Troubleshooting S/MIME Setup in Exchange Online and M365: OWA and Outlook Certificate Issues
JChristiansen provides a hands-on report documenting their S/MIME deployment experience with Exchange Online, Intune, and mixed Windows/macOS endpoints, focusing on certificate publishing and troubleshooting Outlook/OWA trust issues.
Troubleshooting S/MIME Setup with Exchange Online and Microsoft 365
Author: JChristiansen
Overview
This post documents the hands-on experience and troubleshooting steps involved in setting up S/MIME on Microsoft 365 with Exchange Online, supporting both Windows and macOS environments. The author details certificate deployment methods, Outlook-related publishing steps, and analyzes scenarios where S/MIME encryption is working as expected versus where certificate trust issues persist, especially in web (OWA) and new Outlook interfaces.
Setup Steps Taken
- Certificate Installation:
- Installed user .pfx certificates on Windows and macOS devices using the provided password.
- Root/Intermediate Certificate Deployment:
- Deployed the root and intermediate CA certificates to endpoints using Microsoft Intune for both platforms.
- Publishing to Exchange Online:
- Exported the root and intermediate CA certificates from Windows (using certmgr.msc).
- Uploaded the CA certificates into Exchange Online via PowerShell:
Connect-ExchangeOnline Set-SmimeConfig -SMIMECertificateIssuingCA ([IO.File]::ReadAllBytes('C:\Temp\certificate\_CA.sst'))
- GAL Publication:
- Published the S/MIME public certificate for each user into the Global Address List (GAL) via classic Outlook manually (Windows users only).
Current Functionality
Working Scenarios
- Encrypted emails can be sent from signed replies using old/classic Outlook.
- New encrypted email is successful in old Outlook after GAL publication (and when recipient signature saved to contact for external users).
- Sending encrypted mail from Outlook for Mac to Windows users who published their certificate via GAL also works.
Not Working / Issues Observed
- New Outlook (Windows): Sending a new encrypted email results in the error: Certificate is not trusted by this organization.
- OWA on Edge (Windows): Same error as above when sending encrypted mail.
- Cross-platform Issue: Sending encrypted mail from old Outlook (Windows) to macOS users fails when Mac certificates have not been published to GAL.
Observations / Next Steps
- Certificate trust errors in the New Outlook and OWA suggest an issue with CA publishing or propagation in Exchange Online or certificate chain trust visibility within these clients.
- Publishing via GAL appears critical for trust establishment, particularly for non-Windows clients and scenarios.
- Intune deployment to endpoints ensures local trust but does not solve visibility/trust requirements within Exchange Online and cloud endpoints.
Key PowerShell Command Reference
Connect-ExchangeOnline
Set-SmimeConfig -SMIMECertificateIssuingCA ([IO.File]::ReadAllBytes('C:\Temp\certificate\_CA.sst'))
Guidance / Community Request
If you’ve encountered similar OWA or New Outlook certificate trust issues, especially post-root/intermediate CA publishing, share your resolutions or troubleshooting experiences, particularly regarding cloud trust propagation for S/MIME in hybrid or cross-platform environments.
This post appeared first on “Microsoft Tech Community”. Read the entire article here