- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
After provisioned vPro machine I found I cannot access its Web UI through https://myHost.myDomain.com:16993 https://myHost.myDomain.com:16993
It shows the button 'Log On...', but whatever credential i tried, it fails to log me in.
The provisoning was successful since i ran SDK samples to the vPro machine using tls and kerberos works fine.
Can someone please tell me what credential vPro Web GUII is expecting after provisioned by SCCM 2007 SP2?
When in SMB mode, i can acces the Web GUI http://myHost.myDomain.com:16992 http://myHost.myDomain.com:16992 with Mebx admin and password,
now it does not work.
Thanks in Advacne.
- Tags:
- Intel® vPro™
Link Copied
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
This is a common issue when trying to access the WebUI.
Check this Microsoft link:
http://support.microsoft.com/kb/908209 http://support.microsoft.com/kb/908209
Depending on your version of IE, you may need this hotfix.
Regardless of version, you will want to perform the Post-Hotfix registry edit:
(I copied this from the Microsoft page)
Post-hotfix installation instructionsNote These steps should be applied on the client computer on which you try to open the Web page.
After you install the hotfix, you must add the
FEATURE_INCLUDE_PORT_IN_SPN_KB908209registry key, and then set its DWORD value to iexplore.exe. To do this, follow these steps.
For 32-bit computers- Click Start, click Run, type regedit, and then click OK.
- In the left pane, locate and then click the following registry subkey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl
- On the Edit menu, point to New, and then click Key.
- Type FEATURE_INCLUDE_PORT_IN_SPN_KB908209, and then press ENTER.
- On the Edit menu, point to New, and then click DWORD Value.
- Type iexplore.exe, and then press ENTER.
- On the Edit menu, click Modify.
- Type 1 in the Value data box, and then click OK.
- Exit Registry Editor.
- Click Start, click Run, type regedit, and then click OK.
- In the left pane, locate and then click the following registry subkey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl
- On the Edit menu, point to New, and then click Key.
- Type FEATURE_INCLUDE_PORT_IN_SPN_KB908209, and then press ENTER.
- On the Edit menu, point to New, and then click DWORD Value.
- Type iexplore.exe, and then press ENTER.
- On the Edit menu, click Modify.
- Type 1 in the Value data box, and then click OK.
- Exit Registry Editor.
This registry edit usually fixes the issue right away!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi, Josh:
Thank you very much. It works now, I can access the WebUI after modify the registry key setting.
Cheers
James
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hey Kualala, Glad to know that you were able to Remotely Provision your vPro clients using SCCM which is something that i have been trying for a few weeks to no avail. I am writing in to you, presuming that you might be able help me figuring out what is going on with the my lab setup. Remote provisioning is one thing that has been troubling me for long, and I know its all to do with the certificate based authentication and I just cant get the Remote Configuration to work. As you are already aware that the Intel MeBX are preloaded with a few standard certificates from external vendors like GoDaddy, Verisign, Comodo and so on but there are a lot of people like myself who do not wish to purchase certificates from the above mentioned vendors. We really want to use a certificate from an internal CA based on our existing Windows Active Directory Infrastructure if possible. I have no experience with Root CA or even certs for that matter. I would really appreciate if you could help me with the steps of using self generated certificate from an Internal CA for remotely provisioning the vPro enabled clients. My objective is to be able to Remotely provision vPro enabled clients (either in the workgroup or even across a Domain). I am new to the vPro technology and have studied most of the resources from the web and ofcourse the user guides available off the Intel website. So far, I have been able to test all features but the Remote configuration using the PKI or the PSK infrastructure. I am trying to implement the vPro remote provisioning in my Lab here, to no avail. I have a small private network on a domain with one Windows server 2008 computer with the following roles ADS, DNS, DHCP. IIS, WDS. I have also installed SCCM / RCS / SCS on the same server. I have also enabled DHCP option 15, 6 and made sure that the alias name has been created for ProvisionServer in the DNS records. I have a few HP 2540P laptops with Intel AMT firmware version 6.0.3. I want to be able to provision them remotely using the PKI infrastructure. Please help me and walk me through the steps if possible. I would be forever grateful to you. In great anticipation.
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page