MIIS 2003 GAL Synchronization Step by Step
MIIS 2003 GAL Synchronization Step by Step
Microsoft Corporation Published: March, 2005 Author: Dave Kreitler Editor: Justin Hall
Abstract
This walkthrough demonstrates an implementation of the Microsoft Identity Integration Server (MIIS) 2003 global address list synchronization solution between two forests. You create the two Active Directory forests, install Microsoft Exchange Server 2003, create a global address list (GAL) for each forest, and then use MIIS 2003 to create a GAL synchronization infrastructure to synchronize the global address lists between the two forests.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. 2005 Microsoft Corporation. All rights reserved. Active Directory, Microsoft, MS-DOS, Visual Studio, Windows, and Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Contents
MIIS 2003 Walkthrough: Implementing Global Address List Synchronization....................1 Abstract.......................................................................................................................1 Contents.............................................................................................................................3 MIIS 2003 Walkthrough: Implementing Global Address List Synchronization....................5 What This Walkthrough Covers......................................................................................5 Prerequisite Knowledge...............................................................................................6 Audience..................................................................................................................6 Time Requirements..................................................................................................6 Additional Resources...............................................................................................7 Walkthrough Scenario Description..............................................................................7 The Testing Environment.........................................................................................7 Hardware.................................................................................................................8 Software...................................................................................................................8 Setup Files...............................................................................................................9 Sample Data................................................................................................................9 Active Directory Organizational Unit Structure.......................................................10 Metaverse Schema Extensions..............................................................................13 Walkthrough Steps....................................................................................................14 Implementing the Walkthrough.....................................................................................14 Creating the Management Agents.............................................................................15 Creating the Contoso GALMA................................................................................15 Creating the Fabrikam GALMA..............................................................................19 Running the Management Agents.............................................................................22 Using Management Agent Run Profiles.................................................................22 Running the Run Profiles and Enabling Provisioning.............................................24 Verifying the Results..............................................................................................28 Administering the GAL Synchronization Infrastructure..............................................29 Hide a Mailbox from the Exchange Address Book.................................................29 Display a Hidden Mailbox in the Exchange Address Book.....................................31 Delete a User Account...........................................................................................32 Delete a Synchronized Contact in the Target Forest..............................................32 Delete a Mailbox in the Source Forest...................................................................33 Optional: Configure GALSync for Live Communications Server...................................34 Configuration Requirements......................................................................................35
Implementing the LCS Configuration............................................................................35 Select the Central Forest...........................................................................................36 Extend Metaverse Schema.......................................................................................36 Configure a One-way trust from the Central Forest...................................................38 Configure the Management Agent for the Central Forest..........................................40 Configure Management Agent for the Non-Central Forests.......................................42 Synchronize the Live Communications Attributes......................................................44 Verifying Successful Synchronization........................................................................45 Summary......................................................................................................................46 See Also........................................................................................................................46 Appendix A: GAL Sync Lab Setup and Requirements......................................................46 Hardware Requirements...............................................................................................47 Set Up the Contoso Forest Computer...........................................................................48 Configure the DNS Server............................................................................................48 Set Up the Fabrikam Forest Computer.........................................................................48 Create the Scenario Folder...........................................................................................49 Populating and Configuring Active Directory Objects....................................................49 Configure the E-mail Environment................................................................................53 Configure the Mail Addresses in Exchange Server 2003...........................................53 Create Exchange Mailboxes for the Active Directory User Accounts.........................54
Set up the lab environment, where you install and configure Active Directory and Exchange Server 2003. Create two instances of the management agent for Active Directory global address list (GAL). The metaverse schema is extended when you create the first management agent. Run the management agents. Administer the GAL synchronization infrastructure.
The goal of a GAL synchronization solution is to synchronize users, groups, and contacts from one forest with contact objects in another forest. This walkthrough provides step-bystep procedures to demonstrate a GAL synchronization solution between two fictitious organizations. Before you set up a GAL synchronization solution in your own environment, read Microsoft Identity Integration Server 2003 Global Address List (GAL) Synchronization. That document outlines the design of the GAL synchronization solution, including the rules and preconfigured values of the management agent for Active Directory global address list (GAL), and the deployment and extension of a GAL synchronization infrastructure.
rudimentary scenario to help new users get acquainted with how the GAL data flows through MIIS. The following topics are not discussed in this document: Precedence Deprovisioning and Object Deletion
Prerequisite Knowledge
Following are some suggestions regarding the intended audience and time required to complete this walkthrough.
Audience
This walkthrough is intended for administrators who are familiar with the use of a global address list and are familiar with using MIIS 2003 to synchronize multiple data sources. A working knowledge of installing and configuring management agents in MIIS 2003 is helpful but not required because the necessary procedures are included in this walkthrough. The user who sets up and performs the procedures in this walkthrough must be able to install, configure, and perform basic administrative tasks for: Microsoft Windows Server 2003, Enterprise Edition Microsoft Exchange Server 2003 Active Directory Microsoft SQL Server 2000 Microsoft Identity Integration Server 2003
GAL synchronization can be performed by using either Microsoft Identity Integration Server 2003 or Identity Integration Feature Pack (IIFP) for Microsoft Windows Server Active Directory.
Time Requirements
After the initial lab setup, the procedures in this walkthrough can be completed in approximately two hours.
Additional Resources
For more information about designing and planning a GAL Synchronization solution using MIIS 2003, see Microsoft Identity Integration Server 2003 Global Address List Synchronization (http://go.microsoft.com/fwlink/?LinkId=41449). Complete documentation is available for MIIS 2003 at the MIIS Technical Resources Web site (http://go.microsoft.com/fwlink/?LinkId=36734). Technical Reference information describing how MIIS 2003 works can be found in the Microsoft Identity and Access Management Series (http://go.microsoft.com/fwlink/?LinkId=36735). Design and planning information can be found in the MIIS 2003 Design and Planning Collection at the MIIS 2003 Planning, Deploying, and Administering Web site (http://go.microsoft.com/fwlink/?LinkId=36736). Additional walkthroughs can be found at the Microsoft Download Center Web site (http://go.microsoft.com/fwlink/?LinkID=36850).
server that is currently acting as part of the identity management infrastructure in your production environment. For complete instructions about how to build and configure the test environment for this walkthrough, see Appendix A: GAL Sync Lab Setup and Requirements. The lab environment for this walkthrough requires the following hardware and software:
Hardware
To complete this walkthrough, you must configure two server computers. Use hardware that meets or exceeds the following specifications: Pentium II 500 256 MB of RAM 8-GB hard disk 512-KB L2 cache Network adapter 4-MB video adapter SVGA monitor (17 inch) Microsoft Mouse or compatible pointing device
All hardware must be on the Microsoft Windows Server 2003, Enterprise Edition, Windows Catalog, available on the Microsoft web site (http://www.microsoft.com/windows/catalog/server/).
