Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


SSL certificates for Exchange Server 2007/2010 when domain is .local

Posted on 2012-12-29
Medium Priority
Last Modified: 2013-01-02
Hello. I am looking for a little help with Exchange Server and SSL certificates.

I run a networking and IT consulting firm. Many of our clients run Microsoft Small Business Server (SBS) and run the included on-premise Exchange Server.  Other clients run NON-SBS servers and also have on-premise Exchange Servers.  It has been our standard company practice to always name the local activate directory domain name for each customer to be "theircompanyname.local", so that it is separate from any public facing DNS (for websites, OWA, etc) for ""

Since Exchange Server 2007, we have been getting UCC SSL certificates from GoDaddy.  We typically include the following names in our UCC (Unified Communications) SSL request.  I sometimes also hear/see this called a SAN (subject alternate name) certificate.
- servername (local NETBIOS server name)
- servername. theircompanyname.local (local server FQDN)
- (public domain name)
- (public URL for Outlook web access)

I honestly can’t recall the details of how or why we started using all of those names in the certificate/request,  but it has been our standard practice for many years.

Now it is my understanding that Certificate Authorities (CAs) have accepted worldwide guideline changes, and will no longer issue SAN SSL Certificates that include any invalid Fully Qualified Domain Name (such as .local), effective November 2015. We have already run into issues with this, as we are no longer able to request multi-year certificates that go beyond the November 2015 date. (ie a one-year cert request works, but a 3, 4 or 5 year cert request fails).

We are having internal discussions about our practice of using .local for internal domain names (and are considering other common scenarios such as subdomains (such as or corp. So for those future networks, I may have a different workaround.

But we have 80+ networks for 80+ existing customers, that are mostly setup using "theircompanyname.local" for the local domain name.  We have to somehow get SSL certificates for these Exchange Servers, and we will NOT be able to include any reference to “servername“ or “servername. theircompanyname.local” in the SSL certificate request.

SO my questions is.... What is the best/correct method for requesting an UCC/SAN SSL certificate for Exchange Server 2007 and Exchange Server 2010, when the local Windows domain name is “theircompanyname.local”?  

Do we just exclude any reference to the “servername” and “servername. theircompanyname.local” in the SSL cert request?  I guess we could try that, but I have to assume that we were including those for a reason in the first place?

Do we make a change somewhere on the server so that it does not depend on any references to “servername” or “servername. theircompanyname.local” being in the SSL certificate in order to function properly?

Any advice and suggestions would be greatly appreciated.  Thank you in advance.

Warm Regards,

Question by:wolfconsultinginc
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
LVL 59

Expert Comment

by:Cliff Galiher
ID: 38729953
Often those extra names are included because someone got advice they "read on the internet." In common deployments, you only need one or two names, the first is the public name you want the CAS to use for OWA and EWS. Optionally, the second is the autodiscover name, but if you use a SRV record to redirect autodiscover, you don't even need that, so you don't even need a UCC/SAN certificate. The other three names, unless you are doing something very strange, are not needed and no special changes need to be made to exchange.
LVL 59

Expert Comment

by:Cliff Galiher
ID: 38729956
Considering the price of a single name cert is around $10, you can even buy one as a test and chalk up the cost as a business learning expense to verify this works as expected. If your margins are so thin that you cant spend $10 to learn whether a technique will work for 50+ clients a .50 cent per client experiment) then it is time to look at your pricing model.

Author Comment

ID: 38730225

Thanks for the responses. I am happy to try anything, and spending some money to determine a workable solution (especially one that can be applied to all of our clients) is certainly no issue.

As I mentioned, I am not really sure how we developed the practice of including all of the names for the SAN/UCC certtificate. Perhaps it was an SBS thing?

Just so that I fully understand your solution, I beleive you are saying that.... when we request the certificate, we can enter "" for the Outlook Web App service for both intranet and internet, and enter the same ""  for Web Services, Outlook Anywhere and Autodiscover names, and I suppose create a DNS record on the local LAN DNS server so that the host name "" when on the local network resolves to the local IP address of the Exchange Server, am I understanding correctly?

And also, since they are all the same name "" for all of the services, that we dont even need the UCC/SAN certificate and can just by the cheaper cert for a single name?

Thanks again, in advance.

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

LVL 63

Expert Comment

by:Simon Butler (Sembee)
ID: 38735852
The previous advice given was to include:

common name, FQDN of the server, netbios of the server, autodiscover and sites.

This covered all eventualities including where the internal name was used for things like autodiscover.

With the change in SSL certificates forthcoming, using internal names isn't possible. It is possible to get down to two names on the certificate and IF and only IF the external DNS provider supports SRV records then you can get it down to a single name certificate.
That is because you need to cover autodiscover in some way.
Autodiscover can work with either (host name on the SSL certificate) or SRV records.

SRV records information:

Single name certificate use:

There is still a case for UC certificates though. A number of clients will use seperate name spaces for each service, so that troubleshooting becomes easier.,,,

LVL 59

Accepted Solution

Cliff Galiher earned 200 total points
ID: 38736561
Definitely not an SBS thing. In fact, SBS has a certificate wizard that, by default, is designed for a simple single-name certificate.

Yes, you can enter *just* into the certificate process. And yes, it can be a simple single-name certificate.

If you are setting up SBS and use the wizards, the DNS setup for the public name pointing to the private address is done automatically as part of the wizard. For your non-SBS networks, yes, you will want to add that step as part of your setup.

There is still the issue of autodiscover though. Outlook uses several methods to "autodiscover" the exchange settings. If you aren't using a UCC/SAN certificate and aren't setting up records for, you will want to set up a SRV record on the *public* DNS host, wherever that may be. This is unnecessary for the internal private DNS network, as an Active Directory SCP will be used to locate the information.

The public SRV record, when configured properly, will allow users outside the network to easily configure "Outlook Anywhere" using AutoDiscover with no certificate errors or additional work. If you don't use Outlook Anywhere, then even this step is unnecessary.

Hopefully that better answers your questions.

Author Comment

ID: 38736591
@cgaliher and @Sembee2,

Thanks very much for the replies and the explainations!


Featured Post

Moving data to the cloud? Find out if you’re ready

Before moving to the cloud, it is important to carefully define your db needs, plan for the migration & understand prod. environment. This wp explains how to define what you need from a cloud provider, plan for the migration & what putting a cloud solution into practice entails.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will help to fix the below errors for MS Exchange Server 2013 I. Certificate error "name on the security certificate is invalid or does not match the name of the site" II. Out of Office not working III. Make Internal URLs and Externa…
The core idea of this article is to make you acquainted with the best way in which you can export Exchange mailbox to PST format.
In this video we show how to create an Address List in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Organization >> Ad…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…
Suggested Courses

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question