To set up synchronization with a Microsoft Exchange environment, a server has to be available that has the following software installed on it:
- Windows operating system
The following versions are supported:
-
Windows Server 2022
-
Windows Server 2019
-
Windows Server 2016
-
Windows Server 2012 R2
-
Windows Server 2012
-
Microsoft .NET Framework version 4.8 or later
NOTE: Take the target system manufacturer's recommendations into account.
-
Windows Management Framework 4.0
IMPORTANT: The Microsoft Exchange One Identity Manager connector uses Windows PowerShell to communicate with the Microsoft Exchange server. For communication, extra configuration is required on the synchronization server and the Microsoft Exchange server.
Related topics
The One Identity Manager Service must be installed on the synchronization server with the Microsoft Exchange connector. The synchronization server must be declared as a Job server in One Identity Manager.
Table 3: Properties of the Job server
Server function |
Microsoft Exchange connector |
Machine role |
Server | Job Server | Active Directory | Microsoft Exchange |
NOTE: If several target system environments of the same type are synchronized under the same synchronization server, it is recommended that you set up a Job server for each target system for performance reasons. This avoids unnecessary swapping of connections to target systems because a Job server only has to process tasks of the same type (re-use of existing connections).
Use the One Identity Manager Service to install the Server Installer. The program runs the following steps:
-
Sets up a Job server.
-
Specifies machine roles and server function for the Job server.
-
Remotely installs One Identity Manager Service components corresponding to the machine roles.
-
Configures the One Identity Manager Service.
-
Starts the One Identity Manager Service.
NOTE: The program performs a remote installation of the One Identity Manager Service. Local installation of the service is not possible with this program.
To remotely install the One Identity Manager Service, you must have an administrative workstation on which the One Identity Manager components are installed. For more information about installing a workstation, see the One Identity Manager Installation Guide.
NOTE: To generate processes for the Job server, you need the provider, connection parameters, and the authentication data. By default, this information is determined from the database connection data. If the Job server runs through an application server, you must configure extra connection data in the Designer. For more information about setting up Job servers, see the One Identity Manager Configuration Guide.
To remotely install and configure One Identity Manager Service on a server
-
Start the Server Installer program on your administrative workstation.
-
On the Database connection page, enter the valid connection credentials for the One Identity Manager database.
-
On the Server properties page, specify the server on which you want to install the One Identity Manager Service.
-
Select a Job server from the Server menu.
- OR -
To create a new Job server, click Add.
-
Enter the following data for the Job server.
-
Server: Name of the Job server.
-
Queue: Name of the queue to handle the process steps. Each Job server within the network must have a unique queue identifier. The process steps are requested by the Job queue using this exact queue name. The queue identifier is entered in the One Identity Manager Service configuration file.
-
Full server name: Full server name in accordance with DNS syntax.
Syntax:
<Name of servers>.<Fully qualified domain name>
NOTE: You can use the Extended option to make changes to other properties for the Job server. You can also edit the properties later with the Designer.
-
On the Machine roles page, select Microsoft Exchange.
-
On the Server functions page, select Microsoft Exchange connector.
-
On the Service Settings page, enter the connection data and check the One Identity Manager Service configuration.
NOTE: The initial service configuration is predefined. If further changes need to be made to the configuration, you can do this later with the Designer. For more information about configuring the service, see the One Identity Manager Configuration Guide.
-
To configure remote installations, click Next.
-
Confirm the security prompt with Yes.
-
On the Select installation source page, select the directory with the install files. Change the directory if necessary.
-
If the database is encrypted, on the Select private key file page, select the file with the private key.
-
On the Service access page, enter the service's installation data.
-
Computer: Enter the name or IP address of the server that the service is installed and started on.
-
Service account: Enter the details of the user account that the One Identity Manager Service is running under. Enter the user account, the user account's password and password confirmation.
The service is installed using the user account with which you are logged in to the administrative workstation. If you want to use another user account for installing the service, you can enter it in the advanced options. You can also change the One Identity Manager Service details, such as the installation directory, name, display name, and the One Identity Manager Service description, using the advanced options.
-
Click Next to start installing the service.
Installation of the service occurs automatically and may take some time.
-
Click Finish on the last page of the Server Installer.
NOTE: In a default installation, the service is entered in the server’s service management with the name One Identity Manager Service.
IMPORTANT: Run the configuration steps on the Microsoft Exchange server and the synchronization server.
To configure a server for remote access using Windows PowerShell
-
Run Windows PowerShell with administrator credentials from the Run as Administrator context menu.
-
Enter this command at the prompt:
winrm quickconfig
This command prepares for remote access usage.
-
Enter this command at the prompt:
Set-ExecutionPolicy RemoteSigned
This command permits the Windows PowerShell commands (Cmdlets) to be carried out. The script must be signed by a trusted publishers.
-
Enter this command at the prompt:
Set-Item wsman:\localhost\client\trustedhosts * -Force
This command modifies the list of trusted hosts to enable authentication.
The value * allows all connections. One Identity Manager uses the server's fully qualified domain name for the connection. You can limit the value.
To test remote access through Windows PowerShell from the synchronization server to the Microsoft Exchange server (sync.)
-
Run Microsoft Exchange on the Windows PowerShell synchronization server.
-
Enter this command at the prompt:
$creds = New-Object System.Management.Automation.PSCredential ("<domain>\<user>", (ConvertTo-SecureString "<password>" -AsPlainText -Force))
- OR -
$creds = Get-Credential
This command finds the access data required for establishing the connection.
-
Enter this command at the prompt:
$session = New-PSSession -Configurationname Microsoft.Exchange -ConnectionUri http://<ServerName as FQDN>/powershell -Credential $creds -Authentication Kerberos
This command creates a remote session.
NOTE: One Identity Manager establishes a connection using the fully qualified domain name of the Microsoft Exchange server. The server name must therefore be in the list configured with trusted hosts.
-
Enter this command at the prompt:
Import-PsSession $session
This command imports the remote session so that the connection can be accessed.
-
Test the functionality with any Microsoft Exchange command. For example, enter the following command at the prompt:
Get-Mailbox
For synchronization with a Microsoft Exchange environment, Active Directory domain trusts must be declared in One Identity Manager. Users can access resources in other domains depending on the domain trusts.
-
Explicit trusts are loaded into Active Directory by synchronizing with One Identity Manager. Domains which are trusted by the currently synchronized domains are found.
-
To declare implicit two-way trusts between domains within an Active Directory forest in One Identity Manager, ensure that the parent domain is entered in all child domains.
To enter the parent domain
-
In the Manager, select the Active Directory > Domains category.
-
Select the domain in the result list.
-
Select the Change main data task.
-
Enter the parent domain.
-
Save the changes.
Implicit trusts are created automatically.
To test trusted domains
-
In the Manager, select the Active Directory > Domains category.
-
Select the domain in the result list.
-
Select Specify trust relationships.
This shows domains that trust the selected domain.
For more information, see the One Identity Manager Administration Guide for Connecting to Active Directory.