Solved

Securing OWA over HTTPS

Posted on 2010-11-11
6
387 Views
Last Modified: 2012-05-10
I have a server 2003 with exchange 2003.

I would like to setup OWA for Users to access over Internet with HTTPS. I do not have a SSL certain so want to know from scratch what needs to happen.
0
Comment
Question by:Flipp
6 Comments
 
LVL 6

Accepted Solution

by:
nsonbaty earned 500 total points
ID: 34109619
use this link to configure owa with ssl
http://www.msexchange.org/tutorials/SSL_Enabling_OWA_2003.html

and this link for HTTPS

http://support.microsoft.com/kb/839357
0
 
LVL 5

Expert Comment

by:ByteSleuth
ID: 34110048
Hello,

German Edition here:

http://www.msxfaq.de/clients/owa2003.htm

regards

BytesSleuth
0
 
LVL 26

Expert Comment

by:Leon Fester
ID: 34111647
You will need a SSL Certificate to setup OWA over HTTPS.
However you don't need neccessarily buy a certificate.
You can use Microsoft's SelfCert utility or if you've got access to your Certificate Server on your domain then you can sign your own certificates. Just do the certificate request and exported it to a file.
Then access your Certificate Server via a browser and sign it yourself.

For the rest of the setup, look at the tutorial above.
Please note: You will still need to publish OWA via firewall like ISA or Forefront to make it safe on the WWW.
0
 
LVL 6

Author Comment

by:Flipp
ID: 34214680
When you say "publish", I am assuming you just mean to open a port?

Also, when it comes to any use of things like RWW or OWA over HTTPS using a self-signed certificate, I am assuming that this is safe through encryption - right?

Also, if I am comparing a third-party cert to a self-signed, then the only advantage that a third-party cert has is that it does not need to be distributed before use? I would of thought that if my Server has Certificate Services installed, then it could distribute over the Internet?
0
 
LVL 76

Expert Comment

by:Alan Hardisty
ID: 34869228
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Local Continuous Replication is a cost effective and quick way of backing up Exchange server data. The following article describes the steps required to configure Local Continuous Replication. Also, the article tells you how to restore from a backup…
This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
In this video we show how to create a Contact in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Contact ta…
In this video we show how to create a Resource Mailbox in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: Navigate to the Recipients >> Resources tab.: "Recipients" is our default selection …

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now