Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration



Similar documents
Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration

Intel Remote Configuration Certificate Utility Frequently Asked Questions

with PKI Use Case Guide

Intel Management Engine BIOS Extension (Intel MEBX) User s Guide

Intel Setup and Configuration Software (Intel SCS) User Guide. Version 9.0

Intel Retail Client Manager

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Intel Setup and Configuration Software (Intel SCS) Release Notes. Version 9.0

Intel HTML5 Development Environment. Tutorial Test & Submit a Microsoft Windows Phone 8* App (BETA)

Intel System Event Log (SEL) Viewer Utility

User Experience Reference Design

iscsi Quick-Connect Guide for Red Hat Linux

Secure IIS Web Server with SSL

Intel Data Migration Software

Intel HTML5 Development Environment Article Using the App Dev Center

Software Solutions for Multi-Display Setups

e-cert (Server) User Guide For Microsoft IIS 7.0

Intel System Event Log (SEL) Viewer Utility

Intel Retail Client Manager

Intel System Event Log (SEL) Viewer Utility

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

Intel Internet of Things (IoT) Developer Kit

Intel System Event Log (SEL) Viewer Utility. User Guide SELViewer Version 10.0 /11.0 December 2012 Document number: G

Intel HTML5 Development Environment. Article - Native Application Facebook* Integration

Intel Management and Security Status Application

Intel AMT Configuration Utility. User Guide. Version 8.2

Intel Media SDK Library Distribution and Dispatching Process

SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide

Intel HTML5 Development Environment. Tutorial Building an Apple ios* Application Binary

Use QNAP NAS for Backup

Intel Setup and Configuration Software (Intel SCS)

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Installation Guide. SafeNet Authentication Service

Mobility Manager 9.0. Installation Guide

Intel Management and Security Status Application

etoken Enterprise For: SSL SSL with etoken

Intel Identity Protection Technology (IPT)

Installing an SSL Certificate Provided by a Certificate Authority (CA) on the BlueSecure Controller (BSC)

How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Intel Management and Security Status Application

NSi Mobile Installation Guide. Version 6.2

Intel Small Business Advantage (Intel SBA) Release Notes for OEMs

Installing an SSL Certificate Provided by a Certificate Authority (CA) on the vwlan Appliance

APNS Certificate generating and installation

System Image Recovery* Training Foils

SolarWinds Technical Reference

Intel vpro Technology Use Case Reference Design

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

Active Directory Rights Management Service Integration Guide

Intel Entry Storage System SS4000-E

Creating Overlay Networks Using Intel Ethernet Converged Network Adapters

Intel Management Engine Software

Renewing an SSL Certificate Provided by a Certificate Authority (CA) on the vwlan Appliance

Intel Matrix Storage Console

Intel vpro Technology. Common-Use Guide. For the Kaseya IT Automation Platform* Introduction

Intel SSD 520 Series Specification Update

LumInsight CMS Installation Guide

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

Intel Technical Advisory

Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1.

Mobile Secure Cloud Edition Document Version: ios Application Signing

IIS 6.0SSL Certificate Deployment Guide

Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide

Revision History. Revision Revision History Date

Dell One Identity Cloud Access Manager Installation Guide

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

This guide explains how to install an Intel Solid-State Drive (Intel SSD) in a SATA-based desktop or notebook computer.

Setting Up SSL on IIS6 for MEGA Advisor

Intel Active Management Technology with System Defense Feature Quick Start Guide

Millennium Drive. Installation Guide

Generating SSH Keys and SSL Certificates for ROS and ROX Using Windows AN22

Citrix XenServer Workload Balancing Quick Start. Published February Edition

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0

Technical Certificates Overview

Microsoft IIS Integration Guide

Software Evaluation Guide for Microsoft Office Excel 2010* and WinZip 15.5*

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

OrgChart Now SSL Certificate Installation. OfficeWork Software LLC

Out-of-Band Management Reference

ISY994 Series Network Security Configuration Guide Requires firmware version Requires Java 1.7+

Configuration Guide for Intel vpro Technology with Microsoft* ConfigMgr SP2

Dell Statistica Statistica Enterprise Installation Instructions

Creating an Apple APNS Certificate

Dell One Identity Cloud Access Manager How to Configure for High Availability

EM L12 Symantec Mobile Management and Managed PKI Hands-On Lab

Start Here Guide. INTEL ACTIVE MANAGEMENT TECHNOLOGY i (INTEL AMT) Start Here Guide (Intel AMT 9.0)

