Exchange Certificate Renewal Subject Alternative Name Split DNS Autodiscover

jeff mcnabney 301 Reputation points
2021-02-17T15:34:02.907+00:00

Exchange 2016, on a split dns environment with existing local AD CA certificate, will have certificate replaced with 3rd party. The are 3 domains on this server...

domain1.com
domain2.com
domain2.local

I will be ignoring the domain2.local SAN's in the new certificate, but how do i handle the autodiscover?

The Virtual directories [ecp,ews,mapi,activesync,oab,owa] all point at correctly resolving fqdn CN="mail.domain1.com"... my concern is with autodiscover...

if i do an nslookup locally, it resolves to the correct IP of the exchange server, but shows the fqdn as "autodiscover.domain2.local". 3rd party verification will require access to the .local domain to verify ownership, which won't work.

Do I need to change this resolution to the fqdn CN=mail.domain1.com. How do i change this?

When generating the CSR, the server includes autodiscover.domain1.com AND autodiscover.domain2.com... How do i handle this scenario?
If i do a local lookup of autodiscover.domain1.com OR autodiscover.domain2.com... they both come up empty. Are some DNS records missing?

The autodiscover is NOT used off premises, only on the local network. I just don't want to muck up any internal config by screwing up the autodiscover in the certificate.

Exchange | Exchange Server | Management
0 comments No comments
{count} votes

Accepted answer
  1. Andy David - MVP 157.8K Reputation points
    2021-02-17T18:21:04.94+00:00

    The nslookup of the server doesnt matter, what matters is what is set internally to the Autodiscover SCP and that it resolves in DNS.

    So if you want to set autodiscover internally to mail.domain1.com, then you need that on the cert as a subject name OR part of a wildcard.

    Set-ClientAccessService -Identity <server>  -AutoDiscoverServiceInternalUri "https://mail.domain1.com/autodiscover/autodiscover.xml" 
    

    If mail.domain1.com resolves in DNS and the subject is on the cert applied to IIS, then you are good.

    when generating the CSR, include both of those subject names and ensure they are set in external DNS correctly to point to the external Exchange endpoint.
    Internally, there is no absolute requirement to do this because domain joined machines will use the SCP, but I would anyway and create those records:
    autodiscover.domain1.com
    autodiscover.domain2.com

    and have them point to the Exchange Server endpoints and have those as subject names on the certs!


1 additional answer

Sort by: Most helpful
  1. Anonymous
    2021-02-18T06:42:47.927+00:00

    Hi @jeff mcnabney ,

    If the external users use autodiscover on both domain1.com and domain2.com servers, then you gonna need both autodiscover.domain1.com and autodiscover.domain2.com.
    But if there are no external users that will use autodiscover, i think you won't need this. But in this case why do we need the certificate?
    I think, as Andy said, it's a better choice to add the autodiscover.domain.com as the SAN.

    Regards,
    Lou


    If the response is helpful, please click "Accept Answer" and upvote it.
    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.