36
Page 1 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36 Written by Eyal Doron | o365info.com | Copyright © 2012-2015 Autodiscover process and Exchange security infrastructure | Part 20#36 The article is all about the subject of the security mechanism that is implemented as part of the Autodiscover process. Autodiscover and security Autodiscover mechanism includes three major parts: 1. Locating the Autodiscover Endpoint 2. Getting the Autodiscover information \data 3. Using the Autodiscover information

Autodiscover process and Exchange security infrastructure | Part 20#36

Embed Size (px)

DESCRIPTION

Autodiscover process and Exchange security infrastructure | Part 20#36 In this article, we will review the secure communication channel that is implemented between the Autodiscover client and his Exchange CAS server (Autodiscover Endpoint). The secure communication channel is implemented by using the HTTPS protocol and SSL public certificates. We will inspect in details, what happened behind the scenes of the process in which the Exchange server provides his public certificate, and the client implemented different test for verifying the identity to the server, etc. http://o365info.com/autodiscover-process-and-exchange-security-infrastructure-part-20-of-36 Eyal Doron | o365info.com

Citation preview

Page 1: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 1 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Autodiscover process and Exchange

security infrastructure | Part 20#36

The article is all about the subject of the security mechanism that is implemented

as part of the Autodiscover process.

Autodiscover and security

Autodiscover mechanism includes three major parts:

1. Locating the Autodiscover Endpoint

2. Getting the Autodiscover information \data

3. Using the Autodiscover information

Page 2: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 2 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

In the current article, we relate to the “middle part” in the diagram that deals with

the task of – “Getting the Autodiscover information \ data “.

The Autodiscover process was built for providing the “client” an efficient and secure

way for getting the required information from a “server” (Exchange or Autodiscover

Endpoint).

The meaning of a “secure way”, is translated into three major mandatory

requirements:

1. The ability to prove identity

Each of the involved parties in the Autodiscover session, meaning the client and the

server, need to identify himself and to “proof” his identity.

The client and the server must implement a model of – “mutual trust” in which the

client can know that the server is a “reliable source of information” and the server

can know that the client is “authorized” to get a specific information.

Page 3: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 3 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

The trust between the involved parties is achieved by using a mutual

authentication.

The “server side” will identify himself by providing a certificate, the client side will

identify himself by providing user credentials. After the Autodiscover client verifies

that the Exchange certificate is O.K and the server can be trusted, the Autodiscover

client also needs to prove his identity to the Exchange server.

The “Autodiscover client proof”, is not implemented by providing a certificate (client

side certificate) but instead, by providing user credentials (username + password)

that will be encrypted by using the public key from the server certificate.

2. The ability to secure the communication channel

A secure communication channel is implemented by encrypting the data that is

transferred between the two Autodiscover Endpoints.

Page 4: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 4 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

3. The ability to provide data integrity

The meaning of “data integrity” is using a mechanism that will enable each of the

parties to ensure that the data that was sent was not modified, corrupted, etc.

In the following diagram, we can see the essential requirements that need to be

fulfilled. The implementation of this different requirement is implemented by the

SSL infrastructure.

Page 5: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 5 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

SSL (HTTPS) infrastructure and Exchange Autodiscover

SSL stands for – secure socket layer. The SSL mechanism is implemented by a

protocol named – HTTPS (HTTP secure).

The Exchange Autodiscover infrastructure is built upon the SSL infrastructure.

The term “SSL infrastructure” is built from many different parts and components.

Getting into a detailed review of each component is Outlook of our current article’s

scope.

Instead, we will mention some of the “parts” that build the SSL information and how

this part are “used” by the Autodiscover process.

Autodiscover and server-side public certificate

The infrastructure for HTTPS and SSL (the mechanism that is used by the Exchange

Autodiscover process) is heavily relied on the “server side certificate”.

The term “server”, relate to an element that provides a service to a client.

In our scenario, the server is Exchange server (Autodiscover Endpoint) that provides

Autodiscover services to his Autodiscover clients.

Page 6: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 6 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Note – along the current article we will mention the term “public certificate”.

Technically speaking the server certificate doesn’t have to be considered as public

certificate what was created by a public CA (certificate authority).

In a public environment, the mandatory need is for a public certificate. Because

Exchange infrastructure provides services to an external client that reside on the

public network, we can see that the Exchange server must use a public certificate.

The server side (Exchange server) public certificate is used for two purposes:

1. The server ability to provide proof of identity to the Autodiscover client

The Exchange client (Autodiscover client) doesn’t relay to know if the Exchange

server that he is trying to communicate is “Is really who he says he is”.

The server public certificate enables the Exchange server (the Autodiscover

Endpoint) to prove his identity to the Autodiscover client.

Page 7: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 7 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

2. Creating a secure communication link

Autodiscover dictates a mandatory need encryption of the information that passes

between the two sides.

The data encryption is implemented by using a session key that the client creates

and uses for the task of – data encryption between the two end points.

Page 8: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 8 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Type of public certificate

A general classification of a certificate can be:

1. SAN – (Subject Alternative Name) – certificate which was created for

“representing” a limited number of hosts. Most of the time, the host name will

appear as an FQDN meaning a naming convention that includes the host name +

a domain name.

2. Wildcard certificate – a certificate that represents a “complete” domain name

and not just a specific host or FQDN. The name “wildcard” is used because the

syntax which is used is based upon the asterisk character that uses for

representing the wildcard. For example, a wildcard certificate for the domain

name – com will relate to the domain name as – *.o365info.com

Page 9: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 9 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Autodiscover | Data encryption process

Just a quick view about the way that is used for “building the secure communication

channel” between the server and the client.

Step 1 – verify server identity, get a public certificate, and fetch the public key from

the certificate.

The client asks for the server to provide him his certificate. The client implements

the process in which he verifies that the server certificate is “O.K.” and that the

server can be trusted.

The client “fetch” from the server certificate the public key.

Step 2 – create a session key, encrypt, send to the server.

In case that the process of validating the server public certificate was successfully

completed, the client “generate a code” that describes as- Session key.

The session key is the “password”, which will be used by the server and the client

for encrypting the data the travel through the secure communication link.

The client encrypts the session key by using the server public key.

“(The client “take” the value of the Public Key from the server certificate).

The client sends back the information to the server

Step 3 – server extract the session key

Only the server who has a private key, can open the encrypted code and find the

value of the session key that was “hidden” in the encrypted data.

Now, the client and the server have a session key (password) that only they know.

From this day forwards, each piece of data that is transferred between the client

and the server, will be encrypted using the values as the session key.

Note – a session key in the name implies, is “only good” for a specific session.

Each time the client creates a new communication with the server, the process is

implemented all over again, and a new session key is generated.

Page 10: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 10 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Autodiscover process and security in details

In an Autodiscover process, the first attempt of the Autodiscover client is to check if

the Autodiscover Endpoint can communicate using HTTPS and if the answer is “yes”,

the Autodiscover client will ask from the Autodiscover Endpoint his certificate.

The Autodiscover client will need to implement a serious about “validity checks” so

he will be able to be sure beyond doubt, that the server certificate is valid and

legitimate.

In case that the server certificate considered as valid, the Autodiscover client will

provide his credentials to the server and from this day forwards, all the data that

are pass-through the communication channel will be encrypted.

Page 11: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 11 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Server public certificate validity checks

The server certificate, must comply with all the three validation tests that are

performed by the client. To be able to say that the specific certificate is “valid”, all

the three validation tests must me successfully completed.

Note – the validation process is based on the way that the HTTPS protocol “works”

and in reality; the process is even more complex and includes additional steps such

as verifying the integrity of the certificate data by using the server digital signature

and more.

Page 12: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 12 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

To three validation tests that are implemented by the client are:

1. Validating the certificate name.

The term – “validating the certificate name“, is a little confusing.

