Search Engine: Elastic

Article ID: 117261, created on Sep 16, 2013, last review on Jul 14, 2018

  • Applies to:
  • Operations Automation 6.0
  • Operations Automation 5.5
  • Operations Automation 5.4


A public folder creation task fails with the following error:

Exception calling "Execute" with "3" argument(s): "The remote certificate is invalid according to the validation procedure.The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel."

When the https://CAS/ URL is opened in a browser, an error appears:

The security certificate presented by this website was issued for a different website's address


This error occurs because Operations Automation (OA) 5.5 public folder provisioning requests are routed through CAS servers.

The Windows Provisioning Engine (WPE) server makes a request on the backnet address of the CAS server, and receives an error about the incorrect server.

WPE handles this error by aborting the request.

This issue was identified as POA-79601 and is fixed in OA 5.5 updates.


  1. Access the CAS server - its hostname can be found in the WPE request tracer (on the WPE server) in the corresponding task details:

     <password secure_data="yes">************</password>
  2. Open IIS manager
  3. Go to Sites > Default website
  4. Access Bindings
  5. Change the <BACKNET_IP:443> binding so the Microsoft Exchange Certificate is used
  6. Make sure the certificate is issued by the CAS server to its own netbios name.

NOTE: Please make sure the 'Microsoft Exchange Certificate' is used with the backnet IP as this is used for WPE to communicate with Exchange CAS servers.

Finally, re-run the task.

NOTE: this procedure is to be applied on servers with CAS role only. If it handles additional roles, please contact Odin Technical Support team.

5b048d9bddf8048a00aba7e0bdadef37 caea8340e2d186a540518d08602aa065 5356b422f65bdad1c3e9edca5d74a1ae 2554725ed606193dd9bbce21365bed4e ac82ce33439a9c1feec4ff4f2f638899 e12cea1d47a3125d335d68e6d4e15e07 956c448bddc7e1f3585373687602379f 6f1456866eed87488c0f02b298a741c0

Email subscription for changes to this article
Save as PDF