This article describes how to generate certificates to be used to encrypt the communication between Templafy Email Signature Server and Exchange Online.
Prerequisites
|
Overview
TLS X.509 cryptographic certificates are used to encrypt and secure the communication channels between the Templafy Email Signature Server and Exchange Online server over SMTP and Exchange Web Services. These certificates may be self-signed or issued by a Certificate Authority and packaged in a PKCS #12 archive file.
The PowerShell script below will generate the following files:
azureAppRegistrationCertificate.pfx azureAppRegistrationCertificatePassword smtpTlsCertificate.pfx smtpTlsCertificatePassword keyCredentials.txt
Note
|
Generate Certificates
- Start PowerShell as an Administrator.
- Download the PowerShell script.
- You might need to run
Set-ExecutionPolicy Bypass
to allow to execute our script. - Create and navigate to a folder where the Certificate will be stored, then run the PowerShell script.
- A strong password securing the certificates will be generated automatically by the PowerShell script.
Optional: Provide certificate password
If you would like to provide the strong password, add a -PromptForPassword
switch to the script invocation: > .\generateAndExportSelfSignedCertificateAndKeyCredentials.ps1 -PromptForPassword
.
NoteProvide a unique password that uses special characters, mixed case, and numbers that is at minimum 15 characters in length. |
Optional: Provide a pre-generated CA issued certificate in PKCS #12 archive format
If you would like to provide a pre-generated certificate, or Certificate Authority issued certificates, add a -CertificatePath <path-to-pfx-archive-file>
switch to the script invocation: > .\generateAndExportSelfSignedCertificateAndKeyCredentials.ps1 -CertificatePath <path-to-pfx-archive-file>
.
NoteThe provided file must be a certificate packaged in the PKCS #12 (.pfx) archive format. |
Comments
Article is closed for comments.