The meaning is the when a client tries to address, the destination host, using a

specific host name, or if to be more accurate a FQDN (Fully qualified Domain name),

the client except that the server certificate will include this host name.

Case 1 – server use a SAN certificate

The term – ”SAN” (subject Alternative Name) describes a certificate method that

includes or relates to a specific host name\s.

In case that the SAN certificate includes four host names, the certificate can be used

by four different hosts or just one server who want to “present himself” using a

different host name.

Page 13: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 13 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

For example, when an Autodiscover client addresses an Autodiscover Endpoint

namedautodiscover.o365info.com, the client, except that the name will appear in the

server certificate.

In case that the server certificate doesn’t include the server name whom the

Autodiscover client expects to find, the Autodiscover process will fail.

In case that the server uses an SAN certificate, the requirement for a match

between the host name whom the Autodiscover client use and the name who

needs to appear in the server certificate are mandatory.

Case 2 – server uses a wild-card certificate

A wild-card certificate doesn’t relate to a specific hostname (the “left part” of the

FQDN name) but instead, only to the domain name (the “right part” of the FQDN

name).

In this case, the certificate includes only the domain name.

Each host who uses an FQDN name, in which the part of the domain name is

identical to the domain name that appears on the wild-card certificate, can use this

certificate.

For example, in case that the Autodiscover host name of a specific Exchange server

is –autodiscover.o365info.com, the wild-card certificate that the server provides is a

certificate that represents the domain name – o365info.com and not just a specific

host name.

Page 14: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 14 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Real life examples

Type of public certificate

1. SAN certificate

In the following screenshot, we can see an example of SAN certificate.

As we can see, one certificate chain “host” multiple host names and even multiple

domain names.

Page 15: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 15 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

2. Wild-card certificate

The next example is the Office 365 Wildcard certificate.

Page 16: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 16 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

In the following screenshot, we can see an interesting phenomenon – all the huge

Office 365 and Exchange Online infrastructure, is represented by a very simple and

“thin certificate”.

Office 365 uses a Wildcard certificate that includes the domain names:

*.office365.com and, *.outlook.com

All of the Office 365 and Exchange Online server who “belong” to one of these

domains can use this certificate.

We can relate to the wild-card certificate as a “logical umbrella” for all the hosts

whom they FQDN name includes one of this domain name.

Page 17: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 17 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

The certificate CA

In the following screenshot, we can see an example of a public certificate that was

created by a public CA – GoDaddy

Page 18: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 18 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

The name of the CA appears under the “issuer” filed.

Certificate trust chain.

In most of the scenarios, the CA that provides the certificate is the last link in the

chain.

Page 19: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 19 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Many times, there is an additional CA that “enroll” other CA as an authority who can

“enroll” other servers.

In the world of “security”, the client must be sure behind any doubt that the

certificate that the server provide is a legitimate and can be trusted.

For this reason, after the server sends to the client his certificate, the client need to

“pull Outlook” from the certificate the Certificate trust chain.

The next step will be verifying any of the CA that appear in the Certificate trust

chain.

Q1: How can the client (the Autodiscover client) trust the certificate that is provided

by the server (the Autodiscover Endpoint)?

A1: The certificate that is provided by the server is “stamped” by a public CA.

Q2: Why should the client trust this “CA”?

A2: The basic assumption is that the client desktop includes a certificate store that

includes a list of “approved” public CA that the client can trust.

The answer is quite simple: every “windows based” OS includes by default a

database named: certificate store.

The certificate store includes the certificate if these “public companies” such as

– GoDaddy, GTE Cyber Trust, DigiCert and more.

In the following screenshot, we can see an example to the “inside” of the windows

OS certificate store and the CA certificates.

Page 20: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 20 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

The term “certificate trusts chain” describe a “hierarchy of trust” between entities.

To make simpler, many times the CA that “authorized” a specific server by providing

him a public certificate is a “child” or subordinate of additional CA that authorized

him.

When a client gets a public server certificate, besides of validating the details of the

specific server who provide the certificate, the client must verify all the “hierarchy of

trust”, meaning all of the CA that was involved throughout the process.