RSA Security Analytics

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR

Dell Statistica Document Management System (SDMS) Installation Instructions

Version Rev. 1.0

Intel(R) IT Director User's Guide

Intel Integrated Native Developer Experience (INDE): IDE Integration for Android*

Hardening Guide for EventTracker Server

Intel Service Assurance Administrator. Product Overview

SSL Management Reference

System Event Log (SEL) Viewer User Guide

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Lepide Software Asset Management

Transcription:

Intel vpro Technology How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Document Release Date: September 14, 2012

Revision History Revision Revision History Date 1.0 First release. September 14, 2012 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling 1-800-548-4725, or go to: http://www.intel.com/design/literature.htm%20 Intel vpro Technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit: http://www.intel.com/technology/vpro. Intel Active Management Technology (Intel AMT) requires activation and a system with a corporate network connection, an Intel AMT-enabled chipset, network hardware and software. For notebooks, Intel AMT may be unavailable or limited over a host OS-based VPN, when connecting wirelessly, on battery power, sleeping, hibernating or powered off. Results dependent upon hardware, setup and configuration. For more information, visit Intel Active Management Technology. Intel, the Intel logo, Intel AMT, and Intel vpro are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others. Microsoft Windows* operating system screenshots used with permission from Microsoft. Symantec SSL Certificate data and screenshots Copyright 2012 Symantec Corporation. All rights reserved. Symantec SSL Certificate reprinted with permission from Symantec Corporation. Symantec* web screenshots used with permission from Symantec. Copyright 2012 Intel Corporation. All rights reserved. ii

Contents 1 Preface... 2 1.1 Document Scope... 2 1.2 Supported Intel AMT Versions... 2 1.3 Intended Audience... 2 1.4 Prerequisites... 2 2 Purchase a Symantec* Certificate... 4 3 Prepare the Certificate... 16 4 Install the Certificate... 25 4.1 Install the Intermediate Certificates... 25 4.2 Install the pfx Certificates... 25 5 Verify that it Works... 31 A Create a Certificate Signing Request... 32 B Installing the Certificates... 38 1

1 Preface Intel Active Management Technology (Intel AMT) must be setup and configured before you can use the remote manageability and security features. One method is to install Intel Setup and Configuration Software (Intel SCS) and then use remote configuration. Remote configuration uses Transport Layer Security (TLS) between the Intel SCS Remote Configuration Server and the remote PCs with Intel AMT firmware. The Intel AMT firmware is pre-loaded with TLS certificate thumbprints from six different certificate vendors so all you need to do is install a third-party certificate on the Remote Configuration Server. This document includes step-by-step instructions on how to purchase and install a Symantec* SSL certificates (formerly called VeriSign*) that will match the pre-installed Symantec* thumbprint and allow you to use remote configuration and maintenance using Intel SCS. 1.1 Document Scope This document does not include specific steps to install the Symantec* certificate on other management consoles. For consoles that do not use Intel SCS 8, please refer to the vendor s documentation for installing the certificate. The steps used to purchase the certificate are the same for all management consoles. 1.2 Supported Intel AMT Versions See the Intel AMT Firmware Remote Configuration Hash Matrix for a complete listing. Users may need to update the Intel ME firmware to a version that supports the latest Symantec root. 1.3 Intended Audience This document is intended for Information Technology (IT) professionals who will be purchasing and installing the TLS certificates. Readers should have a basic understanding of their IT infrastructure, especially Microsoft* Internet Information Service, the Microsoft Management Console, and a basic familiarity with TLS certificates. 1.4 Prerequisites The Intel SCS User Guide provides information on the prerequisites for using the remote configuration service. Before starting this process, you should have the following: Intel SCS Remote Configuration Service installed on a supported Microsoft* operating system 2

One or more domain names for your network (Microsoft* Workgroups are not supported) Microsoft* Internet Information Service (IIS) running on the server that is hosting the remote configuration service (used in this example to create the certificate signing request (CSR) Account permissions to install the certificate 3

2 Purchase a Symantec* Certificate 1. Go to Symantec s Symantec* Authentication Services web site: www.symantec.com 2. Choose Buy SSL Certificates. 3. Intel AMT requires a certain type of SSL certificate and it has specific requirements for the contents of the Certificate Signing Request (CSR). The following two types of Symantec SSL certificates are compatible with Intel AMT: Symantec Secure Site (Standard SSL) Symantec Secure Site Pro (Premium SSL) For a comparison of the features in the two types of certificates, click on the Compare All SSL Certificates link. 4

