You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The ConnectorType parameter specifies a category for the domains that are serviced by the connector. Valid input for this parameter includes the following values:
187
187
188
188
- Partner: The connector services domains that are external to your organization.
189
-
- OnPremises: The connector services domains that are used by your on-premises organization. Use this value for accepted domains in your cloud-based organization that are also specified by the SenderDomains parameter.
189
+
- OnPremises: The connector services domains that are used by your on-premises organization. OnPremises connectors are used to grant special rights to an email that matches the connector and additional requirements, such as allowing relaying through the tenant to internet destinations, promoting emails from on-premises or other environments as internal (in a hybrid configuration), or enabling other more complex mail flows.
The RestrictDomainsToCertificate parameter specifies whether the Subject value of the TLS certificate is checked before messages can use the connector. Valid values are:
352
+
The RestrictDomainsToCertificate parameter specifies whether the Subject value of the TLS certificate is checked before messages can use the connector.
353
+
354
+
**Note**: This parameter is only applicable to a Partner connector type.
351
355
352
356
- $true: Mail is allowed to use the connector only if the Subject value of the TLS certificate that the source email server uses to authenticate matches the TlsSenderCertificateName parameter value.
353
357
- $false: The Subject value of the TLS certificate that the source email server uses to authenticate doesn't control whether mail from that source uses the connector. This is the default value.
The RestrictDomainsToIPAddresses parameter specifies whether to reject mail that comes from unknown source IP addresses. Valid values are:
373
+
The RestrictDomainsToIPAddresses parameter specifies whether to reject mail that comes from unknown source IP addresses.
374
+
375
+
**Note**: This parameter is only applicable to a Partner connector type.
370
376
371
377
- $true: Automatically reject mail from domains that are specified by the SenderDomains parameter if the source IP address isn't also specified by the SenderIPAddress parameter.
372
378
- $false: Don't automatically reject mail from domains that are specified by the SenderDomains parameter based on the source IP address. This is the default value.
The SenderDomains parameter specifies the source domains that the connector accepts messages for. A valid value is an SMTP domain. Wildcards are supported to indicate a domain and all subdomains (for example, \*.contoso.com), but you can't embed the wildcard character (for example, domain.\*.contoso.com is not valid).
410
+
The SenderDomains parameter specifies the source domains from which a Partner type connector accepts messages, thereby limiting its scope. A valid value is an SMTP domain. Wildcards are supported to indicate a domain and all its subdomains (for example, `*.contoso.com`). However, you can't embed the wildcard character (for example, `domain.*.contoso.com` is not valid).
405
411
406
412
You can specify multiple domains separated by commas.
The SenderIPAddresses parameter specifies the remote IPV4 IP addresses from which this connector accepts messages. IPv6 addresses are not supported. Valid values are:
428
+
The SenderIPAddresses parameter specifies the remote IPv4 IP addresses from which this connector accepts messages.
429
+
430
+
**Note**: This parameter is only applicable to a Partner connector type and only if [RestrictDomainsToIPAddresses](#-restrictdomainstoipaddresses) is enabled.
423
431
424
432
- Single IP address: For example, 192.168.1.1.
425
433
- Classless InterDomain Routing (CIDR) IP address range: For example, 192.168.0.1/25. Valid subnet mask values are /24 through /32.
0 commit comments