Table Of Contents
Configuring Access to Exchange Calendars and Contacts for Personal Call Transfer Rules
Creating the AD Service Account That Cisco Unity Connection Uses to Access Exchange Data
Granting Exchange Permissions to the AD Service Account
Creating and Installing SSL Certificates
Creating Connection External Services to Specify the Exchange Servers That Users Can Access
Configuring the Cisco Unity Connection Server to Trust Exchange Certificates
Configuring Exchange to Require Secure Communication with Cisco Unity Connection (Optional But Recommended)
Synchronizing the Clock on the Cisco Unity Connection Server with the Clock on a Domain Controller
Configuring Access to Exchange Calendars and Contacts for Personal Call Transfer Rules
In this chapter you configure Exchange and Cisco Unity Connection so users can create personal call transfer rules using Exchange calendar and contact information. This allows Connection users to create rules based on who is calling and on the appointments in their calendars. When you are finished with this chapter, return to "Overview of Mandatory Tasks for Installing a Cisco Unity Connection 1.x System."
Note that you will also need to confirm—and, if necessary, modify—a class-of-service setting, and create an external service account for each Connection user who is allowed to base personal call transfer rules on Exchange calendar and contact information. You will be directed to the applicable documentation later in the overview task list.
Note The tasks in the list reference detailed instructions in the Cisco Unity Connection Installation Guide and in other Cisco Unity Connection documentation. Follow the documentation for a successful installation.
This chapter contains the following sections:
•Creating the AD Service Account That Cisco Unity Connection Uses to Access Exchange Data
•Granting Exchange Permissions to the AD Service Account
•Creating and Installing SSL Certificates
•Creating Connection External Services to Specify the Exchange Servers That Users Can Access
•Configuring the Cisco Unity Connection Server to Trust Exchange Certificates
•Configuring Exchange to Require Secure Communication with Cisco Unity Connection (Optional But Recommended)
•Synchronizing the Clock on the Cisco Unity Connection Server with the Clock on a Domain Controller
Creating the AD Service Account That Cisco Unity Connection Uses to Access Exchange Data
Cisco Unity Connection accesses Exchange calendar and contact data by using an Active Directory account that acts as a proxy for Connection. Do the following procedure to create the service account.
To Create the AD Service Account That Cisco Unity Connection Uses to Access Exchange Data
Step 1 On a server on which Active Directory Users and Computers is installed, log on to Windows by using an account that has the right to create new users.
Step 2 On the Windows Start menu, click Programs > Microsoft Exchange > Active Directory Users and Computers or click Programs > Administrative Tools > Active Directory Users and Computers.
Step 3 In the left pane, expand the domain in which you want to create the account, right-click Users or the organizational unit where you want to create the account, and click New > User.
Step 4 Follow the on-screen prompts to create the service account, choosing the following options:
•When you choose password options, choose the option that prevents the password from expiring. If the password expires, Connection will stop working the next time the server is restarted.
•Do not create an Exchange mailbox.
Step 5 Close Active Directory Users and Computers.
Granting Exchange Permissions to the AD Service Account
To enable the Active Directory service account to access Exchange data, you delegate Exchange View Only Administrator control to the account, and you grant the account Administer Information Store, Send As, and Receive As permissions.
You can delegate control either at the organization level or at the administrative group level. If you delegate control at the administrative group level, you must delegate control in every administrative group that contains the following mailstores:
•An Exchange mailstore from which you want Connection users to be able to import contacts.
•An Exchange mailstore in which you want Connection to be able to access Exchange calendar data.
To Grant Exchange Permissions to the Service Account
Step 1 On a server on which Exchange System Manager is installed, log on to Windows by using an account that is an Exchange Full Administrator.
Step 2 On the Windows Start menu, click Programs > Microsoft Exchange > System Manager.
Step 3 In the left pane of Exchange System Manager, right-click either the organization name at the top of the tree control or an administrative group that contains mailstores in which you want to access calendar and contact data, and click Delegate Control.
Step 4 On the Welcome to the Exchange Administration Delegation Wizard page, click Next.
Step 5 In the Users or Groups dialog box, click Add.
Step 6 In the Delegate Control dialog box, click Browse.
