Publishing Exchange Server 2007 with ISA Server 2006

Microsoft® Internet Security and Acceleration (ISA) Server 2006 and Microsoft Exchange Server 2007 are designed to work closely together in your network to provide a secure messaging environment. This document explains how to publish computers running Exchange 2007 both to receive and send Internet e-mail messages and to allow clients to access their mailboxes from the Internet.

Note

This document applies to Exchange Server 2007. This document does not cover Exchange Server 2003, Exchange 2000 Server, or Exchange Server version 5.5. For information about publishing Exchange 2003, see "Publishing Exchange Server 2003 with ISA Server 2006" at the Microsoft TechNet Web site.

ISA Server 2006 is the security gateway that helps protect your mission-critical applications from Internet-based threats. ISA Server enables your business to do more, with secure access to Microsoft applications and data. Secure your Microsoft application infrastructure by protecting your corporate applications, services, and data across all network layers with stateful packet inspection, application-layer filtering, and comprehensive publishing tools. Streamline your network with simplified administrator and user experiences through a unified firewall and virtual private network (VPN) architecture. Safeguard your information technology environment to reduce security risks and costs, and help eliminate the effects that malicious software and attackers have on your business.

Exchange 2007 is the latest Microsoft messaging and collaboration server software product that runs on servers. Using Exchange 2007, you can send and receive electronic mail and other forms of interactive communication through computer networks. Designed to interoperate with a software client application such as Microsoft Office Outlook®, Exchange 2007 also interoperates with Outlook Express and other e-mail client applications. E-mail messages are sent and received through what is commonly referred to as a client device such as a personal computer, workstation, or a mobile device including mobile phones or Pocket PCs. The client typically connects to a network of centralized computer systems comprised of servers or mainframe computers where the e-mail mailboxes are stored. The centralized e-mail servers connect to the Internet and private networks where e-mail messages are sent to and received from other e-mail users. Exchange 2007 also enables companies to send and receive Internet e-mail messages.

Contents

Exchange 2007 Server Roles

Receiving and Sending Internet E-Mail Messages

Client Access

Appendix A: Additional Publishing Features

Appendix B: Troubleshooting

Appendix C: Configuring Certificate-Based Authentication with Exchange ActiveSync through ISA Server

Appendix D: Configuring Basic and Negotiate Authentication Delegation for Outlook Web Access

Exchange 2007 Server Roles

In previous versions of Microsoft Exchange Server, administrators were offered limited choices on what features could or could not be installed. For example, in Exchange Server 2003 and Exchange 2000 Server, the setup process installed all features regardless of which features the administrator planned to use. This behavior required the administrator to turn off or disable the undesired features.

Because organizations tend to group their management tasks around a core set of server roles, Exchange Server 2007 maps Exchange Server management to this more natural way of doing things. System management in Exchange 2007 fundamentally shifts the administrative experience for deploying and managing servers to focus on server roles.

For more information about Exchange 2007, see the Microsoft Exchange Server 2007 Web site.

For more information about Exchange 2007 system requirements, see "Exchange 2007 System Requirements" at the Microsoft TechNet Web site.

Overview of Server Roles

A server role is a unit that logically groups the required features and components needed to perform a specific function in the messaging environment. The requirement of a server role is that it is a server that could be run as an atomic unit of scalability. A server role is composed of a group of features.

Server roles, the primary unit of deployment, enable administrators to easily choose which features are installed on an Exchange server. Logically grouping features in server roles offers the following advantages:

  • Reduces attack surface on an Exchange server.
  • Allows you to install and configure an Exchange server the way you intend to use it.
  • Offers a simple installation, and the ability to fully customize a server to support your business goals and needs.

Exchange Server 2007 includes the following server roles:

Server role Description

Mailbox Server

This is a back-end server that can host mailboxes and public folders.

Client Access Server

The Client Access server role supports Microsoft Outlook Web Access and Microsoft Exchange ActiveSync® client applications, and the Post Office Protocol version 3 (POP3) and Internet Message Access Protocol version 4rev1 (IMAP4) protocols. The Client Access server role also supports services, such as the Autodiscover service and Web services.

Unified Messaging Server

This is the middle-tier server that connects a Private Branch eXchange (PBX) system to Exchange 2007.

Hub Transport Server

This is the mail routing server that routes mail within the Exchange organization.

Edge Transport Server

This is the mail routing server that typically sits at the perimeter of the topology and routes mail in to and out of the Exchange organization.

For more information about the Exchange 2007 server roles, see "Server Roles" at the Microsoft TechNet Web site.

Receiving and Sending Internet E-Mail Messages

The following sections discuss how to configure ISA Server so that you can receive and send Simple Mail Transfer Protocol (SMTP) e-mail messages.

Receiving Internet E-Mail Messages

This section describes how to configure ISA Server to allow Internet e-mail messages to reach your Exchange 2007 server or SMTP server through your ISA Server computer. To receive Internet e-mail through an ISA Server computer, you need to publish your SMTP mail server. When you publish your mail server, SMTP traffic on TCP port 25 from the Internet will be allowed directly to your SMTP server. Normally, you will configure one Exchange 2007 server in your Exchange 2007 organization to send and receive SMTP connections from the Internet. This is typically an Exchange 2007 server configured as a Hub Transport server or Edge Transport server. The Hub Transport server and the Edge Transport server do not host the Exchange information store databases. The Hub Transport server and Edge Transport server accept incoming e-mail messages and forward the e-mail messages to the appropriate server for processing.

Requirements to Publish an SMTP Server

When someone on the Internet wants to send e-mail messages to an employee in your company, all the sender has is the employee's e-mail address, for example, mberg@contoso.com. When the e-mail message is sent to mberg@contoso.com, the sender's e-mail program or e-mail server needs to find out where to send the message for the requested domain, in this case, contoso.com. This is done by querying the Domain Name System (DNS) for the mail exchange (MX) record for contoso.com. The MX record is a special type of resource record in DNS specifying a host record of servers accepting incoming e-mail messages for the domain. To receive e-mail messages from the Internet, a domain should have at least one MX record, but may have multiple MX records to provide fault tolerance. The DNS server will return all listed MX records for a domain, and the e-mail client will attempt to establish an SMTP connection using the listed MX records, in preference order. The MX record points to the A record, which points to the IP address of the SMTP server.

The following requirements must be met before publishing your SMTP server:

  • Create an A record and point the A record to the external IP address of the ISA Server computer.
  • Create an MX record pointing to the A record.

Note the following:

  • These records need to be created on your public DNS servers.
  • If you are changing an existing DNS record, depending on the Time to Live setting for the DNS record, it may take time to for the changes to propagate across the Internet. Make sure to provide enough time for these changes to take effect before testing.

Important

If you are running ISA Server Enterprise Edition and you have enabled Network Load Balancing (NLB) integration, you should create an MX record for each array member using the dedicated IP address for each array member instead of the virtual IP address of the NLB cluster. If you use the virtual IP address as the MX record, you can receive e-mail messages. However, e-mail messages sent to a server that is performing various checks on the sending SMTP server, such as a reverse DNS lookup on your domain, will be rejected. For more information, see the section Common E-Mail Validation Checks and Sending Internet E-Mail Messages with ISA Server.

Before You Begin

Before running the New Mail Server Publishing Rule Wizard, use the following worksheet to gather information.

Item Description or value

Access type

Circle all that apply:

  • SMTP
  • Secure SMTP
  • Newsgroups (NNTP)

Internal IP address of SMTP server (mail server IP address)

IP address: ___.___.___.___

External IP address that ISA Server will listen on

IP address: ___.___.___.___

Bb794751.note(en-us,TechNet.10).gifImportant:
This address needs to match the address that the MX record resolves to.

Has public DNS been properly configured?

Are A records configured?

Are MX records configured?

Circle:

Yes or No

Yes or No

Yes or No

Publish a Mail Server to Receive Internet E-Mail Messages

In this section, you will run the New Mail Server Publishing Rule Wizard to publish an SMTP mail server. Perform the following procedure to publish the SMTP mail server.

To publish a mail server

  1. In the console tree of ISA Server Management, click Firewall Policy:

    • For ISA Server 2006 Standard Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Server_Name, and then click Firewall Policy.
    • For ISA Server 2006 Enterprise Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Arrays, expand Array_Name, and then click Firewall Policy.
  2. On the Tasks tab, click Publish Mail Servers. Use the wizard to create the rule as outlined in the following table.

    Page Field or property Setting

    Welcome

    Mail Server Publishing rule name

    Type a name for the rule, such as Inbound SMTP.

    Select Access Type

    Selectthetypeofaccessthismailserverwillprovide.

    Select Server-to-server communication: SMTP, NNTP.

    Select Services

    Server to Server communications

    Select SMTP.

    If you need to publish secure SMTP or NNTP, select the appropriate service.

    For more information about secure SMTP and NNTP, see the Exchange 2007 product documentation.

    Select Server

    Server IP address

    Type the IP address of the SMTP mail server you are publishing.

    Network Listener IP Addresses

    Listen for requests from these networks.

    Select the network and IP address on which the ISA Server computer will listen for SMTP requests

    Select External and click Address to specify a specific IP address.

    External Network Listener IP Selection

    Listen for requests on

    Available IP Addresses

    Select Specified IP addresses on the ISA Server computer in the selected network.

    Select the appropriate IP addresses and click Add.

    Bb794751.note(en-us,TechNet.10).gifImportant:
    The selected IP addresses must match the MX record IP addresses.

    Completing the New Mail Server Publishing Rule Wizard

    Completing the New Mail Server Publishing Wizard

    Review the selected settings and click Back to make changes and Finish to complete the wizard.

  3. Click the Apply button in the details pane to save the changes and update the configuration.

Important

If you are publishing an Edge Transport server that is located in a perimeter network, also known as a demilitarized zone (DMZ), to accept SMTP mail for your internal Exchange servers, you need to open TCP port 25 between the Edge Transport server in the perimeter network to the Exchange servers on the Internal network.

Test inbound SMTP traffic

Mail servers on the Internet should now be able to connect on TCP port 25 to your inbound SMTP server to send e-mail messages to your organization. You should test that this connectivity is working. There are a few ways to test that inbound SMTP traffic is arriving. The easiest way is to send a test e-mail message to your domain from the Internet.

