Skip to content

Latest commit

 

History

History
139 lines (80 loc) · 8.6 KB

plan-for-security.md

File metadata and controls

139 lines (80 loc) · 8.6 KB
title titleSuffix description ms.date ms.subservice ms.service ms.topic author ms.author manager ms.localizationpriority ms.collection ms.reviewer
Plan for security
Configuration Manager
Get best practices and other information about security in Configuration Manager.
08/02/2021
core-infra
configuration-manager
conceptual
Banreet
banreetkaur
apoorvseth
medium
tier3
essentials-security
mstewart,aaroncz

Plan for security in Configuration Manager

Applies to: Configuration Manager (current branch)

This article describes the following concepts for you to consider when planning for security with your Configuration Manager implementation:

  • Certificates (self-signed and PKI)

  • The trusted root key

  • Signing and encryption

  • Role-based administration

  • Microsoft Entra ID

  • SMS Provider authentication

Before you start, make sure you're familiar with the fundamentals of security in Configuration Manager.

Certificates

Configuration Manager uses a combination of self-signed and public key infrastructure (PKI) digital certificates. Use PKI certificates whenever possible. Some scenarios require PKI certificates. When PKI certificates aren't available, the site automatically generates self-signed certificates. Some scenarios always use self-signed certificates.

For more information, see Plan for certificates.

The trusted root key

The Configuration Manager trusted root key provides a mechanism for Configuration Manager clients to verify that site systems belong to their hierarchy. Every site server generates a site exchange key to communicate with other sites. The site exchange key from the top-level site in the hierarchy is called the trusted root key.

The function of the trusted root key in Configuration Manager resembles a root certificate in a public key infrastructure. Anything signed by the private key of the trusted root key is trusted further down the hierarchy. Clients store a copy of the site's trusted root key in the root\ccm\locationservices WMI namespace.

For example, the site issues a certificate to the management point, which it signs with the private key of the trusted root key. The site shares with clients the public key of its trusted root key. Then clients can differentiate between management points that are in their hierarchy and management points that aren't in their hierarchy.

Clients automatically get the public copy of the trusted root key by using two mechanisms:

  • You extend the Active Directory schema for Configuration Manager, and publish the site to Active Directory Domain Services. Then clients retrieve this site information from a global catalog server. For more information, see Prepare Active Directory for site publishing.

  • When you install clients using the client push installation method. For more information, see Client push installation.

If clients can't get the trusted root key by using one of these mechanisms, they trust the trusted root key that's provided by the first management point that they communicate with. In this scenario, a client might be misdirected to an attacker's management point where it would receive policy from the rogue management point. This action requires a sophisticated attacker. This attack is limited to the short time before the client retrieves the trusted root key from a valid management point. To reduce this risk of an attacker misdirecting clients to a rogue management point, pre-provision the clients with the trusted root key.

For more information and procedures to manage the trusted root key, see Configure security.

Signing and encryption

When you use PKI certificates for all client communications, you don't have to plan for signing and encryption to help secure client data communication. If you set up any site systems that run IIS to allow HTTP client connections, decide how to help secure the client communication for the site.

Important

Starting in Configuration Manager version 2103, sites that allow HTTP client communication are deprecated. Configure the site for HTTPS or Enhanced HTTP. For more information, see Enable the site for HTTPS-only or enhanced HTTP.

To help protect the data that clients send to management points, you can require clients to sign the data. You can also require the SHA-256 algorithm for signing. This configuration is more secure, but don't require SHA-256 unless all clients support it. Many operating systems natively support this algorithm, but older operating systems might require an update or hotfix.

While signing helps protect the data from tampering, encryption helps protect the data from information disclosure. You can enable encryption for the inventory data and state messages that clients send to management points in the site. You don't have to install any updates on clients to support this option. Clients and management points require more CPU usage for encryption and decryption.

Note

To encrypt the data, the client uses the public key of the management point's encryption certificate. Only the management point has the corresponding private key, so only it can decrypt the data.

The client bootstraps this certificate with the management point's signing certificate, which it bootstraps with the site's trusted root key. Make sure to securely provision the trusted root key on clients. For more information, see The trusted root key.

For more information about how to configure the settings for signing and encryption, see Configure signing and encryption.

For more information on the cryptographic algorithms used for signing and encryption, see Cryptographic controls technical reference.

Role-based administration

With Configuration Manager, you use role-based administration to secure the access that administrative users need to use Configuration Manager. You also secure access to the objects that you manage, like collections, deployments, and sites.

With the combination of security roles, security scopes, and collections, you segregate the administrative assignments that meet your organization's requirements. Used together, they define the administrative scope of a user. This administrative scope controls the objects that an administrative user views in the Configuration Manager console, and it controls the permissions that a user has on those objects.

For more information, see Fundamentals of role-based administration.

Microsoft Entra ID

Configuration Manager integrates with Microsoft Entra ID to enable the site and clients to use modern authentication.

For more information about Microsoft Entra ID, see Microsoft Entra documentation.

Onboarding your site with Microsoft Entra ID supports the following Configuration Manager scenarios:

Client scenarios

Server scenarios

SMS Provider authentication

[!INCLUDE SMS Provider authentication]

Next steps