Software
Ensure that you have the installation media for the following software available before you begin this scenario: Microsoft Windows Server 2003, Enterprise Edition.
Microsoft Exchange Server 2003, Standard Edition; or Microsoft Exchange Server 2003, Enterprise Edition. Microsoft Identity Integration Server 2003, Enterprise Edition with Service Pack 1.
Note: The Identity Integration Feature Pack (IIFP) 1a for Microsoft Windows Server Active Directory can also be used for this walkthrough if Microsoft Identity Integration Server 2003, Enterprise Edition is not available. Microsoft SQL Server 2000, Enterprise Edition with Service Pack 3a.
If you are configuring a new server, then Microsoft SQL Server 2000 Standard Edition (with Service Pack 3a) can be used, but a new installation of MIIS 2003 with Service Pack 1 or IIFP 1a must also be used. You cannot use a prior version of MIIS 2003 with SQL Server 2000 Standard Edition and then apply the MIIS 2003 SP1 update. Microsoft SQL Server 2000 Enterprise Edition is required for versions of MIIS 2003 earlier than Service Pack 1. Optionally, if you intend to complete the Live Communications Server procedures at the end of this walkthrough, you also need Live Communications Server 2005 SP1 Standard or Enterprise Edition.
Setup Files
In addition to the installation media mentioned above, this walkthrough also uses a number of support files to help streamline the setup of the lab environment. The Windows Installer package that contains this walkthrough also includes the required support files. The Windows Installer package can be downloaded from the Microsoft Download Center. Copy these support files into a folder named C:\MIIS\GALSynchronization on the server running MIIS 2003, as described in the following section.
Sample Data
To support this MIIS 2003 GAL synchronization walkthrough, command line scripts are provided to create user accounts and organizational units in each of the Active Directory forests. Instructions for the use of these scripts are included in Appendix A: GAL Sync Lab Setup and Requirements. Before using these scripts to create these organizational units, understand the organizational unit structure common to all MIIS 2003 GAL synchronization implementations and the specific implementation for this scenario. In addition, become familiar with metaverse schema extensions that are used to support this MIIS 2003 GAL synchronization scenario.
10
11
The connoa and fabnoa forests have an organizational unit with the name of the local domain controller (CONNOA-DC-01 or FABNOA-DC-01) under which a GAL synchronization organizational unit (GALSynchronization) exists. The GALSynchronization OU contains additional organizational units for contacts, groups, and users. Also under the organizational unit named after the domain controller is an organizational unit named after the remote forest (Contoso or Fabrikam), which contains an organizational unit named Contacts where the synchronized contact objects are stored. In the connoa domain, the OU that accommodates the Fabrikam contacts is named Fabrikam. In the fabnoa domain, the OU is named Contoso. Note: If the scripts included with the support files for this walkthrough are used to setup the lab environment, the proper organizational unit structure will be created on each lab server. Instructions for the use of these scripts are included in Appendix A: GAL Sync Lab Setup and Requirements. Using the computer name of the Active Directory domain controller in the OU structure is uncommon in an Active Directory forest; however, by including the computer name, variations on the scenario within this document can use the same Active Directory forests.
12
You can use any hierarchical OU structure you want when implementing GAL synchronization. To use the scripts included with this walkthrough, however, you must use the structure described here. To use a different OU structure, create your own users, groups, and contacts for testing because the scripts cannot populate the customized OU structure. Also remember that if you build this scenario by using a different OU structure, the label of the lowest OU in the OU structure (Contacts) for each forest must be named Contacts when you deploy the Microsoft Identity Integration Server 2003 GAL synchronization solution. For example, the Lightweight Directory Access Protocol (LDAP) string for the Contacts organizational unit in the Connoa forest is:
ou=Contacts,ou=Fabrikam,ou=GALSynchronization,ou=CONNOA-DC01,DC=connoa,DC=concorp,DC=contoso,DC=com
The computer name parameter (ou=CONNOA-DC-01) is replaced by the computer name of the domain controller. The LDAP string for the organizational units in the Connoa forest is:
ou=Contacts,ou=Contoso,ou=GALSynchronization,ou=CONNOA-DC01,DC=connoa,DC=concorp,DC=contoso,DC=com ou=Users,ou=Contoso,ou=GALSynchronization,ou=CONNOA-DC01,DC=connoa,DC=concorp,DC=contoso,DC=com ou=Groups,ou=Contoso,ou=GALSynchronization,ou=CONNOA-DC01,DC=connoa,DC=concorp,DC=contoso,DC=com ou=Contacts,ou=Fabrikam,ou=GALSynchronization,ou=CONNOA-DC01,DC=connoa,DC=concorp,DC=contoso,DC=com
As stated earlier, the last parent organizational unit is named Fabrikam to indicate that the contacts in its Contacts organizational unit are from the remote (target) Fabrikam forest. The LDAP string for the organizational units in the Fabrikam forest is:
ou=Contacts,ou=Fabrikam,ou=GALSynchronization,ou=FABNOA-DC01,DC=fabnoa,DC=fabcorp,DC=fabrikam,DC=com ou=Users,ou=Fabrikam,ou=GALSynchronization,ou=FABNOA-DC01,DC=fabnoa,DC=fabcorp,DC=fabrikam,DC=com ou=Groups,ou=Fabrikam,ou=GALSynchronization,ou=FABNOA-DC01,DC=fabnoa,DC=fabcorp,DC=fabrikam,DC=com ou=Contacts,ou=Contoso,ou=GALSynchronization,ou=FABNOA-DC01,DC=fabnoa,DC=fabcorp,DC=fabrikam,DC=com
13
Following the convention used in the Contoso organizational units, the last of the Fabrikam organizational units uses the Contoso name to indicate that the contacts in its Contacts organizational unit are from the remote (target) Contoso forest. The Active Directory users in this scenario use Exchange mailboxes, and the groups use Exchange e-mail addresses. Both of these are created from the Active Directory Users and Computers snap-in. Contacts are already mail-enabled.
The extensions enable the metaverse to represent user objects from each forest as metaverse person objects, Active Directory group objects as metaverse group objects, and Active Directory contact objects as separate metaverse contact_forest objects. The management agent generates the attributes listed in the following table for the Person metaverse object. Attribute hideFromAddressLists (hideDLMembership) legacyExchangeDN Name proxyAddresses targetAddress userAccountControl Type Boolean Indexable String Indexable String Indexable String Indexable String Number
The management agent generates the attributes listed in the following table for the Group metaverse object. Attribute Type Multivalued
14
The management agent adds two new object types, contact_fabrikam_galma and contact_contoso_galma, to the metaverse schema and generates the attributes listed in the following table for those objects. Attribute cn company displayName employeeID givenName hideFromAddressLists L legacyExchangeDN mail mailNickname sn proxyAddresses targetAddress Type Indexable String Indexable String Indexable String Indexable String Indexable String Boolean Indexable String Indexable String Indexable String Indexable String Indexable String Indexable String Indexable String Multi-valued No No No No No No No No No No No Yes No
Walkthrough Steps
During this walkthrough, you perform the following tasks: Create management agents. Run the Management Agents Administer the GAL.