4. From the Symantec SSL Certificates page, select Buy Now under the Secure Site. 5. At the Configure Your SSL Certificate menu, enter the following: select how long you would like this certificate to be valid before having to renew this certificate; enter how many Servers to be secured; and select how many additional domains to secure. Note that the cost of the certificate goes up with the length of the validity period. In this example we selected 1-year validity period. The free Intel Remote Configuration Certificate Utility can help you select the right certificate for your environment: http://communities.intel.com/docs/doc-2734#cf Choose Continue. 5

6. At the Sign-in screen, enter your log in information or choose Create an Account. 6

7

7. To create an account, fill in the appropriate account information and choose Continue. 8. At the Contact menu, fill in the organization that owns the Intel Remote Configuration Service website and will use the SSL certificate. This link provides the necessary information on obtaining the Intel AMT setup and configuration certificate. https://knowledge.symantec.com/support/ssl-certificatessupport/index?page=content&id=so10703&actp=search&viewlocale=en_us&searchi d=1345135454693 Click Continue. 8

Verify that the Department field is set to exactly Intel(R) Client Setup Certificate without the quote marks. 9

9. Fill in the appropriate payment information and click Continue. 10. Review your information at the Summary page and accept the terms of the agreement. 11. Choose Order & Continue. 10

12. On the Certificate Signing Request page, Symantec offers both an automated tool to generate the CSR and a manual method. Details are provided for the two different methods. In our example, we used the manual method. Please refer to the step by 11

step instructions in Appendix A (page 32). Paste your CSR in the available window. Click Submit CSR 12

13. The CSR is has now been submitted and is in the pending approval process. The verification process typically takes 5 to 7 business days to complete. During the process, Symantec checks the organization authentication information and the registered domain name. 14. Once the verification process is complete, the certificate will be available for downloading. Return to the Symantec* website and choose Pick up certificate. 13

15. Choose your installation method and save the certificate installer files. 14

Save the Zip file on your Remote Configuration Service (RCS) Server so you can complete the re-keying of the certificate with the server that generated the CSR. In this example, the Zip file contains three files: Sslassistant_installcert.exe Sslassistant_installcert.exe.config Readme_installcert.txt 15

3 Prepare the Certificate 1. Double-click sslassistant_installcert.exe to launch it. Verify the that the domain name is correct and that OU is set to Intel(R) Client Setup Certificate. Choose Install certificate 2. At the Bind HTTPS menu, leave at defaults and click Continue. 16

3. The certificate is now installed in the Microsoft* IIS. Choose Done 17

4. To export the certificate to PFX, open Internet Information Services Manager. Right click on Default Web Site and choose Edit Bindings. 5. From the Site Bindings, choose Edit. 18

6. The Edit Site Bindings panel opens. Choose View. 19

7. Choose Details tab at the Certificate page. 20

8. In the Details page, click Copy to File. 9. Choose Next at the Certificate Export Wizard page. 21

10. Choose Yes, export the private key and then choose Next. 11. Choose Next at the Export File Format page. 22

12. Enter a password to protect the private key. 13. Specify a location and file name for the PFX file. Choose Next. 23

14. Complete the request by choosing Finish. 24

4 Install the Certificate The first step is to import the intermediate certificate into the Current User Intermediate Certificate Authorities Store of the service account for the RCS server. Next, install the pfx certificates and chain them up to the intermediate certificates. 4.1 Install the Intermediate Certificates Install the Symantec Primary and Secondary SSL Intermediate CA Certificates according to your Certificate type. Follow the instructions provided by Symantec in this link: https://knowledge.symantec.com/support/ssl-certificatessupport/index?page=content&id=so10703&actp=search&viewlocale=en_us&searchi d=1345135454693 The Intermediate CA's should be located in the Certificates folder under Intermediate Certification Authorities. The Intermediate CA's can be downloaded from the Symantec knowledgebase in article AR657 and installed using instructions from solution SO4302 Appendix B of this document shows an alternative method, used in this example, to install the two intermediate CA certificates. 4.2 Install the pfx Certificates Once the intermediate Certificate Authorities are in place, logon as the service account for the RCS server. The pfx certificate created earlier will be installed and chained to the intermediate certificates. The.pfx certificate will be imported into the Current User Personal Certificate Store. 25

1. Double-click on the.pfx file where you saved it. Choose Next. 26

2. Enter in the password and select the Mark Key as exportable, and Include all extended properties. 3. Leave the default to place automatically in certificate store. Choose Next. 27

