Part of MS Office, an exchange, imap and POP3 Client
This assumes the Exchange server is correctly set up.
If the exchange server doesn't have its own seperate registered domain name, C:\windows\system32\drivers\etc\hosts needs an entry for the IP address and domain name of the certificate made by the exchange server because the cert doesn't work for IP only. So even if the domain is blah.local you need that association for the cert to work.
In IE, hit the https web address of the exchange server and verify the certificate works. If it doesn't tell IE to continue to the site despite the cert being bad, and then click on the little warning bar to the right of the address and tell it to install the cert.
Right click the Outlook icon (Outlook must NOT be running), select Properties
Add a profile (any name will do) if one doesn't already exist
email accounts, Add a new... , MS Exchange..., enter the local name for the exchange server and the user name. Enable local copy if this is your computer.
Security tab, check Encrypt Information
Connection tab, LAN, ...using HTTP
Exchange Proxy Settings..., web address of your exchange server. If there is no registered domain, use the domain you entered in the hosts file. Check Mutually authenticate... and enter "msstd:" followed by the same web address
Change the Authentication to Basic.
Open outlook and log in.
- http://www.msexchange.org/tutorials/Outlook_2003_Connect_Exchange_2003.html Using Outlook 2003 to connect to Exchange 2003 using RPC over HTTPS
- http://www.msexchange.org/tutorials/Troubleshooting-RPC-over-HTTPS-Part1.html Troubleshooting RPC over HTTPS (Part 1)
- http://www.msexchange.org/tutorials/Troubleshooting-RPC-over-HTTPS-Part2.html Troubleshooting RPC over HTTPS (Part 2)
Form actions can be changed after Tools / Form / Design by Tools / View script and Script / handeler. Then by Script / Object browser. The MAPIItem object contains all the mail fields including ReceivedOnBehalfOfName
VBA macros, etc.. can be signed with a "fake" Digital Certificate generated by a program called SelfCert.exe which is installed as part of Office XP. I found it under Start / Programs / Microsoft Office / Microsoft Office Tools / Digital Certificates for VBA projects. The resulting certificate will not be trusted untill it is installed in the root servers list which is at Internet Options / Content (NOT Security) / Certificates / Trusted Root Certifications Authorities. This is basically telling your computer to trust code you sign.
As of 2002, any thing (anything) that tries to access the following fields will get you a dialog box that asks you to confirm access to this information. This effectivly kills any automation using these items:
The only way to effectively get around this is to use a new API which is only accessable from C# or C++. There is a "wrapper" for this API that allows scripts to access the objects while still providing some security: Outlook Redemption is available at http://www.dimastr.com/redemption/
|file: /Techref/app/msoutlook.htm, 7KB, , updated: 2007/9/21 14:10, local time: 2022/1/19 00:19,
|©2022 These pages are served without commercial sponsorship. (No popup ads, etc...).Bandwidth abuse increases hosting cost forcing sponsorship or shutdown. This server aggressively defends against automated copying for any reason including offline viewing, duplication, etc... Please respect this requirement and DO NOT RIP THIS SITE. Questions?|
<A HREF="http://www.piclist.com/techref/app/msoutlook.htm"> Microsoft Outlook</A>
|Did you find what you needed?|
PICList 2022 contributors:
o List host: MIT, Site host massmind.org, Top posters @20220119
* Page Editors: James Newton, David Cary, and YOU!
* Roman Black of Black Robotics donates from sales of Linistep stepper controller kits.
* Ashley Roll of Digital Nemesis donates from sales of RCL-1 RS232 to TTL converters.
* Monthly Subscribers: Gregg Rew. on-going support is MOST appreciated!
* Contributors: Richard Seriani, Sr.
Welcome to www.piclist.com!