Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Exchange Server 2007 : Securing Access to ActiveSync with Secure Sockets Layer Encryption (part 2) - Using an Internal Certificate Authority for OWA Certificates

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
10/24/2011 9:13:33 AM

Using an Internal Certificate Authority for OWA Certificates

If a third-party certificate authority is not utilized, an internal CA can be set up instead. There are several different CA options, including several third-party products, and it might be advantageous to take advantage of an existing internal CA. Windows Server 2003 also has a very functional CA solution built in to the product, and one can be installed into an organization.

Caution

Proper design of a secure PKI is a complex subject, and organizations might want to spend a good amount of time examining the many factors that can influence CA design. This step-by-step scenario assumes a very basic design, with an enterprise CA installed directly into a domain.


To set up an internal certificate authority, on a domain member server or, more commonly, on a domain controller, the Certificate Authority component of Windows Server 2003 can be installed using the following procedure:

1.
Click Start, Control Panel, Add or Remove Programs.

2.
Click Add/Remove Windows Components.

3.
Check the Certificate Services check box.

4.
At the warning message box, shown in Figure 3, click Yes to acknowledge that the server name cannot be changed.

Figure 3. Installing a local CA.

5.
Click Next to continue.

6.
From the subsequent dialog box, shown in Figure 4, select which type of CA will be set up. Choosing each type of CA has different ramifications and is useful in different situations.

Figure 4. Selecting a CA type to install.


The following types of CAs are available for installation:

  • Enterprise Root CA— An enterprise root CA is the highest level CA for an organization. By default, all members of the forest where it is installed trust it, which can make it a convenient mechanism for securing OWA or other services within a domain environment. Unless an existing enterprise root CA is in place, this is the typical choice for a homegrown CA solution in an organization.

  • Enterprise Subordinate CA— An enterprise subordinate CA is subordinate to an existing enterprise root CA, and must receive a certificate from that root CA to work properly. In certain large organizations, it might be useful to have a hierarchy of CAs, or the desire might exist to isolate the CA structure for OWA to a subordinate enterprise CA structure.

  • Stand-alone Root CA— A stand-alone root CA is similar to an enterprise root CA, in that it provides for its own unique identity, and can be uniquely configured. It differs from an enterprise root CA in that it is not automatically trusted by any forest clients in an organization.

  • Stand-alone Subordinate CA— A stand-alone subordinate CA is similar to an enterprise subordinate CA, except that it is not directly tied or trusted by the forest structure, and must take its own certificate from a stand-alone root CA.

After choosing the type of CA required, continue the CA installation process by performing the following steps:

1.
In this example, choose Enterprise Root CA. Click Next to continue.

2.
Enter a common name for the CA, such as that shown in Figure 5. Click Next to continue.

Figure 5. Entering a common name for the CA.


3.
Enter locations for the certificate database and the database log (the defaults can normally be chosen), and click Next to continue.

4.
Click Yes when warned that the IIS Services will be restarted.

5.
Click Finish after the installation is complete.

After the internal CA is in place, the CAS can automatically use it for generation of certificates. To generate and install a certificate on a CAS using an internal CA, use the following technique:

1.
From the CAS, open IIS Manager (Start, All Programs, Administrative Tools, Internet Information Services [IIS] Manager).

2.
In the console tree, expand SERVERNAME (local computer) – Web Sites, right-click the ActiveSync Virtual Server (typically named Default Web Site, it is typically the same one used for OWA), and then click Properties on the shortcut menu.

3.
Select the Directory Security tab.

4.
Under Secure Communications, click the Server Certificate button.

5.
On the welcome screen, click Next to continue.

6.
Select Create a New Certificate, and then click Next to continue.

7.
From the Delayed or Immediate Request dialog box, select Send the Request Immediately to an Online Certification Authority, and click Next to continue.

8.
Enter a name for the certificate, such as CompanyABC OWA Certificate, leave the bit length at 1024, and click Next to continue.

9.
Enter the organization and OU name, keeping in mind that they should accurately reflect the real name of the requestor. Click Next to continue.

10.
Enter the FQDN of the CAS, such as mail.companyabc.com.

11.
In the Geographical Information dialog box, enter an unabbreviated state, city, and country, and click Next to continue.

12.
Specify the SSL port (443 is the default) that the server will use, and click Next to continue.

13.
In the Choose a Certification Authority dialog box, shown in Figure 6, select the CA that was set up in the previous steps, and click Next to continue.

Figure 6. Installing a local CA certificate on a CAS.


14.
Review the request in the Certificate Request Submission dialog box, and click Next to continue.

15.
Click Finish.

After installation, the certificate can be viewed by clicking the View Certificate button on the Directory Services tab in the Virtual Server properties dialog box.

After being placed on a server, SSL encryption will be made available on the CAS. If the enterprise CA was installed in an Active Directory domain, all of the domain members will include the internal CA as a trusted root authority and connect to OWA via SSL with no errors. External or nondomain members, however, will need to install the enterprise CA into their local trusted root authorities. This includes Windows Mobile devices as well.

Other -----------------
- Enabling ActiveSync in Exchange Server 2007
- Microsoft Systems Management Server 2003 : Migration Issues - Planning the Site Structure (part 2) - Running the Deployment Readiness Wizard
- Microsoft Systems Management Server 2003 : Migration Issues - Planning the Site Structure (part 1)
- Managing Microsoft Windows Server 2003 Disk Storage : Implementing RAID
- Managing Microsoft Windows Server 2003 Disk Storage : Maintaining Disk Storage Volumes
- Securing Windows Server 2008 R2 : DirectAccess
- SharePoint 2010 Search : Setting Up the Crawler - Crawling Metadata
- SharePoint 2010 Search : Setting Up the Crawler - Crawler Impact Rules & Crawler Scheduling
- Securing Windows Server 2008 R2 : Active Directory Recycle Bin
- Securing Windows Server 2008 R2 : NPS & NAP
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server