Home Page Icon
Home Page
Table of Contents for
Microsoft® Office Communications Server 2007 R2 Resource Kit
Close
Microsoft® Office Communications Server 2007 R2 Resource Kit
by Nirav Kamdar, Rajesh Ramanathan, Rick Kingslan, Rui Maximo
Microsoft® Office Communications Server 2007 R2 Resource Kit
Microsoft® Office Communications Server 2007 R2 Resource Kit
SPECIAL OFFER: Upgrade this ebook with O’Reilly
A Note Regarding Supplemental Files
Foreword
Acknowledgments
Personal Acknowledgements
Introduction
Overview of the Book
Document Conventions
Reader Aids
Sidebars
Command-line Examples
Companion CD
Find Additional Content Online
Resource Kit Support Policy
I. Overview and Architecture
1. Overview of Office Communications Server 2007 R2
Office Communications Server Editions and Components
The Evolution of Office Communications Server 2007 R2
Customizing the Platform
Summary
Additional Resources
2. New Features Overview
New Features
Call Delegation
Team Ring
Group Chat
Desktop Sharing
Desktop Sharing Requirements
Desktop Sharing Features
Audio Conferencing
Server Applications
Dial-in Conferencing Feature
Conferencing Attendant
Conferencing Announcement Service
Response Group Service
Sample Scenarios
Outside Voice Control
SIP Trunking
Enhanced Media
Simplified Firewall Configuration for the A/V Edge Server
Presence Enhancements
Archiving, CDR, and QoE Enhancements
Simplified Management
Simplified Topologies
Enhanced Administrative Snap-In
Conference Directories
Automatic Updates
Improved Certificate Wizard
In-Band Provisioning Enhancements
Optional Installation of Administrative Tools
Planning Tool
Technical Overview
Reference Topology
Group Chat
Desktop Sharing Framework
Peer-to-Peer Application Sharing
Multiparty Conference Application Sharing
Server Application Framework
Application Server
Application
Deployment and Topology
Activation
Call Routing
Response Group Topology
Topology
Dial-in Conferencing Architecture
Adding a PSTN User to a Conference
Adding Conferencing Announcement Service to a Conference
Outside Voice Control
SIP Trunking Topology
Media Enhancements
Early Media Support
ICE Protocol Upgrade
Video Negotiation
Summary
Additional Resources
3. Server Roles
Standard Edition Server
Enterprise Edition Pool
Director Role
Conferencing Servers
IM Conferencing Server
Web Conferencing Server
A/V Conferencing Server
Telephony Conferencing Server
Application Sharing Conferencing Server
Application Server
Monitoring Server
Archiving Server
Edge Servers
Access Edge Server
Web Conferencing Edge Server
A/V Edge Server
Communicator Web Access
Web Components Server
Mediation Server
Group Chat Server
Supported Collocation Server Roles
Summary
Additional Resources
4. Infrastructure and Security Considerations
Infrastructure and Security Considerations
Understanding How Office Communications Server Takes Advantage of Active Directory
Performing the Prep Schema Step
Performing the Prep Forest Step
Performing the Prep Domain Step
Changes in Active Directory to Support Operations
Using DNS to Publish Office Communications Server
Impact on Server Certificates
Impact on FQDN Configurations
SIP Namespaces
Migrate Users from One SIP Namespace to Another
Securing Office Communications Server with PKI
Configuring the Common Name or Subject Name
Configuring the Subject Alternative Name
Configuring the CRL Distribution Points
Configuring for Enhanced Key Usage
Server Authentication
Client Authentication
Configuring the Certification Path
Scaling with SQL Server
Building Redundancy with Hardware Load Balancing
Port and Protocol Configuration Considerations for Hardware Load Balancers
Bridging VoIP to the PSTN Network by Using a Media Gateway
Firewall Scenarios and Configuration
Back-to-Back Firewall
Three-Legged Firewall
Port and Protocol Configuration for Edge Servers
Examining Rules for Access Edge Servers
Examining Rules for Web Conferencing Edge Servers
Examining Rules for A/V Edge Servers
Examining Rules for the Web Components Server
Summary
Additional Resources
II. Key Usage Scenarios
5. Basic IM and Presence Scenarios
Understanding the Login Process
Why Talk About the Login Process?
A Login Scenario
Step 1: Signing In to an Account
Step 2: Supplying Account Credentials (If Prompted)
Step 3: The Login Process
Step 4: Login Complete
The Technical Details Behind the Login Process
Pre-Step 1: What Happens During the Initial Launch of Communicator 2007
Enabling the Communicator Protocol Logs
Working with Communicator Application Event Logs
Post-Step 1: What Happens After Sign-In Starts
The Initial Registration
The Authenticated Registration
Step 3: What Happens During Login Processing
Post-Step 4: Post-Login Processing
How Presence Information Is Shared
What Is Presence?
A Presence Sharing Scenario
Step 1: Looking Up a Contact
Step 2: Adding a Contact
Step 3: Receiving an Offline Indication
Step 4: Logging In the Contact and Receiving Updated Presence Information
Step 5: Controlling the Access Level of a Contact
Technical Details Behind the Presence Sharing Scenario
Step 1: What Happens During Looking Up a Contact
Step 2: What Happens When Adding a Contact
Step 3: What Happens When Subscribing for Presence and Receiving an Offline Notification
What Happens During Presence Authorization
Step 4: What Happens When the Contact Logs In and Updated Presence Is Received
Step 5: What Happens When Controlling the Access Level of a Contact
Instant Messaging
An Instant Messaging Scenario
Step 1: Opening a Messaging Window
Step 2: Typing and Sending a Message
Step 3: Receiving the Message
Step 4: Sending a Hyperlink
Step 5: Sending a File
Step 6: Sharing Video
Step 7: Ending the Conversation
The Technical Details Behind the Instant Messaging Scenario
Post-Step 2: What Happens During Session Establishment and Sending a Message
Step 3: What Happens When Receiving a Message
Step 4: What Happens When Sending a Hyperlink
Step 5: What Happens When Sending a File
Step 6: What Happens When Sharing Video
Step 7: What Happens When Ending the Conversation
Summary
Additional Resources
6. Conferencing Scenarios
Understanding Conferencing User Types
Authenticated Enterprise Users
Federated Users
Anonymous Users
Understanding Conferencing User Roles
Understanding Conference Security and Access Types
Invite Within Network Conferences
Invite Within Network (Restricted) Conferences
Invite Anyone Conferences
Understanding Conferencing Media Types
Multiparty Instant Messaging
Data Collaboration
Audio and Video Conferencing
Audio Conferencing Provider Support
Understanding Communicator Web Access Server R2
Support for Distribution Groups
Audio Conferencing
Desktop Sharing
Hosting for Dial-in Audio Conferencing Web Page
Configuring Communicator Web Access Server R2
Installing and Activating Communicator Web Access
Installing Communicator Web Access
Activating the Communicator Web Access Server
Creating the Virtual Server
Publishing the Communicator Web Access URLs in Active Directory
Examining the Technical Details Behind Conferencing Scenarios
Understanding the Conferencing Architecture
Conferencing Clients
Microsoft Office Live Meeting Console 2007 R2
Microsoft Office Communicator 2007 R2
Microsoft Conferencing add-in for Microsoft Office Outlook
The Conferencing Database
Focus
The Focus Factory
Conferencing Servers and the Conferencing Server Factory
Web Components
Process and Machine Boundaries for Conferencing Components
Edge Servers
The Conferencing Protocols
Signaling Protocols
Media Protocols
Understanding the Conference Life Cycle
Conference Creation
Conference Activation
Conference Deactivation
Conference Expiration
Examining the Technical Details Behind Web Conferencing
The Client Conference Joining Sequence
The Client Join Sequence to the Web Conferencing Server
Conference Control
Web Conferencing Server Content Management
Web Conferencing Server Content Upload and Download
Meeting Compliance
Web Conferencing Content Tools
DMInsider.exe
DMHash.exe
DMDel.exe
Meeting Policy and Policy Enforcement
Conference Access Type Settings
Summary
Additional Resources
7. Remote Access and Federation Scenarios
Understanding Basic Remote Access Topologies
Single Edge Server Topology
Scaled Single-Site Edge Server Topology
Multisite Edge Server Topology
Understanding Basic Remote Access Scenarios
Understanding Basic Remote Access for IM and Presence Information
Understanding Remote Access for Web Conferencing
Step 1: Use Office Communicator to Start a Conference
Step 2: Accept and Join a Web Conferencing Invitation
Step 3: Begin Sharing an Application
Examining the Web Conferencing Remote Access Scenario
Understanding Remote Access for Audio and Video Conferencing
Understanding Office Communicator Web Access 2007 R2
Enabling Office Communicator Web Access 2007 R2
Understanding Federation
Understanding Direct Federation
Adding a Trusted Federated Partner Domain
Understanding Federated Partner Discovery
Understanding Federation with Public IM Providers
Understanding the Requirements for and Use of Certificates in Federation
Understanding On-Premises Conferencing Rules for Federated and Nonfederated Users
Configuring and Administering Federation
Configuring User Accounts for Federation
Administering Federated Partner Access
Managing Multiple User Accounts
Blocking External Domains
Examining the Technical Details Behind the Federation Scenario
How Clients from Two Federated Domains Get Online and Register Presence
Step 1: REGISTER sip:litwareinc.com SIP/2.0
Step 3: SUBSCRIBE sip:
[email protected]
SIP/2.0
Step 5: SERVICE sip:
[email protected]
SIP/2.0
Communication from One Federated Enterprise to Another
Step 1: SUBSCRIBE sip:
[email protected]
SIP/2.0
Step 2: BENOTIFY and OK 200
Step 8: INVITE sip:
[email protected]
SIP/2.0
Step 12: INFO
Step 13: MESSAGE
Step 19: BYE
Summary
Additional Resources
8. Public IM Connectivity Scenarios
What Is Public IM Connectivity?
Public IM Connectivity Scenarios
Configuring Public IM Connectivity
Enabling Federation with Public IM Service Providers
Step 1: Provision of Federation with the Public IM Service Providers
Step 2: Configure DNS for the Access Edge Server
Step 3: obtain a Public Certificate
Step 4: Configure the Access Edge Server for Federation
Step 5: Enable Connections to Public IM Service Providers
Step 6: Authorize Users for Public IM Connectivity
Provisioning Federation with the Public IM Service Providers
Enabling Connections to Public IM Service Providers
Considerations Involving Public IM Providers
Existing Accounts on Provider Networks
Capacity Planning Considerations
Security Considerations
Controlling SPIM by Limiting Public Contacts
Limiting SPIM when you Enable Users in Active Directory Users and Computers
Limiting SPIM when You Enable Im Service Providers
Limiting SPIM when Enabling Users that are on a Recipient’s Contact List
Controlling SPIM by Limiting Message Content
Considerations Involving Media Sharing
Authorizing Users for Public IM Connectivity
Using the Active Directory Users and Computers Snap-In
Using the office Communications Server Administrative Snap-In
Disabling Public IM Connectivity
Configuring Per-User and Global Settings
Technical Details Behind the Public IM Connectivity Scenarios
Scenario one: Adding a Contact in office Communicator 2007
Step 1: Specify Recipient’s Account
Step 2: Recipient’s Presence Displayed as Unknown
Step 3: Recipient’s Account Added as a Contact
Step 4: Recipient’s Presence Displayed as offline
Step 5: Recipient Receives Notification
Step 6: Recipient Adds a User to the Buddy List
Step 7: Recipient’s Presence Displayed as Online
Scenario Two: Sending a Single Message
Step 1: User Selects a Recipient from the Buddy List in Office Communicator
Step 2: User Types a Message to a Recipient
Step 3: Recipient Receives a Message from a User
Step 4: Recipient Types a Reply to the User
Step 5: User Receives a Message from the Recipient
Step 6: Conversation Finished
Summary
Additional Resources
9. Remote Call Control Scenarios
A Remote Call Control Scenario
What Functionalities Are Available?
Setting Up the Remote Call Control Scenario
Step 1: Installing the SIP/CSTA Gateway and Configuring the SIP/CSTA Interface
Step 2: Configuring a User for RCC
Step 3: Configuring a Route on the Office Communications Server Pool for the Server URI
Step 4: Normalizing Phone Numbers
Understanding the Technical Details Behind the RCC Scenario
Bootstrapping
Receiving a Call
Making a Call
Summary
Additional Resources
10. Dual Forking Scenarios
What Is Dual Forking?
Overview of Dual Forking Scenarios
Originating a Two-Party Call
Answering a Two-Party Call
In Call Experience
Conferencing Experience
Configuring Call Forwarding
Examining Technical Details Behind Dual Forking Scenarios
Understanding RCC in Dual Forking Scenarios
Understanding Loop Detection
Understanding Routing Rules in Dual Forking Scenarios
Understanding Phone Numbers in Dual Forking Scenarios
Understanding Normalization in Dual Forking Scenarios
Configuring Dual Forking
Summary
Additional Resources
11. VoIP Scenarios
What Is VoIP?
Overview of VoIP Scenarios
Using Two-Party Calling
Configuring Call Deflection
Configuring Call Forwarding
Using Voice Mail
Using Ad Hoc Conference Calling
Using Office Communicator and Phone Edition Integration
Using Response Group Service
Examining the Technical Details Behind VoIP Scenarios
Understanding How Outbound Calls Are Routed
Understanding Voice Policies
Understanding Phone Usage
Understanding Phone Routes
Understanding How Inbound Calls Are Routed
Understanding Normalization
Understanding Office Communicator to Office Communicator Phone Edition Integration
Configuring VoIP
Configuring Global Enterprise Voice Settings
Configuring Voice Policies
Configuring Phone Routes
Configuring Location Profiles
Configuring Users for Unified Communications
Configuring the Media Gateway
Configuring the Mediation Server
Summary
Additional Resources
12. Voice Mail Scenarios
Overview of Voice Mail Scenarios
Redirecting Incoming Calls to Voice Mail
Call Forwarding to Voice Mail
Calling Your Voice Mail
Listening to Voice Mail
Call Logs
Leaving a Voice Mail
Subscriber Access
Auto-Attendant
Examining the Technical Details Behind the Voice Mail Scenario
Configuring Voice Mail
Configuring Exchange Unified Messaging
Step 1: Configuring Exchange UM Servers
Step 2: Creating a UM Dial Plan for Every Location Profile
Step 3: Configuring the Subscriber Access Number
Step 4: Running the PowerShell Tool ExchUCUtil.ps1
Step 5: Creating a UM Auto-Attendant
Step 6: Configuring Users for Exchange UM
Configuring Office Communications Server
Summary
Additional Resources
13. Enterprise Voice Application Scenarios
What Is Enterprise Voice?
Overview of Enterprise Voice Scenarios
Response Group Service Scenarios
Interactive Voice Response
Call Queuing, Timeout, and Overflow Actions
Conferencing Attendant Scenarios
Examining the Technical Details Behind Enterprise Voice Scenarios
Response Group Service Architecture
Overview of the Different Components on which the Response Group Service Is Built
Understanding the Hosting Component
Understanding the Workflow Runtime Component
Understanding the Match Making Component
Understanding the Call Routing Component
Understanding the Call Flow
Conferencing Attendant Architecture
Understanding How External PSTN Callers Join the Conference
Understanding How Authenticated PSTN Callers Join the Conference
Configuring Enterprise Voice Applications
Configuring the Response Group Service
Terminology
Overview of the Management Model
Installing the Response Group Service
Deploying a Response Group
Step 1: Create the Contact Objects to be Used for your Response Groups
Step 2: Define the Set of Agents, Groups, and Queues that Handle Calls Received by the Response Groups
Step 3: Select and Configure the Response Group Template for Definition of the Caller Experience
Step 4: Deploy the Office Communicator Tab for Formal Agents
Step 1: Contact Object Creation
Step 2: Agents, Groups, and Queue Configuration
Step 3: Template Selection and Configuration
Step 4: Deploying the Agent Tab for Formal Agents
Configuring Conferencing Attendant
Summary
Additional Resources
III. Planning and Deployment
14. Planning Example
Defining a Statement of Work
Gathering and Defining Business Requirements
Assigning a Priority to Each Requirement
Mapping Business Requirements to Office Communications Server 2007 R2 Features
Office Communications Server 2007 R2 Planning Tool
Using the Office Communications Server 2007 R2 Planning Tool
Determining Interoperational Requirements
Performing a Gap Analysis
Architectural Design of the Solution
Output to the Deployment Team for Development of the Deployment Plan
Summary
Additional Resources
15. Deployment Example
Understanding Litware, Inc.’s Deployment Process for Office Communications Server 2007 R2
Establishing a Server Naming Convention
Preparing the Server Hardware
Litware, Inc.’s Deployment Path
Preparing Active Directory
Overview of Preparing Firewall Ports, Certificates, NICs, and DNS
Preparing DNS, Firewall Ports, and Certificates for the Chicago Deployment
Preparing DNS and Firewall Ports for the Paris Deployment
Preparing DNS and Firewall Ports for the Singapore Deployment
Litware, Inc.’s Deployment Path for Chicago
Litware, Inc.’s Deployment Path for Paris
Litware, Inc.’s Deployment Path for Singapore
Final Litware, Inc. Architecture
