Managing a Distributed Environment

Slides:



Advertisements
Similar presentations
How to Use Stowe School District
Advertisements

Introduction to Your Name Goes Here
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Staff Computer Training Exchange 2003: More User Friendly Vicki Hecht Cherry Delaney ITaP Luncheon October 14, 2003.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
Exploring Microsoft Office Outlook Microsoft Outlook 2000 A Desktop Information Manager By Robert T. Grauer Maryann Barber.
POP Configuration Microsoft Outlook Express 6.x.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Setting up in Outlook Express. Select “Tools” from the toolbar menu.
Free Powerpoint Templates Page 1 MICROSOFT OFFICE OUTLOOK 2007 PRESENTED BY: BRANDO P. DUMALI.
POP Configuration Microsoft Outlook What is POP? Short for Post Office Protocol, a protocol used to retrieve from a mail server. Most.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
SCO Insight Connector Training. The SCO Insight Connector  Product Overview  Technical Specifications  Installation  Using the Components  Target.
Using Mail Mac OS X. Opening Mail First of all, click on this icon in the dock (or in your Applications folder) to bring up Mail.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
Module 8: Managing Client Configuration and Connectivity.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
Module 4: Add Client Computers and Devices to the Network.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Securing Microsoft® Exchange Server 2010
© 2011 PLANET TECHNOLOGIES, INC. Extending User Profiles with Line of Business Data Patrick Curran, MCT FEBRUARY 24, 2013.
-III Outlook How To Topics CS-3505 Outlook form Office 2003 Wb_ -II.ppt.
Copyright 2000 eMation SECURITY - Controlling Data Access with
(or ?) Short for Electronic Mail The transmission of messages over networks.
1 SCOoffice Server for OpenServer Technical Overview.
-II Outlook How To Topics CS-3505 Outlook 2000 Wb_ -II.ppt.
1 SCOoffice Server for OpenServer Basic Administration 2 Rick Powell System Engineer.
Ashley Hawley. Project Description Business Need User Profiles Development Technology Testing Plan Deliverables Demonstration Conclusion.
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1.
Module 11: Securing a Microsoft ASP.NET Web Application.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Module 3 Managing Recipient Objects. Module Overview Managing Mailboxes Managing Other Recipients Configuring Address Policies Configuring Address.
Module 4: Managing Recipients. Overview Introduction to Exchange Recipients Creating, Deleting, and Modifying Users and Contacts Managing Mailboxes Managing.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
NetTech Solutions Microsoft Outlook and Outlook Express Lesson Four.
Hosted Exchange The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1 Marc Modersitzki.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
Go to Start >> Programs >> Outlook Express ( as shown)
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
Comprehensive Continuous Improvement Plan(CCIP) Training Module 1 CCIP Introduction.
Comprehensive Continuous Improvement Plan (CCIP)
6/11/2018 4:36 AM Services Course Outlook Live Participant Guide
How to Fi
Introduction to Your Name Goes Here
Comprehensive Continuous Improvement Plan (CCIP)
Exchange Configuration on Outlook Express
RR RR Problems Along With Solutions For iPhone And iPad Toll Free ( )
What Is Sharepoint? Mohsen Ashkboos
IIS.
Topic 5: Communication and the Internet
has many aspects that work together to give people almost instant communication from any computer on the internet to any other computer There.
Introduction to Your Name Goes Here
This is the Sign In page for the Dashboard
Implement Web Application Proxy (WAP)
LO3 – Understand Business IT Systems
On the off chance that your business utilizes Roadrunner as your Internet specialist organization, you will have at least one accounts. While you.
Chapter 2 Application Layer
Cloud Migration Training
Presentation transcript:

Managing a Distributed Environment Module 4 Whether you are trying to integrate remote offices, leverage off your Active Directory server, or spread SCOoffice Server’s load across multiple machine, this module will show you how. After completing this modules, students will be able to: Delegate user authentication to an Active Directory Server Configure SCOoffice Server to distribute the load using master and slave servers Configure remote offices to use slave servers Managing a Distributed Environment

Active Directory Authentication Process I’m configured to use Active Directory authentication. So I’ll forward the user’s authentication request. SCOoffice Server 1 Active Directory Server 2 I want to read my email. I decide who is authenticated. 4 3 When SCOoffice Server is configured for Single Server Role or for Master/Slave, user authentication requests are verified against SCOoffice Server’s LDAP server. When SCOoffice Server is configured to use Active Directory authentication, authentication requests from clients are forwarded to an Active Directory server. In environments where user authentication has already been consolidated into Active Directory, this configuration allows SCOoffice Server administrators to leverage off that infrastructure. As an example, consider what happens when a client running Outlook reads his email: Outlook is configured to retrieve email using IMAP (or POP3). The client contacts the SCOoffice Server via IMAP, passing in the user’s username and password. Rather than consulting LDAP, the SCOoffice Server forwards the authentication request to the Active Directory server specified in the admingui under ConfigurationDistributed Mail. The Active Directory server verifies whether the credentials passed in from the client (via the SCOoffice Server) are valid. The Active Directory server informs the SCOoffice Server whether the user is authenticated or not. If the user’s credentials were valid, the SCOoffice Server sends the client its email via IMAP (or POP3). When using the SCOoffice WebClient in conjunction with Active Directory authentication, the process is only slightly different: The WebClient user enters his username and password. The WebClient uses HTTP (or HTTPS) to pass the user’s credentials to the SCOoffice Server. If the user’s credentials were valid, the SCOoffice Server sends the client its email via HTTP (or HTTPS). Client