4. Choose Finish. 5. The certificate is now installed in the Current User Personal Certificates store. To verify the chain, double click scs53pv.vprodemo.com. 28

6. In the Certificate Information menu, confirm there are no errors. Check that the private key corresponds to the certificate. Click the Certificate Path tab. 7. Check that the certificate is mapped to the intermediate Certificate Authorities as shown. Double click on the root cert named Symantec. 29

8. Verify there are no errors with the root certificate and click Details. 9. In the Details section, scroll down and highlight the Thumbprint. The number must match what is shown below. This Intel AMT setup and configuration certificate can now be used with the Intel SCS remote configuration service (RCS) for remote configuration and maintenance of PCs with Intel AMT. 30

5 Verify that it Works To verify that the certificate works in your environment, create a test environment with one or more Intel AMT capable PCs that have not previously been setup and configured. Follow the instruction in the Intel SCS documentation to try Host Based Configuration in Admin Control mode. If successful, then your certificate is installed correctly. If you purchased a wildcard certificate, then you should repeat the tests in the other subdomains. 31

A Create a Certificate Signing Request The following instructions were captured using Microsoft* Internet Information Services (IIS) for Windows* Server 2008 R2. To create a Certificate Signing Request, do the following: 1. On your Intel SCS remote configuration server, open Programs Administrative Tools Internet Information Services (IIS) Manager. 32

2. In the Internet Information Services (IIS) Manager, open the Server Certificate icon. 3. Choose Create Certificate Request from the Actions menu. 33

4. Fill-in the Distinguished Name Properties form: Common Name: The common name or CN, for standard certificates, is the RCS server hostname plus a domain suffix. To determine if the certificate is valid, the client compares the domain portion of the Common Name to the value returned by DHCP option 15, or, if set, to the Secure DNS Suffix or Provisioning Server FQDN value set in the client s MEBX. For help in understanding the rules for determining if the two values match, and support for 2 nd and 3 rd level domains in each version of Intel AMT, refer to the Domain Suffix Guide for Intel AMT Remote Configuration Process. If you are purchasing a wildcard certificate then you can use one certificate to span different branches in the domain forest. For wildcard certificates, use an asterisk followed by a domain suffix in the CN. Example 1 (CN=RCS Server FQDN): In this example, assume that the DHCP Option 15 has been set to vprodemo.com, and that you did not set the Secure DNS Suffix or the Provision Server FQDN values in the client s MEBX. Then, if your Remote Configuration Service (RCS) is running on SCS53PV.vprodemo.com, set CN=SCS53PV.vprodemo.com. You can verify the DHCP Option 15 setting by running the SCSDiscovery utility (provided with Intel SCS) on the client. The DHCP Option 15 setting is called the OSSpecificDNSSuffix. Example 2 (CN=RCS server host with client DNS Suffix) In this example, the DHCP option 15 value has been set to vprodemo.edu for the environment. If your Remote Configuration Service is running on myrcs.vprodemo.com, set the certificate CN=myRCS.vprodemo.edu. Organization: The name of the organization that is requesting the certificate and owns the domain Organizational Unit: Intel(R) Client Setup Certificate City: The requesting organization s city State: The requesting organization s state (spell it out) Country: The requesting organization s two letter country code Note: the Organizational Unit must be set to exactly Intel(R) Client Setup Certificate without the quote marks. Choose Next. 34

35

5. Leave the Cryptographic Service Provider set to Microsoft RSA SChannel Cryptographic Provider and select 2048 as your key Bit Length. Choose Next. 6. Choose the button to select a location. Enter a file name to store the certificate request and then choose submit. Click Finish. 7. This file, VeriSign_vPro_cert in our example, will be used to submit your certificate signing request (CSR) to Symantec* for an Intel AMT Setup and Configuration certificate. You can open the file in Notepad to view encrypted certificate request. 36

37

B Installing the Certificates To install the Symantec* certificates, do the following: 1. Click on the following link to obtain the Primary and Secondary Intermediate Certificate Authorities. https://knowledge.symantec.com/support/ssl-certificatessupport/index?page=content&id=ar657 38

2. Copy the Primary and Secondary extracts and save using a.cer extension. 3. Double-click on the Primary Intermediate CA and click Install Certificate. 39

4. Choose Next at the Certificate Import Wizard. 5. At the Certificate Store, leave as defaults and choose Next. 6. Choose Finish to complete the certificate import. 40

7. Repeat the same steps for the Secondary Intermediate CA. 8. The certificates are now listed in the Current Users store under Intermediate Certification Authorities. 41