15
Note: This walkthrough assumes the design and planning process has been completed based on the information presented earlier and the worksheets are complete. The walkthrough is designed to step the reader through the implementation of the proposed design. For complete information on designing and planning an MIIS 2003 deployment, see the MIIS 2003 Design and Planning Collection.
16
5. In Name, type Contoso GALMA and click Next. When configuring the management agent for Active Directory global address lists, the first step is to provide the name of the forest that the management agent connects to during import and export operations. If you use the example provided in this walkthrough, this management agent connects to the Contoso forest. 6. On the Connect to an Active Directory Forest page, type the values for forest name (connoa.concorp.contoso.com), user name, password, and domain. Note: If you used different domain names than those suggested for this walkthrough, enter that information on this page. 7. Click Next. Next, specify the directory partition and organizational units (OUs) the management agent uses for GAL synchronization. If you used the scripts accompanying this walkthrough to configure your test environment, then the necessary OU structure has been created in the Contoso forest inside the CONNOA-DC-01 OU. 8. On the Configure Directory Partitions page, in Select directory partitions, select the only partition listed (DC=connoa,DC=concorp,DC=contoso,DC=com). 9. Clear the Sign and encrypt LDAP traffic check box. 10. Click Containers. 11. Clear the check box next to the directory partition to clear all organizational units under it. 12. Expand the directory partition if necessary, and then expand the domain controller name. 13. Select the GALSynchronization organizational unit. The organizational units beneath it, Fabrikam and Contoso, will also be selected. 14. Click OK, and then click Next. The next step is to identify the container that will be used to store the contacts from other forests. Based on the sample data provided with this walkthrough, GAL synchronization will take place between the Contoso and Fabrikam forests. If the scripts accompanying this walkthrough are used, a Fabrikam container is created in the OU structure. Inside the Fabrikam container, an additional
17
container named Contacts is created to act as the storage location for contacts imported from the Fabrikam forest. 15. On the Configure GAL page, under GAL container information, click Target. 16. In Target Container, in Select a partition, select the DC=connoa,DC=concorp,DC=contoso,DC=com target organizational unit. 17. Click Container. 18. In Select Containers, expand CONNOA-DC-01, expand the GAL Synchronization container, expand the Fabrikam container, and then select only the Contacts container beneath it. 19. Click OK to close Select Containers, and then click OK again to close Target Container. Next, you need to identify the container used to store the contacts from the local forest, in this case Contoso, which contains the contact information that is to be sent to the other forest. 20. Click Source. 21. Make sure DC=connoa,DC=concorp,DC=contoso,DC=com is selected in the Select a partition drop-down list. 22. Click Add Containers. 23. Expand CONNOA-DC-01, expand the GAL Synchronizationcontainer, expand the Contoso container, and then select only the Contacts container beneath the Contoso container. 24. Click OK to close Select Containers, and then click OK again to close Source Container. 25. On the same Configure GAL page, under Exchange configuration, click Edit. 26. Enter the e-mail suffix @Contoso.com and click Add. Click OK. Note: On the Configure GAL page, do not select the check boxes for routing mail to contacts or specifying an administrative group. 27. Click Next. The management agent for Active Directory GAL is preconfigured to select specific objects and specific attributes of those objects so MIIS 2003 can
18
synchronize the information necessary to create valid contact objects in the other forest. 28. On the Select Object Types page, verify that the object types required for GAL synchronization are selected. Any object types that are already selected should remain selected. If they are not selected by default, ensure the following object types are selected: contact, container, domainDNS, group, organizationalUnit, and user. 29. Click Next. 30. On the Select Attributes page, select Show All. Any attributes that are already can remain selected. In addition, verify that the following attributes required for GAL synchronization are selected: cn company displayName employeeID givenName hideDLMembership l legacyExchangeDN mail mailNickname Name proxyAddresses sn targetAddress userAccountControl
31. Click Next. 32. The management agent for Active Directory GAL is preconfigured to use rules extensions. On the Configure Connector Filter page, ensure that contact, group, and user are configured to use a rules extension as their filter type. Click Next.
19
Join and Projection, Attribute Flow, and Deprovisioning rules are all preconfigured and require no changes. 33. On the Configure Join and Projection Rules page, you can see that four join and one projection rules for GAL synchronization are specified. Note: You can expand the join and projection rules to see data source attribute, mapping type, and metaverse attribute for each rule. 34. Click Next. 35. In Configure Attribute Flow, you can see that five preconfigured attribute flow mappings for GAL synchronization are specified. Note: You can expand the attribute flows to see data source attribute, flow type, and metaverse attribute for each attribute flow mapping. 36. Click Next. 37. On the Configure Deprovisioning page, in Deprovisioning Options, verify that the Determine with a rules extension option is selected. 38. Click Next. 39. On the Configure Extensions page, in Rules extension name, verify that the GALSync.dll file is specified. Note: The Contoso GALMA looks for this file in the following location: C:\Program Files\Microsoft Identity Integration Server\Extensions. 40. Click Finish.
20
3. From the Actions menu, click Create. 4. In Management Agent Designer, in Management agent for, click Active Directory global address list (GAL). 5. In Name, type Fabrikam GALMA, and then click Next. Identify the forest and partition that the management agent needs to connect to. 6. On the Connect to an Active Directory forest page, type the values for forest name (fabnoa.fabcorp.fabrikam.com), user name, password and domain. Note: If you used different domain names than those suggested for this walkthrough, enter that information on this page. 7. Click Next. 8. On the Configure Directory Partitions page, in Select directory partitions, select the only partition listed (DC=fabnoa,DC=fabcorp,DC=fabrikam,DC=com). 9. Clear the Sign and encrypt LDAP traffic check box. Identify the containers that are to be used for synchronizing the GALs. 10. Click Containers. 11. Clear the check box next to the directory partition to clear all organizational units under the directory partition. 12. Expand the directory partition if necessary, and then expand the domain controller name, FABNOA-DC-01. 13. Select the GALSynchronization organizational unit. Note that this also selects the Fabrikam and Contoso organizational units. 14. Click OK, and then click Next. Identify the target container for contact information received from the other forest and the container from this forest that will be used to send contact information to the other forest. 15. On the Configure GAL page, under GAL container configuration, click Target. 16. In Target Container, in Select a partition, select the DC=fabnoa,DC=fabcorp,DC=fabrikam,DC=com target organizational unit.
