?
Solved

Service Provider SCCM Setup. Solutions Architecture

Posted on 2015-02-22
3
Medium Priority
?
28 Views
Last Modified: 2015-06-01
I am looking on someone to give me some info regarding setting UP an SCCM set-up as a service provider.
I am looking at having a Server (CAS)  in the Cloud (Datacenter) and having Client sites every where.
The Client sites are independent Different forest, Different organisation different Domains etc..

What would be involved in a setup like this ?
Would we need to configure trusts  for multi Forest Support ?
I am assuming SCCM needs to be setup with a Full blown PKI infrastructure as well ?

I would like to be able to Push out Master Gold reference image from Central Site to client sites . Then give the Local technicians ability to choose whether to deploy the images to their sites or not. Same for Updates.


Has anyone has a setup like this before ?
What are the challenges you had to overcome ?
0
Comment
Question by:mspsupport
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 82

Accepted Solution

by:
David Johnson, CD, MVP earned 1500 total points
ID: 40625035
Microsoft has a 4 part series on this scenario
Scenario 1
Scenario 2
Scenario 3
Scenario 4

Follow this and report back if there is any part you are confused with
0
 

Author Comment

by:mspsupport
ID: 40627074
Basically regarding scenario 4. Is the 2-way trust a must ? Can we just do a 1-way trust ?
We are concerned about security for the primary sites altering AD etc.. for other primary sites and even CAS site.
0
 
LVL 82

Expert Comment

by:David Johnson, CD, MVP
ID: 40627231
we will also need to ensure that a two way trust which supports Kerberos authentication exists between the two forests as stated it is a requirement
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question