certificate validity period. Because you must export and import the certificate each time before it expires, increasing the validity period reduces how often you must repeat this procedure. However, when you increase the validity period, it decreases the security of the certificate because it provides more time for an attacker to decrypt the private key and steal the certificate.

• Use a custom value in the certificate Subject field or Subject Alternative Name (SAN) to help identify this certificate from standard client certificates. This can be particularly helpful if you will use the same certificate for multiple distribution points.


To create and issue the custom Workstation Authentication certificate template on the certification authority

 

  1. On the member server that is running the Certification Authority console, right-click Certificate Templates, and then click Manage to load the Certificate Templates management console.
  2. In the results pane, right-click the entry that displays Workstation Authentication in the column Template Display Name, and then click Duplicate Template.
  3. In the Duplicate Template dialog box, ensure that Windows 2003 Server, Enterprise Edition is selected, and then click OK. Important: Do not select Windows 2008 Server, Enterprise Edition.
  4. In the Properties of New Template dialog box, on the General tab, enter a template name to generate the client authentication certificate for distribution points, such as ConfigMgr Client Distribution Point Certificate.
  5. Click the Request Handling tab, and select Allow private key to be exported.
  6. Click the Security tab, and remove the Enroll permission from the Enterprise Admins security group.
  7. Click Add, enter ConfigMgr IIS Servers in the text box, and then click OK.
  8. Select the Enroll permission for this group, and do not clear the Read permission.
  9. Click OK and close Certificate Templates Console.
  10. In the Certification Authority console, right-click Certificate Templates, click New, and then click Certificate Template to Issue.
  11. In the Enable Certificate Templates dialog box, select the new template that you have just created, ConfigMgr Client Distribution Point Certificate, and then click OK.
  12. If you do not have to create and issue any more certificates, close Certification Authority.


Requesting the Custom Workstation Authentication Certificate

This procedure requests and then installs the custom client certificate on to the member server that runs IIS and that will be configured as a distribution point.

 

  1. Click Start, click Run, and type mmc.exe. In the empty console, click File, and then click Add/Remove Snap-in.
  2. In the Add or Remove Snap-ins dialog box, select Certificates from the list of Available snap-ins, and then click Add.
  3. In the Certificate snap-in dialog box, select Computer account, and then click Next.
  4. In the Select Computer dialog box, ensure Local computer: (the computer this console is running on) is selected, and then click Finish.
  5. In the Add or Remove Snap-ins dialog box, click OK.
  6. In the console, expand Certificates (Local Computer), and then click Personal.
  7. Right-click Certificates, click All Tasks, and then click Request New Certificate.
  8. On the Before You Begin page, click Next.
  9. If you see the Select Certificate Enrollment Policy page, click Next.
  10. On the Request Certificates page, select the ConfigMgr Client Distribution Point Certificate from the list of displayed certificates, and then click Enroll.
  11. On the Certificates Installation Results page, wait until the certificate is installed, and then click Finish.
  12. In the results pane, confirm that a certificate is displayed that has Client Authentication displayed in the Intended Purpose column, and that ConfigMgr Client Distribution Point Certificate is displayed in the Certificate Template column.
  13. Do not close Certificates (Local Computer).


Exporting the Client Certificate for Distribution Points

This procedure exports the custom Workstation Authentication certificate to a file, so that it can be imported in the distribution point properties.

 

  1. In the Certificates (Local Computer) console, right-click the certificate that you have just installed, select All Tasks, and then click Export.
  2. In the Certificates Export Wizard, click Next.
  3. On the Export Private Key page, select Yes, export the private key, and then click Next.
    Note :If this option is not available, the certificate has been created without the option to export the private key. In this scenario, you cannot export the certificate in the required format. You must reconfigure the certificate template to allow the private key to be exported, and then request the certificate again.
  4. On the Export File Format page, ensure that the option Personal Information Exchange - PKCS #12 (.PFX) is selected.
  5. On the Password page, specify a strong password to protect the exported certificate with its private key, and then click Next.
  6. On the File to Export page, specify the name of the file that you want to export, and then click Next.
  7. To close the wizard, click Finish in the Certificate Export Wizard page, and click OK in the confirmation dialog box.
  8. Close Certificates (Local Computer).
  9. Store the file securely and ensure that you can access it from the Configuration Manager console. The certificate is now ready to be imported when you configure the distribution point.