21
17. Click Container. 18. In Select Containers, expand the directory partition (DC=fabnoa,DC=fabcorp,DC=fabrikam,DC=com), expand the node with name of the fabnoa domain controller (FABNOA-DC-01), expand GALSynchronization, expand Contoso, and then check Contacts. 19. Click OK to close Select Containers, and then click OK again to close Target Container. 20. Click Source. 21. Click Add Containers. 22. Expand the FABNOA-DC-01 branch of the tree until you see the Contacts container under Fabrikam. Make sure that Contacts container is selected. 23. Click OK to close Select Containers, and then click OK again to close Source Container. 24. On the Configure GAL page, configure the settings under Exchange configuration. Click Edit. 25. Enter @Fabrikam.com and click Add. Click OK. Note: On the Configure GAL page, do not select the check boxes for routing mail to contacts or specifying an administrative group. 26. Click Next. 27. On the Select Object Types page, verify that the object types required for GAL synchronization are selected. Any object types that are already selected should remain selected. If they are not selected by default, ensure the following object types are selected: contact, container, domainDNS, group, organizationalUnit, and user. 28. Click Next. 29. On the Select Attributes page, select Show All. Any attributes that are already selected should remain selected. In addition, verify that the attributes required for GAL synchronization are selected (use the same list provided for the Contoso GALMA earlier). 30. Click Next. 31. Connector Filters, Join and Projection Rules, Attribute Flow, and Deprovisioning are all preconfigured for the management agent and require no changes. Click Next to proceed through each screen until you see the Configure
22
Extensions screen. 32. On the Configure Extensions page, in Assembly name, verify that the GALSync.dll file is specified. Note: The Fabrikam GALMA looks for this file in the following location: C:\Program Files\ Microsoft Identity Integration Server\Extensions. 33. Click Finish.
Delta Synchronization
Export
23
Full Import
All specified data flows from the Active Directory data source to the MIIS 2003 connector space and metaverse. All specified data flows from the Active Directory data source to the MIIS 2003 connector space and is staged for inbound synchronization with the metaverse. All specified data flows from the Active Directory data source to the MIIS 2003 connector space. Then, all specified data flows from the MIIS 2003 connector space to the metaverse during inbound synchronization and from the metaverse to the connector space during outbound synchronization. Any staged data flows from the MIIS 2003 connector space to the metaverse during inbound synchronization and from the metaverse to the connector space during outbound synchronization.
Full Synchronization
Enable provisioning, and then run both management agents by using the run profiles in the following order: 1. Full Import (Staging Only) to the connector space. This step imports all specified Active Directory data into the connector space. 2. Full Synchronization. This synchronizes connector space data with the metaverse. 3. Export. This exports connector space data to the Active Directory forests. 4. Delta Import. This confirms that the export was successful. Run each management agent by using the listed run profile before you run the next run profile in the list. In other words, run the Contoso GALMA by using Full Import (Staging Only) and then run the Fabrikam GALMA by using Full Import (Staging Only) before you run the Full Synchronization run profile for either management agent. Important: Use this run profile sequence the first time you run the management agents after creating them. Running the profiles in the order specified is necessary to properly
24
populate the metaverse and connector space. After you complete these run profile steps for both management agents once, you need to complete the run profile steps in a different order for all subsequent management agent operations. For all subsequent management agent operations, use the run profiles in the following order: 1. Delta Import (Staging Only) to the connector space. This step imports all updated Active Directory data into the connector space. 2. Delta Synchronization. This synchronizes updated connector space data with the metaverse. 3. Export. This exports connector space data to the Active Directory forests. 4. Delta Import. This confirms that the export was successful. If your environment has existing contact objects that have been created by previous synchronization solutions, the first time the management agents are run, the following order for the run profiles is recommended instead of the order listed above. Running the profiles in this order ensures that all objects are joined and that duplicate mail recipient objects are not provisioned during the initial setup of GAL synchronization. The recommended order is: 1. Full Import with staging to the connector space on all management agents 2. Delta Synchronization on all management agents 3. Repeat Delta Synchronization on all management agents 4. Export on all management agents
25
4. Ensure that the Enable Provisioning Rules Extension check box is selected. 5. Click OK. After you verify that provisioning is enabled, stage the Contoso data by using the Contoso GALMA. This step creates all the Contoso objects in the connector space. To run the Full Import (Staging Only) run profile for the Contoso GALMA 1. In Identity Manager, in Management Agents view, click the Contoso GALMA. 2. From the Actions menu, click Run. 3. In Run Management Agent, in Run Profiles, click Full Import (Stage Only), and then click OK. The Synchronization Statistics should show 34 Adds. This represents the nine OUs (forest, DC, GALSynchronization, Contoso, Contoso Contacts, Fabrikam, Fabrikam Contacts, Users and Groups) and the 25 user, group, and contact objects. Next, you stage the data for the Fabrikam GALMA. This step creates all the Fabrikam objects in the connector space. To run the Full Import (Staging Only) run profile for the Fabrikam GALMA 1. In Identity Manager, in Management Agents view, click the Fabrikam GALMA. 2. From the Actions menu, click Run. 3. In Run Management Agent, in Run Profiles, click Full Import (Staging Only), and then click OK. Again you should see 34 Adds listed in the Synchronization Statistics. Next, you perform a full synchronization for each of the management agents. This causes the join and projection rules to be processed. All objects will be created in the metaverse and linked to their corresponding connector space objects. Export attribute flow rules will also prepare any objects that are to be exported. The contact information from the Contoso GAL will be flagged for export to the Fabrikam GAL. The Fabrikam contact information will be flagged for export to the Contoso GAL. To run full synchronization for the Contoso GALMA 1. In Identity Manager, in Management Agents view, click the Contoso
26
GALMA. 2. From the Actions menu, click Run. 3. In Run Management Agent, in Run Profiles, click Full Synchronization, and then click OK. The Synchronization Statistics should show a total of 25 projections. These are the new objects created in the metaverse for storing the user, group, and contact information for the objects in the Contoso forest. To run full synchronization for the Fabrikam GALMA 1. In Identity Manager, in Management Agents view, click the Fabrikam GALMA. 2. From the Actions menu, click Run. 3. In Run Management Agent, in Run Profiles, click Full Synchronization, and then click OK. Again you should see 25 projections. These are the new metaverse objects used to store the Fabrikam object data. Next, you export the data to each Active Directory forest. During this step, any objects staged for export will be exported from the connector space to the connected data source. The Contoso contact objects, staged during the previous synchronization, will be exported to the Fabrikam directory. The staged Fabrikam contact objects will be exported to the Contoso directory. To run the export run profile for the Contoso GALMA 1. In Identity Manager, in Management Agents view, click the Contoso GALMA. 2. From the Actions menu, click Run. 3. In Run Management Agent, in Run Profiles, click Export, and then click OK. In the Synchronization Statistics, you should see 25 Adds, indicating that the 25 objects from the Fabrikam forest have been exported to the Contoso forest. To run the export run profile for the Fabrikam GALMA 1. In Identity Manager, in Management Agents view, click the Fabrikam GALMA.
