How To
Summary
The Cloud Management Gateway (CMG) allows Configuration Manager to manage internet based devices securely without requiring VPN or exposing on premises infrastructure. The CMG uses Azure cloud services to proxy client communication back to on premises Management Points (MP), Software Update Points (SUP), and other roles.
Objective
This guide consolidates every essential step required to plan, deploy, authenticate, configure, and validate a CMG deployment in Microsoft Configuration Manager. Following this structured framework ensures a secure, scalable, and fully supported cloud‑attached client management environment.
Environment
CMG Hierarchy Design & Architecture Components

A CMG deployment includes the following core components:
| Component | Purpose |
| CMG service in Azure | Proxies internet client requests over HTTPS |
| CMG Connection Point (On-premises) | Maintains active connection to Azure CMG & forwards client traffic |
| Service Connection Point (On-premises) | Deploys/monitors CMG & connects to Azure |
| Management Point / Software Update Point | Handles policy, inventory, updates |
| Internet Clients | Connect over HTTPS (443) via CMG |
Steps
Setup Checklist for CMG
According to Microsoft, the CMG setup process consists of five major phases:
Certificate Preparation
- Obtain CMG server authentication certificate (public CA or internal PKI).
- CN must match CMG service name.
Configure Microsoft Entra ID
- ConfigMgr requires two app registrations (server and client).
- Created automatically or by Azure admins.
Configure Client Authentication Method
Choose between:
- Entra ID
- PKI
- Site-issued tokens
Deploy CMG
- Create CMG service in Azure (VM Scale Set only in modern versions).
- Add CMG Connection Point.
- Configure MP/SUP for CMG traffic.
Configure Clients
- Ensure client settings allow cloud communication.
- Off-prem devices may require bootstrap parameters.
Full Deployment Procedure: Step-by-Step
Step 1 — Prepare Certificates
- Determine whether you will use public CA or internal PKI.
- Create the CMG server auth certificate.
- Export certificate with private key (.PFX) for ConfigMgr.
Step 2 — Integrate ConfigMgr with Microsoft Entra ID
- In ConfigMgr console:
Administration → Cloud Services → Azure Services - Launch Azure Services Wizard.
- Select service type: Cloud Management.
- Sign in as Entra Global Admin.
- Automatically create or import pre-created app registrations.
Step 3 — Configure Client Authentication
Choose authentication method appropriate for environment:
| Method | Requirements |
| Entra ID | Entra join/hybrid join, MP ASP.NET 4.5, user discovery |
| PKI | Client auth certs + trusted CA |
| Tokens | No PKI/Entra join needed |
Step 4 — Deploy the Cloud Management Gateway
- In console:
Administration → Cloud Services → Cloud Management Gateway - Click Create CMG.
- Choose AzurePublicCloud or AzureUSGovernmentCloud.
- Deployment method: Virtual Machine Scale Set.
- Upload server auth certificate.
- Specify resource group, region, and VM settings.
- Complete wizard.
- Add CMG Connection Point role.
Step 5 — Configure Management Point / SUP
Enable CMG traffic.
Ensure MP supports client authentication method selected.
Step 6 — Configure Clients to Use CMG
- In Client Settings → Cloud Services, enable CMG usage.
- Off-prem devices may require CCMHOSTNAME or token bootstrap.
- To force CMG use:
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CCM\Security
- ClientAlwaysOnInternet = 1
- Validate with PowerShell:
- Get-WmiObject -Namespace Root\Ccm\LocationServices -Class SMS_ActiveMPCandidate |
- Where-Object {$_.Type -eq "Internet"}
Step 7 — Validation & Monitoring
Verify Client CMG Connectivity
- Check CMGService.log, SMS_Cloud_ProxyConnector.log on servers.
- On clients, verify Internet MP assignment in Control Panel or WMI.
Monitor CMG Health
- Console → Monitoring → Cloud Management → CMG
- Use Connection Analyzer for Entra & certificate checks.
Additional Information
Authentication Methods for CMG
CMG supports three authentication methods:
Microsoft Entra ID (Recommended)
- Supports user‑centric scenarios and Windows 10+ devices.
- Requires devices to be cloud‑joined or hybrid‑joined.
- Requires ConfigMgr to be integrated with Entra ID.
PKI Client Authentication Certificates
- Use if organization already has an internal PKI.
- Client certificate must support 2048/4096‑bit keys and CNG v3 support.
Site-Issued Tokens
- Token-based device authentication.
- Best for devices not Entra joined and without PKI deployment.
CMG Data Flow

Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
23 January 2026
UID
ibm17257970