Exchange Server 2010 and Outlook Anywhere Cert warnings
All, When users connect externally via Outlook Anywhere they receive a certificate warning stating that the certificate has expired. When I view the certificate it has in fact expired. If the users connect to OWA or internally to Exchange everything works fine and I notice the user is pulling the correct cert. However, I cannot locate the cert that Outlook anywhere is using in order to renew or replace it. Does anyone know where this cert is located and how to replace it?
May 8th, 2012 10:33am

Run - Mmc File Add or Remove Snapin -- Certificates - Click ok . Computer Account --- You should see it in Trusted and Personal ContainersSatheshwaran Manoharan | Exchange 2003/2007/2010 | Blog:http://www.careexchange.in | Please mark it as an answer if it really helps you
Free Windows Admin Tool Kit Click here and download it now
May 8th, 2012 12:57pm

This would be on the Exchange 2010 CAS server...correct? I see the correct cert that is not expired. However, I do not see the cert that users are picking up when connecting externally via Outlook anywhere.
May 8th, 2012 1:54pm

See what Get-ExchangeCertificate |fl returns on your Exch server, do this on the CAS ServerSukh
Free Windows Admin Tool Kit Click here and download it now
May 8th, 2012 6:20pm

Hi, Please try to run get-outlookprovider -expr |fl to check the certificate name. Then please run get-exchangecertificate |fl to try to find the certificate. Renew an Exchange Certificate http://technet.microsoft.com/en-us/library/ee332322.aspx Note: After you generate a certificate request, you must submit it to a certification authority, obtain a signed certificate and install the certificate on the same server. For details, see Obtain a Server Certificate from a Certification Authority and Install an SSL Certificate on a Client Access Server. Xiu Zhang TechNet Community Support
May 9th, 2012 3:50am

I have run both get-outlookprovider -expr |fl and get-exchangecertificate |fl. Running these commands did not locate the expired cert that Outlook anywhere is using. It found the cert that OWA uses which is not expired.
Free Windows Admin Tool Kit Click here and download it now
May 9th, 2012 9:44am

How long ago did you change the certificate? Has the server been rebooted since then? And I assume this is for all external users? They haven't saved it on their PC? Can you test with a PC which hasn't been used before (A test PC)? Have you checked the OLK Profile config to check the certificate prinical name? And the Outlook proivder Cert principal name? http://technet.microsoft.com/en-us/library/bb123683.aspx Sukh
May 9th, 2012 9:54am

The new certificate was put in place April 2012. The server has been rebooted since. Yes, this is only for external users. I have tried to save it on their PC with no luck. I will try a test PC and check the OLK profile. It still will connect to their mailbox via Outlook Anywhere after the user clicks through the certificate warning. It's more of an annoyance and somewhat baffling.
Free Windows Admin Tool Kit Click here and download it now
May 9th, 2012 11:10am

