[Webinar] Streamline your web hosting managementRegister Today


How do I replace current certificate for Exchange Web Access when the request has been cancelled

Posted on 2008-01-31
Medium Priority
Last Modified: 2010-04-21

I was replacing the self signed certificate that our company uses for exchange web access, or OWA. I followed the process of creating the certificate request, sending it off to third party vendor etc. Sadly, I wasn't aware that removing the certificate and requesting the next one, would stop OWA working, so I cancelled the request and reverted back to the old certificate. Now I have the new cert, how do I get it to replace the current self signed CA one. There doesn't seem to be any way of importing this into IIS.

Question by:fatboyjimbob
LVL 19

Accepted Solution

lamaslany earned 500 total points
ID: 20788805
See 'Install certificate after deleting the pending certificate request (IIS 6.0)': http://www.microsoft.com/technet/prodtechnol/WindowsServer2003/Library/IIS/53dfdb5e-6106-4d99-85bb-da199bc27c7e.mspx?mfr=true

Worked great for me in the past.

Author Closing Comment

ID: 31426814
Nice one. Thanks Very much

Featured Post

Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Media Temple is thrilled to announce the launch of our new Partner Program, specifically designed to empower digital agencies and adtech platforms by offering white-glove support and exclusive hosting enhancements to optimize their sites and their c…
Media Temple is proud to announce our partnership with the Society of Digital Agencies (SoDA) as their exclusive hosting partner.
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Get the source code for a fully functional Access application shell with several popular security features that Access VBA application developers desire, but find difficult or impossible to figure out how to code. You get the source code for managi…

640 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question