Comprehensive data protection for all workloads
Post Reply
dcit
Enthusiast
Posts: 36
Liked: 4 times
Joined: Mar 13, 2015 1:06 am
Contact:

Feature Request: Allow Enterprise Manager to trust SMTP certificates via OS trust store (Let’s Encrypt compatibility)

Post by dcit »

Hello,

Currently, Enterprise Manager (and apparently also VBR) requires manual confirmation of a new SMTP server certificate whenever it changes — even if the certificate is valid, trusted by the OS, and has a complete chain (e.g., Let’s Encrypt R10 → ISRG Root X1).

This behavior breaks automation every 90 days when Let's Encrypt renews the certificate and results in missed notification emails unless someone manually disables and re-enables SMTP notifications to confirm the new thumbprint.

In our case, we are using an internal mail relay with IP-based access (no SMTP authentication) and STARTTLS on port 587.

⚠️ We understand the original intent (to prevent MITM), but for many setups — especially with IP-restricted internal relays using Let's Encrypt — this becomes an unnecessary burden.

📌 **Feature request:**
Please make this behavior configurable — ideally allow EM/VBR to trust certificates based on the OS trust store (like most modern applications) and skip manual thumbprint confirmation, at least when no authentication is used.

Thanks!

– Tomáš Jirka
DCIT, a.s.
david.domask
Veeam Software
Posts: 2931
Liked: 674 times
Joined: Jun 28, 2016 12:12 pm
Contact:

Re: Feature Request: Allow Enterprise Manager to trust SMTP certificates via OS trust store (Let’s Encrypt compatibility

Post by david.domask »

Hi dcit,

Thank you for the explanation and for the request; I've seen requests like this come through our Support team and there are plans for making the SMTP certificate rotation more user friendly, but nothing to share at this time. The idea of allowing to trust the OS trust store is a good one, will discuss it.
David Domask | Product Management: Principal Analyst
Post Reply

Who is online

Users browsing this forum: Bing [Bot], Google [Bot], nmdange, Semrush [Bot] and 16 guests