Can you post the results of Get-ExchangeCertificate?Sukh
May 9th, 2012 11:26am

[PS] C:\Windows\system32>Get-ExchangeCertificate | FL AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System.Security.AccessControl.CryptoKeyAccessR ule} CertificateDomains : {HOU-EXC-CAS.vbar.com} HasPrivateKey : True IsSelfSigned : False Issuer : CN=Veber Enterprise Certificate Authority, DC=vber, DC=com NotAfter : 2/2/2013 7:48:11 PM NotBefore : 2/3/2012 7:48:11 PM PublicKeySize : 1024 RootCAType : Enterprise SerialNumber : 257C50A90001000021AC Services : IMAP, POP Status : Valid Subject : CN=HOU-EXC-CAS.vbar.com Thumbprint : 80E50C85B9BAD3B24E831CFDFC1D12F9F013967C AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System.Security.AccessControl.CryptoKeyAccessR ule} CertificateDomains : {*.vber.com, vber.com} HasPrivateKey : True IsSelfSigned : False Issuer : SERIALNUMBER=07969287, CN=Go Daddy Secure Certification Authority, OU=http://certificates.godaddy. com/repository, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US NotAfter : 4/9/2014 4:20:43 PM NotBefore : 4/11/2011 9:27:55 AM PublicKeySize : 2048 RootCAType : ThirdParty SerialNumber : 4B440CD73845C7 Services : IIS Status : Valid Subject : CN=*.vber.com, OU=IT, O=Veber Inc., L=Houston, S=TX, C=US Thumbprint : 979141860672EB5AA209340148B7047256C9B106 AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System.Security.AccessControl.CryptoKeyAccessR ule, System.Security.AccessControl.CryptoKeyAccessRule, System.Security.AccessControl.CryptoKeyAcc essRule} CertificateDomains : {HOU-EXC-CAS, HOU-EXC-CAS.vbar.com} HasPrivateKey : True IsSelfSigned : True Issuer : CN=HOU-EXC-CAS NotAfter : 1/11/2015 11:17:11 AM NotBefore : 1/11/2010 11:17:11 AM PublicKeySize : 2048 RootCAType : None SerialNumber : 6A7DF00C09A14C9946FEE98EA8F63202 Services : IMAP, POP, SMTP Status : Valid Subject : CN=HOU-EXC-CAS Thumbprint : 3349BDCA749BB99E5C78A4B47108ACEEDD255D62 AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System.Security.AccessControl.CryptoKeyAccessR ule, System.Security.AccessControl.CryptoKeyAccessRule, System.Security.AccessControl.CryptoKeyAcc essRule} CertificateDomains : {HOU-EXC-CAS, HOU-EXC-CAS.vbar.com} HasPrivateKey : True IsSelfSigned : True Issuer : CN=HOU-EXC-CAS NotAfter : 1/7/2015 9:26:57 PM NotBefore : 1/7/2010 9:26:57 PM PublicKeySize : 2048 RootCAType : None SerialNumber : 53D9ECD33145388F41C7FF664F249799 Services : IMAP, POP, SMTP Status : Valid Subject : CN=HOU-EXC-CAS Thumbprint : ED1022D7CD0F02F89DB0BEE35F3004F28CF67C07 AccessRules : {System.Security.AccessControl.CryptoKeyAccessRule, System.Security.AccessControl.CryptoKeyAccessR ule, System.Security.AccessControl.CryptoKeyAccessRule} CertificateDomains : {WMSvc-HOU-EXC-CAS} HasPrivateKey : True IsSelfSigned : True Issuer : CN=WMSvc-HOU-EXC-CAS NotAfter : 1/5/2020 5:51:24 PM NotBefore : 1/7/2010 5:51:24 PM PublicKeySize : 2048 RootCAType : Registry SerialNumber : 112DCB5D5957DC8F43A9F411FF9FD5B8 Services : None Status : Valid Subject : CN=WMSvc-HOU-EXC-CAS Thumbprint : 4D706FA04563AE8FD76E04E97C0D0ED94FDBC8B0
Free Windows Admin Tool Kit Click here and download it now
May 9th, 2012 2:10pm

And what's the external name? Is it covered by that wild card you're using?Sukh
May 9th, 2012 2:14pm

Yes, it's covered by the wildcard cert.
Free Windows Admin Tool Kit Click here and download it now
May 9th, 2012 3:44pm

Are you sure the certificate isn't coming from something else? Firewall, web browser somewhere else etc? If you only have one web site on the server then only one SSL certificate can be bound to the web site. If the correct certificate is shown internally then the problem has to be elsewhere. Simon. Simon Butler, Exchange MVP Blog | Exchange Resources | In the UK? Hire Me.
May 9th, 2012 3:59pm

Hi, Please try to View Certificates with the MMC Snap-in from your CAS server and Domain Controller. you can refer to the steps in article below: How to: View Certificates with the MMC Snap-in http://msdn.microsoft.com/en-us/library/ms788967.aspx By the way, how many CAS server in the network? How did you publish outlook anywhere?Xiu Zhang TechNet Community Support
Free Windows Admin Tool Kit Click here and download it now
May 9th, 2012 10:16pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics