Configuration Manager Current Branch: Non-Trusted Domains
By Jason Rutherford
Published November 3, 2016
Estimated Reading Time: 2 minutes

Howdy! I’m going to make this blog short and to the point because this topic can be cumbersome and intimidating to approach. It was difficult finding a concise blog giving me all the answers I needed. The scenario is a customer was wanting to manage SCCM agents across non-trusted domains, potentially across firewalls, while using System Discovery, leveraging client push, and  all without certificates.

I’m going to hammer on the main points… Managing non-trusted domain machines does not require certificates and managing these machines can be achieved in a couple of easy steps:

  • Ensure you have name resolution to the non-trusted domain machines
    • This can work differently per environments, but in conditional forwarders and/or DNS suffix search orders work pretty well in establishing name resolution between different environments.
    • You could also use hosts files, but…
  • Ensure you have the necessary ports opened. Ports vary based on what site server components the machines will need to access.
  • Have an domain install account for each domain you wish to manage (client installation account)
    • The account will need administrative rights on the machines (for client push)
  • Extend the AD Schema in the remote domains with EXTADSCH.exe
  • Have an domain account with permissions to publish to the System Management container in each domain
  • Setup the forest publishing
    • In Hierarchy config, add the forest and accounts as seen in this super awesome screenshot which has not been modified in any way:
      2

      • Ensure on the publishing tab (not shown above) you have it set to publish and the domain specified.
    • Create discovery rules for each of the domains
      • For non-trusted domains, you’ll need to use an account that’s in that domain to run the query against AD
      • Under ad System discovery
        • Click the Star for a new discovery rule
          • NOTE: you won’t be able to browse for the un-trusted domains, so you’ll need to type the LDAP language starting with server name
          • LDAP://DOMAINCONTROLLER.Stuff.com/OU=SomeOU,DC=stuff,DC=COM
          • As seen here in a depiction of what a discovery rule would look like done by someone who studied abstract art in college.

1

 

Once the discovery has ran, you’ll be able to install the clients using the client push. One piece to note is that the infrastructure will move through the list of the client install accounts which may create a number of failures in the ADSYSDIS.log. Also if you’re using boundaries, don’t forget to add the boundaries!

 

Article By Jason Rutherford
Managing Partner – Model Technology Solutions With over 21 years of Enterprise IT, Jason’s focus on people, process, and delivery has shaped Model into the organization that it has become today. His approach to creating a consulting organization focused on creating IT efficiencies has led to strategic partnerships with Model’s clients. He believes in strong community support and that knowledge sharing is a critical factor to success.

Related Posts