The information about the Certificate trust chain must appear as part of the

certificate.

Real life example: let’s take for an example, the public certificate that I have.

Under the Certificate path tab, we can see a clear picture of the hierarchy.

The certificate was provided for a host named – o365info.com by a CA (Certificate

authority) of GoDaddy.

Page 21: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 21 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

The CA name that provides this certificate is – Go Daddy Secure Certification

Authority G2(number 2).

As we can see, the Go Daddy Secure Certification Authority CA is not in the “top of

the chain.

The “permission to enroll a server certificates were assigned or provided from a

“higher authority” named – “Go Daddy Root Certificate Authority – G2” (number 1).

Page 22: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 22 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

In the following diagram, we can see a description of the Certificate trust chain

process.

Step 1+ 2 : the client accesses a server and asks him to provide his certificate.

When the client gets the server certificate, he verifies that the server name appears

in the certificate and if the name appears correctly the client move to the next step.

Page 23: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 23 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Now, the client will try to communicate the CA server (Go Daddy Secure

Certification Authority in our scenario) and ask from him to provide his public

certificate.

In case that the CA provide his public certificate, the client will check if this is the

“end of the hierarchy.

In case that the answer is: “Yes”, the client moves to the next step.

Step 3: the client accesses his local certificate store, and looks for the CA certificate

(the last CA in the hierarchy).

Page 24: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 24 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

In case that the CA certificate appears in the client certificate store and in case that

the certificate is valid, this is a “sign” for the client that he can relay trust the server

that he wants to communicate with.

3. Verify that the certificate date is valid

This is the simplest part of the “certificate validation process”

Each certificate has a “limited lifetime”. The most common “public certificate,

lifetime” is 1-4 years.

Page 25: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 25 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Digital signature

Q3: How can the client be sure that the certificate is Legitimate and not fake?

A3: The public certificate includes a digital signature. The client “know” how to

implement a procedure in which he can verify if the certificate that the server

provides is the “original certificate” that he got from the CA.

Page 26: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 26 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Certificate public key

In the following screenshot, we can see an example of the public key value that

Page 27: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 27 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

appear in the certificate.

Troubleshooting public certificate scenarios

In the following section, I would like to review a couple of passable scenarios, which

can interfere in the Autodiscover process.

As we know, the Autodiscover process starts by looking for the root domain name.

In our scenario, the company public domain name is – o365pilot.com

Page 28: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 28 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

A user named Bob, which has the E-mail address – [email protected] wants to

create a new Outlook mail profile.

The Autodiscover process that is initialized by the Outlook client, will try to look for

a host named – o365pilot.com and if he finds one, try to create an HTTPS session

and ask for the Autodiscover required information.

Scenario 1: no public website that is “mapped” to the domain name.

In our scenario, the company didn’t publish or “map” the domain name to a public

web site.

Note – there could be a different scenario in which the company has a website, and,

in addition, the root domain name was mapped in the DNS to the public IP of the

web address, but the website doesn’t support HTTPS.

When the Autodiscover client starts the process, he will contact a DNS server

looking for information about the public IP of – o365pilot.com

Because, in our scenario, there is no such information, the Autodiscover client

“understand” that he should start using the second method of Autodiscover

hostname using the naming convention – autodiscover.o365pilot.com

In case that the Exchange server was configured correctly, the Autodiscover client

will find the IP address of the host, check if the host (Exchange server) support

HTTPS asks for the server certificate and so on.

Page 29: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 29 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Scenario 2: public web site + public certificate

In this scenario, the company has a website.

The public IP of the website is “mapped” in the DNS server to the company public

domain name – o365pilot.com

In addition, the company website supports HTTPS and had a certificate.

To be able to demonstrate a passable problem with this scenario, we will simulate

two passable problems that relate to the web server certificate.

Page 30: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 30 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Problem 1: the server certificate was not provided by a public CA

In this scenario, the company website uses a certificate that was created by a non-

public CA.