27
2. From the Actions menu, click Run. 3. In Run Management Agent, in Run Profiles, click Export, and then click OK. Again you will see 25 Adds, indicating that the 25 objects from the Contoso forest have been exported to the Fabrikam forest. Note: When you perform an export, MIIS 2003 cannot be certain that the export completed successfully. To confirm the export, MIIS 2003 stores the exported changes for an object in the connector space. During the next import, MIIS 2003 compares the imported data with the exported changes. Now you must perform an import so that MIIS 2003 can confirm that the export was successful. To run a delta import for the Contoso GALMA 1. In Identity Manager, in Management Agents view, click the Contoso GALMA. 2. From the Actions menu, click Run. 3. In Run Management Agent, in Run Profiles, click Delta Import, and then click OK. Verify that 25 Adds and 25 Updates are reported back from Active Directory to MIIS 2003 as a result of the Delta Import run profile. To run a delta import for the Fabrikam GALMA 1. In Identity Manager, in Management Agents view, click the Fabrikam GALMA. 2. From the Actions menu, click Run. 3. In Run Management Agent, in Run Profiles, click Delta Import, and then click OK. Verify that 25 Adds and 25 Updates are reported back from Active Directory to MIIS 2003 as a result of the Delta Import run profile. The GAL Synchronization management agent synchronizes the mail-enabled contacts from one forest to another. All the users, groups, and contacts created by the scripts for this walkthrough are mail-enabled. You can test the behavior of the management agent
28
for Active Directory GAL by creating a user who does not have a mailbox and witnessing what happens to the account during synchronization. To verify synchronization behavior for accounts that are not mail-enabled 1. On the domain controller for Connoa, use Active Directory Users and Computers to create a new user account. Create the new user in the Users OU located in the Contoso OU under the CONNOA-DC-01 OU. Use the following options when you create the account: First Name: Contoso Last Name: NoMailUser User Logon Name: NoMailUser Make sure you clear the Create an Exchange mailbox check box when given the choice. Accept the defaults for all other settings. 2. Once the user account is created, synchronize the contact data between the two forests. Use the Contoso GALMA and perform a Delta Import. Upon completion of the Delta Import, you can see one filtered disconnector object listed in the Synchronization Statistics. If you open the object details for the disconnector object, you can see that it is the new user account you created with no e-mail. Because the account is not mail-enabled, it is filtered during synchronization and is not added to the metaverse.
29
Verify that 25 new contacts now exist in this organizational unit. To verify the synchronized contacts in the Fabnoa domain 1. On the domain controller for the fabnoa Active Directory domain, click Start, click Control Panel, double-click Administrative Tools, and then double-click Active Directory Users and Computers. 2. Expand the organizational unit named after the domain controller, and then expand GALSynchronization. 3. Expand Contoso, and then click Contacts. Verify that 25 new contacts now exist in this organizational unit.
Only source user objects that have the required attributes appear in the synchronized Contacts organizational unit. The following operation demonstrates what happens when the attributes of a source user object are changed to no longer meet the requirements.
30
Directory Users and Computers, from the View menu, click Advanced Features. 2. In the Fabrikam organizational unit, choose any user in the Users organizational unit. 3. Right-click the user and click Properties, and then click the ExchangeAdvanced tab. 4. Select the Hide from Exchange address lists check box. 5. Click OK. Next, run the delta import for the Fabrikam GALMA to import the change. During the synchronization (after the import has occurred) the imported change will cause the corresponding object in the Contoso GALMA connector space to be flagged for deletion. Once this happens, the next export run for the Contoso GALMA will cause the contact object to be deleted in the Connoa domain. 6. On the domain controller for the connoa Active Directory domain, in Identity Manager, run the Delta Import run profile of the Fabrikam GALMA. By running the delta import, you import the disabled user account. After the run is complete, examine the Synchronization Statistics. Under Inbound Synchronization, there is one Metaverse Object Deletes. This is the removal of the metaverse object that corresponds to the user account you just modified. Because the change you made hides the contact information from the address list, MIIS 2003 does not need to synchronize the object data and therefore removes it from the metaverse. Notice the Outbound Synchronization statistics. There is one Provisioning Disconnect. Because provisioning is enabled, all connectors for this object in the Contoso GALMA connector space are removed by the provisioning rules extension logic. This results in the object stored in the Contoso connector space being flagged for deletion during the next export operation. If you were to run an Export run profile on the Contoso GALMA to push out the deletion, one delete operation would be reported in the export statistics. Then, if you were to run a Delta Import on the Contoso GALMA, the delete operation would be imported into MIIS 2003 again and confirmed. Perform an export and a delta import by using the Contoso GALMA. 7. On the domain controller for the connoa Active Directory domain, in Identity Manager, run the Export run profile on the Contoso GALMA. 8. On the domain controller for the connoa Active Directory domain, in Active Directory Users and Computers, verify the content of the synchronized contact
31
in the Contacts organizational unit in the Fabrikam organizational unit. Note: The corresponding contact for the user you modified should be deleted in the Fabrikam organizational unit. 9. On the domain controller for the connoa Active Directory domain, in Identity Manager, run a Delta Import on the Contoso GALMA. This imports the delete operation into MIIS 2003 again.
32
33
3. On the domain controller for the connoa Active Directory domain, in Identity Manager, run the Full Synchronization run profile on the Fabrikam GALMA. Examine the Outbound Synchronization statistics. Verify that export attribute flow and provisioning are occurring for the conuser02 object. 4. On the domain controller for the connoa Active Directory domain, in Identity Manager, run the Export run profile on the Fabrikam GALMA. Examine the Outbound Synchronization statistics. Verify that one add takes place for the conuser02 object. 5. On the domain controller for the fabnoa Active Directory domain, in Active Directory Users and Computers, verify that the conuser02 contact has been created again in the Contoso organizational unit. 6. On the domain controller for the connoa Active Directory domain, in Identity Manager, run the Delta Import run profile on the Fabrikam GALMA. This imports the add operation into MIIS 2003 so it can confirm the export was successful.
34
removed from the Contacts organizational unit in the Fabrikam organizational unit in the connoa domain. You may need to refresh the view to see the update. 7. On the domain controller for the connoa Active Directory domain, in Identity Manager, run a Delta Import on the Contoso GALMA.