Step 7 Specify the service account name, depending on the Exchange version:
Exchange 2003
|
a. In the Select Users, Computers, or Groups dialog box, in the Enter the Object Name to Select field, enter the user logon name for the account created in "To Create the AD Service Account That Cisco Unity Connection Uses to Access Exchange Data" procedure.
b. Click Check Names.
c. Click OK to close the Select Users, Computers, or Groups dialog box. The account you selected appears in the Group (Recommended) or User box.
|
Exchange 2000
|
a. In the Select Users, Computers, or Groups dialog box, in the Look In list, click the name of the domain in which you created the account in the "To Create the AD Service Account That Cisco Unity Connection Uses to Access Exchange Data" procedure.
b. In the list of users, computers, and groups, double-click the name of the service account.
The Delegate Control dialog box reappears. The account you selected appears in the Group (Recommended) or User box.
|
Step 8 In the Role list, click Exchange View Only Administrator.
Step 9 Click OK to close the Delegate Control dialog box.
Step 10 Click Next.
Step 11 Click Finish.
Step 12 If you selected the organization name at the top of the tree control in Step 3, skip to Step 13.
If you selected an administrative group in Step 3 and you want to access calendar and contact data in mailstores in other administrative groups, repeat Step 3 through Step 11 for each administrative group.
Step 13 In the left pane of Exchange System Manager, right-click the name of a mailbox store that contains mailboxes in which you want to access calendar and contact data, and click Properties.
Step 14 In the <Server name> Properties dialog box, click the Security tab.
Step 15 Click Add.
Step 16 Specify the service account name, depending on the Exchange version:
Exchange 2003
|
a. In the Select Users, Computers, or Groups dialog box, in the Enter the Object Names to Select field, enter the name of the service account.
b. Click Check Names.
|
Exchange 2000
|
a. In the Select Users, Computers, or Groups dialog box, in the Look In list, click the name of the domain in which you created the service account.
b. In the list of users, computers, and groups, double-click the name of the service account.
The Delegate Control dialog box reappears. The account you selected appears in the Group (Recommended) or User box.
|
Step 17 Click OK to close the dialog box.
Step 18 In the Mailbox Store <Server name> Properties dialog box, in the Group or User Names list, click the name of the service account.
Step 19 In the Permissions For <Account name> list, in the Allow column, check the following three check boxes:
•Administer Information Store
•Receive As
•Send As
Do not change any other permissions.
Step 20 Click OK to close the Mailbox Store <Server name> Properties dialog box.
Step 21 Repeat Step 13 through Step 20 for each additional Exchange server on which you want to access Exchange data.
Step 22 Close Exchange System Manager.
Creating and Installing SSL Certificates
In this section, you create and install an SSL certificate on each Exchange server on which you want to access calendar and contact data. This prevents Connection from sending the credentials of the service account that you created in the "Creating the AD Service Account That Cisco Unity Connection Uses to Access Exchange Data" section over the network as unencrypted text. It also prevents Exchange from sending calendar and contact data over the network in unencrypted text.
If you do not create and install SSL certificates, Connection may still send service account credentials in an encrypted format, depending on whether you have configured one or more authentication schemes in Exchange. However, the available Exchange authentication schemes encrypt only the user name and password, not calendar and contact data, and Exchange documentation indicates that the available schemes provide varying degrees of security. We recommend that you create and install SSL certificates.
Caution Cisco Unity Connection does not support Passport authentication.
If you use another method to create and install certificates, use the applicable documentation.
This section contains four procedures. Do them in the order listed.
Do the following procedure on any server in the same domain as the Exchange servers that contain calendar and contact data that you want Connection users to be able to access.
To Install the Microsoft Certificate Services Component
Step 1 Locate either a Windows Server 2003 disc or the Cisco Unity Connection disc, which you may be prompted to insert into the DVD drive to complete the installation of the Microsoft Certificate Services component.
Step 2 Log on to Windows by using an account that is a member of the local Administrators group.
Step 3 On the Windows Start menu, click Settings > Control Panel > Add or Remove Programs.
Step 4 In the left pane of the Add or Remove Programs control panel, click Add/Remove Windows Components.
