All CMN FBC components are installed by the AutoRun utility that accompanies the CMN product kit.
The AutoRun installer automatically checks the environment to verify CMN prerequisites, but you can bypass the prerequisites check by running the installer from the command line and appending ignoreprerequisites=1 to the command before executing.
• |
On the CMN FBC Web Server: Run AutoRun to install the Autodiscover, EWS and the Domino FBC Service on the CMN FBC Web Server. |
• |
On either the same CMN FBC Web Server or a separate CMN Exchange FBC Server: Run AutoRun to install the CMN Exchange FBC Service. |
You can obtain a certificate from either of two sources:
When you receive the certificate, you must install it on the appropriate server.
1 |
From Internet Information Services, click Server Certificates. |
2 |
From the Actions Pane, select Create Certificate Request. |
3 |
Enter autodiscover.<smtpdomain> or <smtpdomain> for the primary domain and all required subdomains. Then click Next. |
4 |
5 |
Specify the file name, and click Finish. |
6 |
1 |
From Internet Information Services, click Server Certificates. |
2 |
From the Actions Pane, select Complete Certificate Request. |
|
1 |
From Internet Information Services (IIS) Manager dialog box, right-click Default Web Site, and select Properties. |
2 |
From the Directory Security tab, select Server Certificate to open the Web Server Certificate Wizard. |
3 |
Click Next. |
4 |
5 |
6 |
Accept the defaults. Ensure Select cryptographic service provider (CSP) for this certificate is checked, and click Next. |
7 |
9 |
Enter autodiscover.<smtpdomain> —or— <smtpdomain> as the common name, for the primary domain and all required subdomains. Then click Next. |
12 |
13 |
1 |
From Internet Information Services (IIS) Manager dialog box, right-click Default Web Site, and select Properties. |
2 |
From the Directory Security tab, select Server Certificate to open the Web Server Certificate Wizard, and click Next. |
3 |
6 |
7 |
From Internet Information Services (IIS) Manager dialog box, right-click Default Web Site, and select Properties. |
9 |
1 |
From a web browser, enter https://<Local_Certification_Authority_computer>/certsrv |
2 |
3 |
Select Submit a certificate request by using a base-64-encoded CMC or PKCS #10 file, or submit a renewal request by using a base-64-encoded PKCS #7 file. |
5 |
Copy and paste the text from the certificate request into the Saved Request box when you selected Submit a certificate request by using a base-64-encoded CMC or PKCS #10 file, or submit a renewal request by using a base-64-encoded PKCS #7 file. |
6 |
7 |
Go to the web site of the public CA, and follow their instructions to request a certificate.
This procedure lets you configure a single certificate to answer for multiple addresses. First, you must enable the SAN (Subject Alternate Name) flag on your CA. On the machine running CA services, run these commands at the command prompt to enable the flag:
When the SAN flag is enabled, you can create the certificate:
1 |
Open IIS on the machine running F/B and select the server. Scroll to the bottom, open Server Certificates, and click on Create Certificate Request. |
2 |
For the common name, enter something appropriate for your larger domain. For example, for a domain alejandro.xyzcorp.com, the common name on the certificate is *.xyzcorp.com. (This is somewhat generic, as we will later add specific namespaces to the certificate.) |
4 |
Open the certificate request you just created, and select and copy all of the text. |
5 |
Open the certificate web enrollment page for the CA of your domain—e.g., https://hostname/certsrv. Then select Request a Certificate, and then select Advanced Certificate Request. |
6 |
Select Submit a certificate request by using a base-64-encoded CMC or PKCS #10 file, or submit a renewal request by using a base-64-encoded PKCS #7 file. |
7 |
In the Base-64-encoded certificate request box, paste all of the text that you copied from the text file in step 4 above. |
8 |
9 |
In the Additional Attributes box, enter any alternate-domain information in this format: |
10 |
Select the DER encoded radio button, and then select Download certificate chain. |
12 |
Go back to IIS and click Complete Certificate Request. |
13 |
For the Filename containing the certification authority’s response, click the Browse button and select the certificate you just saved. (Be sure to change the file type to *.* instead of *.cer, or you won’t see the file you saved—since it is a .P7B extension.) Type a friendly name that is easy to remember and identify so you can find it later on the list. You should then see your new certificate on the list. |
15 |
Click the Details tab, and scroll down to Subject Alternative Name. Highlight this field, and you should see all of your domains in the Details box. |
Now bind your certificate to the HTTPS protocol on the default first website:
1 |
On the CMN F/B computer, in IIS Manager: Select Default Web Site. |
2 |
3 |
4 |
In the Edit Site Binding window, in the SSL certificate drop-down list: Select the certificate you just created. |
5 |
Click OK. |
Log in as the CMN account to be used with the F/B Connector (if you haven’t already). Then, in Internet Options (via Windows Control Panel or IE Tools):
1 |
2 |
In Settings, scroll down to User Authentication | Logon, and click the radio button for Automatic logon with current user name and password. |
3 |
4 |
Add the Exchange Server EWS and Autodiscover URLs to the Trusted Sites. |
5 |
By default, CMN is installed with the log4net utility to generate log files of CMN components’ activity. This information is critical to diagnosing any configuration issues that may arise. Logging is enabled by default for all CMN components.
The default configurations will be suitable for most organizations and circumstances, but you can customize logging features. The log4net utility may be configured to work a particular way with each CMN component. Configuration instructions are nearly identical for all components, so we present the instructions separately, in Appendix C of the User Guide.
© ALL RIGHTS RESERVED. Conditions d’utilisation Confidentialité Cookie Preference Center