Choosing a Certificate

Applies to: Patch My PC Publisher

Overview

Customers often ask which code-signing certificate option they should use when publishing third-party updates. There is no single correct choice, as the right approach depends on your organization’s security requirements, PKI maturity, and operational preferences. In practice, many environments successfully use self-signed certificates, while others require PKI-issued certificates for compliance or governance reasons.

Regardless of the option chosen, the resulting certificate is used by the Publisher to code-sign updates published to WSUS, specifically the CAB files that contain update metadata. The same certificate is also used to sign ConfigMgr detection scripts, even in a ConfigMgr-only environment where there is no WSUS being leveraged by a Software Update Point. Ultimately, whichever method you choose, the certificate that resides in the WSUS certificate store is the certificate the Publisher will use for signing during ConfigMgr and WSUS publishing operations.

Code-Signing Certificate in WSUS Store
circle-info

Note

If multiple code-signing certificates are present in the WSUS store on the SUP, the certificate with the longest validity is always selected.

The Publisher supports multiple approaches to accommodate both ConfigMgr and WSUS environments:

  1. Letting ConfigMgr create and manage the certificate.

  2. Generating a self-signed certificate directly in Publisher.

  3. Importing a customer-provided PFX certificate issued by an internal or public Certificate Authority.

The sections below outlines the considerations for each option.

No action is needed from the Publisher. If ConfigMgr is already set to automatically manage the certificate, this will be the certificate the Publisher selects by default, if there is not another certificate in the WSUS store with a longer validity period.

Best suited for: Organizations that want the simplest setup with minimal manual certificate handling.

Why choose this option

  • Creates a self-signed WSUS code-signing certificate if one does not exist.

  • Manages certificate lifecycle and renewal process.

Considerations

  • The certificate generated is self-signed.

  • May not meet stricter compliance or PKI requirements in some organizations.

circle-exclamation

See the following page for more details: https://learn.microsoft.com/en-us/intune/configmgr/sum/deploy-use/third-party-software-updates#automatically-manage-the-wsus-signing-certificatearrow-up-right

Publisher-Generated Self-Signed Certificate

Regardless of whether ConfigMgr is configured to automatically manage the certificate, or if the environment is WSUS-only, customers can choose to have the Publisher generate and use its own self-signed certificate.

Best suited for: WSUS standalone environemnts or ConfigMgr environments where self-signed certificates are allowed, but where administrators want more control over certificate creation and lifecycle.

Pros

  • Free and immediate to create.

  • Does not require a PKI.

  • Allows control over key length, validity period, and exportability.

  • Can still be automatically distributed to clients by ConfigMgr.

Cons

  • Self-signed certificates cannot be revoked using a Certificate Revocation List (CRL).

  • If the private key is compromised, the certificate must be manually removed from client trust stores using ConfigMgr or another method.

  • When the certificate is reaching the expiry date, customers must remember to re-generate the certificate to ensure signing operations continue uninterrupted.

See the following page for more details: Generate a Self-Signed Certificate

circle-info

Note

By default, in this scneario, the generated certificate’s private key is marked as exportable. This is intentional and recommended, as it allows the certificate (including the private key) to be exported and reused if the Publisher is later moved to a new top-level SUP.

Without an exportable private key, the same signing certificate could not be transferred to another server.

Customer-Provided PKI (PFX) Certificate

Regardless if ConfigMgr is already set to automatically manage the certificate, customers can opt for the Publisher to use a PKI-issued certificate.

Best suited for: Organizations with strict security, compliance, or audit requirements that mandate PKI-issued certificates.

Pros

  • Certificates can be revoked if compromised.

  • Can be issued from an internal PKI (such as Active Directory Certificate Services) at no additional cost.

  • Supported by Configuration Manager for automatic distribution to clients.

Cons

  • Requires access to a PKI and coordination with security or PKI teams.

  • Public Certificate Authority certificates may incur additional cost.

circle-exclamation

Last updated

Was this helpful?