35
additional Active Directory attributes require manual configuration for use by Live Communications Server 2005 with SP1.
Configuration Requirements
To implement the optional Live Communications Server 2005 with SP1 configuration presented in this section, you need to add support for Live Communications Server 2005 with SP1 to your testing environment. In addition to the setup procedures covered in Appendix A: Gal Sync Lab Setup and Requirements, the following additional configuration must be made before continuing with the procedures in this section: Set up a server running Live Communications Server 2005 with SP1 and two clients in the Contoso forest. Instructions can be found in "Lab Scenario 1: Deploying a Live Communications Server and Enabling Client Access" in the Live Communications Server 2005 Standard Edition Lab Quick Start found at the Live Communications Server 2005 Deployment Resources Web site. You also have the option of using Live Communications Server 2005 with SP1 Enterprise Edition for this exercise. If you choose to use the Enterprise Edition instead of the Standard Edition, make sure you use the Live Communications Server 2005 Enterprise Edition Lab Quick Start, found at the same location, for the additional configuration instructions. Important: The GAL synchronization procedures presented earlier in this walkthrough must be completed before proceeding with the optional Live Communications Server 2005 with SP1 section. The procedures in the Live Communications Server 2005 with SP1 section assume the GAL synchronization procedures are complete.
36
The MIIS 2003 metaverse schema must be extended to add support for these attributes. To extend the metaverse schema 1. Click Metaverse Designer. 2. Click person in the Object types pane. 3. Click Add Attribute in the Actions pane. 4. Click New Attribute button.
37
5. Enter msRTCSIP-OriginatorSid in the Attribute name: field. 6. Select Binary (indexable) in the Attribute type: drop-down field. 7. Verify the Multi-valued and Indexed check boxes are not selected. 8. Click OK. 9. Click Add Attribute. 10. Click the New Attribute button. 11. Enter msRTCSIP-PrimaryUserAddress in the Attribute name: field. 12. Select String (indexable) in the Attribute type: drop-down field. 13. Verify the Multi-valued and Indexed check boxes are not selected. 14. Click OK. 15. Click Add Attribute. 16. Click the New Attribute button. 17. Enter ipPhone in the Attribute name: field. 18. Select String (indexable) in the Attribute type: drop-down field. 19. Verify the Multi-valued and Indexed check boxes are not selected. 20. Click New Attribute. 21. Click the New Attribute button. 22. Enter otherMobile in the Attribute name: field. 23. Select String (indexable) in the Attribute type: drop-down field. 24. Verify the Multi-valued and Indexed check boxes are not selected. 25. Click New Attribute. 26. Click the New Attribute button. 27. Enter otherPager in the Attribute name: field. 28. Select String (indexable) in the Attribute type: drop-down field. 29. Verify the Multi-valued and Indexed check boxes are not selected. 30. Click OK. 31. Click OK. After extending the metaverse schema, you must refresh the central forests metaverse schema:
38
To refresh the metaverse schema of the central forest 1. Right-click the central forest management agent (Contoso). 2. Click Refresh Schema 3. Click OK. 4. Enter Enterprise Admin credentials for the central forest. 5. Click OK. 6. Click Close once the schema has refreshed.
39
10. Enter a strong password for the Trust Password. Confirm the password by entering it a second time. Click Next. 11. Review the summary information to make sure the options are correct and click Next. 12. Click Next to create the trust. 13. When asked to confirm the outgoing trust select No, do not confirm the outgoing trust. Click Next. 14. Click Finish. Click OK to close the SID Filtering dialog box if it appears. 15. Click OK to close the Properties dialog. 16. Logon to FABNOA-DC-01 as a member of the Enterprise Admins group in the Fabrikam forest. 17. Open Active Directory Domains and Trusts. 18. Right-click fabnoa.fabcorp.fabrikam.com and choose Properties. 19. Click the Trusts tab and click New Trust. 20. The New Trust wizard opens. Click Next. 21. Enter connoa.concorp.contoso.com as the Trust Name. Click Next. 22. Select One-way incoming as the Direction of Trust. Click Next. 23. On the Sides of Trust page, select This domain only. Click Next. 24. On the Outgoing Trust Authentication Level page, select Domain-wide authentication. Click Next. 25. Enter a strong password for the Trust Password. Use the same password that you entered in step 10 above. Confirm the password by entering it a second time. Click Next. 26. Click Next to create the trust. 27. When asked to confirm the incoming trust, select Yes, confirm the incoming trust. Enter the user name and password of the administrator account from the Contoso forest that was used for steps 1-15. Click Next. 28. Click Finish. 29. Click OK to close the Properties dialog.
40
41
22. Select msRTCSIP-PrimaryUserAddress in the Metaverse attribute: list. 23. Click New. 24. Expand the node that has Object Type: contact in the Data Source Attribute column and Object Type: person in the Metaverse Attribute column of the Configure Attribute Flow table. 25. Under Build Attribute Flow, select ipPhone in the Data sourceattribute. 26. Select the Export option button in the Flow Direction section. 27. Select the option to Allow Nulls. 28. Select the Direct option button in the Mapping Type section. 29. Select ipPhone in the Metaverse attribute: list. 30. Click New. 31. Expand the node that has Object Type: contact in the Data Source Attribute column and Object Type: person in the Metaverse Attribute column of the Configure Attribute Flow table. 32. Under Build Attribute Flow, select otherMobile in the Data sourceattribute. 33. Select the Export option button in the Flow Direction section. 34. Select the option to Allow Nulls. 35. Select the Direct option button in the Mapping Type section. 36. Select otherMobile in the Metaverse attribute: list. 37. Click New. 38. Expand the node that has Object Type: contact in the Data Source Attribute column and Object Type: person in the Metaverse Attribute column of the Configure Attribute Flow table. 39. Under Build Attribute Flow, select otherPager in the Data sourceattribute. 40. Select the Export option button in the Flow Direction section. 41. Select the option to Allow Nulls. 42. Select the Direct option button in the Mapping Type section. 43. Select otherPager in the Metaverse attribute: list. 44. Click New.
42
43
attribute: column and legacyExchangeDN selected in the Metaverse attribute: column. 19. Verify Flow Direction is set to Export. 20. Under Build Attribute Flow, while holding the CTRL key, click msRTCSIPPrimaryUserAddress attribute in the Metaverse attribute list in order to multiselect. 21. Click Edit. 22. Replace the string ProxyAddressesMappingBackwards with LcsProxyAddressesMappingBackwards in the Flow rule name: field. 23. Click OK. 24. In the Configure Attribute Flow table, expand the node that has Object Type: contact in the Data Source Attribute column and Object Type: person in the Metaverse Attribute column of the Configure Attribute Flow table. 25. Click the row that shows proxyAddresses selected in the Data Source Attribute column, legacyExchangeDN and proxyAddresses selected in the Metaverse attribute: column 26. Under Build Attribute Flow, while holding the CTRL key, click msRTCSIPPrimaryUserAddress attribute in the Metaverse attribute list in order to multiselect. 27. Click Edit 28. Replace the string ProxyAddressesMappingForwards with LcsProxyAddressesMappingForwards in the Flow rule name: field. 29. Click OK. 30. Expand the node that has Object Type: user in the Data Source Attribute column and Object Type: person in the Metaverse Attribute column of the Configure Attribute Flow table. 31. Under Build Attribute Flow, select ipPhone in the Data source attribute: list. 32. Select the Import option button in the Flow Direction section. 33. Select Direct in the Mapping Type section. 34. Select ipPhone in the Metaverse attribute list. 35. Click New. 36. Expand the node that has Object Type: user in the Data Source Attribute
44
column and Object Type: person in the Metaverse Attribute column of the Configure Attribute Flow table. 37. Under Build Attribute Flow, select otherMobile in the Data source attribute: list. 38. Select the Import option button in the Flow Direction section. 39. Select Direct in the Mapping Type section. 40. Select otherMobile in the Metaverse attribute list. 41. Click New. 42. Expand the node that has Object Type: user in the Data Source Attribute column and Object Type: person in the Metaverse Attribute column of the Configure Attribute Flow table. 43. Under Build Attribute Flow, select otherPager in the Data source attribute: list. 44. Select the Import option button in the Flow Direction section. 45. Select Direct in the Mapping Type section. 46. Select otherPager in the Metaverse attribute list. 47. Click New. 48. Click OK. 49. Repeat all steps for each non-central forest management agent.
45
3. Select Full Import (Stage Only). 4. Click OK. After you have performed the import on each forest, the next step is synchronization. Once again, these steps need to be performed on each forest. 5. Select the forest management agent under Management Agents. 6. Right-click the management agent. 7. Select Run 8. Select Full Synchronization. 9. Click OK. To export the contact information to the central forest 1. Select the central forest management agent under Management Agents 2. Right-click the management agent 3. Select Run 4. Select Export 5. Click OK
46
To test that synchronization has worked correctly without configuring Live Communications Server 2005 with SP1 and using Windows Messenger, a tool such as ADSIEDIT or LDP can also be used to lookup and confirm the extra attributes have been added to the contact objects in the central forest.
Summary
You have just completed a rudimentary implementation of GAL synchronization by using MIIS 2003. You started with two forests each hosting their own Exchange GAL and you used the management agent for Active Directory global address list (GAL) to synchronize the global address lists between the two forests. After the initial synchronization, you performed some rudimentary administrative tasks and then observed how MIIS 2003 synchronized the changes you made. You hid a mailbox on one forest and then observed how the contact information for that mailbox was removed from the GAL in the other forest. You deleted a user in one forest and saw the contact object for that user removed from the contact list in the other forest. You also attempted to remove a contact from the remote forests contact list and observed how synchronization caused the contact to be replaced. You also had the option of configuring five additional attributes needed for use by LCS 2005 SP1. These attributes make it possible for users in one forest to see the contact information for users in another forest. This exercise demonstrated how to use the GALSync management agent to synchronize this contact information for use by LCS 2005 SP1.
See Also
MIIS 2003 Design and Planning Collection | Microsoft Identity Integration Server 2003 Global Address List Synchronization | Live Communications Server 2005 Deployment Resources
47
To set up the lab environment: Set up the Contoso forest computer Configure the DNS Server Set up the Fabrikam forest computer Create the scenario folders on the scenario computers Populate and configure Active Directory objects, including OUs and users. Configure the e-mail environment
The following diagram represents the test environment used for this walkthrough.
Hardware Requirements
The recommended test environment for this walkthrough is two servers on an isolated network, each hosting one forest. The following software must be installed: Microsoft Windows Server 2003, Enterprise Edition, which contains the required Internet Information Services (IIS) service and ASP.NET components Microsoft Exchange Server 2003, Standard Edition Server Microsoft SQL Server 2000 with Service Pack 3a Microsoft Identity Integration Server 2003 with Service Pack 1
Hardware requirements must meet the minimum requirements outlined for each of the software packages listed above. The minimum hardware requirements can be found in the product documentation for each of the listed products or at http://www.microsoft.com.
48
Note: Exchange Server 2003 requires that the Internet Information Services (IIS) service components are installed and running on the server computer where Exchange Server 2003 is installed.
Make sure you enable dynamic updates so the DNS zones can be properly updated during the installation of Active Directory.
49
Configure it to use connoa-dc-01 as its DNS server prior to installing Active Directory. Note: Exchange Server 2003 requires that the Internet Information Services (IIS) service components are installed and running on the server computer where Exchange Server 2003 is installed.
If you want to recreate the Active Directory environment after you have completed this scenario, you must delete the organizational unit and object structure initially created by these scripts, and then run these scripts again. If you do not delete the existing GAL Synchronization scenario organizational unit and object structure, the scripts will not work.
50
After populating Active Directory, configure the Active Directory objects by configuring the mail addresses in Exchange Server 2003 and by creating Exchange mailboxes for the user accounts. To populate the Active Directory in the connoa domain: 1. Log on to the server running Microsoft Identity Integration Server 2003 using the Administrator account 2. Locate the file contoso-buildad.cmd in the C:\Scenarios\GALSynchronization folder and open it by using Notepad. You should see the following statements: @echo off rem rem Copyright (c) Microsoft Corporation. All rights reserved. rem rem TODO: Enter the right information for the server, user credentials rem and AD Domain if different from the scenario documentation
rem ========================================== set servername=CONNOA-DC-01 set username=administrator set domainname=connoa set password=* rem ========================================== set addomain=DC=connoa,DC=concorp,DC=contoso,DC=com rem ========================================== ldifde -k -v -i -f contoso-ous.ldif -c "OU=COMPUTERNAME,ADDOMAIN" "OU= %COMPUTERNAME%,%addomain%" -s %servername% -b %username% %domainname% %password% ldifde -k -v -i -f contoso-contacts.ldif -c "OU=COMPUTERNAME,ADDOMAIN" "OU= %COMPUTERNAME%,%addomain%" -s %servername% -b %username% %domainname% %password% ldifde -k -v -i -f contoso-users.ldif -c "OU=COMPUTERNAME,ADDOMAIN" "OU= %COMPUTERNAME%,%addomain%" -s %servername% -b %username% %domainname% %password%
51
ldifde -k -v -i -f contoso-groups.ldif -c "OU=COMPUTERNAME,ADDOMAIN" "OU= %COMPUTERNAME%,%addomain%" -s %servername% -b %username% %domainname% %password% 3. Edit the cmd file and change the variables listed in the following table to reflect your scenario. These values are found in the cmd file in the lines that begin with "set." Variable Servername Username Value Name of the domain controller for the connoa Active Directory domain. Name of an administrative account that is allowed to create objects in Active Directory, (for example, Administrator). NetBIOS name of the Active Directory domain, (for example, CONNOA). Password of the administrative account that you specified earlier.
Domainname Password
If you use a domain name other than connoa.concorp.contoso.com, then you need to follow these instructions: 1. While editing the contoso-buildad.cmd file change the addomain=dc=connoa,dc=concorp,dc=contoso,dc=com to match the name of your domain in LDAP notation. 2. Prior to running contoso-buildad.cmd file, edit the contoso-contacts.ldif file. Replace all @contoso.com strings with the Exchange mail domain of your scenario. 3. Save the changes to contoso-buildad.cmd and close Notepad. 4. At the command prompt, run contoso-buildad.cmd. The contoso-buildad.cmd file creates eight organizational units (OUs) in Active Directory. One OU is named after the computer running Microsoft Identity Integration Server 2003, such as CONNOA-DC-01. Under this OU, another OU named GALSynchronization is created. Under this OU, the Contoso and Fabrikam OUs are created. The Contoso OU is populated with three other OUs: Users, Groups and Contacts, Each of these OUs will be populated with users, groups, and contacts respectively. The Fabrikam OU is populated with an empty Contacts OU.
52
After the contoso-buildad.cmd file is finished running, the following objects are within the organizational units: 13 new users in the Users organizational unit. 7 new groups in the Groups organizational unit. 5 new contacts in the Contacts organizational unit.
Next, you must populate the directory for the fabnoa domain. To populate the Active Directory in the fabnoa domain: 1. Log on as Administrator to the domain controller hosting the fabnoa domain. 2. Locate the file fabrikam-buildad.cmd, and then open it by using Notepad. Change the variables listed in following table to reflect your scenario. Variable Servername Username Value Name of the domain controller for the fabnoa Active Directory domain. Name of an administrative account that is allowed to create objects in Active Directory (for example, Administrator). NetBIOS name of the Active Directory domain (for example, FABNOA). Password for the administrator account.
Domainname Password
If you use a domain name other than fabnoa.fabcorp.fabrikam.com, then you need to follow these instructions: 1. While editing the fabrikam-buildad.cmd file, change the LDAP string addomain=dc=fabnoa,dc=fabcorp,dc=fabrikam,dc=com to match the name of your domain. 2. Prior to running fabrikam-buildad.cmd, edit the fabrikam-contacts.ldif file. Replace all @fabrikam.com strings with the Exchange mail domain of your scenario. 3. Save the changes to fabrikam-buildad.cmd and close Notepad. 4. At the command prompt, run fabrikam-buildad.cmd. The fabrikam-buildad.cmd script creates five organizational unit (OU) objects in Active Directory. One OU is named after the server running Microsoft Identity Integration Server 2003, FABNOA-DC-01. Under this OU, another OU is created and named
53
GALSynchronization. Under the GALSynchronization OU, two OUs are created: Contoso OU and Fabrikam OU. The Fabrikam OU is populated with three other OUs: Users, Groups, and Contacts, each of which is populated with users, groups, and contacts respectively. The Contoso OU is populated with an empty Contacts OU. The import assumes an empty Active Directory, except for the default Active Directory and Exchange objects and the default configurations that have only the initial Active Directory objects. If you are setting up this scenario for a second time, you need to delete the existing Active Directory users, groups, and contacts before running the scripts to populate this Active Directory domain.
You must set the SMTP mail domain correctly for both Active Directory forests in this walkthrough. This configuration is performed by adjusting the Exchange Default Recipient Policies. To adjust the Exchange Default Recipient Policies for both forests 1. On the domain controller hosting the connoa domain, start the Exchange Server 2003 System Manager. 2. Expand Recipients, and then click Recipient Policies. 3. Right-click Default Policy and select Properties. 4. Click the E-Mail Addresses (Policy) tab. 5. In Generation rules, in Type, click SMTP, and then click Edit. 6. In SMTP Address Properties, in Address, type @contoso.com for the connoa domain in the Contoso Active Directory forest. 7. Click OK.
54
8. Click OK. 9. If asked to apply the changes to all recipients now, click Yes. 10. On the domain controller hosting the fabnoa domain, start the Exchange Server 2003 System Manager. 11. Expand Recipients, and then click Recipient Policies. 12. Right-click Default Policy and select Properties. 13. Click the E-Mail Addresses (Policy) tab. 14. In Generation rules, in Type, click SMTP, and then click Edit. 15. In SMTP Address Properties, in Address, type @fabrikam.com for the fabnoa domain in the Fabrikam Active Directory forest. 16. Click OK. 17. Click OK. 18. If asked to apply the changes to all recipients now, click Yes.
55
6. From the list of available tasks, ensure that Create Mailbox is highlighted and then click Next. 7. For the Create Mailbox page, use the default values and click Next. 8. Click Finish. To establish e-mail addresses for the newly created groups in the connoa domain 1. On the domain controller for the connoa Active Directory domain, in Active Directory Users and Computers, under the Contoso organizational unit, click Groups. 2. Press CTRL+A to select all groups within the organizational unit. 3. Right-click the selected groups and click Exchange Tasks. 4. In the Exchange Task Wizard Welcome page, click Next. 5. From the list of available tasks, select Establish E-mail Address on Groups. Click Next. 6. For the Establish E-Mail Address on Groups page, use the default values and click Next. 7. Click Finish. To create mail boxes for the newly created objects in the fabnoa domain 1. On the domain controller for the Fabnoa Active Directory domain, start Active Directory Users and Computers. 2. Click the organizational unit named after the domain controller (FABNOADC-01), click GALSynchronization, click Fabrikam, and then click Users. 3. Select all users within the organizational unit. 4. Right-click the selected users and click Exchange Tasks. 5. On the Exchange Task Wizard Welcome page, click Next. 6. From the list of available tasks, ensure that Create Mailbox is highlighted and then click Next. 7. For the Create Mailbox page, use the default values and click Next. 8. Click Finish.
56
To establish e-mail addresses for the newly created groups in the Fabnoa domain 1. On the domain controller for the fabnoa Active Directory domain, in Active Directory Users and Computers, under the Contoso organizational unit, click Groups. 2. Select all groups within the organizational unit. 3. Right-click the selected groups and click Exchange Tasks. 4. In the Exchange Task Wizard Welcome page, click Next. 5. From the list of available tasks, select Establish E-mail Address on Groups and click Next 6. For the Establish E-Mail Address on Groups page, use the default values and click Next. 7. Click Finish. At this point your servers should be setup and configured properly for this walkthrough. You are ready to begin.