Creating and Issuing a Mac Client Certificate Template on the Certification Authority

This procedure creates a custom certificate template for Configuration Manager Mac computers and adds the certificate template to the certification authority. Note: This procedure uses a different certificate template from the certificate template that you might have created for Windows client computers or for distribution points. By creating a new certificate template for this certificate, you can restrict the certificate request to authorized users.

To create and issue the Mac client certificate template on the certification authority

  1. Create a security group that contains user accounts for administrative users who will enroll the certificate on the Mac computer by using Configuration Manager.
  2. On the member server that is running the Certification Authority console, right-click Certificate Templates, and then click Manage to load the Certificate Templates management console.
  3. In the results pane, right-click the entry that displays Authenticated Session in the column Template Display Name, and then click Duplicate Template.
  4. In the Duplicate Template dialog box, ensure that Windows 2003 Server, Enterprise Edition is selected, and then click OK. Important: Do not select Windows 2008 Server, Enterprise Edition
  5. In the Properties of New Template dialog box, on the General tab, enter a template name to generate the Mac client certificate, such as ConfigMgr Mac Client Certificate.
  6. Click the Subject Name tab, make sure that Build from this Active Directory information is selected, select Common name for the Subject name format: and clear User principal name (UPN) from Include this information in alternate subject name.
  7. Click the Security tab, and remove the Enroll permission from the Domain Admins and Enterprise Admins security groups.
  8. Click Add, specify the security group that you created in step one, and then click OK.
  9. Select the Enroll permission for this group, and do not clear the Read permission.
  10. Click OK and close Certificate Templates Console.
  11. In the Certification Authority console, right-click Certificate Templates, click New, and then click Certificate Template to Issue.
  12. In the Enable Certificate Templates dialog box, select the new template that you have just created, ConfigMgr Mac Client Certificate, and then click OK.
  13. If you do not have to create and issue any more certificates, close Certification Authority. The Mac client certificate template is now ready to be selected when you configure client settings for enrollment.


Installing the Roles in Configuration Manager to support the Mac Client Enrollment

I adapted the steps in this section from this article: http://technet.microsoft.com/en-us/library/gg712327.aspx We need to install a total of 4 roles in order to support the Mac OSx Computers as clients and to enroll them in the System Center 2012 R2 Configuration Manager Environment.

    • Enrollment Point
    • Enrollment Proxy Point
    • Management Point
    • Distribution Point


Ensure that the new Site Server we are installing these roles on is configured with an Internet FQDN. In addition, these site system roles must be in a primary site. Check the Site System Role properties for this server to ensure it is configured with an Internet FQDN, even if you are configuring it with the same FQDN as the internal server name.

To configure management points and distribution points for supporting Mac Clients

  1. In the Configuration Manager console, click Administration.
  2. In the Administration workspace, expand Site Configuration, select Servers and Site System Roles, and then select the server that hosts the site system roles to configure.
  3. In the details pane, right-click Management point, click Role Properties, and in the Management Point Properties dialog box, configure the following options: Select HTTPS. Select Allow Internet-only client connections or Allow intranet and Internet client connections. These options require that an Internet FQDN is specified in the site system properties. Select Allow mobile devices and Mac computers to use this management point, and then click OK.
  4. In the details pane, right-click Distribution point, click Role Properties, and in the Distribution Point Properties dialog box, configure the following options: Select HTTPS. Select Allow Internet-only client connections or Allow intranet and Internet client connections. These options require that an Internet FQDN is specified in the site system properties. Click Import certificate, browse to the exported client distribution point certificate file, and then specify the password, and then click OK.



To install and configure the enrollment site systems on a New site system server

 

  1. In the Configuration Manager console, click Administration.
  2. In the Administration workspace, expand Site Configuration, and click Servers and Site System Roles
  3. On the Home tab, in the Create group, click Create Site System Server.
  4. On the General page, specify the general settings for the site system, and then click Next. Important: Make sure that you specify the Internet FQDN, even if it is the same value as the intranet FQDN. Mobile devices that are enrolled by Configuration Manager always connect to the Internet FQDN, even when they are on the intranet.
  5. On the System Role Selection page, select Enrollment proxy point and Enrollment point from the list of available roles, and then click Next.
  6. On the Enrollment Proxy Point page, review the settings and make any changes that you require, and then click Next.
  7. On the Enrollment Point Settings page, review the settings and make any changes that you require, and then click Next.
  8. Complete the wizard.