For additional information about testing SMTP traffic, see "XFOR: Telnet to Port 25 to Test SMTP Communication" at the Microsoft Support Web Site.

Sending Internet E-Mail Messages

After you configure inbound Internet e-mail, the next step is to configure outbound e-mail message traffic from your organization to be sent to the Internet through ISA Server. Typically, you have one Exchange 2007 server configured to send e-mail messages to the Internet via the SMTP protocol. This is typically an Exchange 2007 server with the Hub Transport or Edge Transport server role installed. In this case, the Hub Transport or Edge Transport server accepts SMTP requests from the other Exchange servers in your organization and forwards the requests to the appropriate mail server on the Internet. The Hub Transport or Edge Transport server needs to be able to create SMTP sessions to mail servers on the Internet. Additionally, the Hub Transport or Edge Transport server must be able to perform DNS queries to find the MX record for the domain to which the e-mail message is being sent.

The following sections describe how to create an outbound SMTP access rule.

Confirm the SMTP Server Can Query DNS

Create a Computer Object for the SMTP Server

Create an Outbound SMTP Access Rule

Confirm the SMTP Server Can Query DNS

When the SMTP server has an e-mail message to deliver, it must resolve the MX record and corresponding A record of the recipient's domain. This resolution is done by means of DNS queries.

The first step is to confirm that the SMTP server can perform DNS queries. If the SMTP server cannot perform DNS queries, it will not send Internet e-mail messages. These messages accumulate in the SMTP server's queue, and eventually delivery will fail.

Perform the following procedure to confirm that the SMTP server can perform DNS queries.

To query an MX record for a domain from a command prompt

  1. Open a Command Prompt window.

  2. Type nslookup and press ENTER.

  3. Type set q=mx and press ENTER.

    This sets a filter to only collect MX records and related information.

  4. Type the following: domain_name.com, where domain_name is the domain that you want to obtain the DNS records for, for example, microsoft.com or msn.com. An output similar to the following is displayed:

    Server: [157.178.72.30]

    Address: 157.178.72.30

    microsoft.com MX preference = 10, mail exchanger = mail1.microsoft.com

    microsoft.com MX preference = 10, mail exchanger = mail2.microsoft.com

    microsoft.com MX preference = 10, mail exchanger = mail3.microsoft.com

    microsoft.com MX preference = 10, mail exchanger = mail4.microsoft.com

    microsoft.com MX preference = 10, mail exchanger = mail5.microsoft.com

    mail1.microsoft.com internet address = 131.107.3.125

    mail2.microsoft.com internet address = 131.107.3.124

    mail3.microsoft.com internet address = 131.107.3.123

    mail4.microsoft.com internet address = 131.107.3.122

    mail5.microsoft.com internet address = 131.107.3.121

If the SMTP server cannot query DNS, check the server's TCP/IP settings. If the server is configured to use a public DNS server, check that you have an access rule allowing DNS traffic to the Internet from the SMTP server.

Create a Computer Object for the SMTP Server

In this section, you will create a computer object for the SMTP server. This object will be used when creating the access rule, allowing you to limit outbound SMTP access to the created computer object. If you have more than one SMTP server that needs to send SMTP messages to the Internet, do the following:

  • Create a computer set for all of your SMTP computer objects instead of creating a computer object.

Perform the following procedure to create a computer object.

To create a computer object

  1. In the console tree of ISA Server Management, click Firewall Policy:

    • For ISA Server 2006 Standard Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Server_Name, and then click Firewall Policy.
    • For ISA Server 2006 Enterprise Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Arrays, expand Array_Name, and then click Firewall Policy.
  2. On the Toolbox tab, click Network Objects, click New, and then select Computer.

  3. Type a name for the computer object, such as SMTP Server, in the Name field and type the computers IP address in the Computer IP Address field. If you do not know the IP address, you can use the Browse button.

Create an Outbound SMTP Access Rule

Perform the following procedure to create an outbound SMTP access rule.

To create an outbound SMTP access rule

  1. In the console tree of ISA Server Management, click Firewall Policy:

    • For ISA Server 2006 Standard Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Server_Name, and then click Firewall Policy.
    • For ISA Server 2006 Enterprise Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Arrays, expand Array_Name, and then click Firewall Policy.
  2. On the Tasks tab, click Create Access Rule. Use the wizard to create the rule as outlined in the following table.

    Page Field or property Setting

    Welcome

    Access rule name

    Type a name for the rule, such as Outbound SMTP.

    Rule Action

    Action to take when rule conditions are met.

    Select Allow.

    Protocols

    This rule applies to

    Protocols

    Select Selected Protocols.

    Add the SMTP protocol to the list.

    To add the SMTP protocol to the list, click Add to open the Add Protocols dialog box. In the Add Protocols dialog box, expand Common Protocols, and select SMTP. Click Add and then click Close to close the Add Protocols dialog box.

    Access Rule Sources

    This rule applies to traffic from these sources

    Add the computer object created in the previous section. For example, add SMTP Server.

    To add a computer object, click Add to open the Add Network Entities dialog box. In the Add Network Entities dialog box, expand Computers, and select the correct computer object. Click Add, and then click Close to close the Add Network Entities dialog box.

    Access Rule Destination

    This rule applies to traffic sent to these destinations

    Add the External network to the list.

    To add the External network, click Add to open the Add Network Entities dialog box. In the Add Network Entities dialog box, expand Networks, and select External. Click Add, and then click Close to close the Add Network Entities dialog box.

    User Sets

    This rule applies to requests from the following user sets

    Leave the default of All Users.

    Completing the New Access Rule Wizard

    Completing the New Access Rule Wizard

    Review the selected settings, and click Back to make changes and Finish to complete the wizard.

  3. Click the Apply button in the details pane to save the changes and update the configuration. It may take a few minutes for the rule to be applied.

    Note

    Remember that access rules are ordered, so if a deny rule matching SMTP access requests exists ahead of this allow rule, access will be denied.

  4. Send a test e-mail message to a user on the Internet and confirm that the user received the test e-mail message.

Common E-Mail Validation Checks and Sending Internet E-Mail Messages with ISA Server

To reduce the amount of spam messages that companies receive, some administrators configure their SMTP servers to validate different pieces of information received during different stages of the e-mail delivery process. If the SMTP server is not able to properly validate the information as configured on the SMTP server, the e-mail message will be rejected. Because what information is validated and how the information is validated is determined by the administrator of the receiving SMTP server, it can be difficult to troubleshoot the reason why an e-mail message is rejected by one company but accepted by other companies. Typically, the rejected e-mail message will show a reason why the message was rejected. The reason why the message was rejected can either be included in the rejected message body or the Internet headers of the e-mail message.

The following information is sent by the sending SMTP server when attempting to send e-mail messages to another SMTP server:

  • Public IP address of the SMTP server. This is the source IP address of the IP packets.
  • HELO/EHLO host name.
  • Sender's domain.

The following sections describe some of the more common information that is validated by the receiving SMTP server.

Note

These e-mail validation checks do not affect e-mail messages sent by Internet mail servers to your domain.

Pointer Record Validation

A DNS pointer (PTR) record is used to map an IP address to a host name or host names depending on the version of DNS that is being used. The receiving SMTP server will perform a reverse DNS lookup on the IP address of the sending SMTP server. If a PTR record has been configured, the host name will be sent back as the information requested. Then, the SMTP server performs a forward lookup on the host name. If the IP address of the sending SMTP server and IP address of the forward lookup match, the e-mail message is assumed to have come from a valid SMTP server, and the e-mail message is allowed. If the two IP addresses do not match or there is no PTR record, the e-mail message is rejected.

To fix this scenario, confirm that you have a properly configured PTR record for the primary IP address for the External network adapter of the ISA Server computer. When applying network address translation (NAT), ISA Server uses the primary IP address of the network adapter that the traffic used when sent from the ISA Server computer. This IP address might be different from the IP address used when publishing your mail server.

Important

If you do not control your public DNS records, contact your Internet service provider (ISP) to add the appropriate PTR records.

Note the following:

  • If you are running ISA Server Enterprise Edition and you have an NLB-enabled array, you need to create a PTR record for the external IP address for each array member.
  • To check that you have a properly configured PTR record, visit the following Web sites: https://www.dnsstuff.com or https://www.dnsreport.com.

HELO/EHLO Host Name Validation

HELO/EHLO is a required SMTP command that is used to initiate the transfer of e-mail messages from one SMTP server to another SMTP server. The HELO command is used to identify the sending SMTP server, in the form of a host name, to the receiving SMTP server. The host name should be a fully qualified domain name (FQDN) that can be resolved on the Internet.

Some SMTP servers validate the host name in the HELO command. The receiving SMTP server performs a forward lookup on the host name it received in the HELO command. If the IP address that is received back matches the sending SMTP server's IP address, the e-mail message is allowed. However, if the IP address does not match or no address is returned for the host name, the e-mail message is rejected.

To fix this scenario, confirm the following:

  • You have properly configured the HELO/EHLO command on your SMTP server. The host name should be an FQDN that is resolvable on the Internet. For more information about configuring the HELO command, see the Exchange Sever product documentation.

  • The host name resolves to the primary IP address of the external network adapter. When applying network address translation (NAT), ISA Server uses the primary IP address of the network adapter that the traffic used when sent from the ISA Server computer. This IP address might be different from the IP address used when publishing your mail server.

    Important

    If you do not control your public DNS records, contact your ISP to add the appropriate host records.

Note the following:

  • If you are running ISA Server Enterprise Edition and you have an NLB-enabled array, you need to create a host record that resolves to the primary IP address for each array member.
  • To check that you have a properly configured host name record, visit the following Web sites: https://www.dnsstuff.com or https://www.dnsreport.com.

Domain MX Record Validation

Some receiving SMTP servers attempt to match the IP address that the e-mail message came from to the MX record of the sender's domain. In this case, the receiving SMTP server queries DNS for the MX record for the sender's domain. A forward lookup is performed on the host names and the receiving SMTP server attempts to match the IP address of the sending SMTP server to an IP address from a MX record. If there is a match, the e-mail message is allowed. However, if a match is not found, the e-mail message is rejected.

