qwertyiop wrote: » Maybe I missed something but whats the problem with your Droids connecting to Exchange?
knwminus wrote: » Honestly I am pretty pissed off about the whole situation. I mean all of this is because I am trying to get DROIDS to talk to our mail server. I mean honestly. I am about ready to give up on this because it is going to be technically impractical. Changing a domain name is a major thing to do for just 6-7 phones.
knwminus wrote: » If I am doing something wrong please enlighten me but I can tell you that when I enter the CSR into Godaddys request tool it says you must use a FQDN. Like I said we don't own the top level domain that AD is using. If you know of any other ways to fix this help a brother out lol.
Mojo_666 wrote: » When you configure the MX records at a site like go daddy you typically configure a HOST A and then the MX So say your email domain is mycompany.com you would configure a host A for mail.mycompany.com and point it to your email servers external facing IP Then you configure the MX to point at mail.mycompany.com (an bonafide FQDN), which in turn resolves to the IP........make sense?
You must use a fully-qualified primary domain name for UCC Certificate Request.
knwminus wrote: » Now our internal domain is company.com. We don't own nor do we have any control over company.com. Our websites are mycompany.com (which we have full control over). I have an A record the points to owa.mycompany.com which I wanted to point in our firewall to mailserver.company.com internally. This did not work since as it stands right now, we are still using the self assigned certificate and you cannot use that with owa (which you need to configure so you can use activesync ). That's where it stands now. If I am missing something let me know but I think it won't work because we need to own the FQDN of owa.COMPANY.com and we don't.
Mojo_666 wrote: » So if you own the domain mycompany.com, then the certificate you request should be for that or rather owa.mycompany.com? where is company.com coming into it?
knwminus wrote: » Company.com is out internal domain name. We I generate the request, it comes from mail.company.com (name of our exchange server). mail.company.com does not exist on the internet. company.com does but we don't own it. Company.com internally is ours but externally is some dudes.
knwminus wrote: » That's what I don't understand either. My only assumption is that because most people have more than one exchange server and they have a dedicated CAS then possibly it is simply just common with UCC certs to use an external domain. I am not sure. I have only been support exchange for 4 days lol
Mojo_666 wrote: » Are you generating a request from the server by chance?
knwminus wrote: » Yea I mean is there another way to do it? </noob>
Mojo_666 wrote: » That explains it then, you would use that typically if you were running your own CA. Not sure about go daddy but you should simply be able to go and buy a certificate based on the domains you own just from your control panel when logged in to their site...it's been a few years since I had to buy a cert, but I am sure you will figure it out.
knwminus wrote: » so basically you are saying we need our own CA aka we need PKI?
Mojo_666 wrote: » No, you need to go to a public certificate authority and buy a certificate for whateveryouneed.mycompany.com What is the certificate for?
knwminus wrote: » A ucc cert for OWA, ActiveSync and Autodiscovery.
Mojo_666 wrote: » You might want to consider buying a wild card cert then save on buying multiple certs, but i'm not a cert guru so do some research before you buy.
knwminus wrote: » We already have a wildcard but that if for a different purpose. The way it was explained to me was that this was different than a wildcard cert. But even still the wildcard out need to be based off of a public domain, ie *.mycompany.com. The cert couldn't use *.mycompany.com and *.company.com which is a problem.
Claymoore wrote: » You will need to include the netbios name as well as the FQDN of each server (or service). Since you only have the one server, the names should be something like: owa.public.com owa.private.com owa autodiscover.public.com autodiscover.private.com autodiscover server.private.com server
knwminus wrote: » ad to get a wildcard cert working in IIS last month we actually created a website called *.mycompany.com, used that to generate the CSR, updated the metadata in IIS and applied the cert and it worked. Since there is no OWA.mycompany.com, should I just make one? Hmm....
Common Name - The Common Name is the fully-qualified domain name - or URL - for which you plan to use your certificate, e.g., the area of your site you wish customers to connect to using SSL. For example, an SSL certificate issued for "www.yourcompanyname.com" will not be valid for "secure.yourcompanyname.com." If the Web address to be used for SSL is "secure.yourcompanyname.com," ensure that the common name submitted in the CSR is "secure.yourcompanyname.com."
RobertKaucher wrote: » Generating a Certificate Signing Request (CSR) - Exchange Server 2007 - Search the Go Daddy Help Center