Configuring the Client Settings for Mac Computer Enrollment

The first procedure in this step configures the default client settings for mobile device enrollment and will apply to all users in hierarchy. If you want these settings to apply to only some users, create a custom user setting and assign it to a collection that contains users who you will allow to enroll their mobile devices. The second procedure in this step configures the default client settings for the mobile device polling interval and hardware inventory to apply to all mobile devices in the hierarchy that Configuration Manager enrolls. The hardware inventory settings also apply to client computers. If you want these settings to apply to only mobile devices or to selected mobile devices, create a custom device setting and assign it to a collection that contains the enrolled mobile devices that you want to configure with these settings.  For more information about how to create custom client settings, see How to Create and Assign Custom Client Settings .



To configure the default client settings for Mac Client enrollment

 

  1. In the Configuration Manager console, click Administration.
  2. In the Administration workspace, click Client Settings.
  3. Click Default Client Settings.
  4. On the Home tab, in the Properties group, click Properties.
  5. Select the Enrollment section, and then configure the following user settings: Mobile device enrollment profile: Click Set Profile and configure it as follows: Allow users to enroll mobile devices and Mac computers: Yes, Enrollment profile: Click Set Profile.
  6. In the Enrollment Profile, click Create.
  7. In the dialog box, enter a name for this Mac Computer enrollment profile, and then configure the Management site code. Select the System Center 2012 Configuration Manager primary site that contains the management points that will manage these mobile devices. Note: If you cannot select the site, check that at least one management point in the site is configured to support mobile devices, and ensure it is configured for Both Intranet and Internet connections, this is also the setting we should be using in the Distribution Point properties as well.
  8. Click Add.
  9. In the Add Certification Authority for Mobile Devices dialog box, select the certification authority (CA) server that will issue certificates to mobile devices, and then click OK.
  10. In the Create Mobile Device Enrollment Profile dialog box (Configuration Manager with no service pack) or Create Enrollment Profile dialog box (Configuration Manager SP1), select the mobile device certificate template that you created in III. A. 5. above “ConfigMgr Mac Client Certificate”, and then click OK.
  11. Click OK to close the dialog box, and then click OK to close the Default Client Settings dialog box.


Installing the SCCM Mac Client

There currently is no automated method for installing Mac Clients in Configuration Manager, you will need to perform these steps to do this on each client or find a scripting method to automate the process if possible. I adapted these steps from this article: https://docs.microsoft.com/en-us/previous-versions/system-center/system-center-2012-R2/jj591553(v=te... and this article:

 

  1. Download the Mac OS X client file package, ConfigmgrMacClient.msi, and save it to a computer that runs Windows. This file is not supplied on the Configuration Manager installation media. You can download this file from the Microsoft System Center Configuration Manager - Clients for Additional Operating Systems. I updated this link to the latest Other Client Download released on 04/28/2018.
  2. On the Windows computer, run the ConfigmgrMacClient.msi file that you just downloaded to extract the Mac client package, Macclient.dmg to a folder on the local disk (by default C:\Program Files (x86)\Microsoft\System Center 2012 Configuration Manager Mac Client\).
  3. Copy the Macclient.dmg file to a folder on the Mac computer.
  4. On the Mac computer, run the Macclient.dmg file that you just downloaded to extract the files to a folder on the local disk.
  5. In the folder, ensure that the files Ccmsetup and CMClient.pkg are extracted and that a folder named Tools is created that contains the CMDiagnostics, CMUninstall, CMAppUtil and CMEnroll tools.
  6. Next extract the .dmg package file for the latest version of the SCCM 2012 Mac Client to desktop of my Mac Computer, and navigated to the folder using Terminal and ran the following command to install the ccm client: sudo ./ccmsetup
  7. Wait until you see the Completed installation message. Although the installer displays a message that you must restart now, do not restart now but continue to the next step.
  8. After you have finished installing the client the Computer Enrollment wizard opens. Click Next to continue past the welcome page. Note: If the wizard does not open, or if you accidentally close the wizard, click Enroll from the Configuration Manager preference page to open the wizard.
  9. On the next page of the wizard, specify the following information : User Name, Password, and Server FQDN, the user name can be in domain\user or user@domain.com format: NOTE: When you use an email address to populate the User name field, Configuration Manager automatically uses the domain name of the email address and the default name of the enrollment proxy point server to populate the Server name field. If this domain name and server name do not match the name of the enrollment proxy point server, you must advise your users of the correct name to use, so that they can enter this when enrolling their Mac computers. The user name and corresponding password must match an Active Directory user account that is granted Read and Enroll permissions on the Mac client certificate template.
  10. Click Next to continue, and then complete the wizard and restart the Mac computer and you should be able see it as a new device in the All Systems Collection in the ConfigMgr 2012 R2 Admin Console, as well as get hardware inventory, and be able to deploy applications and compliance settings to your Mac Clients.


