I tried Chris Ridd's suggestion but it didn't work for Exchange (but it
helped for ldap).
In my example, the common names of the certificate do not match and neither
of the common names are the same as the server name used in the OWA URL.
(For example, the common name is EXCH1234 and MCWEB but the OWA URL is
https://webmail.mycompany.com/exchange).
Should the common name be webmail.mycompany.com and must both common names
match?
The common name should be specific to the server. I would suggest that the
common name remain "EXCH1234.fully.qualified.domain.name" and you add a
subject alternative name extension with a FQDN entries of
"EXCH1234.fully.qualified.domain.name" and "webmail.mycompany.com" -- the
duplication is just for explicitness, that the common name really is a FQDN
and not some other random name. That way, every server can have its own
certificate, but all of them with the subjectAltName extension can support
accesses via the OWA URL as well.
I'd also suggest using an IP address of the server in the subject
alternative name (so long as it's an actual internet IP address statically
assigned to the machine), but Entourage's SSL code doesn't do subjectAltName
IP matching in the current release, and there's actually a bug (which will
be addressed in an upcoming update) which causes certificates with an IP
address subjectAlternativeName entry to be mis-parsed, considered to be
badly formed, and thus treated as untrusted. As it is, I'd hold off until
the update, and even then, you still won't be able to securely connect to
the server by IP address.
Unfortunately, the stock installation of Microsoft certificate server
doesn't allow you to create certificates with a subject alternative name. If
you're using it to generate the certificates, you have to tweak some
settings first. I found a summary of how to do it here for LDAP (though it's
identical for your purpose):
<
http://guy.netguru.co.il/categories/6-Security>. The steps use a lot of
information from
<
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies
/security/advcert.mspx> which is more of a reference than a How-To.
If they're using certtool, I don't think it'll be able to generate the
request -- they'll have to use openssl req (or just req(1)), though I'm not
quite sure how to specify the additional subject alternative name item.
Sorry to be a pain on this but I want to inform our IT department with
precise information.
Understandable.
-nh