To fix this scenario, make sure that the address you are publishing your mail server on is the primary IP address of the external network adapter.

Important

If you have multiple SMTP servers behind the ISA Server computer, only one SMTP server can be published with the primary IP address of the external network adapter. In this case, you install an SMTP gateway that will handle all SMTP traffic for all of your SMTP servers. You need to configure the following:

  • Configure the SMTP gateway to accept e-mail messages for all of your domains, and to properly route the SMTP messages to the appropriate internal Exchange server.
  • Configure the SMTP gateway to accept SMTP messages from the internal SMTP servers.
  • Configure your existing SMTP servers to send SMTP e-mail messages to the new SMTP gateway.

You can use an Exchange Edge Transport server or the SMTP service with Internet Information Services (IIS) to act as your SMTP gateway. For configuration information, see the Exchange or IIS product documentation.

Additional Action

If the proposed changes cannot be made, or if it cannot be determined why the e-mail messages have been rejected, you can call the e-mail administrator for the company you are trying to send the e-mail message to. Ask if the application they are using has a safe sender/recipient list, and to add your domain to this list. After your domain or IP address of your SMTP server has been added to the safe list, e-mail messages sent from your SMTP server will be accepted.

Client Access

Many companies need employees to have access to their mailboxes when they are not in the office. This access provides a company with a competitive business edge by ensuring that employees can respond to important e-mail messages, check their calendars, update their contacts, and send updates to their managers from a customer's site, hotel, airport, or home, all in a timely fashion. Also, this functionality can be used by the company to offer flexible work schedules for employees.

The following table lists the client access methods supported by ISA Server 2006 for Exchange 2007 along with the paths configured for each method.

Access method Paths

Outlook Web Access

/owa/*

/public/*

/exchange/*

/Exchweb/*

Outlook Anywhere (RPC over HTTP or HTTPS)

/rpc/*

Outlook Anywhere (RPC over HTTP or HTTPS) with Publish additional folders on the Exchange Server for Outlook 2007 clients selected

/unifiedmessaging/*

/rpc/*

/OAB/*

/ews/*

/AutoDiscover/*

Exchange ActiveSync

/Microsoft-Server-ActiveSync/*

Note

Outlook Mobile Access is not available in Exchange 2007.

Important

When publishing Exchange 2007, you need to run the New Exchange Publishing Rule wizard for each access method separately. You can use the same Web listener for each rule. However, you can only publish one access method at a time you select Exchange Server 2007 as the Exchange version when running the New Exchange Publishing Rule wizard.

Note

If you are using different paths, you need to modify the default paths in the publishing rule.

This document explains how to publish Exchange client access with ISA Server 2006. Communications from external clients to the ISA Server computer and from the ISA Server computer to the published server are encrypted using Secure Sockets Layer (SSL).

By publishing Exchange client access with ISA Server 2006, you have the following security benefits:

  • When you publish an application through ISA Server, you are protecting the server from direct external access because the name and IP address of the server are not accessible to the user. The user accesses the ISA Server computer, which then forwards the request to the server according to the conditions of the server publishing rule.

  • SSL bridging protects against attacks that are hidden in SSL-encrypted connections. For SSL-enabled Web applications, after receiving the client's request, ISA Server decrypts it, inspects it, and terminates the SSL connection with the client computer. The Web publishing rules determine how ISA Server communicates the request for the object to the published Web server. If the secure Web publishing rule is configured to forward the request using Secure HTTP (HTTPS), ISA Server initiates a new SSL connection with the published server. Because the ISA Server computer is now an SSL client, it requires that the published Web server responds with a server-side certificate.

    Note

    The root certification authority (CA) certificate for a CA that issued the server certificate on the published Web server needs to be installed on the ISA Server computer.

  • You can configure forms-based authentication for supported applications. Using forms-based authentication, you can enforce required authentication methods, enable two-factor authentication, control e-mail attachment availability, and provide centralized logging. For more information about authentication, see "Authentication in ISA Server 2006" at the Microsoft TechNet Web site.

ISA Server 2006 also overcomes the difficulties of using client access VPN connections in the following ways:

  • Access to published applications is via a Web browser.
  • Applications are now more widely available and more accessible than remote access VPNs due to the use of SSL. Users can access published applications behind firewalls, from connections using NAT, and from other networking devices that might otherwise be blocking remote access VPN connections.
  • The reconnect process is easier and quicker, due to SSL. If your connection to the Internet is disconnected, you no longer need to reconnect with the remote access VPN dialer. After Internet access is reconnected, you can return to your published application.
  • Partners, vendors, and employees who are not in the office can easily access the required information in a secure way.

Publishing Exchange Web Client Access

The following sections provide the steps necessary to publish Exchange Web client access. The procedures describe a deployment of ISA Server in a production environment. We recommend that you thoroughly test ISA Server in a non-production, test environment before deploying ISA Server in production.

Network Topology

To deploy this solution, you will require the following computers, which are the minimal requirements for a laboratory configuration:

  • Computer to serve as the Exchange Client Access server

  • Computer to serve as an Exchange Mailbox server and Hub Transport server

  • Computer to serve as a domain controller

  • At least one internal client computer

  • A server running ISA Server 2006 Standard Edition or an array of computers running ISA Server 2006 Enterprise Edition

    Important

    For information about the hotfix that is required for publishing Exchange Server 2007, see "Update for Publishing Microsoft® Exchange Server 2007 for Internet Security and Acceleration (ISA) Server 2006" at the Microsoft Support Web site.

    Note

    An array of one computer will suffice running both ISA Server services and Configuration Storage server services. In a production environment, we recommend that the Configuration Storage server be installed behind the ISA Server services computer, for enhanced security. The Configuration Storage server stores all of the ISA Server configuration data, including administrative roles.

  • At least one external client computer or appropriate mobile device

For information about Exchange 2007 system requirements, see Exchange 2007 System Requirements.

Bb794751.39cf1c38-fc41-465c-96c0-dcddb64edff1(en-us,TechNet.10).gif

Authentication

You can configure forms-based authentication for supported applications, such as Outlook Web Access. Using forms-based authentication, you can enforce required authentication methods, enable two-factor authentication, and provide centralized logging. You can publish an application that does not support forms-based authentication even with a Web listener that is configured with forms-based authentication. In this case, ISA Server uses Basic authentication for applications that do not support forms-based authentication.

For more information about authentication, see "Authentication in ISA Server 2006" at the Microsoft TechNet Web site.

Note the following:

  • If you do not limit access to authenticated users, as in the case when a rule allowing access is applied to all users, ISA Server will not validate the user's credentials. ISA Server will use the user's credentials to authenticate to the Web server according to the configured delegation method.
  • We recommend that you apply each publishing rule to all authenticated users or a specific user set, rather than selecting Require all users to authenticate on the Web listener, which requires any user connecting through the listener to authenticate.
Client certificate and Kerberos constrained delegation support

ISA Server 2006 introduces the use of Kerberos constrained delegation, which is described in the article "Kerberos Protocol Transition and Constrained Delegation" at the Microsoft TechNet Web site. Without Kerberos constrained delegation, ISA Server can delegate credentials only when client credentials are received using Basic or forms-based authentication. With Kerberos constrained delegation, ISA Server can accept other types of client credentials, such as client certificates. ISA Server must be enabled on the domain controller to use Kerberos constrained delegation (constrained to a specific service principal name).

If authentication fails, ISA Server provides the server's failure notice to the client. If the server requires a different type of credentials, an ISA Server alert is triggered.

LDAP authentication

ISA Server 2006 supports Lightweight Directory Access Protocol (LDAP) authentication. LDAP authentication is similar to Active Directory® directory service authentication, except that the ISA Server computer does not have to be a member of the domain. ISA Server connects to a configured LDAP server over the LDAP protocol to authenticate the user. Every Microsoft Windows® domain controller is also an LDAP server, by default, with no additional configuration changes required. By using LDAP authentication, you get the following benefits:

  • A server running ISA Server 2006 Standard Edition or ISA Server 2006 Enterprise Edition array members in workgroup mode. When ISA Server is installed in a perimeter network, you no longer need to open all of the ports required for domain membership.
  • Authentication of users in a domain with which there is no trust relationship.

For information about configuring ISA Server for LDAP authentication, see "Secure Application Publishing" at the Microsoft TechNet Web site.

The following table lists the most common and recommended client authentication and authentication delegation methods for Exchange 2007.

Client authentication method (configured in the Web listener) Authentication validation method (configured in the Web listener) Authentication delegation (configured in the publishing rule) Access methods

HTML forms-based authentication

Windows (Active Directory)

LDAP (Active Directory)

RADIUS

Basic

Negotiate (Kerberos / NTLM)

Outlook Web Access (see the Important note that follows)

Outlook Anywhere

Microsoft ActiveSync (only Basic)

HTML forms-based Authentication

RSA SecurID

RSA SecurID

Outlook Web Access

Microsoft ActiveSync (requires RSA SecurID component installed on Exchange servers)

SSL client certificate authentication

Windows (Active Directory)

Kerberos constrained delegation

Outlook Web Access

Microsoft ActiveSync

Bb794751.note(en-us,TechNet.10).gifImportant:
  • If Basic is selected for authentication delegation, the following Exchange 2007 features will not function as expected:
    • Outlook Web Access 2007 Web Part. Outlook Web Access 2007 Web Part requires Integrated Windows authentication configured on the /owa/* directory.
    • Proxying between Exchange Client Access servers in different Active Directory sites. This requires the configuration of Integrated Windows authentication on the Exchange Client Access servers. For more information about proxying Exchange Client Access servers, see the Exchange Server 2007 product documentation.
  • If Negotiate is selected for Authentication delegation, the following will not work:
  • Access to mailboxes residing on Exchange 2003, through legacy folders, such as /public/*, /exchange/*, and /Exchweb/*. Access to these mailboxes via this method requires Basic authentication.
  • Clients that access the user's mailbox through the legacy folders, such as Microsoft Entourage 2004 for Mac and custom written applications using WebDAV extensions. This requires Basic authentication.
    For information about how to take advantage of the new Exchange 2007 features that require Negotiate authentication delegation and still provide access to the legacy folders that require Basic authentication delegation, see Appendix D. Configuring Basic and Negotiate Authentication Delegation for Outlook Web Access.

Note


Some of the features of Outlook Anywhere and Outlook Web Access that require the /ews/* path currently work only with Basic authentication.
This document assumes that the use of the default configured authentication method, Basic authentication, has been accepted on the Client Access server.

Exchange Configuration Requirements

This section describes the changes to the Exchange configuration that are required so that ISA Server Web client publishing works properly.

Confirm forms-based authentication not selected on the Exchange Client Access server

Enable Outlook Anywhere on the Exchange Client Access server

Install a server certificate on the Exchange Client Access server

Require secure channel (SSL) communications to the Web site

Confirm forms-based authentication not selected on the Exchange Client Access server

Forms-based authentication can be configured on the Client Access server when not using ISA Server to publish Exchange Web client access. When ISA Server is being used to publish Exchange Web client access, forms-based authentication should only be configured on the ISA Server computer.

Perform the following procedure to confirm that forms-based authentication is not selected on the Exchange Client Access server.

To confirm forms-based authentication is not selected on an Exchange front-end server

  1. Start the Exchange Management Console.

  2. In the Exchange Management Console, expand Server Configuration, and then click Client Access.

  3. Select your Client Access server, such as cas01, and then select owa (Default Web Site) on the Outlook Web Access page.

    Bb794751.c55dd338-2b29-4e53-a446-e27a4d4cf2f9(en-us,TechNet.10).gif

  4. In the action pane, click Properties under owa (Default Web Site).

  5. Select the Authentication page, and confirm that the following are selected: Use one or more of the following standard authentication methods and Basic authentication (password is sent in clear text).

    Bb794751.a99d0cb9-b9ca-4a79-8ab3-3e84018d43c3(en-us,TechNet.10).gif

  6. Click OK.

  7. Review the Microsoft Exchange Warning dialog box and click OK. For the changes that were just made, you must restart Internet Information Services (IIS). For instructions, see step 9.

    Bb794751.00f68f63-c589-4dad-bb0e-2c537f9f14c6(en-us,TechNet.10).gif

  8. Repeat steps 1–6 for the following sites: Exchange (Default Web Site), Exchweb (Default Web Site), and Public (Default Web Site)

  9. To restart IIS, run the following command: "iisreset /noforce".

Note

Perform this procedure for every Exchange Client Access server in your environment that will be used for Outlook Web Access.

Enable Outlook Anywhere on the Client Access server

If you will provide Outlook Anywhere (RPC over HTTP) access to your users, you need to enable Outlook Anywhere on your Client Access servers.

To enable Outlook Anywhere, you must perform the following procedures.

To install the RPC over HTTP Windows network component

  1. Click Start, point to Settings, click Control Panel, and then double-click Add or Remove Programs.

  2. Click Add/Remove Windows Components.

  3. On the Windows Components page, in the Components window, select Networking Services, and then click the Details button.

  4. On the Networking Services page, in the Subcomponents of Networking Services window, select the check box next to RPC over HTTP Proxy, and then click OK.

  5. On the Windows Components page, click Next.

  6. Click Finish to close the Windows Components Wizard.

To enable Outlook Anywhere on your Client Access server

  1. Start the Exchange Management Console.

  2. In the Exchange Management Console, expand Server Configuration, and then click Client Access.

  3. Select your Client Access server, such as cas01.

  4. In the action pane, click Enable Outlook Anywhere under the server name you just selected.

  5. Enter the host name that the client will use to connect to the Client Access server in the External Host name field, such as mail.contoso.com.

    Note

    This name should match the common name or FQDN used in the server certificate installed on the ISA Server computer.

    Bb794751.1a57a13c-63ae-4dae-ade4-39827b3f72a5(en-us,TechNet.10).gif

  6. Confirm that the External authentication method is set to NTLM authentication and click Enable.

Note

Perform this procedure for every Exchange Client Access server in your environment.

Install a server certificate on the Exchange Client Access server

To ensure the communications between the ISA Server computer and the Exchange Client Access server are properly secured, you need to install a server certificate on the Exchange Client Access server. This certificate can be from an internal CA and does not need to be purchased from a public CA. Outlook Anywhere will not work without a server certificate installed unless you select Allow secure channel (SSL) offloading, when enabling Outlook Anywhere.

This procedure is performed on the Client Access server and assumes that an internal enterprise CA has already been installed. For information about how to install a Microsoft Windows Server® 2003 enterprise CA, see "How to Install a Windows Server 2003 Enterprise CA" at the Microsoft TechNet Web site.

Before you begin, you should decide on a fully qualified domain name (FQDN) (also referred to as a common name).

Important

The FQDN used to create the server certificate on the Client Access server needs to match the value set for either the Internal site name or Computer name or IP address fields on the Internal Publishing Details page of the New Exchange Publishing wizard. The SSL connection between the ISA Server computer and the Client Access server will not be successful if ISA Server uses a different FQDN than the FQDN used to create the certificate.

Perform the following procedure to install a server certificate on the Client Access server.

Note

When you install Exchange 2007, you can install a default Secure Sockets Layer (SSL) certificate that is created by Exchange Setup. However, this certificate is not a trusted SSL certificate. We recommend that you install a certificate from a trusted CA.

Important

This procedure will only work if you have a Windows Server 2003 enterprise CA installed in your domain.

To obtain a new server certificate using the Web Server Certificate Wizard

  1. In IIS Manager, expand the local computer, and then expand the Web Sites folder.

  2. Right-click the Web site for the Exchange front-end services, by default, the Default Web Site, and click Properties.

  3. On the Directory Security tab, under Secure communications, click Server Certificate. Use the wizard to request and install the Web server certificate.

  4. In the Web Server Certificate Wizard, select Create a new certificate.

    Note

    If you installed a certificate during Exchange Setup, select Remove the current certificate on the Modify the Current Certificate Assignment page, and click Next. You can now restart the procedure.

  5. On the Delayed or Immediate Request page, select Send the request immediately to an online certification authority.

  6. Enter the required information on the Name and Security Settings and the Organization Information pages.

  7. Type the FQDN on the Your Site's Common Name page.

    Important

    ISA Server must resolve this name to the Client Access server. The FQDN entered will be used when publishing the Exchange Web client access.

  8. Enter the required information on the Geographical Information page.

  9. Accept the default port of 443 on the SSL Port page.

  10. From the list under Certification authorities, select the correct internal enterprise CA.

  11. Review your request on the Certificate Request Submission page and click Next to submit your request. This will also install the certificate for your Web site.

  12. Click Finish on the Completing the Web Server Certificate Wizard page to close the wizard.

Note


If you have multiple Exchange Client Access servers providing Exchange Web client access, you need to perform this procedure on each Client Access server using the same common name or FQDN for each server. Alternatively, you can export the certificate along with its private key and import the certificate to the additional Client Access servers.
In addition, you can configure SSL client authentication between the Exchange Client Access server and the ISA Server computer. For more information, see ISA Server product Help.

Require secure channel (SSL) communications to the Web site

After a certificate is installed for the Web site, you need to require the Web site to only accept secure channel communications (SSL only communications).

Perform the following procedure to enable Require secure channel (SSL).

To enable secure communications

  1. In IIS Manager, expand the local computer, and then expand the Web Sites folder.

  2. Right-click the Web site where the Exchange front-end services have been installed, by default, the Default Web Site, and click Properties.

  3. On the Directory Security tab, under Secure communications, click Edit.

  4. Select Require secure channel (SSL) on the Secure Communication page, and then click OK. Click OK again to close the Web site properties dialog box.

Note

If you have multiple Exchange Client Access servers providing Exchange Web client access, you need to perform this procedure on each Client Access server.

ISA Server Requirements

Before you run the New Exchange Publishing Rule wizard, you should complete the following procedures.

Install server certificate on the ISA Server computer

Update public DNS

Install server certificate on the ISA Server computer

To enable a secure connection between the client computer and the ISA Server computer, you need to install a server certificate on the ISA Server computer. This certificate should be issued by a public CA because it will be accessed by users on the Internet. If a private CA is used, the root CA certificate from the private CA will need to be installed on any computer that needs to create a secure connection (an HTTPS connection) to the ISA Server computer.

In many cases, the ISA Server computer does not have IIS installed. The following procedures assume that IIS is not installed on the ISA Server computer. Use the following procedures to import a certificate on the ISA Server computer.

Request and install a server certificate from a public CA

Export the server certificate to a file

Import the server certificate on the ISA Server computer

Request and install a server certificate from a public CA

This procedure will create a new Web site on an existing computer with IIS installed. After the Web site has been created, follow the steps provided by the public CA to request and install a server certificate for the new Web site.

Perform the following procedure to request and install a server certificate on a computer with IIS installed.

To request and install a server certificate from a public CA

  1. In IIS, create a new Web site, pointing the Web site to a new empty directory.

  2. In IIS Manager, expand the local computer, right-click the Web Sites folder, click New, and then click Web Site to start the Web Site Creation Wizard.

  3. Click Next on the Welcome page.

  4. Type a name for the Web site in the Description field. For example, type ISA Cert Site, and click Next.

  5. Accept the default settings on the IP Address and Port Settings page.

  6. Enter a path for the Web site on the Web Site Home Directory page. For example, enter c:\temp.

  7. Accept the default settings on the Web Site Access Permissions page and click Next.

  8. Click Finish to complete the Web Site Creation Wizard.

    Important

    By default, the new Web site is stopped. You should leave this Web site in the stopped state. There is no reason to start this Web site.

    Note

    For more information about creating a new Web site, see IIS product documentation.

  9. Follow the steps provided by the public CA to create and install a server certificate.

    Important

    The important information in the certificate is the common name or FQDN. Enter the FQDN that will be used by users on the Internet to connect to the Exchange Outlook Web Access site. For example, enter mail.contoso.com.

    Note

    Confirm that the private key for the certificate that you will install is exportable.

Export the server certificate to a file

After the certificate is installed on the Web site that you just created, you will export the certificate to a file. This file will then be copied and imported to the ISA Server computer.

Perform the following procedure to export the server certificate that you just installed.