Active Directory Authentication

Distributed Mail – Single Server SCOoffice Server Alice Corporate Bob When configured in single server role, the SCOoffice Server: Is responsible for storing all user mail accounts in the LDAP directory on the SCOoffice Server. Is responsible for storing user’s email locally via IMAP Is responsible for authenticating email requests Single Server Role Stores all mail user accounts in local LDAP directory Stores all users’ email locally Handles all email authentication requests

Distributed Mail – Master Server Slave Alice Corporate Slave Remote Bob Carl Internet When configuring for distributed mail, you must appoint exactly one master server and at least one slave server. It is essential that there be at least one slave server. This is because email is stored on the slave server(s) and not on the master server. The server configured as the master: Is responsible for maintaining the definitive LDAP directory of user accounts, aliases, etc. Is not responsible for storing email. Is able to authenticate email requests. Is responsible for redirecting clients to the appropriate slave server for email retrieval. Master Role Stores the master LDAP user accounts database No local email storage for users Can handle mail authentication requests Redirects clients to slave for email retrieval

Distributed Mail – Slave Server Master Slave Alice Corporate Slave Remote Bob Carl Internet When creating a distributed email environment, there must be at least one slave server. Slave servers are where user’s email are stored, not the master server. Servers configured as slaves: Have a copy of the master server’s LDAP directory. Are responsible for storing email for the users assigned to each slave server. Are able to handle email authentication requests. Slave Role Stores a local copy of the master LDAP user account database Stores email locally for each user defined on this server Can handle email authentication requests

Sharing in a Distributed Environment Master Slave Alice Corporate Slave Remote Bob Carl Internet It is very important to understand one aspect of how master and slaves operate. Consider what happens if Bob, a user who retrieves his email via Outlook, browses to see what shared resources he can access. Bob’s Outlook is configured to connect via IMAP to a slave server. Carl’s user account was created on that same slave server. Carl has been kind enough to share some of his contacts, his calendar, and some folders. In this scenario, Bob will be able to access the items that Carl has shared. Alice’s account, on the other hand, resides on another slave server. Bob will not be able to see any of the items that she has shared. Contacts Calendar Folders Contacts Calendar Folders

Sharing in a Distributed Environment Master Slave Alice Corporate Slave Remote Bob Carl WAN Congestion Internet One way to resolve this issue is to have Bob’s Outlook client connect via IMAP to the master server. In addition to still being able to access the items shared by Carl, Bob will now be able to access the items shared by Alice. While it’s possible to point all the user’s at the master server, beware of causing WAN congestion. Contacts Calendar Folders Contacts Calendar Folders

Duties in a Distributed Environment MASTER SLAVE Stores email No Yes Maintains LDAP directory Yes, but only a copy Handles email authentication requests The slide above summarizes the responsibilities of the master server versus slave servers.

Configuring Distributed Mail On the master server: Click Configuration Distributed Mail Select Master Click “Set” To configure a master server: In the admingui, click on ConfigurationDistributed Mail. Select Master. Click Set.

Configuring Distributed Mail (cont.) On the master server: Enter the slave server’s fully qualified domain name Enter “admin” Enter the admin password Click “Add” On the master server, perform the following steps for each slave server in the array of servers: Enter the fully qualified domain name of the slave server. (e.g. elm.example.com). Enter the username of the slave server’s administrator (i.e. “admin”). Enter the password for the slave server’s administrator. Click Add.

Configuring Distributed Mail (cont.) LDAP notice List of slave servers New slave servers added here This server’s role After a slave server has been added to the array of servers, the ConfigurationDistributed Mail section of the admingui displays the list of all the slave servers. The Modify and Delete buttons allow individual slave servers to be modified or deleted. The New Slave section allows more slave servers to be added to the array. Additionally, the admingui displays the role of this server. This same section reminds the administrator of the need to propagate the LDAP database to the slave.

Configuring Distributed Mail On the slave server(s): Click Configuration Distributed Mail. Select Slave. Click Set. To configure a slave server: In the admingui, click on ConfigurationDistributed Mail. Select Slave. Click Set.

Configuring Distributed Mail (cont.) On the slave server(s): Enter the master server’s fully qualified domain name. Enter “admin”. Enter the admin password. Click Add. On each slave server in the array of servers: Enter the fully qualified domain name of the master server. (e.g. oak.example.com). Enter the username of the master server’s administrator (i.e. “admin”). Enter the password for the master server’s administrator. Click Add. ??? This screen shot doesn’t jibe with what the admin guide says you’ll see. You’re supposed to see an Add button. This is a known issue with Internet Explorer. To work around this problem, use SCO OpenServer’s Mozilla web browser. ???

Reading Mail in a Distributed Environment Master You need to contact your slave server I want to read my mail. Client Slave Slave Slave

Mail Delivery in a Distributed Environment DNS Server Master SMTP Server Slave Slave Slave