How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide

Similar documents
Budget Control by Cost Center

How To Configure MDM to Work with Oracle ASM-Based Products

User Experience in Custom Apps

USDL XG WP3 SAP use case. Kay Kadner

SAP Business ByDesign Reference Systems. Scenario Outline. SAP ERP Integration Scenarios

Accounts Receivable. SAP Best Practices

Intelligent Business Operations Chapter 1: Overview & Strategy

OData in a Nutshell. August 2011 INTERNAL

TM111. ERP Integration for Order Management (Shipper Specific) COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)

SAP Master Data Governance- Hiding fields in the change request User Interface

SOP through Long Term Planning Transfer to LIS/PIS/Capacity. SAP Best Practices

How To... Migrate Custom Portal Applications to SAP NetWeaver 7.3

RUN BETTER Become a Best-Run Business with Remote Support Platform for SAP Business One

SAP Service Tools for Performance Analysis

Installation Guide Customized Installation of SQL Server 2008 for an SAP System with SQL4SAP.VBS

SAP Central Process Scheduling (CPS) 8.0 by Redwood

SAPFIN. Overview of SAP ERP Financials COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)

Production Subcontracting (External Processing) SAP Best Practices

HR400 SAP ERP HCM Payroll Configuration

How to Schedule Report Execution and Mailing

Business One in Action - How can we post bank fees and charges while posting Incoming or Outgoing Payment transactions?

Maintaining Different Addresses and Ids for a Business Partner via CRM Web UI

Unified Service Description Language Enabling the Internet of Services

Integrating Easy Document Management System in SAP DMS

Alert Notification in SAP Supply Network Collaboration. SNC Extension Guide

Matthias Steiner SAP. SAP HANA Cloud Platform A guided tour

Next Generation Digital Banking with SAP

Ariba Network Integration to SAP ECC

NetWeaver Business Client (NWBC) for Incentives and Commissions Management (ICM)

How to Configure and Trouble Shoot Notification for Process Control 2.5

AC200. Basics of Customizing for Financial Accounting: General Ledger, Accounts Receivable, Accounts Payable COURSE OUTLINE

Data Archiving in CRM: a Brief Overview

R/3 and J2EE Setup for Digital Signature on Form 16 in HR Systems

Download and Install Crystal Reports for Eclipse via the Eclipse Software Update Manager

Process Archiving using NetWeaver Business Process Management

Table of Contents. How to Find Database Index usage per ABAP Report and Creating an Index

Integration of SAP Netweaver User Management with LDAP

Sending Additional Files from SAP Netweaver PI to third Party System

Log Analysis Tool for SAP NetWeaver AS Java

Application Lifecycle Management

How To Improve Your Business Process With Sap

Understanding HR Schema and PCR with an Example

Configuring Distribution List in Compliant User Provisioning

Enterprise Software - Applications, Technologies and Programming

Third Party Digital Asset Management Integration

UI Framework Logo exchange without skin copy. SAP Enhancement Package 1 for SAP CRM 7.0

How to Create a Support Message in SAP Service Marketplace

SAP Business One for iphone and ipad. Version 1.5.x January 2012

AC 10.0 Centralized Emergency Access

How to Set Up an Authorization for a Business Partner in Customer Relationship Management (CRM) Internet Sales: Sample Case

3 rd party Service Desk interface

How To... Call BEx Web Applications from SAP BusinessObjects Dashboards (Xcelsius) and vice versa

How to Add an Attribute to a Case, Record and a Document in NW Folder Management (ex-records Management)

Finding the Leak Access Logging for Sensitive Data. SAP Product Management Security

Single Sign-On between SAP Portal and SuccessFactors

Installation Checklist

Business Requirements... 3 Analytics... 3 Typical Use Cases... 8 Related Content... 9 Copyright... 10

Compliant, Business-Driven Identity Management using. SAP NetWeaver Identity Management and SBOP Access Control. February 2010

K in Identify the differences between the universe design tool and the information design tool

Fixed Asset in SAP Business One 9.0

Sales Rush Sales Order Processing S01- Lean Baseline Package. SAP Lean Baseline Package Version: V1.500 Country: UK Language: EN Date: February 2006

UI Framework Simple Search in CRM WebClient based on NetWeaver Enterprise Search (ABAP) SAP Enhancement Package 1 for SAP CRM 7.0

