Methods Overview
As discussed in the
Setup and Configuration Overview
section, the computer has to be configured before the Intel AMT
capabilities are ready to interact with management application. There are three methods to complete the provisioning process
(from least complex to most complex):
Configuration service
— A configuration service allows you to complete the provisioning process from a GUI console
on their server with only one touch on each of the Intel AMT capable computers. The PPS and PID fields are completed
using a file created by the configuration service saved to a USB mass storage device.
MEBx interface
— The IT administrator manually configures the Management Engine BIOS Extension (MEBx) settings
on each Intel AMT ready computer. The PPS and PID fields are completed by typing the 32 character and 8 character
alpha-numeric keys created by the configuration service into the MEBx interface.
TLS-PKI
— Commonly referred to as Remote Configuration (RCFG) or Zero Touch Configuration (ZTC). This process
utilizes a certificate associated with the ProvisionServer. The associated certificate hash must be listed within the Intel
Management Engine BIOS Extension (MEBx).
*TLS-PKI refer as Transport Layer Security - Public Key Infrastructure*
Details on using these various methods are available in the next section.
Содержание Precision M4500
Страница 69: ...4 Click the to expand the Intel AMT Getting Started section ...
Страница 70: ...5 Click the to expand the Section 1 Provisioning section ...
Страница 71: ...6 Click the to expand the Basic Provisioning without TLS section ...
Страница 74: ...10 The IP address for the ProvisionServer and Intel SCS are now visible ...
Страница 75: ...11 Select Step 2 Discovery Capabilities ...
Страница 76: ...12 Verify that the setting is Enabled If Disabled select the check box next to Disabled and click Apply ...
Страница 77: ...13 Select Step 3 View Intel AMT Capable Computers ...
Страница 78: ...14 Any Intel AMT capable computers on the network are visible in this list ...
Страница 79: ...15 Select Step 4 Create Profile ...
Страница 80: ...16 Click the plus symbol to add a new profile ...
Страница 84: ...22 Select Step 5 Generate Security Keys ...
Страница 85: ...23 Select the icon with the arrow pointing out to Export Security Keys to USB Key ...
Страница 86: ...24 Select the Generate keys before export radio button ...
Страница 94: ...37 Select Step 7 Monitor Provisioning Process ...
Страница 96: ...39 Select Step 8 Monitor Profile Assignments ...
Страница 99: ......
Страница 105: ......