To export the server certificate to a .pfx file

  1. In IIS Manager, expand the local computer, and then expand the Web Sites folder.

  2. Right-click the Web site for the Exchange front-end services, by default, the Default Web Site, and click Properties.

  3. On the Directory Security tab, under Secure communications, click Server Certificate to start the Web Server Certificate Wizard.

  4. Click Next on the Welcome page.

  5. Select Export the current certificate to a .pfx file on the Modify the Current Certificate Assignment page.

  6. Type the path and file name on the Export Certificate page. For example, type c:\certificates\mail_isa.pfx, and then click Next.

  7. Enter a password for the .pfx file. This password will be requested when a user is importing the .pfx file. We recommend that a strong password be used because the .pfx file also has the private key.

    Important

    The .pfx file should be transferred to the ISA Server computer in a secure fashion because it contains the private key for the certificate to be installed on the ISA Server computer. The .pfx file should be deleted from the ISA Server computer after it has been successfully imported.

Import the server certificate on the ISA Server computer

Perform the following procedure on the ISA Server computer to import the server certificate to the local computer store.

To import a server certificate on the ISA Server computer

  1. Copy the .pfx file created in the previous section to the ISA Server computer in a secure fashion.

  2. Click Start, and then click Run. In Open, type MMC, and then click OK.

  3. Click File, click Add/Remove Snap-in, and in the Add/Remove Snap-in dialog box, click Add to open the Add Standalone Snap-in dialog box.

  4. Select Certificates, click Add, select Computer account, and then click Next.

  5. Select Local Computer, and then click Finish. In the Add Standalone Snap-in dialog box, click Close, and in the Add/Remove Snap-in dialog box, click OK.

  6. Expand the Certificates node, and right-click the Personal folder.

  7. Select All Tasks, and then click Import. This starts the Certificate Import Wizard.

  8. On the Welcome page, click Next.

  9. On the File to Import page, browse to the file that you created previously and copied to the ISA Server computer, and then click Next.

  10. On the Password page, type the password for this file, and then click Next.

    Note

    The Password page provides the option Mark this key as exportable. If you want to prevent the exporting of the key from the ISA Server computer, do not select this option.

  11. On the Certificate Store page, verify that Place all certificates in the following store is selected and Certificate Store is set to Personal (the default settings), and then click Next.

  12. On the wizard completion page, click Finish.

  13. Verify that the server certificate was properly installed. Click Certificates, and double-click the new server certificate. On the General tab, there should be a note that shows You have a private key that corresponds to this certificate. On the Certification Path tab, you should see a hierarchical relationship between your certificate and the CA, and a note that shows This certificate is OK.

  14. Delete the .pfx file from the computer.

Note

If you have ISA Server 2006 Enterprise Edition, you must import the certificate on each array member.

Update public DNS

Create a new DNS host record in your domain's public DNS servers. Users will initiate a connection using the name of the Web site. This name needs to match the common name or FQDN used in the certificate installed on the ISA Server computer. For example, a user might browse to https://mail.contoso.com/owa. In this case, the following conditions need to be met for the user to successfully initiate a connection:

  • FQDN used in the server certificate installed on the ISA Server computer needs to be mail.contoso.com.

  • User needs to resolve mail.contoso.com to an IP address.

  • IP address that mail.contoso.com resolves to needs to be configured on the External network of the ISA Server computer.

    Note

    For ISA Server Enterprise Edition, if you are working with an NLB-enabled array, the IP address should be a virtual IP address configured for the array. For more information about NLB, see ISA Server product Help.

Exchange Publishing

Now that the Exchange front-end server and the ISA Server computer have been properly configured and have the proper server certificates installed, you can start the procedures to publish the Exchange front-end server. Using the New Exchange Publishing Rule wizard, you can provide secure access to your Exchange front-end server.

The following procedures are used to publish your Exchange front-end server.

Create a server farm (optional)

Create a Web listener

Create an Exchange Web client access publishing rule

Create a server farm (optional)

When you have more than one Exchange front-end server, you can use ISA Server to provide load balancing for these servers. This will enable you to publish the Web site once, instead of having to run the wizard multiple times. Also, this eliminates the need for a third-party product to load balance a Web site. If one of the servers is unavailable, ISA Server detects that the server is not available and directs users to servers that are working. ISA Server verifies on regular intervals that the servers that are members of the server farm are functioning. The server farm properties determine the following:

  • Servers included in the farm
  • Connectivity verification method that ISA Server will use to verify that the servers are functioning

Perform the following procedure to create a server farm.

To create a server farm

  1. In the console tree of ISA Server Management, click Firewall Policy:

    • For ISA Server 2006 Standard Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Server_Name, and then click Firewall Policy.
    • For ISA Server 2006 Enterprise Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Arrays, expand Array_Name, and then click Firewall Policy.
  2. On the Toolbox tab, click Network Objects, click New, and select Server Farm. Use the wizard to create the server farm as outlined in the following table.

    Page Field or property Setting

    Welcome

    Server farm name

    Type a name for the server farm. For example, type Exchange front end servers.

    Servers

    Servers included in this farm

    Select Add and enter either the IP addresses or names of your Exchange front-end servers.

    Connectivity Monitoring

    Method used to monitor server farm connectivity

    Select Send an HTTP/HTTPS GET request.

    Completing the New Server Farm Wizard

    Completing the New Server Farm Wizard

    Review the selected settings, and click Back to make changes and Finish to complete the wizard.

  3. When the wizard completes, click Yes in the Enable HTTP Connectivity Verification dialog box.

  4. Click the Apply button in the details pane to save the changes and update the configuration.

For more information about connectivity verifiers, see ISA Server product Help.

Create a Web listener

When you create a Web publishing rule, you must specify a Web listener to be used. The Web listener properties determine the following:

  • IP addresses and ports on the specified networks that the ISA Server computer uses to listen for Web requests (HTTP or HTTPS)
  • Server certificates to use with IP addresses
  • Authentication method to use
  • Number of concurrent connections that are allowed
  • Single sign on (SSO) settings
    Update the following table with information that will be used when you use the New Web Listener Wizard.

Use the information on the worksheet that you filled in previously, and perform the following procedure to create a Web listener.

To create a Web listener

  1. In the console tree of ISA Server Management, click Firewall Policy:

    • For ISA Server 2006 Standard Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Server_Name, and then click Firewall Policy.
    • For ISA Server 2006 Enterprise Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Arrays, expand Array_Name, and then click Firewall Policy.
  2. On the Toolbox tab, click Network Objects, click New, and then select Web Listener. Use the wizard to create the Web listener as outlined in the following table.

    Page Field or property Setting

    Welcome

    Web listener name

    Type a name for the Web listener. For example, type Exchange FBA.

    Client Connection Security

    Select what type of connections this Web listener will establish with clients

    Select Require SSL secured connections with clients.

    Web Listener IP Addresses

    Listen for incoming Web requests on these networks

    ISA Server will compress content

    Select the External network.

    Check box should be selected (default).

    Click Select IP Addresses

    External Network Listener IP Selection

    Listen for requests on

    Available IP Addresses

    Select Specified IP addresses on the ISA Server computer in the selected network.

    Select the correct IP address and click Add.

    Bb794751.note(en-us,TechNet.10).gifNote:
    For ISA Server Enterprise Edition with an NLB-enabled array, you should select a virtual IP address.

    Listener SSL Certificates

    Select a certificate for each IP address, or specify a single certificate for this Web listener

    Select Assign a certificate for each IP address.

    Select the IP address you just selected and click Select Certificate.

    Select Certificate

    Select a certificate from the list of available certificates

    Select the certificate that you just installed on the ISA Server computer. For example, select mail.contoso.com, and click Select. The certificate must be installed before running the wizard.

    Authentication Settings

    Select how clients will provide credentials to ISA Server

    Select how ISA Server will validate client credentials

    Select HTML Form Authentication for forms-based authentication and select the appropriate method that ISA Server will use to validate the client's credentials.

    For example, select Windows (Active Directory) if your ISA Server computer is a member of a domain.

    Single Sign On Settings

    Enable SSO for Web sites published with this Web listener

    SSO domain name

    Leave the default setting to enable SSO.

    To enable SSO between two published sites, such as portal.contoso.com and mail.contoso.com, type .contoso.com.

    Completing the New Web Listener Wizard

    Completing the New Web Listener Wizard

    Review the selected settings and click Back to make changes or Finish to complete the wizard.

Create an Exchange Web client access publishing rule

When you publish an internal Exchange 2007 Client Access server through ISA Server 2006, you are protecting the Web server from direct external access because the name and IP address of the server are not accessible to the user. The user accesses the ISA Server computer, which then forwards the request to the internal Web server according to the conditions of your Web server publishing rule. An Exchange Web client access publishing rule is a Web publishing rule that contains default settings appropriate to Exchange Web client access.

Update the following table with information that will be used when you use the New Exchange Publishing Rule wizard.

Property Value

Exchange publishing rule name

Name: ________________________

Services

Bb794751.note(en-us,TechNet.10).gifNote:
You can only publish one service at a time in a single rule. To publish an additional server, you need to rerun the publishing wizard.

Exchange version: Exchange 2007

__Outlook Web Access

__Outlook Anywhere (RPC over HTTP)

__Exchange ActiveSync

Publishing type

__Publish a single Web site

or

__Publish a server farm of load balanced servers

and

Server farm name:_____________

Server connection security

HTTPS or HTTP (circle one)

Note the following:

  • If HTTP is selected, information between the ISA Server computer and the Web server will be transferred in plaintext.
  • If HTTPS is selected, a server certificate needs to be installed on the Exchange front-end server.

Internal publishing details

Internal site name (FQDN): ______________________

If the FQDN is not resolvable by the ISA Server computer, provide a computer name or IP address:_____________________

Public name details

Accept request for:

__This domain name:______________

or

__Any domain name

Select Web listener

Web listener:________________

User set

List user sets that will have access to this rule:

_________________

__________________

Use the information on the worksheet that you filled in previously, and perform the following procedure to create an Exchange Web client access publishing rule.

To create an Exchange Web client access publishing rule

  1. In the console tree of ISA Server Management, click Firewall Policy:

    • For ISA Server 2006 Standard Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Server_Name, and then click Firewall Policy.
    • For ISA Server 2006 Enterprise Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Arrays, expand Array_Name, and then click Firewall Policy.
  2. On the Tasks tab, click Publish Exchange Web Client Access. Use the wizard to create the rule as outlined in the following tables.

    For a single Web server, use the table in New Exchange Publishing Rule wizard for a single Web site.

    If you are using a server farm, use the table in New Exchange Publishing Rule wizard for a server farm.

    New Exchange Publishing Rule wizard for a single Web site

    Page Field or property Setting

    Welcome

    Exchange Publishing rule name

    Type a name for the rule. For example, type Exchange Web Client Publishing.

    Select Services

    Exchange version

    Web client mail services

    Select the proper version of Exchange. For example, select Exchange Server 2007.

    Select the desired access method.

    Publishing Type

    Select if this rule will publish a single Web site or external load balancer, a Web server farm, or multiple Web sites

    Select Publish a single Web site or load balancer.

    Server Connection Security

    Choose the type of connections ISA Server will establish with the published Web server or server farm

    Select Use SSL to connect to the published Web server or server farm.

    Bb794751.note(en-us,TechNet.10).gifNote:
    A server certificate must be installed on the published Exchange Client Access server, and the root CA certificate of the CA that issued the server certificate on the Exchange Client Access server must be installed on the ISA Server computer.

    Internal Publishing Details

    Internal site name

    Type the internal FQDN of the Exchange Client Access server. For example, type exchfe.corp.contoso.com.

    Bb794751.note(en-us,TechNet.10).gifImportant:
    The internal site name must match the name of the server certificate that is installed on the internal Exchange Client Access server.
    Bb794751.note(en-us,TechNet.10).gifNote:
    If you cannot properly resolve the internal site name, you can select Use a computer name or IP address to connect to the published server, and then type the required IP address or name that is resolvable by the ISA Server computer.

    Public Name Details

    Accept requests for

    Public name

    This domain name (type below)

    Type the domain name that you want ISA Server to accept the connection for. For example, type mail.contoso.com. This must match the FQDN of the certificate selected when creating the Web listener.

    Select Web Listener

    Web listener

    Select the Web listener you created previously. For example, select Exchange FBA.

    Authentication Delegation

    Select the method used by ISA Server to authenticate to the published Web server

    For Outlook Web Access, select Basic Authentication.

    For Exchange ActiveSync, select Basic Authentication.

    User Sets

    This rule applies to requests from the following user sets

    Select the user set approved to access this rule.

    Completing the New Exchange Publishing Rule Wizard

    Completing the New Exchange Publishing Wizard.

    Review the selected settings and click Back to make changes and Finish to complete the wizard.

    Note

    When publishing Outlook Web Access, after you click Finish, review the Remaining Exchange Publishing Tasks dialog box, and then click OK.

  3. Click the Apply button in the details pane to save the changes and update the configuration.

    Note

    Run the New Exchange Publishing Rule wizard for each access method you want to publish. Confirm that the authentication method configured on the Client Access server matches the authentication delegation in the publishing rule.

    Go to SSL Bridging.

    New Exchange Publishing Rule wizard for a server farm

    Page Field or property Setting

    Welcome

    Exchange Publishing rule name

    Type a name for the rule. For example, type Exchange Web Client Publishing.

    Select Services

    Exchange version

    Web client mail services

    Select the proper version of Exchange server. For example, select Exchange Server 2007.

    Select the desired access method.

    Publishing Type

    Select if this rule will publish a single Web site or external load balancer, a Web server farm, or multiple Web sites

    Select Publish a server farm of load balanced Web servers.

    Server Connection Security

    Choose the type of connections ISA Server will establish with the published Web server or server farm.

    Select Use SSL to connect to the published Web server or server farm.

    Bb794751.note(en-us,TechNet.10).gifNote:
    A server certificate must be installed on all of the published Exchange Client Access servers, and the root CA certificate of the CA that issued the server certificate on the Exchange Client Access server must be installed on the ISA Server computer.

    Internal Publishing Details

    Internal site name

    Type the internal FQDN of the Exchange Client Access server. For example, type exchfe.corp.contoso.com.

    Specify Server Farm

    Select the Exchange server farm you want to publish

    Select the name of the server farm previously created. For example, select Exchange front end servers.

    Public Name Details

    Accept requests for

    Public name

    This domain name (type below)

    Type the domain name that you want ISA Server to accept the connection for. For example, type mail.contoso.com.

    Select Web Listener

    Web listener

    Select the Web listener you created previously. For example, select Exchange FBA.

    Authentication Delegation

    Select the method used by ISA Server to authenticate to the published Web server

    For Outlook Web Access, select Basic Authentication.

    For Exchange ActiveSync, select Basic Authentication.

    User Sets

    This rule applies to requests from the following user sets

    Select the user set approved to access this rule.

    Completing the New Exchange Publishing Rule Wizard

    Completing the New Exchange Publishing Wizard

    Review the settings, and click Back to make changes and Finish to complete the wizard.

    Note

    When publishing Outlook Web Access, after you click Finish, review the Remaining Exchange Publishing Tasks dialog box, and then click OK.

  4. Click the Apply button in the details pane to save the changes and update the configuration.

    Note

    Run the New Exchange Publishing Rule wizard for each access method you want to publish. Confirm that the authentication method configured on the Client Access server matches the authentication delegation in the publishing rule.

SSL bridging

SSL bridging is used when ISA Server terminates or initiates an SSL connection. In ISA Server 2006, SSL bridging is automatically configured when the specified Web listener is configured to listen for HTTPS traffic.

Specifically, SSL bridging works in the following scenarios:

  • A client requests an SSL object. ISA Server decrypts the request, and then encrypts it again and forwards it to the Web server. The Web server returns the encrypted object to ISA Server. ISA Server decrypts the object, and then encrypts it again and sends it to the client. SSL requests are forwarded as SSL requests.
  • A client requests an SSL object. ISA Server decrypts the request and forwards it without encryption to the Web server. The Web server returns the HTTP object to ISA Server. ISA Server encrypts the object and sends it to the client. SSL requests are forwarded as HTTP requests.

For incoming Web requests, an external client uses HTTPS to request an object from a Web server located on your Internal network. The client connects to ISA Server on the SSL port specified in the Web listener properties—by default, port 443.

After receiving the client's request, ISA Server decrypts it, terminating the SSL connection. The Web publishing rules determine how ISA Server communicates the request for the object to the published Web server (FTP, HTTP, or HTTPS).

If the secure Web publishing rule is configured to forward the request using HTTPS, ISA Server initiates a new SSL connection with the publishing server, sending a request to the listening port (by default, port 443). Because the ISA Server computer is now an SSL client, it requires that the publishing Web server responds with a server-side certificate.

Test Exchange Publishing Rule

In this section, you will test the new Exchange publishing rule that you just created.

Test Outlook Web Access

From a computer on the Internet, use the following procedure to test Outlook Web Access.

Note

Make sure that you have the root CA of the issuing CA of the mail.contoso.com certificate installed.

To test the Outlook Web Access publishing rule

  1. Open Microsoft Internet Explorer.

  2. Browse to the Outlook Web Access Web site, such as the URL https://mail.contoso.com/owa, and enter your user credentials to log on.

    Bb794751.65cf64a6-59ff-4b3d-9002-01e7ca7cd65a(en-us,TechNet.10).jpg

You can now read and send e-mail messages.

Test Exchange ActiveSync

Configure a mobile device to connect to your Exchange server using Microsoft Exchange ActiveSync, and make sure that ISA Server and Exchange ActiveSync are working properly. For more information about configuring ActiveSync, review the manufacturer's documentation for the mobile device that you want to configure.

When configuring your mobile device and you are prompted to enter a name for the server name field, type the name of the Exchange ActiveSync server that was just published, such as https://mail.contoso.com/microsoft-server-activesync.

Note

You can also test Exchange ActiveSync using Internet Explorer. Open Internet Explorer, and in Address, type the URL https://published_server_name/Microsoft-Server-Activesync, where published_server_name is the published name of the Client Access server (the name a user would use to access Outlook Web Access). After you authenticate yourself, if you receive an Error 501/505 – Not implemented or not supported, ISA Server and Exchange ActiveSync are working together properly.

Test Outlook Anywhere

This procedure must be performed from a client on the Internal network. We recommend configuring Outlook 2003 without RPC over HTTP. Confirm that Outlook is working properly on the Internal network before configuring RPC over HTTP.

To test Outlook Anywhere from Outlook 2003

  1. Change the following account setting in Outlook 2003:

    1. On the Outlook 2003 Tools menu, select E-mail Accounts.
    2. Select View or change existing e-mail accounts, and then click Next.
    3. Select your Microsoft Exchange account and click Change.
    4. Click More Settings.
    5. If you receive an error from Outlook that it could not connect to Exchange, click Cancel and continue to step H.
    6. Click the Connection tab, select Connect to my Exchange mailbox using HTTP, and then click Exchange Proxy Settings.
    7. Type mail.contoso.com in Use this URL to connect to my proxy server for Exchange in Connection settings.
    8. Select Mutually authenticate the session when connecting with SSL and, for example, type msstd:mail.contoso.com in Principal name for proxy server.
    9. Select NTLM Authentication for Proxy authentication settings.
      Bb794751.2fe6712c-82ae-4173-8209-3ff95e40c253(en-us,TechNet.10).gif
    10. Click OK to close the Exchange Proxy Settings dialog box.
    11. Click OK to close the Microsoft Exchange Server dialog box.
  2. Click Next and then click Finish to close the E-mail Accounts dialog box.

  3. Restart Outlook.

Note

For RPC over HTTP to work, both when the user is out of the office and when the user is in the office, the FQDN mail.contoso.com must resolve to the external address when users are in the office and when connected to the Internet.

Appendix A: Additional Publishing Features

In this section, the following additional features are discussed, which you can configure to ease your deployments:

  • HTTP to HTTPS Redirection
  • Password Management
  • Attachment Blocking

HTTP to HTTPS Redirection

When publishing a Web site, we recommend that users open an HTTPS connection between them and the ISA Server computer to protect the sensitive information that is being transferred over the Internet. This requires that users enter a URL such as https://mail.contoso.com/owa. If the user just enters https://mail.contoso.com/owa, the user will receive the following error.

