Intel,Altiris Group

Enterprise Integration, Part 3: Intel® AMT Provisioning 

May 23, 2007 12:00 PM

This is the third of a few articles to discuss enterprise integration of the Intel® vPro™ processor technology and Intel® Centrino® Pro platforms in an Altiris environment. The previous articles include:

Subsequent articles will have a similar introduction to identify their respective contents and portions. This – the third article – focuses on the Intel® AMT provisioning process. The article after this will step through the Altiris OOBM provisioning interface.

Provisioning Overview

Before stepping through provisioning or configuration process, a short overview is required on Intel® AMT provisioning, also referred to as configuring the management engine (ME). If a more detailed article is needed, please comment below.

First, there are two provisioned or configuration options – Small and Medium Business (SMB) or Enterprise mode. A short summary will help to understanding the difference. For most enterprise environments and for the subsequent articles in this series, enterprise mode configuration will be the focus point. Both modes support the key functionalities of discover, heal, and protect.

SMB mode supports the Intel® AMT usage scenarios yet does not include centralization of provisioning control such as Intel® AMT profiles, maintenance operations, and so forth. This mode may be best for small workgroup environments.

Enterprise mode includes Intel® AMT profile settings, integration with the Altiris OOBM interface, and may be best for medium to large enterprise environments.

By default, present systems with Intel® AMT have the management engine disabled. This is called the factory default state. When the management engine is provided with provisioning setup information, the management engine is then in a setup state. After Intel® AMT has received configuration parameters including new administrator password, network settings, TLS settings, access control settings, and power policy – the management engine is in a configured state. If the configuration needs to be changed or removed, possibly due to a system move, the management engine should be returned to a setup state and is ready to be reconfigured or re-provisioned. At the end of the client lifecycle, the customer environment has the option to remove all configuration data and return the management engine to factory default.

The following graphic provides a summary overview.

As mentioned in the first article, the Intel® vPro™ processor technology platform and recently released Intel® Centrino® Pro platform require key infrastructure components and settings. More on the infrastructure details will be shared in a future article.

Basic Enterprise Provisioning Process

The basic provisioning process is also referred to as TLS-PSK (Transport Layer Security Preshared Key). This is due to the pre-shared secret of the Provisioning ID (PID) and the Provisioning Pass-phrase (PPS) that are used to perform the necessary steps of authenticating a new client and initiating the provisioning process. In addition, a new password for the management engine BIOS extensions (MEBx) is provided. The MEBx is viewed only at the local console.

The PID is comprised of 8 alphanumerical characters. The PPS is comprised of 32 alphanumerical characters. The MEBx password must be a strong password – comprised of upper and lower characters, numbers, and special characters.

The provisioning process can be performed via two methods in the current platform: manually entering the provisioning data at each client or via USB flash drive with a setup.bin file at the root. The USB method is also referred to as "One Touch Provisioning". The provisioning keys tech tip provides a short overview of the requirements.

A setting within the MEBx and CMOS allows for only one USB provisioning. To reset, the CMOS has to be cleared on the Intel® AMT device. This is often performed by disconnecting the power source and removing the BIOS battery. Not a simple or preferred process for the system user or administrator.

A future enablement will be Remote Configuration, formerly known as Zero Touch Configuration (ZTC). This process is also referred to as PKI-CH (Public Key Infrastructure, Certificate Hash). The details on this feature and associated process will be shared as a later time.

The following animated graphic, built for ManageFusion, provides a short overview of the One Touch provisioning method based on TLS-PSK. If more details are needed, please provide a comment to this article and let me know.

Enterprise Provisioning with TLS

With an overview understanding of the provisioning process, this next section will focus on the addition of Transport Layer Security to the provisioning process. During the provisioning process, and with the current infrastructure components, an Intel® AMT device can be configured to encrypt management traffic via Transport Layer Security (TLS). TLS is the successor to SSL 3.0, which is commonly used to secure website transactions and so forth.

A quick overview of the supported states in an Altiris environment may help to provide additional understanding.

  1. SMB mode – HTTP Digest authentication of user session, no TLS option
  2. Enterprise mode – HTTP Digest Authentication of user session, TLS available.

These are the current supported states of the Altiris OOBM and Intel® vPro™ combined platform, although Intel® AMT systems can also support Kerberos authentication and Mutual TLS in Enterprise mode. These additions are expected in a future release of the Altiris environment.

A key point to keep in mind with TLS is the role of "server" and "client". One provides a service which is consumed by the other over an encrypted channel. The Intel® AMT device is the "server" and the Altiris management system is the "client". The first is providing services to be consumed or acted upon by the second. Therefore, the server certificate is stored within the non-volatile memory (NVRAM) of the Intel® AMT device.

The Altiris management console is configured as to whether a standalone or enterprise certificate authority will be utilized, along with the associated chain of trust via a PEM file. For those security experts out there, this will be familiar. For those that are not security experts, a PEM file defines the root and subordinate certificates to define the chain of trust. The basic idea is establishing the credentials and proof of authority to initiate a secure and encrypted session.

This animated picture, shown at ManageFusion in Las Vegas, provides a summary overview of the TLS enablement process.

With a basic understanding of the client provisioning process, including configuration and support for TLS, the next article in this series will step through the Altiris OOBM provisioning interface. Until then.

Statistics
0 Favorited
0 Views
0 Files
0 Shares
0 Downloads

Tags and Keywords

Comments

Jun 10, 2008 05:37 PM

The following links and resources step through the common options and menus of the Intel Management Engine BIOS eXtension (MEBx) to configure Intel AMT. There are other resources and topics we could get into...
If there are more specific questions - please send me a private message via Altiris Juice

  • http://support.dell.com/support/edocs/systems/latd630/en/AMT/MEBX.htm
  • http://www.altirisdl.com/PartnerResources/vPro/Provision%20HP%20dc7700%20vPro%20EEP%20systems%20for%20AMT%20support.pdf
  • http://www.thinkwiki.org/wiki/Intel_Active_Management_Technology_(AMT)

May 26, 2008 07:46 AM

Hello Terry!
It would be so nice of you if you can drop a link or take the time to post about the management engine (ME). I really need to know more and surprisingly I can't seem to find the information I need online. Thanks!
---
Mary-Anne Davis - search engine optimization specialist.

Jun 18, 2007 08:07 AM

I'm reading your first sentence as a compliment. Hopefully that was the intent.
ZTC is now called remote configuration. This capability is due out later this year. The Weybridge platform (second generation of Intel vPro) will support first, followed by AMT updates for Averill and Santa Rosa platforms (first generations of Intel vPro and Centrino Pro) The process has been documented and I'll include in a future post.
USB provisioning is also referred to as "one touch provisioning". A bit in the CMOS is set once any type of provisioning is done - this is for security purposes. Once a client is provisioned inside an environment, management processes should utilize partial unprovision (return to setup state). Full unprovision will require a manual entry of provisioning pre-shared data.
The next installment will step through the Altiris OOBM provisioning interface.

May 31, 2007 03:16 PM

This is a good consolidation of info that can be gotten elsewhere, but not all together like this.
You mention that clearing the CMOS is required to re-do USB provisioning which is painful.
I am very interested in ZTC, I hope that comes along sooner rather than later. In the meantime I hope you cover how to get the required information from Altiris OOBM in order to perform the provisioning manually at the client in your next installment.

Related Entries and Links

No Related Resource entered.