Step 5 In the Windows Components dialog box, check the Certificate Services check box. Do not change any other items.
Step 6 When the warning appears about not being able to rename the computer or to change domain membership, click Yes.
Step 7 Click Next.
Step 8 On the CA Type page, click Stand-alone Root CA, and click Next. (A stand-alone certification authority (CA) is a CA that does not require Active Directory.)
Step 9 On the CA Identifying Information page, in the Common Name for This CA field, enter a name for the certification authority.
Step 10 Accept the default value in the Distinguished Name Suffix field.
Step 11 For Validity Period, accept the default value of 5 years.
Step 12 Click Next.
Step 13 On the Certificate Database Settings page, click Next to accept the default values.
If a message appears indicating that Internet Information Services is running on the computer and must be stopped before proceeding, click Yes to stop the services.
Step 14 If you are prompted to insert the Windows Server 2003 disc into the drive, insert either the Cisco Unity Connection disc, which contains the same required software, or a Windows Server 2003 disc.
Step 15 In the Completing the Windows Components Wizard dialog box, click Finish.
Step 16 Close the Add or Remove Programs control panel.
Do the following procedure on each Exchange server that contains calendar and contact data that you want Connection users to be able to access.
To Create a Certificate Signing Request
Step 1 Log on to Windows by using an account that is a member of the Domain Admins group.
Step 2 On the Windows Start menu, click Programs > Administrative Tools > Internet Information Services (IIS) Manager.
Step 3 If the server is running Exchange Server 2003, on the Windows Start menu, click Programs > Administrative Tools > Internet Information Services (IIS) Manager.
If the server is running Exchange 2000 Server, on the Windows Start menu, click Programs > Administrative Tools > Internet Services Manager.
Step 4 In the left pane of Internet Information Services, expand the name of this Exchange server.
Step 5 If the server is running Exchange 2000 Server, skip to Step 6.
If the server is running Exchange Server 2003, expand Web Sites.
Step 6 Right-click Default Web Site, and click Properties.
Step 7 In the Default Web Site Properties dialog box, click the Directory Security tab.
Step 8 Under Secure Communications, click Server Certificate.
Step 9 On the Welcome to the Web Server Certificate Wizard page, click Next.
Step 10 Click Create a New Certificate.
Step 11 Click Next.
Step 12 Click Prepare the Request Now, But Send It Later.
Step 13 Click Next.
Step 14 Enter a name for the certificate, and accept the default bit length.
Step 15 Click Next.
Step 16 Enter the organization information.
Step 17 Click Next.
Step 18 For the common name of the site, enter either the computer name or the fully qualified domain name of the Exchange server.
Remember whether you specified the computer name or the fully qualified domain name. You will need this information in a later procedure.
Caution The name must exactly match the host portion of any URL that will access the system by using a secure connection.
Step 19 Click Next.
Step 20 On the Geographical Information page, enter the applicable information.
Step 21 Click Next.
Step 22 On the Certificate Request File Name page, enter a path and file name, and write down the information. You will need it in a later procedure.
If this is not the server on which you installed Microsoft Certificate Services in the "To Install the Microsoft Certificate Services Component" procedure, try to choose a network location that you can access from the current server and from the server on which Microsoft Certificate Services is installed.
Step 23 Click Next.
Step 24 On the Request File Summary page, verify the request file information.
Step 25 Click Next.
Step 26 On the Completing the Web Server Certificate Wizard page, click Finish.
Step 27 Click OK to close the Default Web Site Properties dialog box.
Step 28 Close Internet Information Services Manager.
Step 29 If Microsoft Certificate Services is on another server and you were not able to save the certificate request file in a network location accessible to that server, copy the certificate request file to a removable medium (diskette, CD, or DVD).
Step 30 Repeat Step 1 through Step 29 to create a certificate signing request for each additional Exchange server that contains calendar and contact data that you want Connection users to be able to access.
Step 31 If you are not using an external certification authority, you are finished with this procedure.
If you are using an external certification authority, send the certificate request files to the CA. When the certificates return from the CA, skip to the "To Install the Certificate" procedure.
Do the following procedure for each Exchange server that contains calendar and contact data that you want Connection users to be able to access.
To Issue the Certificate (Only When You Are Using Microsoft Certificate Services to Issue the Certificate)
Step 1 On the server on which you installed Microsoft Certificate Services, log on to Windows by using an account that is a member of the Domain Admins group.
Step 2 On the Windows Start menu, click Programs > Administrative Tools > Certification Authority.
Step 3 In the left pane, expand Certification Authority (Local) > <Certification authority name>, where <Certification authority name> is the name that you gave to the certification authority when you installed Microsoft Certificate Services in the "To Install the Microsoft Certificate Services Component" procedure.
Step 4 Right-click the name of the certification authority, and click All Tasks > Submit New Request.
Step 5 In the Open Request File dialog box, browse to the location of the first certificate signing request file that you created in the "To Create a Certificate Signing Request" procedure, and double-click the file.
Step 6 In the left pane of Certification Authority, click Pending Requests.
Step 7 Right-click the pending request that you submitted in Step 5, and click All Tasks > Issue.
Step 8 In the left pane of Certification Authority, click Issued Certificates.
Step 9 Right-click the new certificate, and click Open.
Step 10 In the Certificate dialog box, click the Details tab.
Step 11 Click Copy to File.
Step 12 On the Welcome to the Certificate Export Wizard page, click Next.
Step 13 On the Export File Format page, click Base-64 Encoded X.509 (.CER).
Step 14 Click Next.
Step 15 On the File to Export page, click Browse.
Step 16 In the Save As dialog box, choose a location and enter a file name.
If this is not a server on which Internet Information Services Manager is installed, try to choose a network location that you can access from the current server and from the server on which Microsoft Certificate Services is installed.
Step 17 Write down the path and file name. You will need it in a later procedure.
Step 18 Click Save to close the Save As dialog box.
Step 19 Click Next.
Step 20 On the Completing the Certificate Export Wizard page, click Finish.
Step 21 Click OK to clear the message that indicates that the export was successful.
Step 22 Click OK to close the Certificate dialog box.
Step 23 If you created more than one certificate signing request in the "To Create a Certificate Signing Request" procedure, repeat Step 9 through Step 22 for each certificate signing request listed under Issued Certificates.
Step 24 Close Certification Authority.
Step 25 If Internet Information Services Manager is on another server and you were not able to save the certificate request files in a network location accessible to that server, copy the certificate request files to a removable medium (diskette, CD, or DVD).
Do the following procedure for every Exchange server that contains calendar and contact data that you want Connection users to be able to access.
To Install the Certificate
Step 1 On one of the Exchange servers on which you created a certificate signing request in the "To Create a Certificate Signing Request" procedure, log on to Windows by using an account that is a member of the Domain Admins group.
Step 2 On the Windows Start menu, click Programs > Administrative Tools > Internet Information Services Manager.
Step 3 In the left pane, expand the name of this Exchange server.
Step 4 Right-click Default Web Site, and click Properties.
Step 5 In the Default Web Site Properties dialog box, click the Directory Security tab.
Step 6 Under Secure Communications, click Server Certificate.
Step 7 On the Web Server Certificate Wizard Welcome page, click Next.
Step 8 On the Pending Certificate Request page, click Process the Pending Request and Install the Certificate.
Step 9 Click Next.
Step 10 On the Process a Pending Request page, browse to the location where you saved the certificates, and specify the applicable file, depending on the CA that you used:
You may have to change the value of the Files of Type list to All Files (*.*) to see the certificates.
Step 11 On the Certificate Summary page, verify the certificate information.
Step 12 Click Next.
Step 13 On the Completing the Web Server Certificate Wizard page, click Finish to exit the Web Server Certificate wizard.
Step 14 Click OK to close the Default Web Site Properties dialog box.
Step 15 Restart IIS:
a. In the left pane of Internet Information Services Manager, right-click the name of this Exchange server, and click Restart IIS.
b. In the Stop/Start/Restart dialog box, click Restart Internet Services on <Server name>.
c. Click OK.
d. Close Internet Information Services Manager.
Step 16 Repeat Step 1 through Step 15 for each certificate that you want to install.
