Absolutely!! Using a self signed certificate for local intranets/infrastructure is totally acceptable, often it is the ONLY solution on private infrastructure with no internet access.
Without specific information about the error messages the browsers are producing or the specifics of how the certificate was set up, it's difficult to say definitively. However, here are common issues that might cause your certificate to be rejected:
Not in Trust Store: The self-signed certificate has not been installed in the appropriate trust store on the machines that are trying to access the website. Every operating system has its certificate stores and a self-signed certificate needs to be added to that store.
Certificate Mismatch: The common name (CN) on the certificate does not match the hostname or IP address of the IIS server.
Inappropriate Certificate: The certificate used does not support server authentication. If this is the case, even though the certificate is installed correctly, it will not be deemed valid.
Expired Certificate: The certificate is expired. Self-signed certificates have an expiration date, and if it's past that date, browsers will not trust that certificate.
Weak Hashing Algorithm: If your certificate uses SHA-1 as the hashing algorithm, this could be the reason. Modern browsers no longer trust certificates that use SHA-1 due to its security vulnerabilities and have started to require at least SHA-256.
Private Key: For certain applications, the private key must also be installed on the server and properly linked to the certificate.
Please examine the specifics of the error messages you're receiving from the browsers, it should give a more exact insight into why the certificate is being considered invalid. If nothing works, consider reaching out to your system admin or IT support for professional advice.