To be able to get more information about the “web server” certificate let’s take a

look at the certificate content:

In the following screenshot, under the General tab, we can see that the certificate

icon appears with a red stop sign. The warning notification is –

The certificate cannot be verified up to a trusted certification authority.

Pay attention that the server certificate includes the host name – o365pilot.com and,

the certificate date are valid but the server certificate was not created by a “trusted

CA” and for this reason, the validation check will fail.

Page 31: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 31 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Under the Certificate Path tab, we can see that there is no “certificate chain”

meaning – we cannot find the “element” (the public CA) that provide this certificate.

Page 32: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 32 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Analyzing the Autodiscover workflow by using ExRCA

To be able to take a closer look at the Autodiscover flow in this scenario, we will use

the results of the ExRCA test.

In the following screenshot, we can see that the first part of the Autodiscover

processes complete successfully (number 1 + 2).

The Autodiscover client manage to get the IP address of the Autodiscover Endpoint

(o365pilot.com) and, manage to verify that the Autodiscover Endpoint can

communicate using the HTTPS protocol.

Page 33: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 33 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

(IP addresses returned: 85.250.113.157 and Testing TCP port 443 on host

o365pilot.com to ensure it’s listening and open).

The Autodiscover client asks for the server certificate, and the certificate was

Successfully sent to the Autodiscover client (number 3):

The Microsoft Connectivity Analyzer successfully obtained the remote SSL

certificate.

The certificate validation phase starts.

The first test that the Autodiscover clients perform is – the validating that the

Autodiscover Endpoint name appears in the certificate (number 4).

In the ExRCA results, we can see that the server names (o365pilot.com) appear

correctly-

Validating the certificate name. The certificate name was validated successfully.

Hostname o365pilot.com was found in the Certificate Subject Common name.

The next validation test that performed by the Autodiscover client is the “Certificate

trust” (number of 5).

In the test results, we can see that this test did not complete successfully

(number 5) because the server certificate was not created or provided by a “trusted

CA”:

Certificate trust is being validated. Certificate trust validation failed.

The Microsoft Connectivity Analyzer is attempting to build certificate chains for a

certificate CN=o365pilot.com. A certificate chain couldn’t be constructed for the

certificate.

In case that the validity checks of the host failed, the Autodiscover client will “move

forward” to the next step by starting to look for a possibility to communicate with

the host name –autodiscover.o365pilot.com (number 6).

Page 34: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 34 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

Problem 2: the server certificate doesn’t contain the server hostname

In the following scenario, we experience a different problem.

The server certificate doesn’t include the name of the Autodiscover Endpoint that

the client is “expecting”.

In our scenario, the Autodiscover client starts the search by looking for a host

named – o365pilot.com

By looking at the server certificate, we can see that the name that appears on the

certificate is different. In our example, the server name who appears from the

certificate is –

We can see that there is an additional optional problem because, the certificate was not

provided by a public CA.

Page 35: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 35 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

For this reason, the validity check will fail (and not continue) even before the

Autodiscover client will try to check\test the certificate trust path.

In the following screenshot, we can see that the first part of the Autodiscover

processes complete successfully (number 1 + 2).

The Autodiscover client manage to get the IP address of the Autodiscover Endpoint

(o365pilot.com) and, manage to verify that the Autodiscover Endpoint can

communicate using the HTTPS protocol.

The Autodiscover client asks for the server certificate and the certificate was

successfully sent to the Autodiscover client (number 3).

Page 36: Autodiscover process and Exchange security infrastructure | Part 20#36

Page 36 of 36 | Autodiscover process and Exchange security infrastructure | Part 20#36

Written by Eyal Doron | o365info.com | Copyright © 2012-2015

The certificate series of validation check start.

The first test that the Autodiscover clients perform is the validating that the

Autodiscover Endpoint name appears in the certificate (number 4).

The validation test fails, and the following information appears –

Validating the certificate name. Certificate name validation failed. Host name

o365pilot.com doesn’t match any name found on the server certificate

CN=EX01.o365info.local.