Creating Connection External Services to Specify the Exchange Servers That Users Can Access
In Cisco Unity Connection Administration, you create and configure one WebDav external service for each Exchange server that contains calendar and contact data that you want Connection users to be able to access.
To Create Connection External Services to Specify the Exchange Servers That Users Can Access
Step 1 In Cisco Unity Connection Administration, expand System Settings, then click External Services.
Step 2 Click Add New.
Step 3 In the Type list, click WebDav Service.
Step 4 In the Display Name field, enter a name that will help you identify the service when you configure Connection users to access their calendar and contact information. (For example, in the name of the service, you might include the name of the Exchange server that contains the calendar and contact data users are accessing.)
Step 5 In the Server Base URL field, enter the URL for the Exchange server that contains calendar and contact data that you want Connection users to be able to access. Use the format https://<Exchange server>/Exchange/ where <Exchange server> is the computer name, the fully qualified domain name, or the IP address of the Exchange server.
If you enter the computer name or the fully qualified domain name of the Exchange server, the value that you enter for <Exchange server> must exactly match the value that you entered in Step 18 of the "To Create a Certificate Signing Request" procedure.
Step 6 Confirm that the Access Enabled check box is checked.
Step 7 In the Service Login field, enter the Active Directory user logon name of the service account that you created in the "To Create the AD Service Account That Cisco Unity Connection Uses to Access Exchange Data" procedure. Use the format <Domain name>\<Account name>.
Note the back slash (\) between <Domain name> and <Account name>. If you use a forward slash (/), the WebDav service will not work.
Step 8 In the Service Password field, enter the password for the service account.
Step 9 Click Save.
Step 10 If you have created external services for all of the Exchange servers that you want to allow users to access, skip the rest of this procedure.
If you want users to be able to access additional Exchange servers, on the External Service menu, click New External Service.
Step 11 Repeat Step 3 through Step 10 until you have created all of the required external services.
Configuring the Cisco Unity Connection Server to Trust Exchange Certificates
To make the Cisco Unity Connection server trust the certificates for the Exchange servers, you need to add the certification authority's signing certificate to the root certificate store for the Connection server.
To Configure the Cisco Unity Connection Server to Trust Exchange Certificates
Step 1 On the server on which you installed certification authority, log on to Windows by using an account that is a member of the local Administrators group.
Step 2 On the Windows Start menu, click Programs > Administrative Tools > Certification Authority.
Step 3 In the left pane, expand Certification Authority (Local).
Step 4 Right-click the name of the certification authority, and click Properties.
Step 5 In the <Certification authority name> Properties dialog box, on the General tab, in the CA Certificates list, click the name of one of the certificates that you created for the Exchange servers.
Step 6 Click View Certificate.
Step 7 In the Certificate dialog box, click the Details tab.
Step 8 Click Copy to File.
Step 9 On the Welcome to the Certificate Export Wizard page, click Next.
Step 10 On the Export File Format page, click Base-64 Encoded X.509 (.CER).
Step 11 Click Next.
Step 12 On the File to Export page, enter a temporary path and file name of the certificate export file (for example, c:\cacert.cer).
Step 13 Click Next.
Step 14 On the Completing the Certificate Export Wizard page, click Finish.
Step 15 Click OK to close the "Export successful" message box.
Step 16 Click OK to close the Certificate dialog box.
Step 17 Click OK to close the <Server name> Properties dialog box.
Step 18 Close Certification Authority.
Step 19 Copy the certificate export file that you specified in Step 12 to the Connection server, and save it in the Utilities directory on the drive where Connection software is installed (usually drive G).
Step 20 On the Windows Start menu, click Programs > Accessories > Command Prompt.
Step 21 Change to the Utilities directory.
Step 22 Run the following command, where <Certificate export file.cer> is the name of the certificate export file that you created in Step 12:
certmgr /add /c <certificate export file.cer> /r localMachine /s root
Note that the name of the application is certmgr, not CuCertMgr, which is in the same directory.