Summary
Additional Resources
IV. Operations and Administration
16. Monitoring
Event Logs
Using the Administrative Tool to View Office Communications Server Events
Accessing the Event Log by Using Scripts
Performance Monitoring
Monitoring Performance Using the Administrative Tool
Modifying the Default Counter Sets
The Archiving Server and the Monitoring Server
The Archiving Server
The Monitoring Server
Monitoring Server Reports
Installing Monitoring Server Reports
Accessing the Archiving Server and the Monitoring Server Databases
Accessing the Databases by Using the ArchivingCdrReporter Tool
Adding Custom Queries to ArchivingCdrReporter
Accessing the Databases by Using Scripts
Viewing the Database Schemas
Deployment Validation Tool
Using Answering Agents
Installing an Answering Agent
Running Formal Tests with the Deployment Validation Tool
Installing the Deployment Validation Tool
Running Tests and Viewing Reports
Summary
Additional Resources
17. Backup and Restore
Planning for Backup and Restore
Backup and Restore Requirements
Backing Up Settings
Backing Up Pool, Global, and Computer Settings
Backing Up Office Communications Server Data
Backing Up Databases
Backing Up File Shares
Best Practices
Guidelines for Backup and Restoration
Guidelines for Minimizing the Impact of a Disaster
Restoring Service
Verifying Restoration Prerequisites
Preparing to Use an Existing Server’s Hardware and Software for Database Recovery
Recovering an Existing Server
Reinstalling an Existing Server
Installing Restoration Tools
Restoring Data
Restoring Databases
Restoring File Shares
Restoring Settings
Step 1: Prepare for Restoration of Settings
Step 2: Restore Settings
Step 3: Activate Servers
Step 4: Start Services
Step 5: Validate Services
Next Steps
Re-creating Enterprise Pools
Reassigning Users
Restoring Domain Information
Restoring Sites
Step 1: Determine the Recovery Support to Be Provided by the Secondary Site
Step 2: Create a Deployment Plan and Restoration Strategy for the Secondary Site
Step 3: Set Up the Secondary Site
Step 4: Prepare the Primary Site to Support Recovery at the Secondary Site
Step 5: Maintain the Secondary Site
Step 6: Validate Site Recovery Capabilities by Simulating an Outage
Step 7: Bring the Secondary Site Online
Step 8: Restore the Primary Site and Bring It Back Online
Summary
Additional Resources
18. Administration
Configuring Global Settings
Configuring Enterprise Voice Settings
Configuring Policy-Specific Settings
Configuring Service Connection Point Settings
Configuring Trusted Server Settings
Configuring User-Specific Settings
Configuring Conference Directory Settings
Configuring Application Contact Object Settings
Configuring Conference Auto Attendant Settings
Configuring Pool Settings
Configuring Front-End Pool Properties
Configuring MCU Pool Properties
Configuring Web Component Pool Properties
Configuring Response Group Service Pool Properties
Configuring Miscellaneous Pool Properties
Configuring Server Settings
Configuring Settings for All Servers
Configuring Settings for Standard Edition and Enterprise Edition Servers
Configuring Application Server Settings
Configuring Archiving Settings
Configuring Monitoring Server Settings
Configuring Conferencing Server Settings
Configuring Communicator Web Access Server Settings
Configuring Mediation Server Settings
Configuring Edge Server Settings
Configuring Federation Settings
Migrating to Office Communications Server 2007 R2
Migration Process
Summary
Additional Resources
19. Client and Device Administration
Office Communicator 2007 R2
Generating a Log File
Using Group Policy Settings
Communicator 2007 R2 Call Configurations
Standalone Communicator 2007 R2 (TelephonyMode=1)
Coexistence of Communicator 2007 R2 and PBX (TelephonyMode=2)
Dual Forking (TelephonyMode=3)
What Happens During User Sign-In
Understanding Client Automatic Configuration and DNS Discovery
Understanding Office Communicator Compatibility
Communicator 2005 and Communicator 2007 R2 Compatibility
Office Communicator 2007 R2 and Microsoft Office Compatibility
Microsoft Exchange Server and Office Communicator 2007 R2 Compatibility
Microsoft Windows and Office Communicator 2007 R2 Compatibility
Exchange Server Communication Interfaces
MUI Pack for Office Communicator 2007 R2
Office Live Meeting 2007 R2
Office Live Meeting 2007 R2 Registry Keys