Bb794751.30acd38d-c5b5-49f5-8281-6eb2b55a5542(en-us,TechNet.10).bmp

Users have a tendency not to enter the HTTPS portion of the URL even when going to a secured Web site. This behavior has been reinforced by Web administrators who have scripted their Web sites to redirect users to an HTTPS page, even when they enter HTTP. This is done to reduce the number of Help desk calls by users when they cannot open the URL they are trying to open.

To enable HTTP to HTTPS redirection, perform the following procedure.

To enable HTTP to HTTPS redirection

  1. In the console tree of ISA Server Management, click Firewall Policy:

    • For ISA Server 2006 Standard Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Server_Name, and then click Firewall Policy.
    • For ISA Server 2006 Enterprise Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Arrays, expand Array_Name, and then click Firewall Policy.
  2. On the Toolbox tab, click Network Objects, expand Web Listeners, right-click the Web listener, and then select Properties.

  3. Select the Connections tab.

  4. Select Enable HTTP connections on port and confirm that the listening port for HTTP is 80.

  5. Confirm that Enable SSL (HTTPS) connections on port is selected and is listening on port 443.

  6. Select Redirect all traffic from HTTP to HTTPS.

    Bb794751.457bec84-baec-4030-98a3-176f3c3b8082(en-us,TechNet.10).bmp

  7. Click OK to close the properties of the Web listener.

  8. Click the Apply button in the details pane to save the changes and update the configuration.

Password Management

It is good security policy to require your users to change their passwords on a regular basis. Users who are not in the office on a regular basis need a method to change their passwords when they are not in the office.

When using forms-based authentication, you can inform users that their passwords will expire in a specific number of days, and you can enable users to change their passwords so they do not expire. Users can also change an expired password.

To enable the change password functionality for forms-based authentication

  1. In the console tree of ISA Server Management, click Firewall Policy:

    • For ISA Server 2006 Standard Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Server_Name, and then click Firewall Policy.
    • For ISA Server 2006 Enterprise Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Arrays, expand Array_Name, and then click Firewall Policy.
  2. On the Toolbox tab, click Network Objects, expand Web Listeners, right-click the desired Web listener, and then select Properties.

  3. Select the Forms tab.

  4. Select Allow users to change their passwords and Remind users that their password will expire in this number of days. The default number of days is 15.

    Bb794751.0f41508e-f9aa-4e57-997d-45a61ba3a040(en-us,TechNet.10).bmp

  5. Click OK to close the properties of the Web listener.

  6. Click the Apply button in the details pane to save the changes and update the configuration.

  7. The users will now see the following logon screen. Notice the option I want to change my password after logging on.

    Bb794751.880e2ee7-fc08-4f9a-90d6-8a0e8b0156d6(en-us,TechNet.10).bmp

To configure the Change Password option when using LDAP authentication, LDAP needs to be configured with the following settings:

  • Connection to the LDAP servers must be over a secured connection. This requires an SSL certificate to be installed on the Active Directory servers. For more information about enabling LDAP over SSL, see "How to Enable LDAP over SSL with a third-party certification authority" at the Microsoft Support Web Site.
  • The ISA Server computer needs to have the root certificate for the CA that issued the SSL certificate installed on the Active Directory servers.
  • Connection to the LDAP servers cannot be via a global catalog.
  • A user name and password that are used for verifying user account status and changing passwords are required.

Attachment Blocking

ISA Server 2006 attachment blocking with Exchange Server 2007 is not supported. If you are using Exchange Server 2007 and want to block attachments, you need to configure attachment blocking on the Exchange 2007 server. For more information about configuring attachment blocking on Exchange Server 2007, see Exchange Server 2007 product Help.

Appendix B: Troubleshooting

This section provides troubleshooting information.

ISA Server Best Practices Analyzer

To determine the overall health and to diagnose common configuration errors, download and run the Microsoft ISA Server Best Practices Analyzer Tool at the Microsoft Download Center.

Log Off When the User Leaves Site Feature Removed

The Log off when the user leaves site setting has been removed from ISA Server 2006. Users should always use the log off button to properly log off from Outlook Web Access.

Windows Mobile Users Receive Error 401 Unauthorized

When a Microsoft Windows Mobile® user tries to access a published Outlook Web Access or Windows Mobile Web site published with the New Exchange Publishing Rule wizard, the user receives error 401 instead of the Exchange logon forms.

The required HTML form directories for Windows Mobile access are missing from the Exchange HTML form set directory, which is causing this error.

The solution is to manually create the following two directories cHTML and xHTML in the %programfiles%\Microsoft ISA Server\CookieAuthTemplate\Exchange folder. Then copy the contents of the %programfiles%\Microsoft ISA Server\CookieAuthTemplate\Exchange\HTML folder to the cHTML and xHTML folders. Restart the Firewall service for the changes to take effect.

Users Receive Access Denied Error Message

When a user attempts to connect to a published Outlook Web Access site and does not add the /owa suffix to the end of the URL (such as https://mail.contoso.com), an "Access denied" error message is received, instead of the forms-based authentication logon screen. This error can be difficult to troubleshoot, because ISA Server is behaving as expected.

A workaround to this is to publish the root of the Exchange front-end server, with an action of Deny, and redirect users to the proper URL, such as https://mail.contoso.com/owa.

Perform the following procedure to automatically redirect users to the proper Outlook Web Access URL.

To create an Exchange Web client access publishing rule

  1. In the console tree of ISA Server Management, click Firewall Policy:

    • For ISA Server 2006 Standard Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Server_Name, and then click Firewall Policy.
    • For ISA Server 2006 Enterprise Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Arrays, expand Array_Name, and then click Firewall Policy.
  2. On the Tasks tab, click Publish Web Sites. Use the wizard to create the rule as outlined in the following tables.

    Page Field or property Setting

    Welcome

    Web Publishing rule name

    Type a name for the rule, such as Exchange Redirect.

    Select Rule Action

    Action to take when rule conditions are met

    Select Deny.

    Publishing Type

    Select if this rule will publish a single Web site or external load balancer, a Web server farm, or multiple Web sites

    Select Publish a single Web site or load balancer.

    Server Connectivity Security

    Choose the type of connections ISA Server will establish with the published Web server or server farm.

    Select Use SSL to connect to the published Web server or server farm.

    Bb794751.note(en-us,TechNet.10).gifNote:
    A server certificate must be installed on the published Exchange Client Access servers, and the root CA certificate must be installed on the ISA Server computer.

    Internal Publishing Details

    Internal site name

    Type the internal FQDN of the Exchange front-end server. For example: exchfe.corp.contoso.com.

    Bb794751.note(en-us,TechNet.10).gifImportant:
    The internal site name must match the name of the server certificate that is installed on the internal Exchange Client Access server.
    Bb794751.note(en-us,TechNet.10).gifNote:
    If you cannot properly resolve the internal site name, you can select Use a computer name or IP address to connect to the published server and then type the required IP address or name that is resolvable by the ISA Server computer.

    Internal Publishing Details

    Path (optional)

    Type / in the Path field.

    Public Name Details

    Accept requests for

    Public name

    This domain name (type below)

    Type the domain name that you want ISA Server to accept the connection for. For example, type mail.contoso.com.

    Select Web Listener

    Web listener

    Select the Web listener you created previously, such as Exchange FBA.

    Authentication Delegation

    Select the method used by ISA Server to authenticate to the published Web server

    Select Basic authentication.

    User Sets

    This rule applies to requests from the following user sets

    Select the user set approved to access this rule. This should be the same user set you used in the Exchange publishing rule.

    Completing the New Web Publishing Rule Wizard

    Completing the New Web Publishing Wizard

    Review the selected settings, and click Back to make changes and Finish to complete the wizard.

  3. Right-click the rule you just created and click Properties.

  4. Select the Action tab, select Redirect HTTP requests to this Web page, and type the correct URL, such as https://mail.contoso.com/owa, in the Redirect requests to an alternate Web page field.

  5. Select the Application Settings tab, select Use Customized HTML forms instead of the default, type Exchange in the Custom HTML  form set directory field, and then click OK.

  6. Click the Apply button in the details pane to save the changes and update the configuration.

    Important

    This rule should be placed before the Exchange publishing rule to have the expected results.

Outdated Bookmark Causes Log On to Fail after Second Attempt

Users may create a bookmark to the Outlook Web Access forms-based authentication logon page. With a bookmark, users do not have to enter the URL every time they want to go to the site. The first time, users enter the URL, such as https://mail.contoso.com/owa. This URL is redirected automatically by ISA Server to the proper forms-based authentication Web page. This URL can be quite long, such as https://mail.contoso.com/CookieAuth.dll?GetLogon?reason=0\&formdir=2\&curl=Z2Fowa. The URL that is added in the Favorites menu is the longer URL.

If the administrator changes the configuration, such as changing the custom HTML folder that is used, the URL stored in the users' Favorites menu is no longer valid. Users receive two logon screens. After entering their credentials for a second time, they receive the "The page cannot be displayed" error message.

A workaround to this is to publish the outdated URL, with an action of Deny, and redirect users to the proper URL, such as https://mail.contoso.com/owa. It is important to test the redirection and confirm that the redirection is occurring only for the desired users.

Appendix C: Configuring Certificate-Based Authentication with Exchange ActiveSync through ISA Server

Exchange ActiveSync in Exchange Server 2007 allows Windows Mobile-based devices and Exchange ActiveSync-enabled third-party devices to synchronize e-mail, calendar, contact, and task information that is stored on the user's Exchange server, and to retain access to this information when the mobile device is online or offline.

Exchange Server 2007 adds the ability to authenticate an ActiveSync connection using certificate-based authentication. Prior to ISA Server 2006, to publish ActiveSync with certificate-based authentication, you had to publish ActiveSync in tunnel mode. When you publish a site in tunnel mode, you lose the benefit of ISA Server being able to inspect the SSL traffic.

ISA Server 2006 supports Kerberos constrained delegation, which allows ISA Server to authenticate client connections with a client certificate and issues a Kerberos ticket to the published Web server. When Kerberos constrained delegation is configured properly, the published Web server accepts the Kerberos ticket instead of client credentials.

