About this article
In this article we will be creating and configuring connectors to route e-mails through the Templafy Email Signature Server in the Exchange Online Admin Center.
Prerequisites
|
Tenant Steps
1. Create the Inbound Connector
- Navigate to https://admin.microsoft.com/ in the web browser of your choice. Or go directly to https://admin.exchange.microsoft.com/
-
Click Show all
-
Click Exchange
-
Click Mail flow and then Connectors
-
Click [
+ Add a connector
] -
New connector
- The Connection from option should be set to the 'Your organization's email server' setting.
- The Connection to option will remain on the 'Office 365' setting.
- Click [
Next
]
-
Connector name
-
Enter a name for the connector:
templafy-ess-inbound-cert
- Under "What do you want to do after connector is saved?", enable/select the Retain internal Exchange email headers checkbox; both boxes should be enabled.
- Click [
Next
]
-
-
Authenticating sent email
-
Choose the, defaulted, 'By verifying that the subject name on the certificate...' option.
-
The subject name for Templafy-hosted ESS will be:
[tenant-name].templafy-ess.com
(replace the `[tenant-name]` with the unique name of the Templafy tenant in production.)-
Add the Templafy managed DNS SPF entry to the DNS records for each sending domain.
- To ensure the Email Signature Server is identified as authorized to process mail for your domains it is important to add the Templafy-managed DNS entry for your cluster region.,
[essprod0|essaue0|essuse0].templafy-ess.com
, to the DNS SPF record for each domain that may be sending emails through the Templafy Email Signature Server for processing. nslookup -type=txt templafy.com
- An example (SPF Record):
v=spf1 include:essprod0.templafy-ess.com -all
- SPF entry Configuration, Setup, and Verification.
-
- Click [
Next
]
-
-
Review connector
- Click [
Create connector
]
- Click [
2. Create the Outbound Connector
-
Click [
+ Add a connector
] -
New connector
- The Connection from option should be set to the 'Office 365' setting.
- The Connection to option should remain on the default 'Your organization's email server' setting.
- Click [
Next
]
-
Connector name
- Enter a name for the connector:
templafy-ess-outbound-cert
- Under "What do you want to do after connector is saved?", enable/select the Retain internal Exchange email headers checkbox; both boxes should be enabled.
- Click [
Next
]
- Enter a name for the connector:
-
Use of connector
-
Choose the 'Only when I have a transport rule set up that redirects messages to this connector' option.
- Click [
Next
]
-
-
Routing
- Specify a smart host name (public cluster hostname)
- For Templafy-hosted ESS this is:
[tenant-name].templafy-ess.com
(replace `[tenant-name]` above with the unique name of the Templafy tenant in production.) - Click the [
+
] sign. -
Click [
Next
]
-
Security restrictions
- Choose the 'Issued by a trusted certificate authority (CA)' option
- Enable/Select the 'Add the subject name or subject alternative name (SAN) matches this domain:' checkbox.
- Enter hostname
[tenant-name].templafy-ess.com
the same as above. - Click [
Next
]
-
Validation email
- Outbound connector validation is REQUIRED for Microsoft Exchange (through Exchange Online Protection) to trust the connectors.
-
Provide an email address from inside of your domain.
-
Click [
+
] -
Click [
Validate
] -
There will be a three-step validation progress bar. This will take one to two minutes to complete.
- If the second step of the test fails.
- Check if other connectors are already configured that could be intercepting the incoming validation email.
- Add an Exception for the built-in sender
O365ConnectorValidation@<yourrdomain.tld>
to this other connector's mail flow rule.
- If the connector had previously been saved in a failed validation state.
- Open the connector and at the bottom of the pane click [Validate this connector].
- Repeat the validation process as described above.
-
Click [
Save
]
Comments
0 comments
Please sign in to leave a comment.