Entrust Datacard

Entrust Certificate Services Support Knowledge Base

Last Modified: 2017-04-10 14:26:29.0

SSL/TLS Certificate Installation Instructions - Microsoft Exchange 2007

Article Number: 46308

User-added image
Purpose: SSL/TLS Certificate Installation Guide
For Microsoft Exchange 2007
User-added image
Need Certificate Signing Request (CSR) help? Please see our technote on how to generate a CSR in Microsoft Exchange 2007 here.

The installation is in two parts:
1) Importing CA certificate using Microsoft Management Console (MMC)
2) Installing the certificate on the server
*Additional Instructions: Microsoft ISA Servers

Part 1 of 2: Importing CA certificate using Microsoft Management Console (MMC)

1. Click the Download button in the pickup wizard to download your certificate files. Clicking the download button will produce a zip file that includes your Server Certificate, the Entrust chain/intermediate certificates(s) and the Entrust Root certificate. Extract the files from the zip file.

2. On the server, go to Start > Run > type MMC and hit enter.

3. Click File > Add Remove Snap-in.

4. Select Certificates and click Add.

5. Select Local Computer and click Finish.

6. Click Close.
 

7. Expand Certificates on the left hand side of the console window.

8. Expand the Trusted Root Certification Authorities folder and click on the Certificates sub-folder.
9. Important: Check the list of Trusted Root Certificates to see if there is a root labeled Entrust Root Certification Authority - G2.  If this root is present, delete the root from the list. You will install another root certificate and chain your certificate to that root to provide backwards compatibility with older devices that do not include the newer Entrust SHA-2 root certificate.

10. Right click on the Certificates sub-folder under Trusted Root Certification Authorities and select All Tasks > Import.

11. In the import wizard, browse to the Root.crt file downloaded in step 1 and complete the wizard.

12. In the MMC console, expand the Intermediate Certification Authorities folder. Right click on the Certificates sub-folder and select All Tasks > Import.

13. In the import wizard, browse to the Intermediate1.crt file downloaded in step 1 and complete the wizard.

14. Right click on the Certificates sub-folder under Intermediate Certification Authorities and select All Tasks > Import.

15. In the import wizard, browse to the Intermediate2.crt file downloaded in step 1 and complete the wizard to complete the certificate chain setup process. You should see your Entrust Intermediate certificates listed in the Intermediate Certification Authorities folder. You are now ready to install your signed server certificate. 

Part 2 of 2: Installing the certificate on the server

1. As an Administrator on the server, open the Exchange Management shell by clicking Start > Exchange Management Shell.

2. You will need to run a command to import the Server Certificate file that was downloaded in step 1 and a command to enable the desired Exchange services. This can be done in a single command by using the pipe delimiter. To simplify the command, place your ServerCertificate.crt file in your C drive.

Import-ExchangeCertificate -Path C:\ServerCertificate.crt | Enable-ExchangeCertificate -Services "SMTP, IMAP, POP, IIS"

3. To verify that the previous command was successful, run the following command:

Get-ExchangeCertificate

This command will display a list of all of the certificates available on the server.  Check the Subject column to identify the certificate that you just imported in the previous step. Check the corresponding Services column to ensure the correct services have been enabled.   In the Services Column:
  • 'S' is the SMTP Service
  • 'I' is the IMAP Service
  • 'P' is the POP Service
  • 'W' is IIS which is used for Webmail and Active Sync

4. If the proper services are not enabled, run the following command and provide your certificate thumprint. The certificate thumprint value should have been part of the ouput of the Get-ExchangeCertificate command.

Enable-ExchangeCertificate -ThumbPrint [Certificate Thumbprint Value] -Services "SMTP, IMAP, POP, IIS"

*Additional Instructions: Microsoft ISA Server

If you are running Microsoft Internet Security Server (ISA), you must export your certificate and private key and install it on the ISA server. You can find instructions here.
 
User-added imageYour SSL/TLS certificate should now be installed.

Check that your Certificate has been successfully installed by testing it on the Entrust SSL Install Checker.

If you have any questions or concerns please contact the Entrust Certificate Services Support department for further assistance: 

Hours of Operation:
Sunday 8:00 PM ET to Friday 8:00 PM ET 
North America (toll free): 1-866-267-9297 
Outside North America: 1-613-270-2680 (or see the list below) 
NOTE: It is very important that international callers dial the UITF format exactly as indicated. Do not dial an extra "1" before the "800" or your call will not be accepted as an UITF toll free call.

CountryNumber
Australia0011 - 800-3687-7863
1-800-767-513
Austria00 - 800-3687-7863
Belgium00 - 800-3687-7863
Denmark00 - 800-3687-7863
Finland990 - 800-3687-7863 (Telecom Finland)
00 - 800-3687-7863 (Finnet)
France00 - 800-3687-7863
Germany00 - 800-3687-7863
Hong Kong001 - 800-3687-7863 (Voice)
002 - 800-3687-7863 (Fax)
Ireland00 - 800-3687-7863
Israel014 - 800-3687-7863
Italy00 - 800-3687-7863
Japan001 - 800-3687-7863 (KDD)
004 - 800-3687-7863 (ITJ)
0061 - 800-3687-7863 (IDC)
Korea001 - 800-3687-7863 (Korea Telecom)
002 - 800-3687-7863 (Dacom)
Malaysia00 - 800-3687-7863
Netherlands00 - 800-3687-7863
New Zealand00 - 800-3687-7863
0800-4413101
Norway00 - 800-3687-7863
Singapore001 - 800-3687-7863
Spain00 - 800-3687-7863
Sweden00 - 800-3687-7863 (Telia)
00 - 800-3687-7863 (Tele2)
Switzerland00 - 800-3687-7863
Taiwan00 - 800-3687-7863
United Kingdom00 - 800-3687-7863
0800 121 6078
+44 (0) 118 953 3088

TN8222

Affected Products:

  • Entrust Certificate Services 1 Year Advantage SSL Certificate Version Not Applicable Language Not Applicable Platform Not Applicable