Figure 1: The self-signed certificate is created by default when installing the Exchange 2007 HUB, CAS, and UM server roles
Hub and Edge Transport certificates and roles
Transport layer security between Active Directory sites
The Exchange 2007 Hub Transport server role uses a certificate to encrypt all traffic between Active Directory sites. You cannot configure Exchange to allow unencrypted SMTP traffic between Hub Transport servers located in different sites.
To see which certificate is used between Hub Transport servers located in different Active Directory sites, use the SMTP login protocol to Send connector inside the organization on each Hub Transport server, see Figure 2 below. below, using the Exchange Management Shell Set-TransportServer command.
By setting the IntraOrgConnectorProtocolLoggingLevel to verbose, the login protocol will be added to the Send connector protocol log. After sending a mail from Mailbox in Site B to a Mailbox located on the Exchange 2007 Mailbox server in Site A, observe the Send protocol log you will see that the Exchange Hub Transport server in Site B (Ex2007SE) uses the certificate. Only provided by the Exchange Hub Transport server in the destination Active Directory site (Ex2007EE) to start Transport Layer Security, see Figure 3 for details.
You can immediately see the certificate on the Hub Transport server that is in the state available to TLS, indicating that it is a self-signed certificate that has been used (Figure 4).
EdgeSync
Once EdgeSync is configured between the internal Hub Transport servers and the Edge Transport, both servers will use a certificate to encrypt their communication problem. In addition, both will be used to provide direction for trust. This trust is an authentication method where the certificate can be used for authentication when the issued certificate is present in Active Directory (with the Hub Transport server role) or ADAM / LDS (for the Edge Transport server role). When setting up EdgeSync, the required certificates will be published in the correct location.
Transmission layer security
Whenever a server opens a connection to the Exchange 2007 Hub / Edge Transport server role, Exchange will allow a TLS by providing its certificate.
Domain security
Certificates can also be used by the Hub / Edge Transport to configure Domain Security with partner organizations, both encryption and authentication.
Client Role Access Server and certificates
Client Access
Certificates are used by the Client Access server role to allow encrypted media traffic between the Client Access server and its clients. By default SSL is required for:
With virtual directories, the use of certificates is not required by default, which makes the Offline Address Book available for download by Microsoft Office Outlook 2007 and newer clients.
Certification based on certificate
You can configure certificate-based authentication, by configuring it to allow clients to authenticate themselves to the Client Access server using their personal certificates.
Unified Messaging Server Role and certificates
Certificates used by the Unified Messaging Server role to encrypt communications when sending a Voice Mail message are recorded to the Exchange Hub Transport Server role. Certificates are also used to code SIP or RTP traffic for UM IP Gateway, and must be used when you decide to deploy Office Communications Server in your environment, because Office Communications Server only communicates with roles Other servers through encryption.
When you deploy the Exchange 2007 Server role, except for the Mailbox Server role, Exchange will create a self-signed certificate and allow Exchange to use this certificate when required for IIS, SMTP, POP3, IMAP4, and UM services.
Characteristics of Self-Signed certificates
Let's take a look at these default Self-Signed certificates features.
Self-Signed certificates are only valid for about a year, see Figure 7, and need to remew after a year.
To renew a Self-Signed certificate, you can use the New-ExchangeCertificate command. If this certificate exists by running Get-ExchangeCertificate, you can quote the object for the New-ExchangeCertificate command, then create a new Self-Signed certificate with the same settings and activate it. It gives the same service by default.
In Figure 8, you can see the existing Self-Signed certificate is renewed.
The Exchange 2007 Client Access server only allows one certificate to be enabled for use with IIS, but you may still have multiple certificates enabled for POP, IMAP, UM and SMTP. When multiple certificates are available, Exchange will select a certificate based on different standards. We will cover this selection process in part two of the series.
The Self-Signed certificate created when deploying Exchange 2007 will have a common name set for the Host name of the Exchange server and there are two Subject Alternative Names setting for its Host name and its Fully Qualified Domain Name.
However, it is possible to create a Self-Signed certificate with the Subject and Subject Alternative Names to ensure that it can be used in the Exchange organization.
Using the New-ExchangeCertificate command, you can create an example of a certificate with Common Name is webmail.proexchange.global, then specify Subject Alternative Names as Exchange for Host and Fully Qualified Domain Name, see Figure 10.
Don't forget to add the PrivateKeyExportable boolean parameter and set True, if you want, you can export this certificate to allow your users to trust it (details will be introduced in Part 2).
In part two of this series, we will return to the required names of the certificate. In part three, we will explain more about the commands used.
Be aware that the Self-Signed certificate is only trusted by its issuer, which can cause Exchange to fail if not configured properly. Let's take a look at what you need to consider if you decide to use a Self-Signed certificate:
Figure 11: Self-Signed certificate is not trusted
Figure 12: Self-Signed certificate is not trusted
Conclude
In this article, I have explained that Exchange 2007 components use certificates and the characteristics of the 'self-signed' certificate. In part two of this series, we will introduce you to the factors that help you trust and this certificate and the requirements of a certificate that you need to keep in mind when using them. The final part of the series will give you a closer look at the Exchange Management Shell commands used to create, manage, and remove Exchange certificates.