Prerequisites for Application Management in Configuration Manager
Updated: May 14, 2015
Applies To: System Center 2012 Configuration Manager, System Center 2012 Configuration Manager SP1, System Center 2012 Configuration Manager SP2, System Center 2012 R2 Configuration Manager, System Center 2012 R2 Configuration Manager SP1
This topic lists the prerequisites for application management in Microsoft System Center 2012 Configuration Manager. The prerequisites are categorized as either external dependencies or dependencies within Configuration Manager.
Dependencies External to Configuration Manager
The following table lists the external dependencies for application management.
Prerequisite |
More information |
---|---|
IIS is required on the site system servers that run the Application Catalog website point, the Application Catalog web service point, the management point, and distribution point. |
For more information about this requirement, see the Prerequisites for Site System Roles section in the Supported Configurations for Configuration Manager topic. |
For client computers that access the Application Catalog by using Internet Explorer 6 and HTTPS client connections:
|
Internet Explorer 6 incorrectly detects some areas of the Application Catalog to be unsecure and displays a security warning about mixed content. When this occurs, users might not be able to use the Application Catalog. Later versions of Internet Explorer do not display this message. Configure Internet Explorer 6 by using the following steps:
|
For mobile devices that are enrolled by Configuration Manager:
|
When you code sign applications in order to deploy them to mobile devices, do not use a certificate that was generated by using a version 3 template (Windows Server 2008, Enterprise Edition). This certificate template creates a certificate that is not compatible with Configuration Manager applications for mobile devices. |
To deploy applications to Symbian Bell mobile devices:
|
If you deploy .SIS/.SISX files to a Nokia Symbian Belle mobile device that is enrolled by Configuration Manager, you must use a file format that conforms to the OS v9.x SIS file format specification. |
Clients must be configured to audit logon events if you want to automatically create user device affinities. |
Configuration Manager reads the following two settings from the local security policy on client computers to determine automatic user device affinities:
To automatically create relationships between users and devices, make sure that these two settings are enabled on client computers. You can use Windows Group Policy to configure these settings. |
Configuration Manager Dependencies
The following table lists the dependencies within Configuration Manager for application management.
Prerequisite |
More information |
---|---|
Management point |
Clients will contact a management point to download client policy, to locate content, and to connect to the Application Catalog. Important If clients cannot access a management point, they cannot use the Application Catalog. |
Distribution point |
Before applications can be deployed to clients, you must have at least one distribution point in the hierarchy. By default, the site server has a distribution point site role enabled during a standard installation. The number and location of distribution points will vary according to the specific requirements of your enterprise. For more information about how to install distribution points and manage content, see Configuring Content Management in Configuration Manager. |
Client settings |
Many client settings control how applications are installed on the client and the end user experience on the client. These client settings include the following:
For more information about these client settings, see About Client Settings in Configuration Manager. For information about how to configure client settings, see How to Configure Client Settings in Configuration Manager. |
For the Application Catalog:
|
Users must first be discovered by Configuration Manager before they can view and request applications from the Application Catalog. For more information, see the Configure Active Directory Discovery for Computers, Users, or Groups section in the Configuring Discovery in Configuration Manager topic. |
App-V 4.6 SP1 or later client to run virtual applications |
To be able to successfully create virtual applications in Configuration Manager, client computers must have the App-V 4.6 SP1 or later client installed. You must also update the App-V client with the hotfix described in the Knowledge Base article 2645225 before you can successfully deploy virtual applications. |
Application Catalog web service point |
The Application Catalog web service point is a site system role that provides information about available software from the Software Library to the Application Catalog website. For information about how to configure this site system role, see Configuring the Application Catalog and Software Center in Configuration Manager. |
Application Catalog website point |
The Application Catalog website point is a site system role that provides users with a list of available software. For information about how to configure this site system role, see Configuring the Application Catalog and Software Center in Configuration Manager. |
Reporting services point |
To be able to use the reports in Configuration Manager for application management, you must first install and configure a reporting services point. For more information, see Configuring Reporting in Configuration Manager. |
Security permissions for application management |
You must have the following security permissions to manage applications. To create, modify and retire applications:
The Application Author security role includes the preceding listed permissions that are required to create, modify and retire applications in Configuration Manager. To deploy applications:
The Application Deployment Manager security role includes the preceding listed permissions that are required to deploy applications in Configuration Manager. The Application Administrator security role contains all of the permissions from both the Application Author and the Application Deployment Manager security roles. For more information, see Configure Role-Based Administration in the Configuring Security for Configuration Manager topic. |