Duplicate root certificates on MECM clients an issue?

Steve 401 Reputation points
2022-11-28T16:06:49.61+00:00

Is there any sort of issues or security risks that can occur with a duplicate root certificate (Intended Purposes is All) deployed to Windows clients/servers from an internal PKI infrastructure?

For MECM root certificates, it's not clear in the below link if the intended purposes should be set to All or something more specific such as client authentication only if someone can clarify and possibly send a link that is more detailed on MECM root certificate configuration configuration/requirements.

https://learn.microsoft.com/en-us/mem/configmgr/core/plan-design/network/pki-certificate-requirements

Auto enrollment seems to be failing on some clients and an option is to use a GPO as a backup method to make sure clients receive the root cert. Targeting the GPO to only clients that are missing the cert is possible but adds more management overhead. A configuration item/baseline deployment may be another option, but this may not work on clients that are not receiving the root cert.

Windows Server Security
Windows Server Security
Windows Server: A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.Security: The precautions taken to guard against crime, attack, sabotage, espionage, or another threat.
1,728 questions
Microsoft Configuration Manager
0 comments No comments
{count} votes

6 answers

Sort by: Most helpful
  1. Jason Sandys 31,156 Reputation points Microsoft Employee
    2022-12-02T20:04:59.12+00:00

    The client authentication cert issued to the FQDN of the host under Local Computer>Personal>Certificates client certification path requires the PKI root cert to be deployed.

    As noted, this is only true for PKI issued certs and not self-signed certs as self-signed certs don't have root authorities.

    To clarify, when I look in certmgr under Local Computer>Trusted Root Certification Authorities>Certificates on a MECM client, all of the root certs are either set to <All> or to something more specific such as Time Stamping for Intended Purposes.

    Ah, OK. That purpose simply calls out what purposes are valid for certs issued by that CA and have no true impact or significance.

    Should the PKI deployed root cert deployed be left to <All> for intended purposes or set to something more specific such as only server and client authentication?

    That's determined by the PKI's configuration as noted and is not something you should change. The purpose is metadata set when the root CAs cert is imported into the system. As noted, it's based on the certs eligible to be issued by that CA/PKI. Changing it limits systems from trusting certs issued by that PKI based on the purpose of the cert which in general probably is not desirable. Bottom line is to not change anything about the root CA's cert.

    0 comments No comments