How to Create Mac Computer Configuration Items in Configuration Manager:
https://docs.microsoft.com/en-us/previous-versions/system-center/system-center-2012-R2/jj687949(v=te... Update this is old information and only works on older Mac OS versions 10.6 or earlier. This is the updated article/blog here: https://configmgrblog.com/2014/06/13/set-user-preferences-mac-os-x-10-x-configmgr-2012-r2/


Deploy OS X Applications With Configuration Manager (should be the same for SCCM 2012/R2 and Current Branch):
http://www.jamesbannanit.com/2012/11/deploy-os-x-applications-with-configuration-manager-2012-sp1/...

You can download the System Center Endpoint Protection Agent for Mac from your Volume License site from Microsoft, and use the blog above to create and deploy this as an Application for your Mac Clients.

Compliance Settings can be used with Detection and Remediation Scripts to configure settings such as turning the firewall on or off automatically by using these scripts to read and change settings in plist files on the Mac Clients. https://configmgrblog.com/2014/06/13/set-user-preferences-mac-os-x-10-x-configmgr-2012-r2/

 

Troubleshooting and Certificate Revocation List publishing.

After some time, my Mac client stopped connecting to the Management Point and found that in the MPControl.log I was getting 443 errors. This was related to the Certificate Revocation List (CRL) not being published in my lab and I followed this article to disable this feature since my certs will not expire for 10 years, and you may do the same, although it is not really a best practice it is a workaround I found here: http://blogs.msdn.com/b/kaushal/archive/2012/10/15/disable-client-certificate-revocation-check-on-...

 

After following this on the HTTPS SCCM Server, and restarting IIS, my Mac Client was able to connect again.

I recommend following up with Microsoft Support for assistance with the Certificate Authority Configuration in order to properly publish the Certificate Revocation List as part of your certificate template in order to ensure your clients can access the CRL URL. Here is an article to get you started:

 

https://social.technet.microsoft.com/wiki/contents/articles/485.how-to-publish-the-crl-on-a-separat...

The SCCM Https Server has some logs that can be helpful in troubleshooting Mac Clients in Configuration Manager. X:\SMS_CCM\Logs folder this is the Management Point logs of the HTTPS Management Point.

DMPRP.log is for Mac Client Policy actions.

MP_Location.log will show Mac Client activity for Application Deployment Content location requests to help troubleshooting Application Deployments to Mac Computers.

On the Mac Client under ~Library/Logs and User/Library/Application Support/Microsoft/CCM/Logs are the logs for the CCMClient on the Mac Client.

I updated my SCCM to 1706 this past August 21st, and on Sept 4th 2017 I got a MacBook Pro Sierra 10.12.6 working as an SCCM Client. I have disabled CRL Checking in my Lab in SCCM and in IIS per this for the IIS part:


https://blogs.msdn.microsoft.com/kaushal/2012/10/15/disable-client-certificate-revocation-crl-check...

Also after having trouble with the client not being able to communicate with the MP with the Certificate has untrusted root, I found this info:

 

https://social.technet.microsoft.com/Forums/en-US/9412b298-8480-4141-a12d-3bd8fe12d9b8/configmgr-201...

This led me to the adding the common name to the Subject Name field in the ConfigMgr Web Server Certificate request, once I provided both the common name and the DNS name, the Mac Client was able to communicate with the HTTPS MP.

Cliff

Version history
Last update:
‎Oct 15 2019 02:01 PM
Updated by: