LDAP Directory Synchronization. Technical Manual Version Edition 1
|
|
|
- Paul Stevens
- 10 years ago
- Views:
Transcription
1 LDAP Directory Synchronization Technical Manual Version Edition 1
2 TOPCALL International AG 18. March / 45
3 TABLE OF CONTENTS 1. LDAP DIRSYNC Background General Information about LDAP Benefits and Strengths Structure of the Product Functionality TOPCALL users and recipients Short overview of the LDAP search filter syntax Attribute mapping Mailsystem TOPCALL userid syntax Dirsync schedule Configuration Error handling Option to ignore specific errors Automatic deletion of unused shadow users (FullDirsyncDeletes) Creating custom attributes (schema extensions) Prerequisites TCOSS requirements for large synchronization operations Installation Dirsync Type LDAP Dirsync Options Daily Dirsync Periodic Dirsync with shorter intervals Compatibility Performance Conformance to Laws and Directives Restrictions Security Aspects Possible future Enhancements Further Documents Implementation Issues Deviations from IPD and / or Standard Requirements LDAP DIRSYNC WITH WINDOWS 2000 OR 2003 ACTIVE DIRECTORY Background Domains, Domain Trees Forests Domain Controller Global Catalog Servers Active Directory Replication Functionality Binding to Active Directory Dirsync Scope TOPCALL users and recipients Server list Hidden objects Requested attributes Globally Unique Identifiers (GUIDs) Utility tcadutil Error Handling Configuration Extending the Active Directory Schema Prerequisites Installation Active Directory Dirsync Configuration Active Directory: Specify Server or User Account TOPCALL International AG 18. March / 45
4 2.4.3 Active Directory: Attributes Hints Dirsync from MS ADAM (Active Directory Application Mode) LDAP DIRSYNC WITH IPLANET/NETSCAPE DIRECTORY SERVER Background Attributes Object Classes Inheritance Netscape Directory Schema Change Log IPlanet/Netscape Directory Server Manuals The Directory Synchronization Procedure Full Dirsync Update Dirsync Full Dirsync with PDLastChangeNumberName = NULL Functionality TOPCALL Users and Recipients Using Object Classes to Distinguish Between Users and Recipients Using an Attribute to Distinguish Between Users and Recipients Using the Directory Server Command-line Utilities Using Ldapsearch for Verifying a Search-Filter Using Ldapmodify for Writing Entries to the Directory Server Using Ldapdelete for Deleting Entries on the Directory Server Extending the Netscape Directory Schema Creating Attributes Creating Object Classes and Adding Attributes Requested Attributes Unique Identifier for the TCOSS User ID Error Handling Configuration Large Synchronization Operations TCOSS Requirements Update Directory Synchronization Full Directory Synchronization Importing more than 5000 Entries to the Directory Server at Once Support for the ISOCOR Directory The Lastchangenumber Server Attribute The modrdn Changelog Entry Prerequisites General Read Attributes of the Directory Server Installation Configuring iplanet/netscape Directory Server for TC Dirsync Starting the Directory Server Console Configuring the change log: Creating the User for Directory Access Providing Access to Change Log, Address Store and Root DSE (Entry) Directory Server Parameters TC/LINK iplanet/netscape Directory Dirsync Installation iplanet/netscape Directory Configuration IPlanet/Netscape Directory: Attributes First Time Installation Notes Troubleshooting LDAP Error: 4; Sizelimit exceeded LDAP Error: 32; No such object LDAP Error: 49; Invalid credentials LDAP Error: 91; Can't connect to the LDAP Server Restrictions Hints Possible future Enhancements TOPCALL International AG 18. March / 45
5 TOPCALL International AG 18. March / 45
6 1. LDAP Dirsync 1.1 Background TOPCALL Communication Server One comes with an integrated multi-purpose directory. The directory is used for inbound routing of messages as well as for outbound addressing using short names. Use of the TOPCALL directory is optional but in most installations the key to tight, full featured integration with a wide range of , ERP and collaboration platforms. In order to make Communication Server One as maintenance free as possible, TOPCALL offers Directory Synchronisation. Directory synchronisation allows full management of directory information within the existing corporate meta-directory while leveraging the flexibility and benefits of the TOPCALL directory. Directories supported today include Novell Directory Server (NDS), Microsoft Exchange and Lotus Notes. Additionally open interfaces are provided to integrate TOPCALL with virtually every existing directory, either via simple ASCII-file import, the ActiveX based TOPCALL Foundation Classes or, for host based applications, via IBM-MQ. LDAP, the Lightweight Directory Access Protocol, has meanwhile established itself as the industry standard for searching and retrieving information from directories of different vendors. TOPCALL is supporting LDAP since 1997 to allow LDAP client software to search the TOPCALL directory. Now that global corporations are more and more consolidating their directories, LDAP also becomes the protocol of choice for server to server directory integration. Both Microsoft Active Directory and iplanet Directory Server (formerly Netscape Directory Server) use the LDAP protocol to replicate information between multiple sites. With LDAP Directory Synchronization TOPCALL now provides full support for Microsoft Active Directory and iplanet/netscape Directory Server as well as a solid basis for support of future LDAP based directories General Information about LDAP The LDAP information model is based on entries. A directory entry contains information about some object (e.g., a person). Entries are composed of attributes, which have a type and one or more values. Attributes hold information about a specific descriptive aspect of the entry. Each attribute has a syntax that determines what kinds of values are allowed in the attribute (e.g., ASCII characters, a jpeg photograph, etc.). Entries are organized in a tree structure, usually based on political, geographical, and organizational boundaries. Each entry is uniquely named relative to its sibling entries by its relative distinguished name (RDN) consisting of one or more distinguished attribute values from the entry. The directory schema is a database holding formal definitions about the attributes and object classes that can be used. Object classes define the types of attributes an entry can contain. Most object classes define a set of required and optional attributes. The existing set of classes and attributes should meet the needs of most applications. However, the schema is extensible, which means that you can define new classes and attributes. LDAP provides operations to authenticate, search for and retrieve information, modify information, and add and delete entries from the directory tree. TOPCALL International AG 18. March / 45
7 1.2 Benefits and Strengths Administrate the TOPCALL user and recipient directory from within Microsoft Active Directory or iplanet/netscape Directory Server. This means: Single point of administration for all Unified Messaging (fax, voice, SMS, etc). Flexible mapping of fields/attributes from the LDAP directory to the TOPCALL directory Optional use of custom fields for TOPCALL specific attributes like cost center or default template (by extending the schema) Use LDAP directory synchronisation together with any of the existing TOPCALL supported Mail or ERP environments (Lotus Notes, Microsoft Exchange, Novell GroupWise, SAP, IBM-MQ, etc). 1.3 Structure of the Product Any TC/LINK LDAP-Sync Microsoft Active Directory Mail / ERP Sytem iplanet/netscape Directory Server LDAP Dirsync is part of the TOPCALL Link Package. TC/LINK can be configured to do an LDAP Dirsync instead of the native dirsync with the connected mail system. This means that any link type can be used for LDAP dirsync. Each TC/LINK instance can use it s own LDAP dirsync options. LDAP dirsync is implemented in a separate DLL, which is regularly used by TCLINK.EXE. 1.4 Functionality Automatically replicates users and recipients to the TOPCALL directory. Supports standard TOPCALL directory synchronization features: -> flexible mapping of attributes between TOPCALL directory and LDAP directory, including concatenation of LDAP fields to single TOPCALL fields, -> configurable syntax for TOPCALL userids, -> configurable dirsync schedule (immediate or periodic) Supported in combination with any TC/LINK. During installation, LDAP synchronization for Microsoft Active Directory and iplanet/netscape Directory Server can be selected as an alternative to native directory synchronization. Each TC/LINK installation can specify a unique LDAP directory server with fully independent configuration options. LDAP directory schema can be extended with TOPCALL specific fields. Standard TC/LP configuration and error handling mechanisms. This documentation explains how LDAP dirsync leverages general TC/LINK dirsync features and gives details about LDAP directory specific dirsync implementations. TOPCALL International AG 18. March / 45
8 Features that are specific to Active Directory or to Netscape/iPlanet Directory server will be discussed in a later section of this document. For a detailed description of standard TC/LINK dirsync, please consult the latest TC/LINK manual TOPCALL users and recipients LDAP dirsync can create two different types of TOPCALL directory entries: users and recipients. TOPCALL users shall be created for LDAP directory entries that have a mailbox on a mail system that is connected to TOPCALL via TC/LINK. Thus, the mailbox owner can use standard TOPCALL utilities to view the status of the sendorders created on TCOSS, use default send options and a default coversheet, add documents from the FIS folder, receive Voice Mail in his mail inbox, access the TCOSS archive etc. TOPCALL recipients can be created for address book entries: People whom the customer can send messages, but who do not have a mailbox on the customer s mail system. Please note that in standard installations it is sufficient to synchronize users only. As LDAP servers are not necessarily connected to a specific mail server, TC/LINK offers a flexible mechanism to distinguish between users and recipients: 2 registry keys (Dirsync\UserFilter, Dirsync\RecipientFilter) allow to specify the LDAP filter used to query for users and recipients. Recommendations for the filter settings are part of the Directory server specific documentation. The filters must use LDAP search filter syntax (defined in RFC 2254). You can define separate TOPCALL dirsync templates for users and recipients (registry keys Dirsync\UserTemplate, Dirsync\RecipientTemplate). Synchronization of users can be enabled / disabled via registry key Dirsync\UserExport. Synchronization of recipients can be enabled / disabled via registry key Dirsync\RecipientExport. Notes: You might as well use these configuration keys to distinguish between two groups of users. In this case, you would configure two different filters and use two different TOPCALL users as templates. Although the registry keys are called UserTemplate and RecipientTemplate, the actual type of the resulting TCOSS entry depends on the type of the dirsync template. It is possible to define the dirsync template separately for every LDAP directory entry: If registry key Dirsync\TemplateAttribute contains the name of an LDAP attribute, dirsync assumes that the dirsync template name is stored in this attribute. If the attribute is empty or does not exist for a certain LDAP directory entry, dirsync uses the template configured in Dirsync\UserTemplate or Dirsync\RecipientTemplate as a fallback Short overview of the LDAP search filter syntax LDAP search filters use one of the following formats: <filter>=(<attribute><operator><value>) <filter>=(<operator><filter><filter>) Some operators that are frequently used for search filters are listed in the following table: = Equal to ~= Approximately equal to <= Lexicographically less than or equal to >= Lexicographically greater than or equal to & AND OR! NOT TOPCALL International AG 18. March / 45
9 See RFC 2254 for full description (available at Attribute mapping Attribute mapping is done via dirsync templates, as described in the TC/LINK manual. A dirsync template is a TCOSS user or recipient entry that holds placeholders for foreign directory attributes. A single TCOSS attribute may contain several placeholders. When dirsync creates a TCOSS object, the template is used as a basis and the placeholders are replaced by the real attribute values. For performance and compatibility reasons, dirsync does not request all attributes from the LDAP directory. Instead, you must configure a set of required attributes, either via Setup or via a registry editor. The list of required attributes is stored in registry keys Dirsync\List00 to Dirsync\List99. These registry keys contain the LDAP display names of the attributes. As a rule, you should only use LDAP attributes that are character strings. If the LDAP attribute contains multiple values, LDAP dirsync only uses the first value. Exceptions to this rule may be defined in the directory server specific part of this documentation. The LDAP attribute name cannot be used for dirsync, because the dirsync variable $name$ is reserved for the TCOSS user name. Please consult the directory server specific chapters for information about allowed and recommended LDAP attributes Mailsystem Every user / recipient on TOPCALL is marked as belonging to a mailsystem. Users created via a native TC/LINK dirsync belong to the mailsystem of the TC/LINK that created them (e.g. MS Exchange, Lotus Notes, etc.). With LDAP dirsync, the mailsystem of TCOSS users is not necessarily correlated with the link type. It is possible that the LDAP server holds a metadirectory with users from different mail systems. Therefore, LDAP dirsync takes the mailsystem from the field user belongs to defined in the dirsync template. In future versions of TCFW, additional mail systems will be implemented (e.g. X400, Internet, SMS). As a side-effect of this solution, Dirsync may be unable to check if the mailsystem matches when a user is deleted: When the Directory server marks an entry for deletion, most attributes of the entry are removed (e.g. also the attribute holding the dirsync template name). This implies that registry key USRIO\ChangeAllUsers must not be set to 0 if one link instance synchronizes users from different mail systems. Instead, set USRIO\ChangeAllUsers to 1 (dirsync ignores Dirsync Allowed flag and Mailsystem of the TCOSS user) or 2 (dirsync ignores Mailsystem only) TOPCALL userid syntax The name of the TOPCALL directory entries created by dirsync must be unique. It will be composed from attributes of the LDAP directory entry. You can either use a LDAP attribute that is guaranteed to have a unique value or choose a combination of LDAP attributes that is unique within the customer s system. The formula for creation of TOPCALL directory entry names (user ID or recipient ID) is configured during Setup and is stored as a string value in registry key Dirsync\UserIDFormula. The string contains LDAP attribute names surrounded by brackets (e.g. [surname]). These attribute names are interpreted as placeholders for the corresponding LDAP attributes of the LDAP directory entry. All other components of the formula are used as they are. Examples: [surname] [initials]. [givenname] [employeeid]/[department]-[company] Which LDAP attributes are used in a specific LDAP directory depends on the Directory server and on the customer s system architecture. TOPCALL International AG 18. March / 45
10 Normal attributes (like surname, employeeid etc) are not guaranteed to have unique values. It depends on the Directory server, which LDAP attribute is unique for a user. Please consult the directory server specific chapters in this documentation for information about allowed and recommended LDAP attributes Dirsync schedule To keep the TCOSS user and recipient store consistent with the LDAP directory, it will be necessary to synchronize directory changes at regular intervals. Setup offers two options for a periodic dirsync: Dayly dirsync at a specific time (e.g. 3am) Dirsync at a specific interval (e.g. every 5 minutes). The actual interval depends on message throughput (dirsync is not done while a message is being transferred). Normally, periodic dirsync is an update dirsync: only changes after last dirsync are stored. In some scenarios, it is necessary to have a periodic full dirsync. This is possible by setting registry key PeriodicFull to 1. Additionally, TC/LINK can be configured to do an immediate dirsync. This can be either a full dirsync (all directory entries) or an update dirsync (request directory entries that were changed after the last dirsync). If you choose an immediate dirsync in Setup, it will be done at the next TC/LINK startup. You can also force an immediate dirsync while TC/LINK is running, by setting registry key Dirsync\Immediate to 1 (full) or 2 (update). TC/LINK resets this registry key to 0 (no immediate dirsync) if the dirsync was successful. TOPCALL International AG 18. March / 45
11 1.4.6 Configuration LDAP Dirsync options can be changed via a registry editor. All LDAP dirsync specific options are stored in a subkey Dirsync below the registry subkey of the link instance. General registry keys for LDAP Dirsync (used for Netscape and Active Directory) Registry Key Type Default Description Dirsync\Type DWORD 0 0 = no dirsync (disables native dirsync for MX, LN and GW 1 ) 1 = native dirsync (only valid for MX, LN, GW, FI and MQ) 2 = Microsoft Active Directory 3 = iplanet / Netscape Directory Dirsync\Immediate DWORD 0 0 = no immediate dirsync 1 = immediate full dirsync 2 = immediate update dirsync Dirsync\Periodic DWORD 0 Intervals for update dirsync 0 = no periodic dirsync 1 = daily update dirsync 2 = periodic dirsync with shorter intervals Dirsync\PeriodicFull DWORD 0 0: periodic update dirsync 1: periodic full dirsync Dirsync\Time SZ Time for daily update dirsync (valid if Periodic is 1) and for update of TCOSS system files (if Topcall\UpdateSystemFiles = 1) Format: hhmmss Dirsync\Interval DWORD 300 Interval for update dirsync (in seconds) (valid if Periodic is 2) Dirsync\LastDirsyncAt SZ Date and time of last dirsync, in syntax YYYYMMDD:hhmmss Dirsync\LastUpdateSys SZ Date and time of last update of TCOSS system files (if configured) Dirsync\UserExport DWORD 0 1: synchronize users 0: do not synchronize users Dirsync\UserTemplate SZ TCOSS template for users Dirsync\RecipientExport DWORD 0 1: synchronize recipients 0: do not synchronize recipients Dirsync\RecipientTemplate SZ TCOSS template for recipients Dirsync\TemplateAttribute SZ LDAP attribute containing the TCOSS template name (attribute contents overrides UserTemplate and RecipientTemplate) Dirsync\UserIDFormula SZ Formula for TOPCALL userid, can hold LDAP attribute names in [brackets] Default value depends on dirsync type. See below. Dirsync\List01 to List99 SZ Requested attributes (LDAP attribute names) Dirsync\FullDirsyncDeletes DWORD 0 Enable deletion of unused shadow users after every full dirsync Dirsync\FullDirsyncDeletesMailSystem DWORD 0 Additional option, described in section Dirsync\DLL SZ TCLAD or TCLPD Dirsync DLL base name (without extension and path). Must be in the TCLP working directory. Default value depends on dirsync type. Registry keys Immediate, Periodic, Interval and FullDirsyncDeletes can be changed at runtime. To make changes to other keys effective, you must restart the link. 1 With FI and MQ, dirsync cannot be disabled. TOPCALL International AG 18. March / 45
12 1.4.7 Error handling The following errors may occur while writing a single user or recipient to TCOSS: Code Description Remark Standard Handling (LDAP Dirsync) 3501 Dirsync preparation error (e.g. retry next DS time memory allocation failure) 3502 No name found in string ignore 3503 No template found in string ignore 3504 Template not existing ignore 3505 Dirsync allowed flag not set ignore 3506 wrong function (Modify, Add, retry next DS time Delete allowed) 3507 Tried to touch user from ignore different mail system 3508 obsolete replaced by 3509 and Group not existing new retry next DS time 3510 Representative not existing new retry next DS time 3511 Connection to TCOSS lost new retry next DS time 3512 Maximum store capacity new retry next DS time reached 3513 Other TCOSS errors new retry next DS time LDAP dirsync uses the standard TC/LINK error handling mechanisms: All errors are logged to the application event log and written to the trace file. There is an individual event log warning for every failed user or recipient. Additionally, a final event log warning contains the number of errors. Some errors are ignored by default: they are written to the event log but do not trigger a dirsync retry. Examples: dirsync not allowed for a user, different mail system. Errors that are not ignored lead to a dirsync retry at the next configured Dirsync time (e.g. next day, or after the configured interval) Option to ignore specific errors You can choose to ignore all errors mentioned above, by setting registry key General\ReportDSErrors to 0. To ignore specific errors only, use the new registry key Dirsync\IgnoredErrors (REG_SZ). It contains a comma separated list of error codes that shall be ignored. Default: errors 3502, 3503, 3504, 3505 and 3507 are ignored Both options must be handled with care, because ignoring an error leads to a missing shadow user. Errors that are not mentioned in the list (e.g. no dirsync license, LDAP server access problems) are not configurable and always lead to a dirsync retry. If dirsync fails for any reason, TC/LINK still continues transferring messages. Maximum diagnostic trace output will be available at tracelevel 100 decimal (registry key General\Tracelevel) Automatic deletion of unused shadow users (FullDirsyncDeletes) With registry key FullDirsyncDeletes set to 1, the full dirsync automatically deletes shadow users for mailboxes that went out of dirsync scope. This operation is done after every successful full dirsync (if no errors or only ignored errors occurred). TOPCALL International AG 18. March / 45
13 When you enable this option for the first time, you should perform the following steps: TC/LINK uses the link group and the date and time of the last dirsync to recognize which objects must be deleted. If several instances of TC/LINK are used for LDAP dirsync, check to which link group they belong (registry key General\LinkGroup). Using several links with identical dirsync settings is not recommended because this is unnecessary overhead. If, in spite of this, there are multiple links that do dirsync with identical settings, they must belong to the same link group, and the FullDirsyncDeletes feature must be enabled for all of them. If there are instances with different dirsync settings they must belong to a different link group, otherwise their shadow users may be deleted by mistake. Set registry key Dirsync\FullDirsyncDeletes to 1. You need not restart the link. Do a full dirsync by setting registry key Dirsync\Immediate to 1 (if there are multiple links with identical settings, you only have to do it in one instance). You need not restart the link. After changing the dirsync scope or making large changes in the LDAP directory, you can trigger a full dirsync (and deletion of unused shadow users) by setting Dirsync\Immediate to 1. When deleting a shadow user, TC/LINK writes the following eventlog entry: Code Severity Description Corrective Action Parameters 5145 Information Full dirsync deleted user / recipient %1. This TCOSS object was deleted because it had left the dirsync scope. %1: user/recipient ID If the mail user entered the dirsync scope of another link, it will be subject of the other link s dirsync. The shadow user will not be deleted by the original link after the other link changed the object. If both actions (link 1 deleting the user, link 2 updating it) occur simultaneously, one of them will fail. In previous releases, LDAP full dirsync deleted even objects that were part of the dirsync scope but could not be changed for some reason (e.g. mailsystem changed, invalid group, dirsync not allowed). Now, objects for whom dirsync failed are not deleted. Instead, LDAP dirsync removes the stamp that marks these objects as dirsynced by this link group. Additionally, users or recipients with dirsync disabled are not deleted. If you copy a shadow user via TCFW (by changing the name of an existing shadow user), you should clear the dirsync enable flag, in order to prevent deletion of this user. Special option for upgrade from Exchange 5.5 dirsync to Active Directory dirsync If the position of users in the Exchange organization changes during an upgrade from Exchange 5.5 to Exchange 2000 or 2003, dirsync cannot correlate the existing shadow user profiles with the new users. The old user profiles must be deleted. Up to now, it was not possible to delete them automatically, even if the FullDirsyncDeletes feature was enabled before and after the upgrade. Now, a new dirsync option allows automatic deletion of all Exchange shadow user profiles that were created via dirsync and are not maintained by full dirsync any more. For this purpose, you must create the registry value Dirsync\FullDirsyncDeletesMailSystem (REG_DWORD) via a registry editor and set it to 7. (7 is the TCSI constant for the Exchange mail system). Additionally, registry value Dirsync\FullDirsyncDeletes must be set to 1. When TCLINK encounters this situation after a full dirsync, it deletes all Exchange user profiles that were created by any link and were not part of this full dirsync, - of course only if dirsync is allowed for the user. TOPCALL International AG 18. March / 45
14 1.4.9 Creating custom attributes (schema extensions) It is possible to add new object classes and attributes to the LDAP schema. In the context of LDAP dirsync, this may be needed if it is not possible to use existing user attributes for TOPCALL user properties. For example, you could create an attribute that holds the TCOSS default template name. The process of creating or modifying LDAP object classes and attributes is called Extending the Schema. This process is described in the Directory Server specific chapters of this document. 1.5 Prerequisites Any TC/LINK (LN, MX, FI, SM, GW, MQ, X4, etc) plus either: Microsoft Active Directory (part of the Microsoft Windows 2000 or 2003 Server family) iplanet/netscape Directory Server version 4.1 or higher Other LDAP servers may be supported in future versions. See the TC/LINK manual for standard TC/LP requirements. LDAP dirsync needs a standard dirsync (TC/DS) license TCOSS requirements for large synchronization operations The user store of the TCOSS server has to be configured to maintain the required number of user entries. Use the TCDISK utility program to change disk space and allowed number of user entries. There are also two entries in the common config parameters (sysconfig): In line 13, positions 5-8 the numbers of user and recipient entries are specified. In fact space for the TOPCALL user-id is reserved for that amount of entries, so for long user-ids as for the Directory Server distinguished names you should even configure more entries than you actual need. Keep also in mind, that for every user entry a recipient entry is generated. For more information please see the TCOSS System and Config Manual. 1.6 Installation For installation, use the standard TC/LP Setup. During installation of any TC/LINK, an additional option is provided for configuration of Directory Synchronization. This chapter contains only installation steps that are common for all LDAP servers Dirsync Type Directory Synchronization Type (registry: Dirsync\Type): Available choices are: None Native Microsoft Active Directory IPlanet/Netscape Directory TOPCALL International AG 18. March / 45
15 Option Native will only have effect if the particular TC/LINK supports native directory synchronization (LN, MX, GW, FI and MQ) LDAP Dirsync Options Immediate Dirsync (registry: Dirsync\Immediate): Here you can order one immediated dirsync after the next start of TCLINK. Possible values: Nothing (default) Everything Changes Periodic Dirsync (registry: Dirsync\Periodic): Here you can configure a periodic update dirsync. Possible values: OFF (default) Daily Shorter Intervals Daily Dirsync If you selected a daily dirsync, a dialog box lets you enter the exact time of day: Time (hhmmss) for daily dirsync (registry: Dirsync\Time): Enter a time (hh=hours: 00-23, mm=minutes: 00-59, ss=seconds: 00-59). Daily update dirsync will take place at time specified here. Default: (3am) TOPCALL International AG 18. March / 45
16 Periodic Dirsync with shorter intervals Interval for periodic dirsync (sec) (registry: Dirsync\Interval): Only valid if you selected shorter dirsync intervals. Please specify how many seconds TC/LINK shall wait between subsequent dirsyncs. The configured interval is not allowed to exceed 24 hours. The actual interval used by TC/LINK depends on message throughput (no dirsync during message transfer). Default: 300 sec Note: If TC/LINK is configured to update system files, this is by default only done once per day (at the time configured in DIRSYNC\Time, default is 3 am). The reason is that update of system files has a severe impact on TC/LINK performance. But you can force TCLINK to update the system files after every successful dirsync by setting registry value Topall\UpdateSystemFiles to Compatibility See prerequisites for supported directory servers. 1.8 Performance Min replications per hour (Mod 2xx-PRO, no other load on both TOPCALL and LDAP server) Multiple TC/LINKs per server may be replicating different sub-trees of the master directory. Manual fail over required in case of hardware failure. 1.9 Conformance to Laws and Directives Standard LDAP protocol is used for directory access and replication of information Restrictions The actual synchronization algorithm is not part of the LDAP standard and therefore proprietary to each Directory Server. Currently TOPCALL provides support for the proprietary LDAP synchronization protocols of Microsoft Active Directory and iplanet/netscape Directory Server. Support of other LDAP directory servers is optionally made available upon request Security Aspects LDAP communication between TOPCALL and directory server is via a standard TCP/IP connection within the corporate network. Future versions might provide SSL/TLS connection encryption. Login information required to gain access to the LDAP server is stored in encrypted form on the TC/LINK server. Access to the TC/LINK server is restricted via standard NT logon. The server itself is normally located within a restricted area (server room). TOPCALL International AG 18. March / 45
17 1.12 Possible future Enhancements SSL/TLS support Support of other LDAP directory servers 1.13 Further Documents Common configuration will be described in TC/LINK release description/manual. LDAP server specific information will be described in separate release descriptions, to be consolidated into one manual for final release Implementation Issues Directory synchronization for each LDAP server is implemented in a separate DLL (TCLAD.DLL and TCLPD.DLL) TCLINK.EXE loads the DLL according to the per instance TC/LINK configuration (registry) The interface between TCLINK.EXE and DLL s is described in the TC/LINK implemenation description. Both DLLs use ADSI (Active Directory Service Interface) to access the LDAP server Deviations from IPD and / or Standard Requirements Parallel synchronization of same directory subtree is possible for failover operation (same configuration! ). Fax pincode shall not be dirsynced (updated only via TCFW and TC/Voic ). Active Directory: Creation of custom attributes not documented and not recommended. TOPCALL International AG 18. March / 45
18 2. LDAP Dirsync with Windows 2000 or 2003 Active Directory 2.1 Background Active Directory is the directory service used in Microsoft Windows 2000 and 2003 and is the foundation of Windows distributed networks. Active Directory provides secure, structured, hierarchical storage of information about the interesting objects in an enterprise network; such as users, computers, services, and so on. The directory provides rich support for locating and working with these objects. Active Directory is primarily a namespace, as is any directory service. A namespace is any bounded area in which a given name can be resolved. Name resolution is the process of translating a name into some object or information that the name represents. Active Directory forms a namespace in which the name of an object in the directory can be resolved to the object itself. The Active Directory is physically stored on the domain controllers. Every domain controller holds a set of directory database partitions Domains, Domain Trees A domain is a single security boundary of a Windows 2000 / 2003 computer network. Active Directory is made up of one or more domains. On a standalone workstation, the domain is the computer itself. A domain can span more than one physical location. Every domain has its own security policies and security relationships with other domains. When multiple domains are connected by trust relationships and form a contiguous namespace, you have a domain tree Forests A forest is a set of one or more domain trees that do not form a contiguous namespace. There are trust relationships between all trees in a given forest. The single domain controllers in the forest store only user profiles of their own domains, whereas Global Catalog Servers hold a directory with all user profiles of the forest (see section for details). You can set up Active Directory Dirsync to work with single domains (1 link per domain) or with the complete forest (1 link connected to a Global Catalog server). TOPCALL International AG 18. March / 45
19 2.1.3 Domain Controller A domain controller is a computer that is running Windows 2000 or 2003 Server and hosts Active Directory. Domain controllers are responsible for authenticating domain user logons. A domain controller holds a writable replica of the following directory partitions: the Domain directory partition, which stores users, groups, computers and other objects for the local Windows domain. Updates to this partition are replicated only to domain controllers within the domain and (partially) to Global Catalog Servers (see below). the Schema container, which stores class and attribute definitions for all existing and possible Active Directory objects. Updates to this container are replicated to all domain controllers in the forest. The Configuration container, which holds information about sites, services, and directory partitions. Updates to this container are replicated to all domain controllers in the forest. A Windows domain can deploy many domain controllers, and all domain controllers can accept Active Directory changes Global Catalog Servers A Global Catalog server is a domain controller that stores the three writable directory partitions mentioned above, as well as a partial, read-only copy of all other domain directory partitions in the forest. This copy is called the Global Catalog (GC). It holds a replica of every object in Active Directory but with only a small number of their attributes. The attributes in the GC are those most frequently used in search operations (such as a user's first and last names or login names) and those required to locate a full replica of the object. The GC allows users to quickly find objects of interest without knowing which domain holds them and without requiring a contiguous extended namespace in the enterprise. The first domain controller in a forest is automatically designated as a Global Catalog Server. Thereafter, another domain controller can be designated as a Global Catalog in the NTDS Settings Properties dialog box in Active Directory Sites and Services Active Directory Replication Replication of updates is triggered when a user updates an object on a domain controller. When an update occurs, a timer is started and after a set period the (source) domain controller notifies the adjacent (destination) domain controllers. After being notified that there are changes, the destination domain controller contacts the source domain controller to request the changes. To determine what changes need to be propagated to other domain controllers, Active Directory replication uses update sequence numbers (USNs). USNs are 64-bit numbers that are assigned by a counter that is local to each domain controller. Every attribute of every object in the Active Directory has its own USN number. An object s usnchanged attribute is the maximum local USN among all attributes of the object. The highestcommittedusn attribute of a domain controller is the maximum local usnchanged among all objects stored in the Active Directory partitions of this domain controller. All these USNs are local to the domain controller and are not replicated. Therefore, it is meaningless to compare a USN assigned on one domain controller to a USN assigned on a different domain controller. The up-to-date-ness vector is a value that a domain controller maintains for tracking the updates that are received from all other domain controllers. This vector contains the maximum USN number received from every source domain controller. When a destination domain controller requests changes for a directory partition, it provides its up-to-date-ness vector to the source domain controller. On the bases of this value, the source domain controller can determine if the destination has an up-to-date value for an attribute. TOPCALL International AG 18. March / 45
20 2.2 Functionality Binding to Active Directory Automatic lookup of domain controller: In a standard installation, where TCLINK.EXE is started with a Windows account from the Active Directory that shall be used for Dirsync, it is not necessary to specify a domain controller name, because Dirsync is able to locate the nearest domain controller itself. When running for the first time, AD Dirsync looks for a domain controller in the domain of the TC/LINK NT user. The security context of TCLINK.EXE is used for logon to the domain controller. After a successful dirsync, TC/LINK stores the name of this domain controller and the domain controller s highestcommittedusn attribute in the registry. At every subsequent dirsync, TC/LINK logs in to the same domain controller. If binding to this domain controller succeeds, TC/LINK provides the stored highestcommittedusn number and asks for objects with a higher USN number. If this domain controller is not available, TC/LINK writes an error to the event log and retries to logon at every subsequent poll cycle. You can force TC/LINK to look for another domain controller, by requesting an immediate full dirsync. Specifying domain controller for dirsync: In TC/LP Setup, you can optionally specify which domain controller shall be used. This option is essential if TC/LINK uses an account from a different forest, e.g. from an Application Service Provider s domain. If a specific domain controller has been selected during Setup, dirsync will never try to locate a domain controller by itself, even if the specifed domain controller is not available Dirsync Scope AD dirsync can be done on a domain level, domain tree level, or global catalog level. Domain level: Users or recipients from a specific domain are synchronized. All attributes can be used. Users from subdomains are not covered by dirsync. Global Catalog level: Users from the whole forest are synchronized. The GC holds only a subset of attributes. A TOPCALL utility called tcadutil will be installed by Setup. You can use this utility to get a list of user attributes represented in the GC. You can use the Active Directory Schema snap-in to add attributes to the global catalog. Nevertheless, you must be aware that this operation causes an immediate directory replication cycle, which may cause a lot of network traffic in a large organization. The Active Directory Schema snap-in can be installed from the Windows Advanced Server CD. To search the global catalog, a domain controller containing a global catalog must be available in the LAN. If one is not available, dirsync is not possible. Domain Tree level: Users from a complete domain tree or from a specified Organizational Unit are synchronized. This is implemented as a restricted search within the global catalog. Therefore, only the subset of attributes stored in the global catalog can be used. Additionally, dirsync is not possible if no domain controller holding a global catalog is available in the LAN. TOPCALL International AG 18. March / 45
21 2.2.3 TOPCALL users and recipients As a default, Active Directory dirsync creates TCOSS users for Exchange mailboxes and TCOSS recipients for Active Directory contacts (an equivalent to the custom recipients in former Exchange versions). Nevertheless, you can use a completely different concept, by changing the LDAP filter expressions stored in registry keys Dirsync\UserFilter and Dirsync\RecipientFilter. Default for UserFilter: ( (mail=*)(proxyaddresses=*)(textencodedoraddress=*))(&(objectcategory=person)(objectclass=user)(msexchhomeservername=*)) Default for RecipientFilter: ( (mail=*)(proxyaddresses=*)(textencodedoraddress=*))( (&(objectcategory=person)(objectclass=contact))) For example, you can treat every Active Directory user as a user, by configuring UserFilter as: (&(objectcategory=person)(objectclass=user)) You can also define additional subsets Server list The native TC/LINK-MX dirsync algorithm offers an option to define a list of home servers. Dirsync ignores mailboxes from other home servers. AD dirsync has a similar option. Registry key Dirsync\ADServers allows to specify a list of server distinguished names. Attention: The complete distinguished name of the server must be entered, e.g. : /o=e2korg/ou=first Administrative Group/cn=Configuration/cn=Servers/cn=PCFS2000A Hidden objects By default, dirsync does not import objects hidden from the Exchange Global Address list. If hidden objects shall be imported, set registry value Dirsync\ADSyncHiddenObjects to Requested attributes You can use the utility tcadutil.exe (see 2.2.8) to get a list of possible attributes. With dirsync scope Local Domain, all attributes can be used. With all other dirsync scopes, you can only use attributes that are replicated to the Global Catalog (column exported to GC in the output of tcadutil.exe must be yes ). A special syntax can be used to retrieve a single address from the multistring attribute proxyaddresses: proxyaddresses:<addresstype> references the first address with the given addresstype. For instance, proxyaddresses:smtp refers to the user s first SMTP address Attributes that are part of the TOPCALL userid ($Name$ and all components of the UserIdFormula) or that are used internally by TCLINK need not be specified in the Dirsync\List registry keys. They are requested automatically Globally Unique Identifiers (GUIDs) With Exchange 5.5, the unique name of a mailbox was its distinguished name. With Active Directory, the only object identifier that can never be changed is the object's Globally Unique Identifier (GUID). The GUID is a very large number that is created by the domain controllers. The algorithm used for GUID creation ensures that a GUID can never be created twice. Using GUIDs also allows objects, such as domains, to be moved in the directory tree or forest. Therefore, Active Directory dirsync uses the GUID to locate existing shadow users. A string representation of the GUID is stored as a correlation field in the TCOSS recipient store entry. It is recommended to delete existing shadow users and then run a full Active Directory dirsync. TOPCALL International AG 18. March / 45
22 2.2.8 Utility tcadutil Before running Setup, you should decide which Active Directory attributes shall be used in the TCOSS directory entries (if the scope is larger than the local domain, these attributes must be part of the Global Catalog) from which attributes the TCOSS userid shall be built which attribute holds a per-user template name (optional) In order to facilitate these decisions, TC/LP contains a console application called tcadutil.exe. This application reads the Active Directory schema and enumerates all possible user attributes. Additionally, it states whether an attribute is replicated to the global catalog, and whether it is indexed. If you redirect the program s output to a file, you can create a CSV-file with all possible user attributes, and cut and paste attribute names into the Setup fields. Called without a command line parameter, tcadutil.exe creates a comma-separated output like this: attribute name, exported to GC, indexed cn,yes,yes Called with a command line parameter that specifies an existing user from the current domain, the output contains an additional column Attribute value, holding the value for every attribute: attribute name, attribute value, exported to GC, indexed cn,administrator,yes,yes For a user within the Users container of the current domain, just specify the name of the user, e.g.: tcadutil Administrator Special characters:,=+<>#;\ For user names containing one of the special characters, you must put a backslash \ before the special character, e.g. \+F instead of +F. For a user that is not in the Users container of Windows Active Directory, you have to specify the location of the user within the domain using the following syntax: CN=UserName,OU=Container1,OU=Container2 UserName and ContainerX are placeholders for the real values, the number of containers depends on the real directory structure. Example: TOPCALL International AG 18. March / 45
23 User Jim Brown is a member of the organizational unit Europe. Organizational unit Europe itself is a member of the Sales organizational unit. If tcadutil shall show the attributes for user Jim Brown, use the following command line: tcadutil CN=Jim Brown,OU=Europe,OU=Sales The parameter must be surrounded with double quotes, and there must not be any blanks between the components of the path. Use CN to specify the user name and OU to specify organizational units Error Handling AD dirsync will write events to the application event log for the following problems: Errors: Invalid or missing registry keys No domain controller / global catalog server available Invalid LDAP filter string Missing access permissions to Active Directory Other errors (to be defined) Warnings: The target domain controller is not available, dirsync is postponed A detailed list of event log messages will be part of the final version of this document. TOPCALL International AG 18. March / 45
24 Configuration AD Dirsync options can be changed via a registry editor. All LDAP dirsync specific options are stored in a subkey Dirsync below the registry subkey of the link instance. Registry Key Type Default Description ADAllowOtherDC DWORD 1 0: always use the same domain controller (ADDCName) 1: if access to DC specified in ADDCName fails, full dirsync tries to locate another DC ADBaseDN SZ Base node for dirsync (used internally) ADDCName SZ Distinguished name of target domain controller ADDefaultNamingContext SZ Default value for defaultnamingcontext property (MS ADAM only) ADInvocationID SZ Used internally ADPageSize DWORD 100 used internally, do not change ADPassword SZ Password of the user specified in ADUserID ADPort DWORD 0 Custom port used for LDAP access to MS ADAM ADPreviousHighUSN SZ Used internally ADScope DWORD 0 0: synchronize with local domain 1: synchronize with Global Catalog 2: synchronize with domain tree (uses GC) ADServers MULTI_SZ List of distinguished names of servers. Makes only sense for Exchange mailboxes. Only mailboxes from the listed home servers are synchronized. ADSyncHiddenObjects DWORD 0 0: objects hidden from Exchange address list are not imported 1: objects hidden from Exchange address list are imported ADTreeBase SZ Domain tree (only valid if Scope is 2), e.g. DC=us,DC=topcall,DC=com for subdomain us.topcall.com, OU=sales,DC=us,DC=topcall,DC=com for OU sales/us.topcall.com ADUpgradeFromExch5 DWORD 0 If 1: Enables dirsync to convert existing Exchange 5.5 shadow users to Exchange 2000 shadow users. ADUserID SZ specify a Windows user for dirsync, normally not needed format: DOMAIN\USER DeletedFilter SZ used internally, do not change RecipientFilter SZ LDAP filter for Active Directory contacts Default is: ( (mail=*)(proxyaddresses=*)(textencodedoraddress=*)) ( (&(objectcategory=person)(objectclass=contact))) UserFilter SZ LDAP filter for Active Directory users Default is: ( (mail=*)(proxyaddresses=*)(textencodedoraddress=*)) ( (&(objectcategory=person)(objectclass=user))) UseridFormula SZ [cn] Formula for creating the Topcall user id Extending the Active Directory Schema A simple mechanism for adding new attributes to Active Directory users will be made available in a later version of TC/LDAP dirsync. In the first release, it is recommended to use only the standard user attributes for dirsync. 2.3 Prerequisites TC/LINK must run on Windows 2000 or It must either run as a domain user, or you must specify the credentials of such a user in the LDAP Dirsync configuration. If configured to dirsync the local domain, this user profile must be a member of the local domain. The mentioned user must have read access to the Active Directory, including the Deleted Objects folders. With standard settings, only members of the security group Domain Admins can read the Deleted Objects folders. Note: There is an alternative way of giving the link user access to the deleted items containers. With the DSACLS tool that is part of the Microsoft Active Directory Application Mode (ADAM) Administration Tools, any domain user can be given access to these containers. Microsoft KB article describes in detail how this is done: TOPCALL International AG 18. March / 45
25 Download the ADAMRetailX86.exe package from the Microsoft download site. Extract the contents and run AdamSetup.exe. Select installation option ADAM Administration Tools Only and finish the installation. Login to the computer with a user account that is a member of the Domain Admins group. Click Start, point to All Programs, point to ADAM, and then click ADAM Tools Command Prompt. Execute the following two commands (modified as explained below) for every domain in the forest: o DSACLS CN=Deleted Objects,DC=DomainDistinguishedName /takeownership o DSACLS CN=Deleted Objects,DC=DomainDistinguishedName /g DOMAIN\USER:LCRP Instead of the placeholders DomainDistinguishedName, DOMAIN and USER, use the following: DomainDistinguishedName: specify the full domain distinguished name, e.g. DC=Topcall,DC=com DOMAIN: specify the domain of the link user (as in registry value Domain) USER: specify the user id of the link user (as in registry value UserId) or a security group where the user is member. 2.4 Installation Active Directory Dirsync Configuration Specify server or user account: If selected, you will be prompted to enter which domain controller and which Windows domain user shall be used for dirsync. This option is only needed if if TCLINK runs under a user account that is not a member of the Active Directory forest accessed by Dirsync (e.g. in an ASP environment). Dirsync scope (registry: Dirsync\ADScope): Choose the scope of directory synchronization (see section 2.2.2). Possible values: Local Domain Global Catalog Domain Tree Domain tree base (registry: Dirsync\ADTreeBase): Only needed if scope is Domain Tree. Setup asks for the domain tree that shall be synchronized. TOPCALL International AG 18. March / 45
26 Synchronize users (registry: Dirsync\UserExport): Choose if users shall be synchronized. See section for a definition of the term users. User template (registry: Dirsync\UserTemplate): If users shall be synchronized, you can define here the default dirsync template for users. This default template can be overridden by a user-specific template configured via attribute holding template. Dirsync without a dirsync template is not possible. Default: ADUSER (belongs to Exchange) Synchronize contacts (registry: Dirsync\RecipientExport): Choose if contacts shall be synchronized. See section for a definition of the term contacts. Contact template (registry: Dirsync\RecipientTemplate): If contacts shall be synchronized, you can define here the default dirsync template for contacts. This default template can be overridden by a contact-specific template configured via attribute holding template. Dirsync without a dirsync template is not possible. Default: ARECIP (belongs to Exchange) Attribute holding template (registry: Dirsync\TemplateAttribute): Here you can specify an Active Directory attribute that holds the dirsync template name. If this attribute exists and is not empty for a user (or contact), TC/LINK dirsync will interpret the attribute content as the dirsync template name for this object. You can find out valid attribute names via the utility tcadutil which is part of TC/LP. Note: For scopes other than Local Domain you can only use attributes that are part of the Global Catalog! If the template holding attribute is not in the global catalog, dirsync will use the default template. Formula for TOPCALL userid (registry: Dirsync\UserIDFormula): This mandatory input option defines how TC/LINK builds the TOPCALL userid of a shadow user. The userid can contain various Active Directory user attributes. In this input field, you can specify any combination of fixed text and attribute names in [brackets]. You can find out valid attribute names via the utility tcadutil which is part of TC/LP. Note: For scopes other than Local Domain you can only use attributes that are part of the Global Catalog! Default:[cn] Active Directory: Specify Server or User Account This window appears if you selected specify server or user account in the general Active Directory dirsync configuration. Use only this DC for dirsync (registry: Dirsync\ADDCName): Specify the name of the domain controller, including the full domain name. Please note that the link computer must be able to find the IP address of this domain controller, either via DNS or via a local hosts file. If you enter a value into this field, Setup also sets registry key Dirsync\ADAllowOtherDC to 0. This means that if this domain controller is unavailable, dirsync will not try to locate another domain controller. TOPCALL International AG 18. March / 45
27 If the dirsync scope is NOT Local Domain, the specified domain controller must be a Global Catalog server. Domain\User for dirsync (member of Domain Admins) (registry: Dirsync\ADUserId): Enter the domain and user id of an account that has access to the Deleted Objects containers in Active Directory. This user must be in the same forest as the domain controller specified above. Password of this user ( * leaves existing setting) (registry: Dirsync\ADPassword): Enter the password of this user. It will be stored encrypted Active Directory: Attributes Use this setup page to define which Active Directory attributes are needed for dirsync. Setup allows to define up to 18 attributes as dirsync parameters (a second page is available). They are stored in the registry as Dirsync\List01 to Dirsync\List18. If more attributes are needed, they can be entered manually via the registry editor (Dirsync\List19 etc.). For scopes other than Local Domain you can only use attributes that are part of the Global Catalog! Please note that some attributes, e.g. legacyexchangedn and proxyaddresses, do not exist for users without an Exchange mailbox. Attribute names are case sensitive. The attribute defining the TOPCALL user name is requested automatically and need not be part of this list. In the sample user template on TOPCALL, the dirsync parameters can also be referenced via their sequential number, e.g. $1$ instead of $displayname $. Default: If Active Directory dirsync is installed for the first time, Setup configures a set of attributes corresponding to the ADUSER template installed by TC/LINK (see screen shot). TOPCALL International AG 18. March / 45
28 Notes : If Active Directory dirsync is installed for the first time, TC/LINK installs a dirsync template user ADUSER. If this is an upgrade and a dirsync template user already exists, it is not changed. 2.5 Hints Dirsync from MS ADAM (Active Directory Application Mode) Microsoft ADAM (Active Directory Application Mode) is a special mode of the Active Directory service that is designed for directory-enabled applications. ADAM is a Lightweight Directory Access Protocol (LDAP) directory service that runs as a user service, rather than as a system service. You can run ADAM on servers running Microsoft Windows Server 2003 and also on computers running Microsoft Windows XP Professional. ADAM does not require the deployment of domains or domain controllers. You can run multiple instances of ADAM concurrently on a single computer, with an independently managed schema for each ADAM instance. This section explains configuration changes for using TCLINK LDAP Dirsync with Microsoft ADAM. Dirsync scope: Only dirsync scope 0 (= Domain level) is supported, as there is no Global Catalog with MS ADAM. Directory server: To avoid that dirsync contacts the nearest domain for information, configure the name of the directory server explicitly (registry value Dirsync\ADDCName) and disable the use of other directory servers (Dirsync\ADAllowOtherDC = 0). After changing from a different directory server, delete registry value Dirsync\ADBaseDN. Port number: ADAM instances can use non-standard port numbers for LDAP access. The port number must be configured manually in the new registry value Dirsync\ADPort. Default naming context: TC/LINK Active Directory Dirsync reads the default naming context property of the LDAP server. In a default MS ADAM instance, this property is not defined. You can define the default naming context in the MS ADAM directory or configure a fallback value in the TCLINK registry. Defining a default naming context in MS ADAM: Using the tool ADAM AdsiEdit, edit the attribute "msds-defaultnamingcontext" of the object "NTDS Settings" of the ADAM server instance (see screen shot below). TOPCALL International AG 18. March / 45
29 Set this attribute to the distinguished name of the application partition where the users are stored. Example: Defining a default naming context in TCLINK configuration: Use a registry editor to write the distinguished name of the application partition where the users reside into registry value Dirsync\ADDefaultNamingContext. User filter changes: Change registry value Dirsync\UserFilter. Probably, the ADAM users will not have an Exchange home server and will therefore not be found with the standard dirsync filter. To get all user objects, set the filter to: (&(objectclass=user)) TOPCALL International AG 18. March / 45
30 3. LDAP Dirsync with iplanet/netscape Directory Server 3.1 Background The iplanet, or former Netscape Directory Server is suitable to store any kind of information. It is optimised for read access operations and therefore especially for user-data that is supposed to be changed seldom but read frequently. The server provides access via the LDAP interface. Data is stored organised in object classes in a directory structure. Each object class requires and allows certain attributes Attributes Attributes hold information about a specific descriptive aspect of the entry. Each attribute consists of an attribute type and one or more attribute values. The attribute type identifies the class of information given by that attribute (for example, telephone number). The attribute value is the particular instance of information appearing in that entry (for example, ) Object Classes Object classes define the types of attributes an entry can contain. Most object classes define a set of required and optional attributes. This attribute list represents both required and allowed data that you can store on the entry. The iplanet/netscape Directory Server recognizes a standard list of object classes by default. These are described in the Netscape Schema Reference Guide. You can find it at the following location: Inheritance Object classes are meant to use inheritance to define the total list of attributes that are either required or allowed on the entry. This inheritance is defined in the form of an object class structure. The structure begins with objectclass top and proceeds through a series of object class definitions, each of which adds to the list of required or allowed attributes. An object class that is meant to be at a lower end of the structure should not be placed on an entry until all of that object class s antecedent object classes have also been defined on the entry. A typical and predefined class structure for a user entry is: objectclass: top objectclass: person objectclass: organizationalperson objectclass: inetorgperson objectclass top is what allows additional object classes to be placed on the entry. objectclass person defines two required attributes (commonname and surname), and then a few optional attributes. organizationalperson and inetorgperson, in turn, add more attributes to the list of optional attributes. Further, before you can put inetorgperson on the entry, you must first put object classes top, person, and organizationalperson on the entry Netscape Directory Schema If you find that the existing object class structure does not support every kind of information that you want to store in your directory, it is possible to extend the attributes and object classes. However, you should add new attributes only when you add new object classes. If you find that you need to add an attribute to a standard LDAP object class, then you should: Create the new attribute. Create a new object class. Define its parent object class to be the object class on which you wanted to add the attribute. Add the new attribute on the new object class. TOPCALL International AG 18. March / 45
31 3.1.5 Change Log Before a server can supply directory entries to consumer servers (as the TOPCALL server), you must configure a change log on the Directory Server. The change log is a special database maintained by the Directory Server that identifies the changes made to the server s primary directory tree IPlanet/Netscape Directory Server Manuals For detailed information of the iplanet/netscape Directory Server please read the following manuals. You can find them at Deployment Guide Managing Servers with Netscape Console Installation Guide Administrator's Guide Netscape Schema Reference 3.2 The Directory Synchronization Procedure Initially there is a Full Dirsync replicating the user store on the Directory Server to the TCOSS Server. From than on there are scheduled Update Dirsyncs to synchronize the changes on the Directory Server to the TCOSS Server Full Dirsync The Link reads the lastchangenumber entry before performing the initial Full Directory Synchronization. After the successful Full Dirsync the lastchangenumber is written to the registry of the Link-Server ( \TCLINKxx\Dirsync\PDLastChangeNumber). Directory Server Link Server lastchangenumber AddressStore (o=topcall.com) TC/Link-xx Processing Dirsync TCOSS lastchangenumber Changelog (cn=changelog) Registry: \TCLINKxx\Dirsync PDLastChangeNumber 1. TC/Link reads the attribute lastchangenumber from the Directory Server. 2. The AddressStore of the Directory is read (according to the configured search-base and filter), the address entries are written to the TCOSS Server. 3. After successful Full Dirsync the previously read value of the lastchangenumber attribute is written to the registry of the Link Server. If there were changes on the Directory, the changelog would have new entries (beyond the value written to PDLastChangeNumber) and these changes would be synchronized during the next Update Dirsync Update Dirsync For the succeeding regular Update Dirsyncs the registry-key PDLastChangeNumber is used to read the changelog from the last relevant position. After a successful Update Dirsync the key is updated. So the Link- Server registry-key PDLastChangeNumber is always the value of the last successfully updated changelog entry and marks where to start reading the changelog of the Directory Server for the next Update Dirsync. TOPCALL International AG 18. March / 45
32 Directory Server Link Server lastchangenumber AddressStore (o=topcall.com) 3. TC/Link-xx TCOSS Changelog (cn=changelog) 2. Processing Dirsync PDLastChangeNumber New PDLastChangeNumber Old entries New entries Registry: \TCLINKxx\Dirsync PDLastChangeNumber 1. PDLastChangeNumber (referring the last synchronized entry, either from Full or from Update Dirsync) is read from the Link Server registry. 2. Starting with PDLastChangeNumber the new entries of the changelog are read. 3. For each changelog entry the according AddressStore entries are read and the data is transferred via TC/Link to the TCOSS Server. 4. On successful Dirsync the registry key PDLastChangeNumber is updated and points again to the last synchronized entry Full Dirsync with PDLastChangeNumberName = NULL Additionally there is the possibility to disable the reading the lastchangenumber parameter. This is necessary for Directory Servers that do not maintain this attribute. For this there is the key PDLastChangeNumberName. If the key does not exist it is created with the default value lastchangenumber. During Full Dirsync an attribute of that name is searched in the root of the Directory Server. Full Dirsync is performed as described in If PDLastChangeNumber is set to NULL, the reading of the lastchangenumber attribute is omitted. Directory Server Link Server lastchangenumber AddressStore (o=topcall.com) 1. TC/Link-xx Processing Dirsync... TCOSS lastchangenumber Changelog (cn=changelog) Registry: \TCLINKxx\Dirsync PDLastChangeNumber 1. The AddressStore of the Directory is read (according to the configured search-base and filter), the address entries are written to the TCOSS Server. TOPCALL International AG 18. March / 45
33 2. The Link Server registry key PDLastChangeNumber is not changed. For that reason this key has to be set manually. Setting the key manually means that before starting Full Dirsync you have to find out the number of the last changelog entry on the Directory and set the key PDLastChangeNumber on the Link Server to that value. After that you can perform the Full Dirsync. The Update Dirsyncs will work as usual. 3.3 Functionality Dirsync uses LDAP to connect to an iplanet/netscape Directory Server and to retrieve user information from this server. TC/LINK updates the TCOSS user and recipient store accordingly TOPCALL Users and Recipients TC/Link s implementation of iplanet/netscape Directory dirsync supports two types of objects, as TCOSS knows two different types of address entries: users and recipients. By default inetorgperson objects are created as TCOSS users. But it is also possible to create a new user class object extended by some attributes and to configure dirsync to create TCOSS users from the newly defined class. For maximum compliance you can create two classes, representing users and recipients, and create TCOSS users and recipients accordingly from these classes. You can change the LDAP filter expressions used to retrieve users and recipients (registry keys UserFilter, RecipientFilter). The filter expressions must be in the LDAP search filter syntax defined in RFC Using Object Classes to Distinguish Between Users and Recipients By default all inetorgperson objects are used to create users. In the registry, only UserFilter holds a value, RecipientFilter is void: Dirsync\UserFilter (objectclass=inetorgperson) On the other hand you can inherit the inetorgperson object to the object classes TCUserClass and TCRecipientClass and configure them to be the source for the TCOSS user and recipient update: Dirsync\UserFilter Dirsync\RecipientFilter (objectclass=tcuserclass) (objectclass=tcrecipientclass) Using an Attribute to Distinguish Between Users and Recipients If you find it too difficult to define new object classes, you can also use any existing attribute to distinguish between TOPCALL users and recipients. If for example the predefined attribute description has either the value "tcuser" or "tcrecipient" and you want to update according to these values either TOPCALL users or recipients, you would configure in the registry: Dirsync\UserFilter Dirsync\RecipientFilter (&(objectclass=inetorgperson)(description=tcuser)) (&(objectclass=inetorgperson)(description=tcrecipient)) You can also define additional subsets according to the LDAP search filter syntax Using the Directory Server Command-line Utilities The Netscape Server Console can be used to view and edit the entries on the Directory Server. There are however command-line tools that are faster and more flexible to browse the entries on the Directory and that can be used to automate importing data to the Directory. For a detailed description of the tools please see the Administrator's Guide of the Directory Server. Here are a few examples how these tools can be used Using Ldapsearch for Verifying a Search-Filter TOPCALL International AG 18. March / 45
34 The following command returns the attributes and values dn (distinguished name, this attribute is always returned), cn (common name) and description of entries matching the search-base and the filter: ldapsearch -h pcms -D "uid=topcall,o=netscaperoot" -w "topcall" -b "o=topcall.com" (description=user) cn description > out.txt -h pcms specifies the name of the Directory Server -D "uid=topcall,o=netscaperoot" authenticates with the specified user-entry -w "topcall" the password of the user -b "o=topcall.com" the search-base (description=user) the search-filter cn description list of attributes for output > out.txt redirect of the output to the file out.txt The resulting file out.txt could look like the following example, if there are only four objects on that directory with the description "user". out.txt: dn: uid=arynes,o=topcall.co.at cn: Andreas Rynes description: user dn: uid=ataurok,o=topcall.co.at cn: Angelika Taurok description: user dn: uid=npoenisch,ou=spengergasse,o=topcall.co.at cn: Nik Poenisch description: user dn: uid=ckerschbaum,o=topcall.co.at cn: Christoph Kerschbaum description: user Using Ldapmodify for Writing Entries to the Directory Server This is an example for importing entries to the Directory Server. The root DN (cn=directory Manager) is used to authenticate. The parameter a defines the command as a add operation, -f lets you specify a file that provides the entries to be imported in LDIF (LDAP Data Interchange Format). Each added entry has to be separated by an empty line. ldapmodify -h pcms -D "cn=directory Manager" -w "topcall" -a -f import_statements.txt import_statements.txt: dn: uid=r1,o=topcall.com objectclass: top objectclass: person objectclass: organizationalperson objectclass: inetorgperson cn: r_cn1 sn: cn1 uid: r1 o: Topcall description: recipient dn: uid=else2,o=topcall.com objectclass: top objectclass: person objectclass: organizationalperson TOPCALL International AG 18. March / 45
35 objectclass: inetorgperson cn: else_cn2 sn: cn2 uid: else2 o: Topcall description: something else dn: uid=u3,o=topcall.com objectclass: top objectclass: person objectclass: organizationalperson objectclass: inetorgperson cn: u_cn3 sn: cn3 uid: u3 o: Topcall description: user Using Ldapdelete for Deleting Entries on the Directory Server Here is finally an example for deleting entries on the Directory Server. A file is used again to specify the entries to be deleted. The entries defining the users that should be deleted are the unique IDs, the dn. ldapdelete -h pcms -D "cn=directory Manager" -w "topcall" -f delete_statements.txt delete_statements.txt: uid=r1,o=topcall.com uid=else2,o=topcall.com uid=u3,o=topcall.com Extending the Netscape Directory Schema If you find that the existing object class structure does not support every kind of information that you want to store in your directory, you can extend it. Most likely this occurs when you find that you want to store more information on a person entry than the person, organizationalperson, or inetorgperson object classes support. For example, you might want to store TOPCALL Cost Center information in your directory. No attribute for this information exists within the standard Netscape Directory Server schema, so you may choose to create a new attribute called CostCenter and allow this attribute to be used on entries representing people. You should always look for an existing attribute that meets your needs before you extend your schema to include new attributes and object classes. If you want to distinguish between TCOSS users and recipients, you can create two new object classes inherited from the standard inetorgperson class. Existing object classes must not be changed. So if you want to add new attributes first create a new object class. If you find that you need to add an attribute to a standard LDAP object class, then you should: Create the new attribute. Create a new object class. Define its parent object class to be the object class on which you wanted to add the attribute. Add the new attribute on the new object class. Here follows a step-to-step guide what you have to do in detail using the Directory Server console: Creating Attributes 1. On the Directory Server Console, select the Configuration tab. 2. Select the Database icon in the navigation tree in the left pane. 3. Select the Schema folder and then select the Attributes tab in the right pane. 4. Click Create. The Create Attribute dialog box appears. 5. Enter a unique name for the attribute in the Attribute Name text box (no spaces allowed). TOPCALL International AG 18. March / 45
36 6. (Optional) Enter an object identifier for the attribute in the Attribute OID. 7. Select a syntax that describes the data to be held by the attribute from the Syntax pull-down menu. 8. Click OK Creating Object Classes and Adding Attributes You create an object class by giving it a unique name, selecting a parent object for the new object class, and adding required and optional attributes. To create an object class: 1. On the Directory Server Console, select the Configuration tab. 2. Select the Database icon in the navigation tree in the left pane. 3. Select the Schema folder and then select the Object Classes tab in the right pane. 4. Click Create. The Create Object Class dialog box appears. 5. Enter a unique name for the object class in the Name text box (no space and no underlines allowed). 6. (Optional) Enter an object identifier for the new object class in the OID 7. Select a parent object for the object class from the Parent pull-down menu. You can choose from any existing object class. 8. To add an attribute that must be present in entries using the new object class: highlight the attribute in the Available Attributes list and then click the Add button to the left of the Required Attributes box. You can either use the standard attributes or create new ones. 9. To add an attribute that may be present in entries using the new object class: highlight the attribute in the Available Attributes list and then click the Add button to the left of the Allowed Attributes box. 10. To delete an attribute that you previously added, highlight the attribute in the Required Attributes list or the Allowed Attributes list and then click the corresponding Remove button. 11. Click OK when you have finished identifying the new object class and the required and allowed attributes Requested Attributes The attributes exported for every object can be defined in Setup, and can be edited later via registry keys Dirsync\List00 to Dirsync\List99. You can use the Directory Server Console to see a list of all possible attributes of any class: 1. On the Directory Server Console, select the Configuration tab and in the folder Database select the Schema folder. 2. Select the Object Classes tab in the right pane. 3. In the Object Classes selection box, search the object class you want to see the attributes of and select it. Typically that will be the inetorgperson object class 4. On the right side you see now a complete list of all attributes, above the required and below the allowed ones. TOPCALL International AG 18. March / 45
37 Attributes that are part of the TOPCALL userid (as defined in the registry) need not be specified in Dirsync\Listxx. They are requested automatically Unique Identifier for the TCOSS User ID The unique name of an iplanet/netscape Directory entry is its distinguished name (dn). A save way to ensure a unique user ID on the TCOSS system is to use the dn as TCOSS UserID (configured during setup or later with registry key Dirsync/UserIDFormula = [dn]). That way you get user IDs that look something like uid=ms,ou=int,o=topcall.com. The other way is that there is another attribute or combination of attributes that are unique by definition Error Handling IPlanet/Netscape dirsync writes events to the application event log for the following errors: Number Text Parameter 5601 LDAP Error: %1; %2 LDAP Error number and description 5602 Syntax Error in Registry Parameter: %1 Name of Registry Parameter For more information see the trace file (C:\TCOSS\TRACE). For maximum trace-output set the general trace-level to 100 (Registry: HKLM\Software\TOPCALL\TCLINKxx\General\Tracelevel). A detailed error description of LDAP errors is accessible at Syntax errors in registry parameters (like missing brackets) are recognised in PDTreeBase, PDChangeLogBase and UserIDFormula during startup Configuration Dirsync options can be changed via a registry editor. All LDAP dirsync specific options are stored in a subkey Dirsync below the registry subkey of the link instance. Changing of the configuration becomes efficient only after restart of the process. TOPCALL International AG 18. March / 45
38 iplanet/netscape Directory Synchronization specific registry keys: Registry Key Type Default Description UserIDFormula SZ [dn] Formula for TOPCALL userid, can hold LDAP attribute names in [brackets]; Default is the distinguished name (dn) UserFilter SZ (objectclass=inet OrgPerson) LDAP filter for users; Default is a filter for the standard person objectclass inetorgperson RecipientFilter SZ LDAP filter for recipients PDHostname SZ Directory Name of the Directory Server PDTreeBase SZ o=topcall.com The search base for the root directory of the address store PDChangelogBase SZ cn=changelog The search base for the ChangeLog PDLastChangeNumber DWORD Used internally for reading the changelog during update dirsync; the last successfully synchronized change number is stored here PDLastChangeNumber Name SZ lastchangenumbe r Name of the attribute on the Directory that provides the number of the last changelog entry lastchangenumber default for the iplanet/netscape Directory NULL no value is read; in this case the key PDLastChangeNumber has to be set manually PDUserID SZ uid=topcall,o=nets caperoot Netscape Directory user with read permission; the Link needs that user to read changelog, address store and the root DSE (entry) of the Directory Server; for extensive reading (full dirsync, more than 5000 changelog entries at once) you may better use the root DN PDPassword SZ Password for Netscape Directory user Large Synchronization Operations For large synchronizations (reading more than 5000 entries from the directory) you have to consider the following things TCOSS Requirements The user store of the TCOSS server has to be configured to maintain the required number of user entries. Use the TCDISK utility program to change disk space and allowed number of user entries. There are also two entries in the common config parameters (sysconfig): In line 13, positions 5-8 the numbers of user and recipient entries are specified. In fact space for the TOPCALL user-id is reserved for that amount of entries, so for long user-ids as for the Directory Server distinguished names you should even configure more entries than you actual need. Keep also in mind that for every user entry a recipient entry is generated. For more information please see the TCOSS System and Config Manual Update Directory Synchronization For update operations, the changelog of the Directory Server is read from the last successful synchronization. If there are never more than the 5000 last changelog-entries to read, there will be no problems. There is a (not documented) restriction concerning reading the changelog of the Directory Server. A normal user can only read the last (or first) 5000 entries of the changelog. Only the root DN user (by default cn=directory Manager) has unlimited access to the changelog. So if you have to read more than the 5000 last entries at one time, use the root DN to authenticate the TC\LINK to the Directory Full Directory Synchronization Full dirsync starts with reading the last change number from the root DSE of the Directory Server. After that all entries matching the user filter are synchronized, then all entries matching the recipient filter. If any updates are executed in that time, they are probably not used for that synchronization process. However they get an entry in the changelog and are updated within the next update dirsync. For full dirsync you will most likely have to change the Directory Server Parameters or use the root DN (see chapter Directory Server Parameters) Importing more than 5000 Entries to the Directory Server at Once If you want to import a lot of entries at once (more than 5000) to the iplanet/netscape Directory Server you have either to use the root DN for the next update dirsync (to handle that many changelog entries) or you make a full dirsync afterwards (meaning, you have to change the Directory Server Parameters). TOPCALL International AG 18. March / 45
39 3.3.9 Support for the ISOCOR Directory Additionally to the iplanet/netscape Directory this version supports also the ISOCOR Directory Server. The following differing behaviors have to be considered The Lastchangenumber Server Attribute The iplanet/netscape Directory has a root entry called lastchangenumber. This entry is read before a full Dirsync, to know the point where to start the differential update Dirsync. The ISOCOR directory does not provide this entry. Therefore you have to find out the number of the last changelog entry manually before performing a full Dirsync and write it to the registry key of the TC/LINK-PD server. For the update Dirsyncs TC/LINK-PD will maintain this value. Additionally you have to the set the key defining the name of the lastchangenumber attribute to NULL. This defines that the attribute does not exist on the directory. Configuration for ISOCOR in registry HKLM\Software\TOPCALL\TCLINKxx\Dirsync Registry Key Type Set to: PDLastChangeNumber DWORD Number of last changelog entry on Directory PDLastChangeNumberName STRING NULL For detailed information on the Full and Update Dirsync procedure and the impact of the NULL configuration of PDLastChangeNumberName see section of this document The modrdn Changelog Entry If the distinguished name (DN) of an address store entry is changed, on both directories a modrdn changelog entry is created. This entry provides the attributes changenumber, changetype and the targetdn. Example of a modrdn changelog entry on iplanet/netscape Directory: dn: changenumber=120,cn=changelog changenumber: 120 changetype: modrdn targetdn: uid=ms,ou=development,o=topcall.co.at On an iplanet/netscape Directory such a modrdn entry is followed by a modify -entry. This entry states as the targetdn attribute the new DN of the changed address store entry. A modify -entry after a modrdn -entry on iplanet/netscape Directory: dn: changenumber=121,cn=changelog changenumber: 121 changetype: modify targetdn: uid=mschaub,ou=development,o=topcall.co.at On an ISOCOR Directory changelog this information is stored in one single entry. Additional to the targetdn attribute there is a newrdn and newsuperior attribute. The newsuperior attribute is not provided if only the first part of the DN (RDN) has changed. (Note: Also the iplanet/netscape changelog can look like that, but the additional attributes are not accessible via the LDAP-API.) Example of a modrdn changelog entry on ISOCOR Directory: dn: changenumber=128,cn=changelog changenumber: 120 changetype: modrdn targetdn: uid=ms,ou=development,o=topcall.co.at newrdn: uid=mschaub newsuperior: ou=development department,o=topcall.co.at If handling a modrdn changelog entry, TC/LINK-PD will try to read the newrdn attribute. When it is read successfully, the information from this entry is enough and the Dirsync operation can proceed. If the newrdn TOPCALL International AG 18. March / 45
40 attribute can t be read, the next changelog entry has to be a modify -entry, and this entry will replace the original entry on TOPCALL. If the next entry is no modify -entry the previous modrdn -entry is ignored. 3.4 Prerequisites General The general prerequisites for TC/LP installation apply. Netscape dirsync needs a standard dirsync (TC/DS) license Read Attributes of the Directory Server The following attributes are read from the Directory Server. You have to ensure that these entries are set correctly and accessible by the TC\LINK. Sub tree Attributes Needed for Root Entry lastchangenumber Read at initialization of full dirsync to know where to start the first update dirsync afterwards. Changelog changenumber, changetype, targetdn These attributes are read from the changelog at update dirsync to find the changed entries since last update or full dirsync. Address store dn, all in the registry demanded attributes The new or modified records are read at update dirsync, and all is read at full dirsync (according to the configured filter). Changelog and Address store are the sub trees as configured during setup and written to the registry ( \TCLINKxx\Dirsync\PDChangelogBase and PDTreeBase). The demanded attributes are also configured during setup and afterwards maintained in the registry ( \TCLINKxx\Dirsync\List01 to List99). 3.5 Installation Configuring iplanet/netscape Directory Server for TC Dirsync After installation of the iplanet/netscape Directory Server you will have to make decisions like how to organize your user store and which object classes and attributes to use. Please refer for those issues to the iplanet/netscape Directory Documentation. For TC Dirsync however you need to do the following basic operations: You need to know where to store user data. Only one root directory per TC/Link instance is possible. For example: o=topcall.com on a computer called planetdirectory. The complete LDAP path for TC/Link Setup (registry key PDTreeBase) would be: "LDAP://planetdirectory/o=topcall.com" You need to know how to store user data. The typical object class for storing user data is inetorgperson. Either you use this object class, or you create your own user object classes, typically inherited from inetorgperson. TCOSS distinguishes between users and recipients; so two different user classes can be used to update TOPCALL users and recipients. The change log has to be configured. The change log is part of the directory and typically gets the name cn=changelog. TC/Link needs a user and password for accessing the Directory Server. This user needs the rights to read, search and compare in the address store, the change log (in our example o=topcall.com and cn=changelog) and the root DSE (entry). If this is not a productive user, it is better not to create him in the scope of dirsync. That way the user will not be created on the TOPCALL Server. For an easy installation of iplanet/netscape dirsync the following steps are necessary: (We presume a Directory Server 4.11 and following parameters: Servername: planetdirectory; root address store dn: o=topcall.com; user object class: inetorgperson; changelog dn: cn=changelog; Directory User for TC/Link access: uid=topcall,o=netscaperoot) Starting the Directory Server Console 1. Start the Netscape Console 4.11 and log in as Directory Manager (cn=directory Manager). TOPCALL International AG 18. March / 45
41 2. In the left window, double click from the Server Group the Directory Server. The Directory Server Console appears Configuring the change log: 1. On the Directory Server Console, select the Configuration tab and then select the Replication Agreements folder. 2. Select the Supplier Settings tab in the right pane. 3. In the Changelog Database Directory text box, type the full path to the directory where you want the server to store the change log. This directory must be located on the supplier s local disk. If you want the directory server to suggest a pathname, click Use Default. 4. In the Changelog Suffix text box, enter a DN to be used as the change log s directory suffix. Typically, this suffix is: cn=changelog. 5. Either enter the maximum number of records you want the change log to record in the Max Changelog Records text box, or if you do not want to set a maximum number of entries for the change log, select Unlimited. TOPCALL International AG 18. March / 45
42 6. If you want the server to remove entries from the change log after they reach a certain age, specify that age in seconds, minutes, hours, days, or weeks in the Max Changelog Age fields. If you do not want to configure a maximum age, select Unlimited; the server will not remove entries from the change log due to their age. 7. Click Save. 8. Restart the directory server (Choose Restart in the Tasks tab). 9. Close the directory server console and open it again (Too my experience this step is also necessary, the views are not always refreshed automatically). After that you should see on the Directory Server Console, on the Directory tab in the left window the entry for the changelog Creating the User for Directory Access Before Dirsync can read from the Directory Server, the Link Server must be allowed to read the change log and the root directory. Therefore we create the user: uid=topcall,o=netscaperoot 1. On the Directory Server Console, select the Directory tab. 2. Right-click the entry NetscapeRoot in the left pane and select New User. The new entry will be created as a child entry of the NetscapeRoot entry. The Create New User box appears. 3. Provide the information for the new entry in the dialog box. You have to fill in the required fields. For the uid write topcall and set a password. 4. When you are finished defining the information for the entry, click OK Providing Access to Change Log, Address Store and Root DSE (Entry) The user topcall must be allowed to read change log and root directory. At the root level of your change log tree, create an ACI (Access Control Instruction) statement that grants the user topcall read, search, and compare access to the entire change log tree. The same has to be done for the root directory of the address store and the root DSE. (On a standard installation however there is by default anonymous access granted on the address store root, and no restrictions are set for the root DSE.) 1. On the Directory Server Console, select the Directory tab. TOPCALL International AG 18. March / 45
