Solved

Certificate to replace the self signed from sbs 2008

Posted on 2011-02-11
4
383 Views
Last Modified: 2012-05-11
We're looking for a simple certificate to replace the Self Signed one from SBS. We have 5 email domains downloaded through exchange and a couple of people who connect via VPN. Everyone has iPhones that connect through exchange.
0
Comment
Question by:iconeyewear
4 Comments
 
LVL 5

Expert Comment

by:zippybungle2003
Comment Utility
If its 2008 sbs you need to lookin into a SAN certificate.

http://www.digicert.com/subject-alternative-name.htm
0
 
LVL 9

Accepted Solution

by:
dmessman earned 250 total points
Comment Utility
You're receiving 5 domains worth of email, but there will only be one domain name that the server will use.  With SBS 2008, it's just easiest to use remote.domanname.com where domainname.com is the public domain name you'll want your users seeing.  

You can get a single name cert using this method:
http://blogs.technet.com/b/sbs/archive/2009/02/11/sean-daniel-how-to-install-a-godaddy-certificate-on-sbs-2008.aspx

With a single name cert, you also have to create an SRV record.  I can give you more details on that if that's the route you want to go.

You can also get a SAN cert (which I prefer though it costs a small bit more).  In this case, you get a cert that will cover multiple names - notably:

domainname.com
remote.domainname.com
autodiscover.domainname.com


The SAN cert is helpful becuase you don't have to create the SRV record.  The SRV/autodiscover record helps with several aspects of Exchange 2007 functionality (like out of office assistant).  I can help guide you through the installation of that if you choose to go with a SAN certificate.  

Personally, I get all my certificates through godaddy:

http://www.godaddy.com/ssl/ssl-certificates.aspx?ci=9039

0
 
LVL 16

Expert Comment

by:Ady Foot
Comment Utility
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I've often see, or have been asked, the question about the difference between the Exchange 2010 SP1 version, available as part of Small Business Server (SBS) 2011, and the “normal” Exchange 2010 SP1 Standard. The answer to the question is relativ…
If you are a user of the discontinued Microsoft Office Accounting 2008 (MSOA) and have to move to a new computer running Windows 8, you will be unhappy to discover that it won't install.  In particular, Microsoft SQL Server 2005 Express Edition (SSE…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now