How to Configure S/MIME in Exchange Online

In this article

  1. Step 1: Set up and publish S/MIME certificates
  2. Step 3: Sync user certificates for S/MIME into Microsoft 365
  3. Step 4: Configure policies to install the S/MIME extensions in web browsers
  4. Step 5: Configure email clients to use S/MIME

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a widely accepted protocol for sending digitally signed and encrypted messages. For more information, see S/MIME for message signing and encryption in Exchange Online.

S/MIME is available in Exchange Online with the following types of email clients:

  • Supported versions of Outlook.
  • Outlook on the web (formerly known as Outlook Web App) on Windows clients. For more information, see Encrypt messages by using S/MIME in Outlook on the web. NoteSensitive policy actions are applied on the server backend, while S/MIME signing and/or encryption is done in the Outlook on the web client. Because of this architectural constraint, S/MIME is disabled in Outlook on the web in messages where there are sensitivity labels with protection actions.
  • Mobile devices (for example, Outlook for iOS and Android, Exchange ActiveSync apps or native email apps).

As an Exchange Online admin, you can enable S/MIME-based security for the mailboxes in your organization. The high-level steps are described in the following list and are expanded upon in this article:

  1. Set up and publish S/MIME certificates.
  2. Set up a virtual certificate collection in Exchange Online.
  3. Sync user certificates for S/MIME into Microsoft 365.
  4. Configure policies to install S/MIME extensions in web browsers for Outlook on the web.
  5. Configure email clients to use S/MIME.

For end-to-end S/MIME configuration instructions for Outlook for iOS and Android, see S/MIME for Outlook for iOS and Android.

Step 1: Set up and publish S/MIME certificates

Each user in your organization requires their own certificate that’s issued for the purposes of signing and encryption. You publish these certificates to your on-premises Active Directory for distribution. Your Active Directory must be located on computers at a physical location that you control and not at a remote facility or cloud-based service on the internet.

For more information about Active Directory, see Active Directory Domain Services Overview.

  1. Install a Windows-based Certification Authority (CA) and set up a public key infrastructure to issue S/MIME certificates. Certificates issued by third-party certificate providers are also supported. For details, see Active Directory Certificate Services Overview.Notes:
    • Certificates issued by a third-party CA have the advantage of being automatically trusted by all clients and devices. Certificates that are issued by an internal, private CA aren’t automatically trusted by clients and devices, and not all devices (for example, phones) can be configured to trust private certificates.
    • Consider using an intermediate certificate instead of the root certificate to issue certificates to users. That way, if you ever need to revoke and reissue certificates, the root certificate is still intact.
    • The certificate must have a private key and the X509 extension “Subject Key Identifier” must be populated.
  2. Publish the user’s certificate in their on-premises Active Directory account in the UserSMIMECertificate and/or UserCertificate attributes.

Step 2: Set up a virtual certificate collection in Exchange Online

The virtual certificate collection is responsible for validating S/MIME certificates. Set up the virtual certificate collection by using the following steps:

  1. Export the root and intermediate certificates that are required to validate user S/MIME certificates from a trusted machine to a serialized certificate store (SST) file in Windows PowerShell. For example:PowerShellCopyGet-ChildItem -Path cert:\<StoreCertPath> | Export-Certificate -FilePath "C:\My Documents\Exported Certificate Store.sst" -Type SST For detailed syntax and parameter information, see Export-Certificate.
  2. Import the certificates from the SST file into Exchange Online by running the following command in Exchange Online PowerShell:PowerShellCopySet-SmimeConfig -SMIMECertificateIssuingCA ([System.IO.File]::ReadAllBytes('C:\My Documents\Exported Certificate Store.sst')) For detailed syntax and parameter information, see Set-SmimeConfig.

Step 3: Sync user certificates for S/MIME into Microsoft 365

Before anyone can send S/MIME-protected messages in Exchange Online, you need to set up and configure the appropriate certificates for each user and publish their public X.509 certificates to Microsoft 365. The sender’s email client uses the recipient’s public certificate to encrypt the message.

  1. Issue certificates and publish them in your local Active Directory. For more information, see Active Directory Certificate Services Overview.
  2. After your certificates are published, use Microsoft Entra Connect to synchronize user data from your on-premises Exchange environment to Microsoft 365. For more information on this process, see Microsoft Entra Connect Sync: Understand and customize synchronization.

Along with synchronizing other directory data, Microsoft Entra Connect synchronizes the userCertificate and userSMIMECertificate attributes for each user object for S/MIME signing and encryption of email messages. For more information about Microsoft Entra Connect, see What is Microsoft Entra Connect?.

Step 4: Configure policies to install the S/MIME extensions in web browsers

 Note

This step is required only for Outlook on the web clients.

S/MIME in Outlook on the web in the Chromium-based Microsoft Edge or in Google Chrome requires specific policy settings that are configured by an admin.

Specifically, you need to set and configure the policy named ExtensionInstallForcelist to install the S/MIME extension in the browser. The policy value is maafgiompdekodanheihhgilkjchcakm;https://outlook.office.com/owa/SmimeCrxUpdate.ashx. Applying this policy requires domain-joined or Microsoft Entra joined devices, so using S/MIME in Edge or Chrome effectively requires domain-joined or Microsoft Entra joined devices.

For details about the policies, see the following topics:

The policy is a prerequisite for using S/MIME in Outlook on the web. It does not replace the S/MIME control that’s installed by users. Users are prompted to download and install the S/MIME control in Outlook on the web during their first use of S/MIME. Or, users can proactively go to S/MIME in their Outlook on the web settings to get the download link for the control.

Step 5: Configure email clients to use S/MIME

If an email client supports S/MIME, the next consideration is access to the user’s S/MIME certificate by that email client. The S/MIME certificate needs to be installed on the user’s computer or device. You can distribute S/MIME certificates automatically (for example, using Microsoft Endpoint Manager) or manually (for example, the user can export the certificate from their computer and import it on their mobile device). After the certificate is available locally, you can enable and configure S/MIME in the settings of the email client.

For more information about S/MIME in email clients, see the following topics:

You can also use the following parameters on the New-MobileDeviceMailboxPolicy and Set-MobileDeviceMailboxPolicy cmdlets in Exchange Online PowerShell to configure S/MIME settings for mobile devices:

  • AllowSMIMEEncryptionAlgorithmNegotiation
  • AllowSMIMESoftCerts
  • RequireEncryptedSMIMEMessages
  • RequireEncryptionSMIMEAlgorithm
  • RequireSignedSMIMEAlgorithm
  • RequireSignedSMIMEMessages

Ref: