Exchange Hybrid connector validation from o365 to on-prem

Ella Taylor 20 Reputation points
2024-11-08T00:10:35.5166667+00:00

We recently setup Exchange Hybrid on Classic mode. Completed without errors.

During setup we ensure that the Transport Certificate is valid and we assigned our 3rd party cert.

We checked on IIS that "Default Front End" certificates are assigned with 3rd party cert.

IIS 'Exchange Back End' is using the private "Exchange Server" certificate.

When checking Exchange online connectors and validating the O365-Onprem connector, it errors with

"450 4.4.317 Cannot connect to remote server [Message=SubjectMismatch Expected Subject: ...... Thumbprint:######"

When troubleshooting and Checking the certificate thumbprint from the error message on the server.  Determined that the thumbprint belonged to the private certificate used in the 'Exchange Back End'

Not sure why it's presenting the wrong certificate and not the front-end certificate?

Normal email flow is still working.

Appreciate anyone's feedback.

Microsoft Exchange Online Management
Microsoft Exchange Online Management
Microsoft Exchange Online: A Microsoft email and calendaring hosted service.Management: The act or process of organizing, handling, directing or controlling something.
4,592 questions
Microsoft Exchange Hybrid Management
Microsoft Exchange Hybrid Management
Microsoft Exchange: Microsoft messaging and collaboration software.Hybrid Management: Organizing, handling, directing or controlling hybrid deployments.
2,140 questions
0 comments No comments
{count} votes

Accepted answer
  1. Bruce Jing-MSFT 5,870 Reputation points Microsoft Vendor
    2024-11-08T06:41:58.92+00:00

    Hi,@Ella Taylor

    This NDR is generated in the following scenarios:

    Exchange Online connects to a remote email server, also known as a remote message transfer agent (MTA), to send an email message to an external recipient. During the TLS handshake, the remote MTA sends only a leaf certificate to Exchange Online without including the certificates of the intermediate certification authorities (CAs). If Exchange Online can't validate the authenticity of the certificate by building the chain to a Microsoft-trusted root CA, it generates an NDR for the sender.

    A remote MTA connects to Exchange Online to send an email message to an Exchange Online recipient. During the TLS handshake, the remote MTA sends only a leaf certificate to Exchange Online without including the certificates of the intermediate CAs. If Exchange Online can't validate the authenticity of the certificate by building the chain to a Microsoft-trusted root CA, it rejects the email message. The remote MTA then generates an NDR for the sender.

    You can refer to the solution below:

    If you're an email admin in the remote MTA organization, configure your remote MTA to provide the full certificate chain.

    If you're an email admin in the Exchange Online organization, notify an email admin in the remote MTA organization about the NDR.


    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".

    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.

    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.