How to configure BusinessObjects Enterprise with Citrix Presentation Server 4.0

Performance Best Practices Guide for SAP NetWeaver Portal 7.3

Implementing Outlook Integration for SAP Business One

CREATING A PURCHASE ORDER STORE RECORD WEB SERVICE

Secure MobiLink Synchronization using Microsoft IIS and the MobiLink Redirector

AC 10.0 Customizing Workflows for Access Management

GRC 10.0 Pre-Installation

Data Source Enhancement Using User Exit

Integration of Universal Worklist into Microsoft Office SharePoint

Sample Universe on Microsoft OLAP Cube

SAP Best Practices Account and Contact Management (C66) Business Process Documentation

Configuring Single Sign-on for SAP HANA

Ten reasons small and midsize enterprises (SMEs) choose SAP to help transform their business. Copyright/Trademark

Portfolio and Project Management 5.0: Excel Integration for Financial and Capacity Planning

AC 10.0 Business Role Management

Mass Maintenance of Procurement Data in SAP

ERP Quotation and Sales Order in CRM WebClient UI Detailed View. SAP Enhancement Package 1 for SAP CRM 7.0 CRM Sales - SFA

Migration Guide Remote Support Component 1.0 to SAP Solution Manager 7.1. Target Audience System Administrators Technology Consultants

SAP NetWeaver BRM 7.3

How To Use the BPC Mass User Management Tool in BPC 10.0 NW

Consume an External Web Service in a Nutshell with good old ABAP

BICS Connectivity for Web Intelligence in SAP BI 4.0. John Mrozek / AGS December 01, 2011

Xcelsius Dashboards on SAP NetWaver BW Implementation Best Practices

UI Framework Task Based User Interface. SAP Enhancement Package 1 for SAP CRM 7.0

SAP GRC Access Control: Background jobs for risk analysis and remediation (formerly Virsa Compliance Calibrator)

Ten reasons to step up to the cloud with SAP Business ByDesign. Copyright/Trademark

Integrate Third Party Collaboration Tools in the SAP NetWeaver Portal. SAP NetWeaver Product Management

Ronald Bueck SBO Product Definition

Run SAP like a Factory

BW362. SAP BW powered by SAP HANA COURSE OUTLINE. Course Version: 10 Course Duration: 5 Day(s)

September 10-13, 2012 Orlando, Florida. Step-by-step guidelines for building an information governance strategy

Backup & Restore with SAP BPC (MS SQL 2005)

Variable Exit in Sap BI How to Start

BW Workspaces Use Cases

How To... Integrate Custom Formulas into the Formula Builder

Analyzing Sales Data for Choosing Forecast Strategies

Methodology to Implement SAP Process Integration

Extract Archived Data from SAP ERP

Transcription:

SAP How-to Guide Mobile Device Management SAP Afaria How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide Applicable Releases: SAP Afaria 7 SP3 HotFix 06, SAP Afaria 7 SP4 Version 2.0 December 2013

