Solved

Credential Passing with Exchange

Posted on 2014-10-03
1
351 Views
Last Modified: 2014-10-10
We are currently trying to setup Cherwell. We enter the Exchange Domain and Server (Client Access) and use a SSL connection. We then put in the User and Password for the e-mail account we would like to use for Cherwell. We then click 'test account'. Get the error: "Account test failed. (Recipient: <e-mail address (not of the account that was entered, but mine)> The request failed with HTTP status 401: Unauthorized." The credentials that are entered are correct in Cherwell. I have checked the event logs and get an Event ID 4625: Failure Reason - Unknown user name or bad password; Status: 0xC000006D; Sub Status 0xC0000064. Detailed Authentication Information: Logon Process - NtLmSsp; Authentication Package - NTLM. I can log into OWA using the credentials that I put into Cherwell e-mail setup. Also, I can create an IMAP account through gmail and it works but unable to get it to work when passing to Exchange. Any help is greatly appreciated.
0
Comment
Question by:Jason Carlson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 35

Accepted Solution

by:
Cris Hanna earned 500 total points
ID: 40360887
You'll need to set up SMTP relay on your exchange server.  This article describes how to do it in Exchange 2007, but it's pretty much the same regardless of the version of exchange.  http://blogs.technet.com/b/sbs/archive/2008/09/18/how-to-configure-trusted-smtp-relay-in-exchange-on-sbs-2008.aspx
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question