Posted on 07-31-2012 03:47 PM
Hi All,
On 10.7.x i've managed to knock up a profile that meant the clients would request a Machine certificate from our AD Certificate Authority. As per: http://support.apple.com/kb/HT4784
This now links to a new document for 10.8, http://support.apple.com/kb/HT5357.
This new profile is also available in 8.6, I've tried filling out the profile.. but it errors with the message:
The 'Active Directory Certificate' payload could not be installed. The certificate request failed.
If I manually download the profile from the JSS & then run, i'm prompted for a username & password.. none seemingly work.. also the apple document for 10.8 states:
Prompt for credentials: Disregard this option for computer certificates.
However, I do not see the option to disregard the prompts.. has anyone got this working or is it a bug?
Solved! Go to Solution.
Posted on 10-24-2012 11:58 AM
Hi All,
The resolution for me was on the CA.
Someone removed the Domain Computers group from the ACL.
Affectively blocking requests for computer Certs.
Once fixed, certs started installing.
Posted on 08-01-2012 10:37 AM
Ben, we're working on the same thing here. Would you mind sharing what you've got and I'll see what we can figure out here to help us both out? The big thing my PKI administrator grumbled about is that what comes down was exportable.
Posted on 08-01-2012 01:00 PM
Hi Jason,
Sent you 2 emails.
1 with payloads, other from MacEnterprise List where someone is having a similar issue.
Posted on 08-03-2012 07:11 AM
I'm seeing the below on the CA itself, i wonder if a possible MS hotfix has caused this issue as it's affecting more than just us & i tested my config on a known good setup & it failed too.
"The request was for a certificate template that is not supported by the Active Directory Certificate Services policy: Machine."
Posted on 09-14-2012 04:52 PM
Any luck getting this to work?
I think I am seeing the same error on AD computer cert request, when testing mountain lion.
Posted on 09-19-2012 01:22 PM
Have a ticket in with Jamf support on this one, any one else seeing this issue, or had luck getting AD certs applied via profiles with mountain lion?
Seeing profiles created by hand successfully requesting AD computer certs, however the one generated by the JSS fails with an error -319.
Interesting that the profile created by the JSS prompts for user credentials even though set to false...
Posted on 09-19-2012 05:44 PM
I haven't been able to get apple's request procedure to work in my environment at all, it seems to be some sort of IIS kerberos authentication problem.
i now do the cert request and download with curl and then insert the certificate using plistbuddy into a profile template created on a 10.8 server. THAT works, but it was a decent amount of work to set up.
Posted on 10-24-2012 07:32 AM
Has anyone made any progress with this using 8.6.2? I am getting the same issue with the profile failing with error -319.
Posted on 10-24-2012 08:31 AM
@colonelpanic are you at jnuc? I was able to get this working eventually.. happy to discuss.
Posted on 10-24-2012 11:04 AM
Yes I am! Whenever you have time that would be great!
Posted on 10-24-2012 11:58 AM
Hi All,
The resolution for me was on the CA.
Someone removed the Domain Computers group from the ACL.
Affectively blocking requests for computer Certs.
Once fixed, certs started installing.
Posted on 03-12-2013 09:35 PM
Hi Lisa, How did you get it working?
Posted on 03-14-2013 05:29 PM
Got it sorted.
klist -l
sudo kinit -k computername$
Read this for more info;
http://tinyurl.com/bljyoha
Because Profile Manager does not allow the entering of a username at all when selecting TLS at the EAP type, let alone something like %AD_ComputerID%, we chose Apple’s second recommendation and made a new certificate template within Active Directory. We duplicated the already existing “Machine” template and titled the duplicate “Mac_Computer”. See this screenshot of the modified settings for the “Mac_Computer” certificate template. Notice that the subject alternative name setting is set to “User Principal Name (UPN)” to match the requirement outline by Microsoft.
Posted on 04-13-2013 12:37 PM
@Kumarasinghe wrote:
2. You may also want to make sure that you have an Kerberos ticket for the Machine:klist -l
- If not make one:
sudo kinit -k computername$
You might consider properly attributing stuff you copy/paste from other members' posts. In this case you plagiarised @cfountain's post, including his typo... ;)
Thanks for the link to the MacEnterprise page. This is something we're going to take a look at, seems like there were attemtps to get this to work in the past, hoping for success this time around, since we need this capability.
Don