Configuring Exchange to Require Secure Communication with Cisco Unity Connection (Optional But Recommended)
Several of the procedures earlier in this chapter help to secure, by encryption, the calendar and contact data that is transferred from Exchange to Cisco Unity Connection. However, if you specified an http URL instead of an https URL when you did the procedure in the "Creating Connection External Services to Specify the Exchange Servers That Users Can Access" section, the data is not encrypted before it is sent over the network.
Do the following procedure on each Exchange server so that if a Connection administrator accidentally specifies an http URL when updating the list of Exchange servers that users can access, any attempt to transfer unencrypted Exchange data will fail. However, note that this is a global setting. For every Exchange server on which you have done this procedure, all web clients that access Exchange data on that server will be required to use an https URL.
To Configure Exchange to Require Secure Communication with Cisco Unity Connection (Optional But Recommended)
Step 1 Confirm that no other applications will be affected when Internet Information Services is configured to require Web clients to use https URLs to access Exchange data.
Step 2 Log on to an Exchange server that contains mailboxes from which Connection users want to import calendars or contacts.
Step 3 If the server is running Exchange Server 2003, on the Windows Start menu, click Programs > Administrative Tools > Internet Information Services (IIS) Manager.
If the server is running Exchange 2000 Server, on the Windows Start menu, click Programs > Administrative Tools > Internet Services Manager.
Step 4 In the left pane of Internet Information Services, expand the name of this Exchange server.
Step 5 If the server is running Exchange 2000 Server, skip to Step 6.
If the server is running Exchange Server 2003, expand Web Sites.
Step 6 Right-click Default Web Site, and click Properties.
Step 7 In the Default Web Site Properties dialog box, click the Directory Security tab.
Step 8 Under Secure Communications, click Edit.
Step 9 In the Secure Communications dialog box, check the Require Secure Channel (SSL) check box.
Step 10 Click OK to close the Secure Communications dialog box.
Step 11 Click OK to close the Default Web Site Properties dialog box.
Step 12 Close Internet Information Services.
Step 13 If you are prompted to turn on this setting for child nodes, select the child nodes on which you want to enable this setting and click OK.
Step 14 Repeat Step 1 through Step 13 on each Exchange server that contains mailboxes from which Cisco Unity Connection users want to import calendar or contact data.
Synchronizing the Clock on the Cisco Unity Connection Server with the Clock on a Domain Controller
Personal call transfer rules that are based on calendar data require that the system clocks be synchronized for the Cisco Unity Connection server and all of the Exchange servers on which Connection is accessing calendar data.
If you already have a method for synchronizing system clocks, synchronize the clock on the Connection server by using the same method. If not, do the procedure in this section to configure the Connection server and all of the Exchange servers on which Connection is accessing calendar data to synchronize the system clock with the system clock on a domain controller.
Caution If the time on the Connection server does not match the time on Exchange servers on which calendar data is being accessed, personal call transfer rules that are based on calendar data will route calls incorrectly.
To Synchronize the Clock on the Cisco Unity Connection Server with the Clock on a Domain Controller
Step 1 With the IT manager, determine the domain controller with which you should synchronize system clocks.
Step 2 On the Connection server, log on to Windows by using an account that is a member of the local Administrators group
Step 3 On the Windows Start menu, click Programs > Administrative Tools > Services.
Step 4 In the right pane of the Services MMC, find the Windows Time service.
Step 5 If the value of the Status column is Started and the value of the Startup Type column is Automatic, skip to Step 10.
If the values are different, in the right pane, double-click the Windows Time service.
Step 6 In the Windows Time Properties dialog box, if Startup Type is not Automatic, change it to Automatic.
Step 7 If the service is stopped, click Start.
Step 8 Click OK to close the Windows Time Properties dialog box.
Step 9 Close the Services MMC.
Step 10 On the Windows Start menu, click Programs > Accessories > Command Prompt.
Step 11 On the Connection server and all other servers running Windows Server 2003, run the following command:
net time /setsntp:<domain_controller_name>
Step 12 On any Exchange servers running Windows 2000 Server, run the following five commands:
net stop w32time
net time /setsntp:<domain_controller_name>
w32tm -v
w32tm -s
net start w32time
Step 13 Close the Command Prompt window.
Step 14 Repeat Step 2 through Step 13 on each Exchange server on which Connection will access calendar data.