Copyright 2013 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft, Windows, Excel, Outlook, and PowerPoint are registered trademarks of Microsoft Corporation. IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x, System z, System z10, System z9, z10, z9, iseries, pseries, xseries, zseries, eserver, z/vm, z/os, i5/os, S/390, OS/390, OS/400, AS/400, S/390 Parallel Enterprise Server, PowerVM, Power Architecture, POWER6+, POWER6, POWER5+, POWER5, POWER, OpenPower, PowerPC, BatchPipes, BladeCenter, System Storage, GPFS, HACMP, RETAIN, DB2 Connect, RACF, Redbooks, OS/2, Parallel Sysplex, MVS/ESA, AIX, Intelligent Miner, WebSphere, Netfinity, Tivoli and Informix are trademarks or registered trademarks of IBM Corporation. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Oracle is a registered trademark of Oracle Corporation. UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group. Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or registered trademarks of Citrix Systems, Inc. HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C, World Wide Web Consortium, Massachusetts Institute of Technology. Java is a registered trademark of Sun Microsystems, Inc. JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape. SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects Software Ltd. Business Objects is an SAP company. Sybase and Adaptive Server, ianywhere, Sybase 365, SQL Anywhere, and other Sybase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Sybase, Inc. Sybase is an SAP company. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. The information in this document is proprietary to SAP. No part of this document may be reproduced, copied, or transmitted in any form or for any purpose without the express prior written permission of SAP AG. This document is a preliminary version and not subject to your license agreement or any other agreement with SAP. This document contains only intended strategies, developments, and functionalities of the SAP product and is not intended to be binding upon SAP to any particular course of business, product strategy, and/or development. Please note that this document is subject to change and may be changed by SAP at any time without notice. SAP assumes no responsibility for errors or omissions in this document. SAP does not warrant the accuracy or completeness of the information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. SAP shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials. This limitation shall not apply in cases of intent or gross negligence. The statutory liability for personal injury and defective products is not affected. SAP has no control over the information that you may access through the use of hot links contained in these materials and does not endorse your use of third-party Web pages nor provide any warranty whatsoever relating to third-party Web pages. SAP How-to Guides are intended to simplify the product implementtation. While specific product features and procedures typically are explained in a practical business context, it is not implied that those features and procedures are the only approach in solving a specific business problem using SAP Afaria. Should you wish to receive additional information, clarification or support, please refer to SAP Consulting. Any software coding and/or code lines / strings ( Code ) included in this documentation are only examples and are not intended to be used in a productive system environment. The Code is only intended better explain and visualize the syntax and phrasing rules of certain coding. SAP does not warrant the correctness and completeness of the Code given herein, and SAP shall not be liable for errors or damages caused by the usage of the Code, except if such damages were caused by SAP intentionally or grossly negligent. Disclaimer Some components of this product are based on Java. Any code change in these components may cause unpredictable and severe malfunctions and is therefore expressively prohibited, as is any decompilation of these components. Any Java Source Code delivered with this product is only to be used by SAP s Support Services and may not be modified or altered in any way.

Document History Document Version Description 1.0 First official release 2.0 Updated to include information about Exchange 2010 and 2013

Typographic Conventions Type Style Example Text Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons labels, menu names, menu paths, and menu options. Cross-references to other documentation Icons Icon Description Caution Note or Important Example Recommendation or Tip Example text Example text Example text <Example text> EXAMPLE TEXT Emphasized words or phrases in body text, graphic titles, and table titles File and directory names and their paths, messages, names of variables and parameters, source text, and names of installation, upgrade and database tools. User entry texts. These are words or characters that you enter in the system exactly as they appear in the documentation. Variable user entry. Angle brackets indicate that you replace these words and characters with appropriate entries to make entries in the system. Keys on the keyboard, for example, F2 or ENTER.

Table of Contents 1. About This Document... 1 2. Business Scenario... 1 3. Prerequisites... 1 4. Supported Devices... 1 5. Access Control Requirements for Exchange PowerShell Cmdlets... 1 6. Finding Current Exchange ActiveSync Setting in Office 365... 2 7. Finding Current Access State of Device in Office 365... 3 8. Finding Current Exchange ActiveSync Settings for Exchange 2010... 4 9. Finding Current Exchange ActiveSync Settings for Exchange 2013... 5 10. Finding the Current Access State of Device... 5 11. Setting Up Access Control for Email using Exchange PowerShell Cmdlets... 7

1. About This Document This document discusses how to configure access control for local or hosted Microsoft Exchange using Exchange PowerShell cmdlets. 2. Business Scenario Use Exchange API (a.k.a Exchange PowerShell cmdlets) to control email access for the mobile devices under management in these following scenarios: When a device comes under management, add it to the "Allow" list. Exchange will allow it to get email. If a device is found to be out of compliance, add it to the "Blocked" list. Exchange will prevent it from getting email. When a device comes back into compliance, remove it from the "Blocked" list. Exchange allows it to get email again. 3. Prerequisites Install Afaria 7 SP3 release Hotfix 6. Ensure that Access Control for E-mail component is not installed. 4. Supported Devices PowerShell Exchange Cmdlets is supported only for Android, ios, Windows Mobile Professional, Windows Mobile Standard, and Windows Phone 8 devices. For more information, see the Afaria 7 System Requirements document of the required service pack that is available on the Sybase Mobile Enterprise Technical Support Web site. 5. Access Control Requirements for Exchange PowerShell Cmdlets For the Afaria Access Control for Email feature, you can use a cmdlet. This implementation uses Exchange PowerShell commands for controlling device access for email. Component Local Email Server Description Access Control for Email supports Microsoft Exchange Server 2010 and Microsoft Exchange Server 2013. December 2013 1

Hosted Email Microsoft Office 365 PowerShell Host Server Microsoft PowerShell Version 2.0 The PowerShell virtual directory is created when you install Exchange. Enable the powershell remoting by enabling Basic Authentication on the virtual directory in IIS. 6. Finding Current Exchange ActiveSync Setting in Office 365 1. Login to office 365 using admin credentials. 2. Click mobile and click edit. December 2013 2

7. Finding Current Access State of Device in Office 365 Note: This is applicable for local Cmdlets implementation also. 1. Login to the 365 user account you have configured in device. 2. Click on Settings. Now, click Options. 3. Click phone and then select your device. Click on Edit. December 2013 3

8. Finding Current Exchange ActiveSync Settings for Exchange 2010 1. Enter the URL https://<your exchange server>/ecp/ on the Web browser. 2. Login using admin credentials. 3. Click Phone & Voice and click edit. December 2013 4

9. Finding Current Exchange ActiveSync Settings for Exchange 2013 1. Enter the URL https://<your exchange server>/ecp/on the Web browser. 2. Login using admin credentials. 3. Click Mobile and click edit. 10. Finding the Current Access State of Device 1. Login to the user account you have configured in device (URL:https://<your exchange server>/owa/. 2. Select Options > See all options. December 2013 5

3. Click phone and then select your device. Click Details. December 2013 6

11. Setting Up Access Control for Email using Exchange PowerShell Cmdlets Afaria server must reflect the settings of 365 server or local Exchange server. Set up access control for local or hosted email by configuring Office 365 (Microsoft Exchange 2010 or 2013 that uses Exchange 2010 or 2013 PowerShell cmdlets respectively). Prerequisites Ensure that the Access Control for Email filter is not installed. The PowerShell virtual directory is created when you install Exchange. Enable the PowerShell remoting by enabling Basic Authentication on the virtual directory in IIS. Task E-mail services are available locally, where a local Exchange server is used. E-mail services are also hosted by a third-party and are available to users from the Internet, without any e-mail servers or related Afaria components inside the enterprise network or DMZ. Afaria server communicates with Exchange 365 for updating device status. Note: Configure access control for local email by either using the Exchange 2010 PowerShell cmdlets or by installing the Access Control for Email filter. If you have installed the filter, then do not follow this procedure. Also, these settings are tenant-specific. 1. Log in to the Afaria Administrator Web console. 2. Navigate to the Server > Configuration > MS Exchange 365 page. Note: In Afaria 7 SP4 release, the page name is changed to Server > Configuration > MS Exchange page. Devices with ISAPI account and MS Exchange 365 account cannot co-exist in a tenant as this configuration is not supported. Ensure that this page is empty if the tenant is supposed to be used for local exchange. 3. Click New. 4. Enter the following information: URL Enter the URL of the hosted or local Exchange server. Account Username Enter the hosted or local Exchange Admin User ID. Create a user that is a member of the Exchange Organization Managers group so that the user will have minimum permission to execute PowerShell commands. Password Enter the hosted or local Exchange Admin password. Note: Ensure that MS Exchange 365 account credentials have Administrator privileges. December 2013 7

5. Click Test MS Exchange 365 connection to authenticate the account credentials and test connectivity for the local Exchange or hosted accounts. If the account credentials are valid, you see a success message; otherwise, you see an error message. Note: In Afaria 7 SP4 release, the link name is changed to Test connection. 6. Click Save. When Exchange 365 triggers e-mail blocking using access control, it may take as long as 10 minutes for Exchange 365 to block e-mail messages. 7. To specify local or hosted service's Exchange ActiveSync Access Settings, select one of: Always allow allow users who have enrolled in Afaria management to access hosted or local MS Exchange 365. Always block or quarantine prevent all users who are not enrolled in Afaria management from accessing hosted or local MS Exchange 365. Note: 8. Click Save. Afaria sends a device enablement message when it is enrolled in the Always allow mode for enhanced security. 9. (Optional) Change or delete a record by selecting it and clicking Edit or Delete. After a device is enrolled in Afaria, it will use the access policy that is set for the device. December 2013 8

December 2013 9

www.sap.com/contactsap www.sdn.sap.com/irj/sdn/howtoguides