43 2. Right-click the entry in the navigation tree for which you want to set access control (cn=changelog), and select Set Access Permissions from the pop-up menu. The Multi-value ACI Selector dialog box appears. 3. Click New. The Set Access Permissions dialog box appears. The table lists the access control rules (ACRs) defined for this ACI. By default, the first ACR in the table denies access to everyone with the exception of the root DN (Directory Manager). We are going to change that line. 4. In the Allow/Deny column select allow. 5. Double click in the User text box. The select Users and Groups dialog box appears. 6. Click in the void text box beside the Add button and write "uid=topcall,o=netscaperoot" (without quotes, and take care, no blanks!). 7. Click Add. The line beyond is updated. 8. Click OK. The Set Access Permission dialog box is updated. 9. Double click in the Rights column. The Select Rights dialog appears. 10. Check the read, search and compare permissions, uncheck the rest. 11. Click OK. The Set Access Permission dialog is updated. 12. Click OK. The server creates the new ACI. 13. Now do the same again from step 2 for the root directory (o=topcall.com) and the root DSE (the topmost entry on the server) if the default settings are not sufficient. Take care with access permissions on the Directory Server. If there are any confusing configurations along the directory structure, the most restrictive permission is used! Directory Server Parameters The Directory Server Parameters restrict the number of entries returned at one request. But these restrictions do not confirm to the root DN user (by default cn=directory Manager). On the Directory Server Console you find these parameters on the configuration-tab. Mark on the left side the root entry and choose on the right the performance-tab to see the Server Parameters. TOPCALL International AG 18. March / 45
44 Mark on the left side database and choose on the right the performance-tab to see the Database Parameters. You can also directly edit the configuration files to change the parameter settings. The two files are named slapd.conf and slapd.ldbm.conf. The documentation states that the directory server has to be stopped for editing these files. For more detailed information on the server parameters see the Netscape/iPlanet Directory Server documentation Full Dirsync For full dirsync the whole directory has to be read in one single step. That means that the sizelimit and the lookthroughlimit parameter have to be set high enough to read all entries. Therefore it is recommended to do one of the following for a full dirsync: Either set both of the sizelimit and lookthroughlimit parameters to no limits. This is done by setting them to 1, Or use the root DN (by default cn=directory Manager) to authenticate TC/LINK to the Directory Server (HKLM\Software\TOPCALL\TCLINKxx\Dirsync\PDUserID, \PDPassword). After changing these settings you have to restart the link. TOPCALL International AG 18. March / 45
45 Update Dirsync For update dirsync there are no special recommendations for setting the Directory Server Parameters. But beside these parameters there seems to be a not documented restriction concerning the changelog. A normal user can read only the last 5000 entries of the changelog, no matter how the parameters are configured. Only the Directory Manager can read unlimited all entries of the changelog. So for the regular update dirsync, Either configure the time frequently enough to have never more than 5000 changelog entries, Or use the root DN (by default cn=directory Manager) to let TC/LINK read from the Directory Server (HKLM\Software\TOPCALL\TCLINKxx\Dirsync\PDUserID, \PDPassword). After changing these settings you have to restart the link TC/LINK iplanet/netscape Directory Dirsync Installation Please see the TC/LINK documentation for the general part of the Link installation, and chapter 1.6 of that manual for the previous setup-screens. Choose the iplanet/netscape Directory on the DirSync dialog box described there. It is not necessary to choose Configure Advanced Features on the Basic parameters dialog box iplanet/netscape Directory Configuration Name of iplanet/netscape Directory Server (registry: Dirsync\PDHostName): The name of the Directory Server that shall be synchronized is requested. Default: directory Address store search base (registry: Dirsync\PDTreeBase): Setup asks for the address store directory tree that shall be synchronized. Default: o=topcall.com Change log search base (registry: Dirsync\PDChangeLogBase): Setup asks for the change log directory that is used for storing the change log entries. Default: cn=changelog Formula for TOPCALL userid (registry: Dirsync\UserIDFormula): This mandatory input option defines how TC/LINK builds the TOPCALL userid of a shadow user. The userid can contain various iplanet/netscape Directory user attributes. In this input field, you can specify any combination of fixed text and attribute names in [brackets]. Default: [dn] iplanet/netscape Directory userid (registry: PDUserID): TOPCALL International AG 18. March / 45
46 A user is necessary for accessing the Directory Server. This user needs the rights to read, search and compare in the address store and the change log defined above, as well as for the root DSE (entry). For reading more than 5000 changelog entries it is necessary to use the root DN (by the default cn=directory Manager) here. If you do not want to change the Directory Server Parameters (see chapter ) for full dirsync, you have to use the root DN as well. Default: uid=topcall,o=netscaperoot iplanet/netscape Directory password (registry: PDPassword): Password for the user-id. Synchronize users (registry: Dirsync\UserExport): Choose if users shall be synchronized. See section for a definition of the term users. Default: checked User template (registry: Dirsync\UserTemplate): If users shall be synchronized, you can define here the default dirsync template for users. A user-specific template configured via "attribute holding template" can override this default template. Attention: If users are going to be synchronized, specify some existing template even if you use the attribute holding template. When users are deleted, the template attribute no longer exists, but some template is needed anyway! Default: PDUSER User filter (registry: Dirsync\UserFilter): The user filter defines which entries are regarded as users on the Directory Server. You can define any restrictions according to the LDAP search filter syntax (defined in RFC 2254). Default: (objectclass=inetorgperson) Synchronize recipients (registry: Dirsync\RecipientExport): Choose if recipients shall be synchronized. See section for a definition of the term recipients. Default: unchecked Recipient template (registry: Dirsync\RecipientTemplate): If recipients shall be synchronized, you can define here the default dirsync template for recipients. A recipient-specific template configured via "attribute holding template" can override this default template. Attention: If recipients are going to be synchronized, specify some existing template even if you use the attribute holding template. When recipients are deleted, the template attribute no longer exists, but some template is needed anyway! Default: PDRECIP TOPCALL International AG 18. March / 45
47 Recipient filter (registry: Dirsync\RecipientFilter): The recipient filter defines which entries are regarded as recipients on the Directory Server. You can define any restrictions according to the LDAP search filter syntax (defined in RFC 2254). Attribute holding template (registry: Dirsync\TemplateAttribute): Here you can specify an iplanet/netscape Directory attribute that holds the dirsync template name. If this attribute exists and is not empty for a user (or recipient), TC/LINK dirsync will interpret the attribute content as the dirsync template name for this object IPlanet/Netscape Directory: Attributes Use this setup page to define which iplanet/netscape Directory attributes are needed for dirsync. Setup allows defining up to 18 attributes as dirsync parameters (a second page is available). They are stored in the registry as Dirsync\List01 to Dirsync\List18. If more attributes are needed, they can be entered manually via the Windows NT registry editor (Dirsync\List19 etc.). The attribute defining the TOPCALL user name is requested automatically and need not be part of this list. In the sample user template on TOPCALL, the dirsync parameters can also be referenced via their sequential number, e.g. $1$ instead of $displayname$. Default: If iplanet/netscape Directory dirsync is installed for the first time, Setup configures a set of attributes corresponding to the PDUSER template installed by TC/LINK (see screen shot) First Time Installation Notes If iplanet/netscape Directory dirsync is installed for the first time, TC/LINK installs a dirsync template user PDUSER. If this is an upgrade and a dirsync template user already exists, it is not changed. After the first installation you are supposed to do a full dirsync operation (HKLM\Software\TOPCALL\TCLINKxx\Dirsync\Immediate=1). After full dirsync the directories are for the first time synchronized, and the key \PDLastChangeNumber is written the first time with the current change-number of the Directory Server. If there is no full dirsync at all, the PDLastChangeNumber is assumed to be 0, which would lead to an update dirsync starting with the very first changelog-entry. (If there is already a large changelog, this would lead the problems described in chapter ) TOPCALL International AG 18. March / 45
48 3.6 Troubleshooting Here are some typical errors written to the event-log and possible solutions: LDAP Error: 4; Sizelimit exceeded Please see chapter on Directory Server Parameters LDAP Error: 32; No such object Check if the search-base of the address-store is set correctly (HKLM\Software\TOPCALL\TCLINKxx\Dirsync\PDTreeBase) Check if user and recipient-filter are set correctly (HKLM\Software\TOPCALL\TCLINKxx\Dirsync\UserFilter and \RecipientFilter) LDAP Error: 49; Invalid credentials Check if user and password of the Directory are configured correctly on the link-server (registry keys HKLM\Software\TOPCALL\TCLINKxx\Dirsync\PDUserID and \PDPassword) Verify that the rights of that user are set correctly on the directory (see chapter ) Try if it works using the root DN (default: cn=directory Manager); this user has by definition the most possible rights LDAP Error: 91; Can't connect to the LDAP Server Check if the Directory Server is up and running Make sure there is a network connection (e.g. try to ping) Check if the registry key HKLM\Software\TOPCALL\TCLINKxx\Dirsync\PDHostName is configured correctly 3.7 Restrictions The computer name of the iplanet/netscape Directory Server and the root directory has to be specified in the registry key PDHostName. Multiple Directory Servers or multiple root directories can only be handled by multiple TC/Link instances. Most attributes of the Directory Server allow multiple values (e.g. more than one first name). Right now only the first value of each attribute is read and written to TCOSS (as defined with registry keys Dirsync\List01 to Dirsync\List99 and with the shadow user template). The changelog of the iplanet/netscape Directory Server has a (not documented) read-limit of 5000 entries. Therefore the system has to be configured that synchronisation is regular enough not to violate that limit. Alternatively the root DN (by default cn=directory Manager) can be used to read the changelog (registry keys Dirsync\PDUserID, Dirsync\PDPassword). No server limitations confirm to the Directory Manager. The password fields of iplanet cannot be used for synchronisation. Only the value read from the registry Userio\DefaultPassword is used as the TOPCALL user password. Do not use the predefined organizational units (Directory Administrators, Groups and People) of the Netscape Directory. From these groups you cannot delete users via Dirsync. This problem does not occur if you create new organizational units. 3.8 Hints The templates (user and recipient) are created during link-startup if they do not exist except the templates used in the attribute holding template. Attribute Holding Template (TemplateAttribute): You are allowed only to use this template (no User-template). If you add a user, everything is ok, but you cannot delete a user if there is no default user-template defined. If you tried to delete a user without having a default user-template (e.g. PDUSER) defined, then you only can delete this user after the attempt with "usertemplate="user and "fulldirsyncdeletes=1" and "immediate=1" AND "user belongs to" has to be the same as in the usertemplate. Furthermore: If you specify a templateattribute, then this attribute also has to exist in the Listxx-fields. PDUSER: If user is created automatically, "User belongs to" is by default "TCFI" - independent of the used link. 3.9 Possible future Enhancements Using LDIF (LDAP Data Interchange Format) files to update TOPCALL entries. TOPCALL International AG 18. March / 45
WINDOWS 2000 Training Division, NIC
WINDOWS 2000 Active TE Directory Services WINDOWS 2000 Training Division, NIC Active Directory Stores information about objects on the network and makes this information easy for administrators and users
LDAP Directory Integration with Cisco Unity Connection
CHAPTER 6 LDAP Directory Integration with Cisco Unity Connection The Lightweight Directory Access Protocol (LDAP) provides applications like Cisco Unity Connection with a standard method for accessing
Deploying ModusGate with Exchange Server. (Version 4.0+)
Deploying ModusGate with Exchange Server (Version 4.0+) Active Directory and LDAP: Overview... 3 ModusGate/Exchange Server Deployment Strategies... 4 Basic Requirements for ModusGate & Exchange Server
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
Cryoserver Archive Lotus Notes Configuration
Lotus Notes Configuration Version 1.0 December 2007 Forensic & Compliance Systems Ltd +44 (0)800 280 0525 [email protected] www.cryoserver.com Contents INTRODUCTION... 3 SMTP ROUTING TO CRYOSERVER...
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Customer Tips. Basic E-mail Configuration and Troubleshooting. for the user. Overview. Basic Configuration. Xerox Multifunction Devices.
