Ed Price - MSFT edited Revision 1. Comment: white space
Hi!
First I want to say thanks for this article.
Can you please advise if there is still the certificate requirement to have the appropriate domain names within the SAN area of the certificate to be able to use Mutual TLS?
E.g. we tried to use Mutual TLS with out Exchange 2010 against a company routing their messages through Exchange Online Protection and Mutual TLS never worked as our Edge server always said, that the recipients domain is missing in the certificates name.
In fact we were unable to establish the Mutual TLS (or "forced TLS", how they called it) with any company who asked us to do so because of the certificate requirements...
Best regards,
Michael
Hi Michael,
Yes, you must have appropriate names in certificate. Actually, certificate that you assign to SMTP service must have the exact same name that your SMTP connector (created for Domain Security) is using.
Hi Damir,
Thanks for your quick reply!
So currently there seems to be no option to "force TLS" with partners relaying through EOP or other services which do not have the recipient domains on the accepting smtp server certificate with the implemenation of "Mutual TLS"?
Maybe, do you know if EOP or FOPE works the same way? The documentation here is not exect precise:
technet.microsoft.com/.../jj723154.aspx
What I am exactly curious about is, what does this one mean:
For Connection Security, specify Recipient certificate matches domain. Enter the domain name of the recipient in the Certificate domain field. For Outbound Delivery, choose MX record associated with the recipient domain.
Assuming I have EOP and my partner company also, so our mx records point to Microsoft servers and not to our own envrionment. Will we be able to secure the transfer with TLS between both domains with a force TLS as our domains will never show up on the Microsoft mail server certificates.
We have the possibility the move on to EOP from our EA and currently there is a decision to be made regarding this...
I know this is a comment box and no support forum but maybe other people have the same questions and I appreciate any answer :)
Finally I found a workaround for half the problem myself by creating a new send connector where I can put in the domains I require outbound TLS with a lower cost value and the setting RequireTLS as true.
The only requirement from the remote server is a StartTLS command and no certificate is checked during this process. If no StartTLS is offered, mails will be stuck in the queue until the TTL is reached or the remote server offers TLS. Not exactly the same as Mutual TLS but at least a workaround to secure stuff we send.
The opposite partner has to make sure that they send TLS encrypted as well and your're good to go with "MutualTLS light".