This appendix provides information about the configuration changes to the Exchange Client Access server, to the back-end servers, and to the ISA Server computer, which are required to successfully publish ActiveSync with client certificate-based authentication through ISA Server 2006.

The following are required to configure certificate-based authentication with ActiveSync through ISA Server 2006:

  • Raise the domain functional level to Windows Server 2003.
  • Configure Kerberos constrained delegation and protocol transitioning for:
    • ISA Server
    • Exchange Client access servers
  • Configure Integrated Windows authentication for the Exchange Client Access servers.
  • Create and assign an Exchange ActiveSync mailbox policy. For more information about creating and assigning an Exchange ActiveSync mailbox policy, see the Exchange 2007 product Help.
  • Create a Web listener with client authentication set to client certificate authentication.
  • Create an Exchange publishing rule, setting the authentication delegation to Kerberos constrained delegation.
  • Test the new configuration.

Raising the Domain Functional Level to Windows Server 2003

For Kerberos constrained delegation to work properly, you need to confirm that the Active Directory domain is working at a Windows Server 2003 native mode level.

To raise the domain functional level to Windows Server 2003

  1. Click Start, point to Program Files, point to Administrative Tools, and then click Active Directory Users and Computers.

    Important

    The change in steps 2, 3, and 4 are permanent. You cannot undo these actions.

  2. Right-click the domain, and then select Raise Domain Functional Level.

  3. In the Raise Domain Functional Level box, select Windows Server 2003 from the list, and then click Raise.

  4. Click OK.

Configuring Constrained Delegation and Protocol Transitioning

Kerberos is a network authentication protocol that authenticates the identity of users who are trying to log on to a network, and encrypts their communications through secret key cryptography.

You must configure Kerberos constrained delegation when ISA Server is configured to authenticate the user through a client certificate and then impersonate that user to the Exchange front-end server. The Exchange Client Access server will then impersonate the user when you access the user's e-mail, calendar, contact, and task information in the Exchange back-end server where the user's mailbox is located. This is required because ISA Server cannot delegate the client certificate presented to it by the client.

When you want to configure Kerberos constrained delegation, so that the Exchange Client Access server trusts the Kerberos ticket from the ISA Server computer, the configuration is done on the ISA Server computer account. To configure Kerberos constrained delegation, so that the Exchange Mailbox servers trust the Kerberos ticket issued from the Exchange Client Access servers, the configuration is done on the Exchange Client Access servers computer account.

For more information, see Kerberos Authentication in Windows Server 2003.

Active Directory Users and Computers is an MMC snap-in that is a standard part of Microsoft Windows Server operating systems. However, when you install Exchange Server 2003, the Setup wizard automatically extends the functionality of Active Directory Users and Computers to include Exchange-specific tasks.

You start Active Directory Users and Computers from either an Exchange server or from a workstation that has the Exchange management tools installed.

Note

If the Active Directory Users and Computers snap-in is installed on a computer that does not have Exchange Server or the Exchange Server management tools installed, you cannot perform Exchange Server tasks from that computer.

The Delegation tab that is referenced in the following procedures lets you configure delegation in three ways:

  • Not allowed   Select the Do not trust this computer for delegation option.

  • Allowed for all services   Select the Trust this computer for deletion to any service (Kerberos only) option. Refers to the Windows 2000 Server delegation method.

  • Allowed for only a limited set of services   Select the Trust this computer for delegation to specified services only option. Refers to the constrained delegation method available with Windows Server 2003.

    Note

    The ISA Server and Exchange Client Access servers need to be in the same domain.

To configure Kerberos constrained delegation on the ISA Server computers, perform the following procedure.

To use Active Directory Users and Computers to configure constrained delegation and protocol transitioning

  1. Click Start, point to Program Files, point to Administrative Tools, and then click Active Directory Users and Computers.

  2. In the console tree, click your Domain and expand the tree view.

  3. Click Computers and expand the tree view. From the list of computers, right-click the ISA Server computer, click Properties, and then click the Delegation tab.

  4. On the Delegation tab, select Trust the computer for designation of specified services only, and then click Add.

  5. Select Use any authentication protocol to enable protocol transitioning, and then click Add.

  6. Click Users or Computers, type the name of the Exchange Client Access server, and then click OK.

  7. Select HTTP and W3SVC, and then click OK two times.

  8. Note   Perform this procedure for each ISA Server computer that will be publishing Exchange ActiveSync.

To configure Kerberos constrained delegation for the Exchange Client Access servers, perform the following procedure.

To use Active Directory Users and Computers to configure constrained delegation and protocol transitioning, follow these steps from the Client Access server

  1. Click Start, point to Program Files, point to Administrative Tools, and then click Active Directory Users and Computers.

  2. In the console tree, click your Domain and expand the tree view.

  3. Click Computers and expand the tree view. From the list of computers, right-click the Exchange Client access server, click Properties, and then click the Delegation tab.

  4. On the Delegation tab, select Trust the computer for designation of specified services only, and then click Add.

  5. Select Use any authentication protocol to enable protocol transitioning, and then click Add.

  6. Click Users or Computers, type the name of the Exchange Mailbox server or servers, and then click OK.

  7. Select HTTP and W3SRV, and then click OK two times.

  8. Right-click the back-end Exchange computer, click Properties, and then click Delegation.

  9. On the Delegation tab, select Trust the computer for designation of specified services only. If the Mail box server is a domain controller, it is already configured to trust the computer for designation of specified services only.

    Note

    this procedure for each Exchange Client Access server in your environment that is providing Exchange ActiveSync services.

Configuring Integrated Windows Authentication on the Exchange Front-End Servers

For the Exchange front-end servers to accept the Kerberos ticket, the ActiveSync directory needs to be configured to accept Integrated Windows authentication in IIS Manager.

Perform the following procedure to configure Integrated Windows authentication on the Exchange front-end servers.

To configure Integrated Windows authentication for the ActiveSync directory in IIS Manager

  1. In IIS Manager, double-click the local computer, right-click the ActiveSync directory you want to configure, and then click Properties.

  2. Click the Directory Security tab.

  3. In the Authentication and access control section, click Edit.

  4. In the Authenticated access section, select Integrated Windows Authentication.

  5. Click OK twice.

Creating a New Web Listener

You need to create a new Web listener with client authentication configured with client certificate authentication.

Follow the instructions in the topic Create a Web listener, with the following change:

  • On the Authentication Settings page, select SSL Client Certificate Authentication.

Creating a New Exchange Publishing Rule

To create a new Exchange publishing rule, follow the instructions in the topic Create an Exchange Web client access publishing rule, with the following changes:

  • On the Select Services page, select Exchange ActiveSync.
  • On the Authentication Delegation page, select Kerberos constrained delegation. The service principle name will be automatically entered, based on the information you entered in the Internal site name box on the Internal Publishing Details page.

Appendix D: Configuring Basic and Negotiate Authentication Delegation for Outlook Web Access

To take advantage of the new Exchange 2007 features that require Negotiate authentication delegation and still provide access to the legacy folders that require Basic authentication delegation, two publishing rules are required. For information about the limitations when publishing Outlook Web Access with only one authentication method, see Authentication.

The following procedures enable you to properly publish Outlook Web Access with different authentication delegation methods for the /OWA/* and the legacy directories and configure Integrated Windows authentication on the Exchange 2007 Client Access server.

The following procedure assumes that you have already configured the owa (Default Web Site) as described in Confirm forms-based authentication not selected on the Exchange Client Access server.

To add Integrated Windows authentication for the /OWA/ folder on the Exchange Client Access server

  1. Start the Exchange Management Console.

  2. In the Exchange Management Console, expand Server Configuration, and then click Client Access.

  3. Select your Client Access server, such as cas01, and then select owa (Default Web Site) on the Outlook Web Access page.

    Bb794751.c55dd338-2b29-4e53-a446-e27a4d4cf2f9(en-us,TechNet.10).gif

  4. In the action pane, click Properties under owa (Default Web Site).

  5. Select the Authentication page, and select Integrated Windows authentication. You will now have both Basic and Integrated Windows authentication selected.

    Bb794751.f76ff2fc-4992-4ed6-b6bb-0a81053a3f32(en-us,TechNet.10).gif

  6. Click OK.

    You need to now publish Outlook Web Access for both Basic and Negotiate authentication delegation.

    Note

    After you have configured Basic and Negotiate authentication delegation for Outlook Web Access, you can clear the Basic authentication (password is sent in clear text) option from the Authentication page for the /OWA/ folder if it is not required internally.

To configure Basic and Negotiate authentication delegation for Outlook Web Access

  1. Publish Outlook Web Access as described in Create an Exchange Web client access publishing rule. For Exchange Publishing rule name, type Exchange 2007 OWA Basic, and on the Authentication Delegation page, select Basic Authentication.

  2. Right-click the rule you just created and click Copy.

  3. Right-click the rule you just created again and click Paste. This will paste the rule above the selected rule. The pasted rule name will be Exchange 2007 OWA Basic (1).

    Bb794751.b6f8106c-0a17-4062-aede-9af66ec2c554(en-us,TechNet.10).gif

  4. Right-click the pasted rule from Step 3 and click Properties.

  5. On the General tab, change the name of the rule to Exchange 2007 OWA Negotiate.

  6. Select the Path tab, select the /public/* path, and click Remove. Repeat this step for the /Exchweb/* and /Exchange/* paths. The only listed path should be /OWA/*.

    Bb794751.65aff610-e900-439e-9193-fbb911693d26(en-us,TechNet.10).gif

  7. Select the Authentication Delegation tab and select Negotiate (Kerberos/NTLM).

  8. Click OK.

  9. Right-click the rule named Exchange 2007 OWA Basic and click Properties.

  10. Select the Path tab, select the /OWA/* path, and click Remove.

    Bb794751.629bb877-7743-456b-8965-b73fa9eae244(en-us,TechNet.10).gif

  11. Click OK.

  12. Click the Apply button in the details pane to save the changes and update the configuration.

  13. Configure Integrated Windows authentication on the /OWA/ folder on the Client Access server. For details, see the next procedure.

    ISA Server will now use Negotiate as the authentication delegation method for /OWA/* path and Basic as the authentication delegation method for the /public/*, /Exchange/*, and /Exchweb/* folders.