Most know this error message below quite well as it happens from time to time when Windows Live either isn’t working to register the “*.remotewebaccess.com” domain name. Microsoft is pushing this wonderful feature away and don’t think it’ll be supported much longer. The result is to find an alternative solution using your Server’s Certificate Authority Role or purchase an outside Certificate. This post will be providing instructions for how to create your own Remote VPN Certificate from the Certificate Authority role on the Essentials server (or any Windows Server version 2016 and above) to use for the remote connection to the Office.
A previous post here “2016 Essentials – Anywhere Access setup fails” talks about the solutions to the above error message. Most of the time adding the registry keys and rebooting the server fixes the problem. Recently this hasn’t been the case.
The SOLUTION is to use the Certificate Authority role on the Windows Server to create a “RemoteVPN.domain.com” certificate to use with the Anywhere Access Wizard. There are a few gotcha’s with this process so please read steps below carfefully, even if you feel you’re an expert with Essentials and Certificates etc.
The Problem
Each time running the Anywhere wizard the above picture error would show. Adding all the registry hacks to fix – multiple reboots – did not fix issue.
From the Dashboard logs under “C:\ProgramData\Microsoft\Windows Server\Logs”: “SharedServiceHost-ManagementServiceConfig.log” – This error happening each time the Wizard was run: “DomainManagerFault:[Reason:CommunicationFailure, Message:GetUserDomainNames failed, Detail:Could not establish trust relationship for the SSL/TLS secure channel with authority ‘dyndns.domains.live.com‘. – indicating that live.com wasn’t accepting new registrations for remotewebaccess.com domains!
Alternative Solution: Setup external DNS address & Create own RWA certificate
Below are steps to followto implement this solution. Pre-reqs: Router is forwarding Port 80 and 443 to the Server; Make sure NPS Policy Server is installed; Create a “remotevpn.domain.com” DNS entry for the domain zone you have for your client.
Create Certifcate on Server:
Setup Anywhere Access using new Certificate
You can now open: https://remotevpn.domain.com/remote web page and sign in with domain account to view the devices and folders the user has access to.
Note: Domain joined machines automatically get the Root CA certificate added to the Trusted Root Certification Authorities Store.
Setup VPN for non-domain joined PC
If you have an outside PC you want to use the VPN to connect, then open the IIS console again, go back to Server Certificates.
Note if you use the “remotevpn.domain.com/connect” page to install the Essentials connector, it will install the VPN solution for your and you don’t need to do anything further – but it will also join your PC to the domain. If you don’t want that, then follow setps below to create own VPN connection.
Steps for manual installation of VPN to remotevpn.domain.com
Set the No Certificate Revocation Check on Computer
Create the VPN connection on PC
Note: During my extensive troubleshooting, I tinkered with NPS Policy Server policies to make things work, however, all this was moot and unnecessary. The KEY was to change the VPN connection to only use MS-CHAPv2 as that matches the NPS policy settings.
The caveat to this option is of course the autorenewal of the remotevpn.domain.com certificate when it expires. This will need to be a manual process.
Another Certificate option was to download Certifytheweb.com application to use Let’s Encrypt to create free certs that will of course autorenew and have all the trusted root certs already be trusted on any workstation. This is on the list to test out in near future.
Thanks for reading. Comments are welcome!
References:
Office Maven – Essentials software for future Windows Server Standard OS versions.