Xerox Multifunction Devices Customer Tips November 24, 2003 This document applies to these Xerox products: x WC Pro 32/40 Color x WC Pro 65/75/90 x WC Pro 35/45/55 WC M35/M45/M55 x DC 555/545/535 x DC
Secure Email for MFPConnect. Manual Version 2.05.00 Edition 1
Secure Email for MFPConnect Manual Version 2.05.00 Edition 1 TABLE OF CONTENTS 1. Introduction... 3 1.1 System Overview... 3 1.2 Benefits... 4 2. Administration Section... 5 2.1 Configuration... 5 2.1.1
Forests, trees, and domains
Active Directory is a directory service used to store information about the network resources across a. An Active Directory (AD) structure is a hierarchical framework of objects. The objects fall into
Security Provider Integration LDAP Server
Security Provider Integration LDAP Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Planning LDAP Integration with EMC Documentum Content Server and Frequently Asked Questions
EMC Documentum Content Server and Frequently Asked Questions Applied Technology Abstract This white paper details various aspects of planning LDAP synchronization with EMC Documentum Content Server. This
Module 1: Introduction to Active Directory Infrastructure
Module 1: Introduction to Active Directory Infrastructure Contents Overview 1 Lesson: The Architecture of Active Directory 2 Lesson: How Active Directory Works 10 Lesson: Examining Active Directory 19
Password Management Guide
www.novell.com/documentation Management Guide Identity Manager 4.0.2 June 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Novell Identity Manager
Password Management Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 June 05, 2009 www.novell.com Identity Manager 3.6.1 Password Management Guide Legal Notices Novell, Inc. makes no representations
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
Technology Primer. OPS Manager, Release 7.4. Integrating Your Directory Server with our Directory Service Solution
Technology Primer OPS Manager, Release 7.4 Integrating Your Directory Server with our Directory Service Solution The Mitel Integrated Directory Services (IDS) application synchronizes the telephone directory
User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1
The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)
IIS SECURE ACCESS FILTER 1.3
OTP SERVER INTEGRATION MODULE IIS SECURE ACCESS FILTER 1.3 Copyright, NordicEdge, 2006 www.nordicedge.se Copyright, 2006, Nordic Edge AB Page 1 of 14 1 Introduction 1.1 Overview Nordic Edge One Time Password
Installation and Configuration Guide
Installation and Configuration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124827386 Contents Overview: BlackBerry Enterprise Service
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
Troubleshooting Active Directory Server
Proven Practice Troubleshooting Active Directory Server Product(s): IBM Cognos Series 7 Area of Interest: Security Troubleshooting Active Directory Server 2 Copyright Copyright 2008 Cognos ULC (formerly
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Simple Scan to Email Setup Guide
Simple Scan to Email Setup Guide Document Centre 555/545/535 Dc04cc0336 Scan to Email Scanning to email from a Xerox DC 555/545/535 requires the support of external email services on a network. These services
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
Chapter 3: Building Your Active Directory Structure Objectives
Chapter 3: Building Your Active Directory Structure Page 1 of 46 Chapter 3: Building Your Active Directory Structure Objectives Now that you have had an introduction to the concepts of Active Directory
Terms you ll need to understand:
14 Managing Servers............................................... Terms you ll need to understand: Transaction logging Activity logging Policy documents Administrator access Network names Directory deployment
Installation and Configuration Guide
www.novell.com/documentation Installation and Configuration Guide GroupWise Coexistence Solution for Exchange November 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect
Hansoft LDAP Integration
Hansoft LDAP Integration The Hansoft LDAP Integration synchronizes Hansoft resources to user accounts in an LDAP directory server, such as Windows Active Directory. It matches accounts on login names and
Step-by-Step Guide to Active Directory Bulk Import and Export
Page 1 of 12 TechNet Home > Windows Server TechCenter > Identity and Directory Services > Active Directory > Step By Step Step-by-Step Guide to Active Directory Bulk Import and Export Published: September
Agency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
Contents CHAPTER 1 IMail Utilities
Contents CHAPTER 1 IMail Utilities CHAPTER 2 Collaboration Duplicate Entry Remover... 2 CHAPTER 3 Disk Space Usage Reporter... 3 CHAPTER 4 Forward Finder... 4 CHAPTER 5 IMAP Copy Utility... 5 About IMAP
ShoreTel Active Directory Import Application
INSTALLATION & USER GUIDE ShoreTel Active Directory Import Application ShoreTel Professional Services Introduction The ShoreTel Active Directory Import Application allows customers to centralize and streamline
Active Directory LDAP Quota and Admin account authentication and management
Active Directory LDAP Quota and Admin account authentication and management Version 4.1 Updated July 2014 GoPrint Systems 2014 GoPrint Systems, Inc, All rights reserved. One Annabel Lane, Suite 105 San
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
LockoutGuard v1.2 Documentation
LockoutGuard v1.2 Documentation (The following graphics are screen shots from Microsoft ISA Server and Threat Management Gateway which are the property of Microsoft Corp. and are included here for instructive
Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.
Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): C54x, C73x, C746, C748, C792, C925, C950, E260, E360, E46x, T65x, W850, X264, X36x, X46x, X543, X544, X546, X548,
Ultimus and Microsoft Active Directory
Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: [email protected]
HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2
HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
Administrator s Guide
MAPILab Disclaimers for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4
Email Integration for Open Text Fax Appliance and Open Text Fax Appliance, Premier Edition
Email Integration for Open Text Fax Appliance and Open Text Fax Appliance, Premier Edition Open Text Fax and Document Distribution Group October 2009 2 White Paper Contents Introduction...3 Who Should
ms-help://ms.technet.2005mar.1033/enu_kbntrelease/ntrelease/308406.htm
Page 1 of 12 Knowledge Base FRS Event Log Error Codes PSS ID Number: 308406 Article Last Modified on 10/13/2004 The information in this article applies to: Microsoft Windows 2000 Server Microsoft Windows
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
McAfee One Time Password
McAfee One Time Password Integration Module Outlook Web App 2010 Module version: 1.3.1 Document revision: 1.3.1 Date: Feb 12, 2014 Table of Contents Integration Module Overview... 3 Prerequisites and System
Terminal Services Tools and Settings - Terminal Services: %PRODUCT%
Page 1 of 10 Terminal Services Tools and Settings In this section Terminal Services Tools Terminal Services Registry Entries Terminal Services Group Policy Settings Terminal Services WMI Classes Network
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): MS911de, MX910de, MX911, MX912, XM9145, XM9155, XM9165, CS310, CS410, CS510, CX310, CX410, CX510, M1140, M1145,
TSM Studio Server User Guide 2.9.0.0
TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
PingFederate. IWA Integration Kit. User Guide. Version 3.0
PingFederate IWA Integration Kit Version 3.0 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate IWA Integration Kit User Guide Version 3.0 April, 2012 Ping Identity Corporation
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
How to install Small Business Server 2003 in an existing Active
Page 1 of 6 How to install Small Business Server 2003 in an existing Active Directory domain INTRODUCTION This article describes how to install a Microsoft Windows Small Business Server (SBS) 2003-based
Administrator Quick Start Guide
Administrator Quick Start Guide - Index 1. Cloud Email Firewall Introduction 2. Licensing model 3. Initial Cloud Email Firewall configuration 3.1 Cloud Email Firewall Inbound email filtering 3.1.1 Domain
User Management Resource Administrator. Managing LDAP directory services with UMRA
User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains
ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains Microsoft Corporation Published: July 2008 Authors: Moon Majumdar, Brad Mahugh Editors: Jim Becker, Fran Tooke Abstract This guide
Microsoft Virtual Labs. Active Directory New User Interface
Microsoft Virtual Labs Active Directory New User Interface 2 Active Directory New User Interface Table of Contents Active Directory New User Interface... 3 Exercise 1 User Management and Saved Queries...4
Cisco TelePresence Management Suite Extension for Microsoft Exchange
Cisco TelePresence Management Suite Extension for Microsoft Exchange Installation Guide Software version 2.3 D14846.03 August 2013 Contents Introduction 4 End user guidance 4 Server requirements 5 Exchange
Installing GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
ms-help://ms.technet.2004jul.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/reskit/distsys/part1/dsgch06.htm
Page 1 of 32 Windows 2000 Server Chapter 6 - Active Directory Replication Active Directory, the directory service that is included with Microsoft Windows 2000, is a distributed directory service. Objects
Step By Step Guide: Demonstrate DirectAccess in a Test Lab
Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008
Using Avaya Aura Messaging
Using Avaya Aura Messaging Release 6.3.2 Issue 1 December 2014 Contents Chapter 1: Getting Started... 4 Messaging overview... 4 Prerequisites... 4 Accessing your mailbox from any phone... 4 Accessing the
The following gives an overview of LDAP from a user's perspective.
LDAP stands for Lightweight Directory Access Protocol, which is a client-server protocol for accessing a directory service. LDAP is a directory service protocol that runs over TCP/IP. The nitty-gritty
ILTA 2013 - HAND 6B. Upgrading and Deploying. Windows Server 2012. In the Legal Environment
ILTA 2013 - HAND 6B Upgrading and Deploying Windows Server 2012 In the Legal Environment Table of Contents Purpose of This Lab... 3 Lab Environment... 3 Presenter... 3 Exercise 1 Add Roles and Features...
9. Which is the command used to remove active directory from a domain controller? Answer: Dcpromo /forceremoval
1. What is Active Directory schema? Answer: The schema is the Active Directory component that defines all the objects and attributes that the directory service uses to store data. 2. What is global catalog
Windows Server 2003 Active Directory: Perspective
Mary I. Hubley, MaryAnn Richardson Technology Overview 25 September 2003 Windows Server 2003 Active Directory: Perspective Summary The Windows Server 2003 Active Directory lies at the core of the Windows
Windows.NET Beta 3 Active Directory New Features
Windows.NET Beta 3 Active Directory New Features Wolfgang Werner Compaq Decus Bonn 2002 Agenda Install Replica from Media Domain Controller Rename Domain Rename Universal Group Membership Caching Linked
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
Active Directory. Learning Objective. Active Directory
(November 19, 2015) Abdou Illia, Fall 2015 1 Learning Objective Use concepts Namespace DNS Global Catalog Schema Class Tree Forest Organizational Units 2 AD = A Central Database on a Domain Controller
Empowered by Innovation. Setting Up and Using Fax Mail. P/N 1770087 July 2006 Printed in U.S.A.
Empowered by Innovation Setting Up and Using Fax Mail P/N 1770087 July 2006 Printed in U.S.A. This manual has been developed by NEC Unified Solutions, Inc. It is intended for the use of its customers and
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
Symantec Endpoint Encryption Full Disk
Symantec Endpoint Encryption Full Disk Installation Guide Version 7.0 Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
E-mail Listeners. E-mail Formats. Free Form. Formatted
E-mail Listeners 6 E-mail Formats You use the E-mail Listeners application to receive and process Service Requests and other types of tickets through e-mail in the form of e-mail messages. Using E- mail
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Enabling single sign-on for Cognos 8/10 with Active Directory
Enabling single sign-on for Cognos 8/10 with Active Directory Overview QueryVision Note: Overview This document pulls together information from a number of QueryVision and IBM/Cognos material that are
Cisco TelePresence Management Suite Extension for Microsoft Exchange
Cisco TelePresence Management Suite Extension for Microsoft Exchange Installation Guide D14846.01 June 2011 Software version 2.3 Contents Introduction 5 End user guidance 5 Server requirements 6 Exchange
Symantec Endpoint Encryption Full Disk
Symantec Endpoint Encryption Full Disk Policy Administrator Guide Version 8.0.1 Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks
PingFederate. IWA Integration Kit. User Guide. Version 2.6
PingFederate IWA Integration Kit Version 2.6 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate IWA Integration Kit User Guide Version 2.6 March, 2012 Ping Identity Corporation
Vector HelpDesk - Administrator s Guide
Vector HelpDesk - Administrator s Guide Vector HelpDesk - Administrator s Guide Configuring and Maintaining Vector HelpDesk version 5.6 Vector HelpDesk - Administrator s Guide Copyright Vector Networks
Using DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Windows Server
Active Directory Rights Management Service Integration Guide
Active Directory Rights Management Service Integration Guide Preface Preface 2013 SafeNet, Inc. All rights reserved. Part Number: 007-011230-001 (Rev F, 07/2013) All intellectual property is protected
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
The Win32 Network Management APIs
The Win32 Network Management APIs What do we have in this session? Intro Run-Time Requirements What's New in Network Management? Windows 7 Windows Server 2003 Windows XP Network Management Function Groups
Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services About this Course This five-day instructor-led course provides to teach Active Directory Technology Specialists
NetWrix Server Configuration Monitor
NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW
Installing GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in
Installation and Administration Guide
Installation and Administration Guide BlackBerry Enterprise Transporter for BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-11-06 SWD-20141106165936643 Contents What is BES12?... 6 Key features
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
Modular Messaging. Release 4.0 Service Pack 4. Whitepaper: Support for Active Directory and Exchange 2007 running on Windows Server 2008 platforms.
Modular Messaging Release 4.0 Service Pack 4 Whitepaper: Support for Active Directory and Exchange 2007 running on Windows Server 2008 platforms. April 2009 2006-2009 Avaya Inc. All Rights Reserved. Notice
Troubleshooting problems with the PDMWorks Enterprise database server
Troubleshooting problems with the PDMWorks Enterprise database server The PDMWorks Enterprise database server is a helper service that periodically polls any PDMWorks Enterprise databases on the SQL server
Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide
Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
GFI Product Guide. GFI MailArchiver Archive Assistant
GFI Product Guide GFI MailArchiver Archive Assistant The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
Installation and Configuration Manual
Beacon Office Installation and Configuration Manual Version - 2.5(1) Radianta Inc. September 2008 Radianta, Inc. Beacon Office Page 2 Table of Contents Introduction... 4 What is Beacon Office... 4 How
