Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
New Member

Mailbox Auto Remediation for O365 on ESA

Good Morning,

Reading through the document "How-To Configure Mailbox Auto Remediation for Office 365 on Cisco Email Security".  It talks about "Building a Public and Private Certificate and Key Pair".  We have previously generated these items for SSH access to our Cloud ESA.  Can we use the same Key Pairs or do you recommend generating new Key Pairs?

Thanks in advance,

Doug

3 REPLIES
Cisco Employee

You are referencing the

You are referencing the following article?

How-to configure Azure AD and Office 365 mailbox settings for ESA

I would recommend just creating a new pair specifically for this operation.  Doesn't need to be anything fancy, just simple self signed cert, export - etc.  In my testing and repros on this, I have seen instances where existing pub/private key pairs caused the .json build to fail.

This white paper gives the same technique I use, using XCA:

https://www.cisco.com/c/dam/en/us/products/collateral/security/email-security-appliance/guide-c07-738370.pdf

I like my steps in my article better to do the actual setup, though.

-Robert

Highlighted
New Member

Robert,

Robert,

Thanks for the reply.  I have both articles printed out and reviewing them.

Doug

New Member

We have followed the

We have followed the instructions provided, and believe everything is configured properly, but when running the "Check Connection" test at the very end, we are receiving a failure with the following error message:

Connection Unsuccessful.

Details: 
int() argument must be a string or a number, not 'Sequence'

Not sure if this is a configuration issue on our side, or what, but if you have any insight, or have any idea of how to dig deeper into the problem, it would be appreciated.

Thanks

168
Views
0
Helpful
3
Replies
CreatePlease login to create content