Export (0) Print
Expand All
This topic has not yet been rated - Rate this topic

Walkthrough: Configure CRM for Integration with Windows Azure

[Applies to: Microsoft Dynamics CRM 2011]

This walkthrough guides you through configuring on-premises or Internet-facing deployments of Microsoft Dynamics CRM 2011 for posting the execution data context to the Windows Azure Service Bus. This walkthrough does not apply to Microsoft Dynamics CRM Online, which is pre-configured for Windows Azure.

As a prerequisite, perform the following tasks before continuing with this walkthrough.

  1. Obtain a certificate from an issuing authority.

  2. Install the certificate in the certificate store of the server running the Microsoft Dynamics CRM asynchronous service.

  3. Generate a public key file in Base64 format from the certificate. For more information about how to obtain and work with a certificate, see Obtain a Public Certificate.

  4. Verify that Windows PowerShell is installed on your Microsoft Dynamics CRM server.

Configure Certificate Read Access

The system user account under which the Microsoft Dynamics CRM asynchronous service runs must have read access to your certificate in the certificate store. Either a user account that is identified by the deployment administrator during server setup or NetworkService is used. You can verify the account used by running the Services administrative tool. In the tool, look up the service named “Microsoft Dynamics CRM Asynchronous Processing Service” and see what account that service is running under.

You must grant read access by the above mentioned account to your certificate in the certificate store. You can do this by setting an ACL on the certificate by using the certificate snap-in of the mmc (Microsoft Management Console) or by typing the following command.

winhttpcertcfg -g -c <certLocation> -s <subjectStr> -a <accountName>

Substitute the correct values, described in the following table, for the <> parameters shown in the command.



The location (path) of the certificate in the certificate store. Use the Certificate snap-in of mmc (Microsoft Management Console) to locate the certificate.


The certificate’s Subject value. You can obtain this value by double-clicking the public certificate key file (.cer) file in Windows Explorer. In the Details tab of the Certificate dialog box, look for the value of the Subject field.


The name of the account to grant read access to. For a default Microsoft Dynamics CRM installation, the name of the account is “NetworkService”.

Configure the Microsoft Dynamics CRM Configuration Database (MSCRM_Config)

Follow these procedures to configure the Microsoft Dynamics CRM database.

Register the Microsoft Dynamics CRM PowerShell cmdlets

  1. Log into the administrator account on your Microsoft Dynamics CRM server.

  2. In a Windows PowerShell command window, enter the following command.

    Add-PSSnapin Microsoft.Crm.PowerShell

    This command adds the Microsoft Dynamics CRM Windows PowerShell snap-in to the current session. The snap-in is registered during installation and setup of the Microsoft Dynamics CRM server.

Set the Microsoft Dynamics CRM certificate

  1. Enter the following command in the Windows PowerShell window.

    Set-CrmCertificate –CertificateType AppFabricIssuer –Name <issuerName> -StoreName My –StoreLocation LocalMachine 
    -StoreFindType FindBySubjectDistinguishedName –DataFile <certificateFilename>

    In this command, the issuer name <issuerName> can be any name. However, you will be using this same issuer name when configuring Access Control Service (ACS). The -DataFile parameter value is the filename or path of the public certificate file.

  2. List the installed certificates in the MSCRM_CONFIG database. You should see the certificate that you just added.


See Also

Microsoft Dynamics CRM 2011
Send comments about this topic to Microsoft.
© 2013 Microsoft Corporation. All rights reserved.
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

© 2014 Microsoft. All rights reserved.