Microsoft offers the following methods for relaying messages from MFP devices or on-premises application servers. The methods are described in detail How to set up a multifunction device or application to send email using Microsoft 365 or Office 365.
This is the second part of a three-part series that compares the different methods Microsoft uses to accept emails from your on-premise SMTP server. The remainder of this page talks about Configuring a TLS certificate-based connector for SMTP relay.
A client-side SSL certificate for mutual TLS (mTLS) is a digital certificate that the client uses to prove its identity to the server. In a standard TLS (formerly SSL) connection, only the server presents a certificate to the client for verification; with mTLS, this process is mutual, meaning both parties must authenticate each other before a secure connection is established. Therefore, by using a client-side certificate, Microsoft can confirm that the server from which it receives emails belongs to you, thereby allowing that server to relay messages.
Consider the following scenario:
contoso.com (borrowed from Microsoft's documents)Xeams will display your certificate details after you upload the file, and will use this certificate to authenticate with Microsoft when relaying emails.
Do NOT use the Smart Host feature in Xeams if you want to use this method. Instead, go to
Server Configuration > SMTP Configuration, select the Domains tab, and ensure the Forward To
value for your domain points to your Microsoft hostname, such as contoso-com.mail.protection.outlook.com. Messages must go out on port 25.
Use the following steps to confirm your client-side certificate is being utitized:
contoso.com.The goal is to send a test email from Email Sender to Xeams, which will then relay that message through Microsoft.
SMTPOutboundConversation.log and go the end. This shows the communication log between
Xeams and Microsoft. You should see a similar log file the image below.