Articles in this section

Configure Connectors for Templafy-Hosted Email Signature Server

About this article

In this article we will be creating and configuring connectors to route e-mails through the Templafy Email Signature Server in the Exchange Online Admin Center.

Prerequisites

 
  • Global Admin rights in Exchange Online Admin Center

 

Tenant Steps

1. Create the Inbound Connector

  • Navigate to https://admin.microsoft.com/ in the web browser of your choice. Or go directly to https://admin.exchange.microsoft.com/
  • Click Show all

  • Click Exchange

  • Click Mail flow and then Connectors

  • Click [+ Add a connector]

  • New connector

    • The Connection from option should be set to the 'Your organization's email server' setting.
    • The Connection to option will remain on the 'Office 365' setting.
    • Click [Next]

       

  • Connector name

    • Enter a name for the connector: templafy-ess-inbound-cert

    • Under "What do you want to do after connector is saved?", enable/select the Retain internal Exchange email headers checkbox; both boxes should be enabled.
    • Click [Next]
  • Authenticating sent email

    • Choose the, defaulted, 'By verifying that the subject name on the certificate...' option.

    • The subject name for Templafy-hosted ESS will be: [tenant-name].templafy-ess.com (replace the `[tenant-name]` with the unique name of the Templafy tenant in production.)
       
      • Add the Templafy managed DNS SPF entry to the DNS records for each sending domain.

      • To ensure the Email Signature Server is identified as authorized to process mail for your domains it is important to add the Templafy-managed DNS entry for your cluster region., [essprod0|essaue0|essuse0].templafy-ess.com, to the DNS SPF record for each domain that may be sending emails through the Templafy Email Signature Server for processing.
      • nslookup -type=txt templafy.com
      • An example (SPF Record): v=spf1 include:essprod0.templafy-ess.com -all
      • SPF entry Configuration, Setup, and Verification.
    • Click [Next]

       

  • Review connector

    • Click [Create connector]

       

2. Create the Outbound Connector

  • Click [+ Add a connector]

  • New connector

    • The Connection from option should be set to the 'Office 365' setting.
    • The Connection to option should remain on the default 'Your organization's email server' setting.
    • Click [Next]

       

  • Connector name

    • Enter a name for the connector: templafy-ess-outbound-cert
    • Under "What do you want to do after connector is saved?", enable/select the Retain internal Exchange email headers checkbox; both boxes should be enabled.
    • Click [Next]

       

  • Use of connector

    • Choose the 'Only when I have a transport rule set up that redirects messages to this connector' option.

    • Click [Next]

       

  • Routing

    • Specify a smart host name (public cluster hostname)
    • For Templafy-hosted ESS this is: [tenant-name].templafy-ess.com
      (replace `[tenant-name]` above with the unique name of the Templafy tenant in production.)
    • Click the [+] sign.
    • Click [Next]

       

  • Security restrictions

    • Choose the 'Issued by a trusted certificate authority (CA)' option
    • Enable/Select the 'Add the subject name or subject alternative name (SAN) matches this domain:' checkbox.
    • Enter hostname [tenant-name].templafy-ess.com the same as above.
    • Click [Next]

       

  • Validation email

     
    • Outbound connector validation is REQUIRED for Microsoft Exchange (through Exchange Online Protection) to trust the connectors.
    • Provide an email address from inside of your domain.

    • Click [+]

    • Click [Validate]

    • There will be a three-step validation progress bar. This will take one to two minutes to complete.

     
    • If the second step of the test fails.
      • Check if other connectors are already configured that could be intercepting the incoming validation email.
      • Add an Exception for the built-in senderO365ConnectorValidation@<yourrdomain.tld> to this other connector's mail flow rule.

         

    • If the connector had previously been saved in a failed validation state.
      • Open the connector and at the bottom of the pane click [Validate this connector].
      • Repeat the validation process as described above.

     

  • Click [Save

 

Related articles

 
Add-ins ESS tech_role
Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Article is closed for comments.