I am trying to setup an IPv6-only Exchange Server 2013, running on Server 2012 R2 Datacenter. This is a 1-machine-setup in a VirtualBox for testing purposes.
Everything is running ok so far. I.e. I can access the Exchange-OWA and send and receive emails to IPv6-enabled mail-providers.
However, I still cannot seem to get Outlook 2016 to connect. This seems to be related to my certificates. Also Chrome/IE accessing the OWA complain about the certificate, but this can be skipped, while for Outlook 2016 it's a stop.
Therefor, I installed the Certification Authority role on the server, configured it (Enterprise-CA, Root-CA), created a certificate in Exchange 2013, signed it by my CA (web enrollment) and enabled it in Exchange. So, if I access the OWA from the server, certificate is fine. Then I copied the certificate to the machine running my Outlook-client and imported it there (Windows 10 Home Premium x64). However, Chrome/IE still complain about a non-trusted issuer. My certificate shows up looking at the windows-certificate-store, but if I check Internet Options in Control Panel, I don't see my certificate. When I try to add it there, it says it worked, but it doesn't appear in the list.
Is it somehow necessary that the Root-CA (or a subordinate CA) is accessible by the client-machine to somehow verify that the certificate hasn't been revoked? Or am I missing something else? If it needs to be online, is there a way to do it without? This is not a production environment (and never supposed to become one) but just testing for IPv6-readyness.