Live Meeting Registry Keys Shared with Office Communicator 2007 R2
Multiple Client Installation Script
Group Policy for Unified Communications Clients
How Group Policy Works
Adding Administrative Templates
Office Communicator 2007 R2 Group Policy Settings
Communicator 2007 R2 Group Policy Precedence
Office Live Meeting 2007 R2 Group Policy
Response Group Service Clients
Communicator Phone Edition
DHCP and Communicator Phone Edition
DHCP Search Options
Microsoft Exchange Server 2007 Autodiscover
How Communicator Phone Edition Retrieves Outlook Contacts, Call Logs, and Voice Mail
Communicator Phone Edition Query Order of Microsoft Exchange Server 2007
Troubleshooting Contacts, Call Logs, and Voice Mail on Communicator Phone Edition
NTP and Communicator Phone Edition
NTP Time Provider
Server Security Framework Overview
Root CA Certificate for Communicator Phone Edition
Using Communicator Phone Edition Certificates
Enterprise Root CA Chain
Trusted Authorities
RoundTable Management
Installing the Microsoft RoundTable Management Tool
Using Rtmanage.exe
Common Configuration Tasks
Set the Time
Change the Display Language
Change the Time Zone
Get the Device’s Current Configuration
Update the Firmware Images
Reset the Device to Factory Settings
Reset the Device Password
Upload the Diagnostics Logs
Interpreting the Diagnostics Logs
Summary
Additional Resources
V. Technical Troubleshooting and Diagnostics
20. Diagnostic Tools and Resources
Identifying Diagnostic Tools by Scenario
Using Server Setup Logs
Usage Example
Using Event Logs
Usage Example: Using Event Logs
Using the Validation Wizard
Using Client and Server Trace Logs
Understanding Office Communicator Traces
Configuring Trace Settings
Looking at Trace Files
Using ClientLogReader
Media Logging
Understanding Office Communications Server Traces
Example of Gathering a Server Trace
Understanding Office Communicator Mobile Traces
Understanding Office Communicator Phone Edition Traces
Understanding Microsoft RoundTable Traces
Using Snooper
Using Best Practices Analyzer
Summary
Additional Resources
21. Troubleshooting Problems
Troubleshooting Process
Determining the Root Cause
Understanding the Symptoms
Collecting Information
Installation Logs
Event Logs
Validation Wizards
Best Practices Analyzer
Client Logging (UCCAPI LOGS)
Reducing Complexity
Isolating the Component
Researching Your Findings
Resolving the Issue
Troubleshooting Common Problems
Common Communicator Scenarios
Scenario 1: Resolving Issues That Involve DNS Service Record Locator Queries
Description of Problem
Troubleshooting
Next Steps
Scenario 2: Resolving Issues That Arise from Certificate Negotiation Failures
Description of Problem
Troubleshooting
Next Steps
Troubleshooting Web Conferencing
Problem Description
Troubleshooting
Next Steps
Troubleshooting External Audio/Video
Description of Problem
Troubleshooting
Next Steps
Summary
Additional Resources
22. Routing and Authentication
Understanding Session Initiation Protocol
Common SIP Requests
Register
Subscribe and Notify
Service
Invite
ACK
Cancel
Bye
Message
Common SIP Responses
Informational
Success
Redirection
Client Error
Server Error
Global Failure
How Office Communications Server Uses SIP
Understanding SIP Routing
SIP Routing Headers
Record-Route Headers
Route Headers
Via Headers
Contact Headers
Route Signatures
How Office Communications Server Uses SIP Routing
Understanding the Globally Routable User Agent URI
GRUU Creation
How Office Communications Server Uses GRUU
Understanding Authentication
NTLM Overview
Kerberos Overview
Security Association Establishment
Refreshing a Security Association
Pre-Authentication of a Message
How Office Communication Server Uses NTLM
How Office Communication Server Uses Kerberos
Troubleshooting Authentication
Summary
Additional Resources
A. About the Authors
B. System Requirements
For OCS-All.ps1 PowerShell Script
For Resource Kit Tools and Reference Material
Index
About the Authors
SPECIAL OFFER: Upgrade this ebook with O’Reilly
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cover
Next
Next Chapter
SPECIAL OFFER: Upgrade this ebook with O’Reilly
Microsoft
®
Office Communications Server 2007 R2 Resource Kit
Rui Maximo
Rick Kingslan
Rajesh Ramanathan
Nirav Kamdar
Copyright © 2009
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset