Cisco Unity Connection Reconfiguration and Upgrade Guide, Release 1.x
Changing Access to Exchange Data for Additional Servers or for Relocated Exchange Mailboxes

Table Of Contents

Changing Access to Exchange Data for Additional Servers or for Relocated Exchange Mailboxes

Moving Exchange Mailboxes Between Servers to Which Connection Access to Exchange Data Is Configured

Task List for Configuring Connection Access to Exchange Data on Additional Servers

Creating the AD Service Account that Connection Uses to Access Exchange Data

Granting Exchange Permissions to the AD Service Account

Creating and Installing SSL Certificates

Creating Connection External Services to Specify the Exchange Servers That Users Can Access

Configuring the Connection Server to Trust Exchange Certificates

Requiring Secure Communication Between Connection and Exchange (Optional But Recommended)

Updating or Creating Connection User External Service Accounts to Access the Additional Exchange Servers


Changing Access to Exchange Data for Additional Servers or for Relocated Exchange Mailboxes


The sections in this chapter apply only when the Cisco Unity Connection system is already configured to access calendar and contact data on Exchange servers, as documented in the Cisco Unity Connection Installation Guide (in the "Configuring Access to Exchange Calendars and Contacts for Personal Call Transfer Rules" chapter).

This chapter contains the following sections:

Moving Exchange Mailboxes Between Servers to Which Connection Access to Exchange Data Is Configured

Task List for Configuring Connection Access to Exchange Data on Additional Servers

Creating the AD Service Account that Connection Uses to Access Exchange Data

Granting Exchange Permissions to the AD Service Account

Creating and Installing SSL Certificates

Creating Connection External Services to Specify the Exchange Servers That Users Can Access

Configuring the Connection Server to Trust Exchange Certificates

Requiring Secure Communication Between Connection and Exchange (Optional But Recommended)

Updating or Creating Connection User External Service Accounts to Access the Additional Exchange Servers

Moving Exchange Mailboxes Between Servers to Which Connection Access to Exchange Data Is Configured

In this section, you move mailboxes between two Exchange servers to which access to Exchange calendar and contact data is already configured, and update existing external service accounts for each Cisco Unity Connection user whose mailbox you moved. It assumes the following conditions have been met:

The Connection user accounts to which you want to give access to calendar and contact data exist.

The accounts are assigned to a class of service in which the option Allow Users to Use Personal Call Transfer Rules is enabled.

To Move Exchange Mailboxes Between Servers to Which Connection Access to Exchange Data Is Configured


Step 1 Move the Exchange mailboxes to the other server to which Connection access to Exchange data is configured. Refer to Exchange Help for instructions.

Step 2 On the Connection server, log on to Cisco Unity Connection Administration.

Step 3 In Cisco Unity Connection Administration, expand Users.

Step 4 On the Search Users page, in the Search Results table, click the alias of the applicable user.

If the user does not appear in the search results table, set the applicable parameters in the search fields at the top of the page, and click Find.

Step 5 On the Edit User Basics page, on the Edit menu, click External Service Accounts.

Step 6 On the External Service Accounts page, click the name of the external service account that was originally created for Connection access to Exchange calendar and contact data.

If there is more than one external service account, use the account for which the value in the Service Type list is WebDav.

Step 7 Confirm that the value of the Account Login field is the Active Directory user logon name for the user.

Step 8 Change the value of the Server URL Suffix field to the new Exchange account logon name for the user.

Step 9 Click Save.

Step 10 Repeat Step 3 through Step 9 for any other users whose Exchange mailboxes you moved to the other Exchange server.


Task List for Configuring Connection Access to Exchange Data on Additional Servers

To allow Connection access to calendar and contact data on one or more Exchange servers to which access is not already configured, do the following tasks.

1. If the additional Exchange servers are in the same Active Directory domain as any of the Exchange servers to which Connection access to calendar and contact data is already configured, skip to Task 3.

If the additional Exchange servers are in a different Active Directory domain from any of the Exchange servers to which Connection access to calendar and contact data is already configured, create a new Active Directory service account in the same Active Directory domain as the additional Exchange servers. See the "Creating the AD Service Account that Connection Uses to Access Exchange Data" section.

2. Grant the required Exchange permissions to the Active Directory account that you created in Task 1. See the "Granting Exchange Permissions to the AD Service Account" section.

3. Create and install an SSL certificate on each additional Exchange server. See the "Creating and Installing SSL Certificates" section.

4. Create a Connection external service for each additional Exchange server. See the "Creating Connection External Services to Specify the Exchange Servers That Users Can Access" section.

5. Configure the Connection server to trust the SSL certificates from the additional Exchange servers. See the "Configuring the Connection Server to Trust Exchange Certificates" section.

6. Configure the additional Exchange servers to require secure (encrypted) communication with the Connection server. See the "Requiring Secure Communication Between Connection and Exchange (Optional But Recommended)" section.

7. Update or create user external service accounts to allow access to calendar and contact data on the additional Exchange servers. See the "Updating or Creating Connection User External Service Accounts to Access the Additional Exchange Servers" section.

Creating the AD Service Account that Connection Uses to Access Exchange Data


Note If the additional Exchange servers are in the same Active Directory domain as any of the Exchange servers to which Connection access to calendar and contact data is already configured, skip this section.


Cisco Unity Connection accesses Exchange calendar and contact data by using an Active Directory service account that acts as a proxy for Connection. When you are configuring access to additional Exchange servers that are in a different Active Directory domain from any of the Exchange servers to which Connection access to Exchange data is already configured, you must create a new service account for the additional servers.

To Create the AD Service Account that Cisco Unity Connection Uses to Access Exchange Data


Step 1 On a server on which Active Directory Users and Computers is installed, log on to Windows by using an account that has the right to create new users.

Step 2 On the Windows Start menu, click Programs > Microsoft Exchange > Active Directory Users and Computers or click Programs > Administrative Tools > Active Directory Users and Computers.

Step 3 In the left pane, expand the domain in which you want to create the account, right-click Users or the organizational unit where you want to create the account, and click New > User.

Step 4 Follow the on-screen prompts to create the service account, choosing the following options:

When you choose password options, choose the option that prevents the password from expiring. If the password expires, Connection will stop working the next time the server is restarted.

Do not create an Exchange mailbox.

Step 5 Close Active Directory Users and Computers.


Granting Exchange Permissions to the AD Service Account


Note If the additional Exchange server is in the same Active Directory domain as any of the Exchange servers to which Connection access to calendar and contact data is already configured, skip this section.


To enable the Active Directory service account to access Exchange data, you delegate Exchange View Only Administrator control to the account, and you grant the account Administer Information Store, Send As, and Receive As permissions.

You can delegate control either at the organization level or at the administrative group level. If you delegate control at the administrative group level, you must delegate control in every administrative group that contains the following mailstores:

An Exchange mailstore from which you want Connection users to be able to import contact data.

An Exchange mailstore in which you want Connection to be able to access Exchange calendar data.

To Grant Exchange Permissions to the AD Service Account


Step 1 On a server on which Exchange System Manager is installed, log on to Windows by using an account that is an Exchange Full Administrator.

Step 2 On the Windows Start menu, click Programs > Microsoft Exchange > System Manager.

Step 3 In the left pane of Exchange System Manager, right-click either the organization name at the top of the tree control or an administrative group that contains mailstores in which you want to access calendar and contact data, and click Delegate Control.

Step 4 On the Welcome to the Exchange Administration Delegation Wizard page, click Next.

Step 5 In the Users or Groups dialog box, click Add.

Step 6 In the Delegate Control dialog box, click Browse.

Step 7 Specify the service account name, depending on the Exchange version:

Exchange 2003

a. In the Select Users, Computers, or Groups dialog box, in the Enter the Object Name to Select field, enter the user logon name for the account created in "To Create the AD Service Account that Cisco Unity Connection Uses to Access Exchange Data" procedure.

b. Click Check Names.

c. Click OK to close the Select Users, Computers, or Groups dialog box. The account you selected appears in the Group (Recommended) or User box.

Exchange 2000

a. In the Select Users, Computers, or Groups dialog box, in the Look In list, click the name of the domain in which you created the account in the "To Create the AD Service Account that Cisco Unity Connection Uses to Access Exchange Data" procedure.

b. In the list of users, computers, and groups, double-click the name of the service account.

The Delegate Control dialog box reappears. The account you selected appears in the Group (Recommended) or User box.


Step 8 In the Role list, click Exchange View Only Administrator.

Step 9 Click OK to close the Delegate Control dialog box.

Step 10 Click Next.

Step 11 Click Finish.

Step 12 If you selected the organization name at the top of the tree control in Step 3, skip to Step 13.

If you selected an administrative group in Step 3 and you want to access calendar and contact data in mailstores in other administrative groups, repeat Step 3 through Step 11 for each administrative group.

Step 13 In the left pane of Exchange System Manager, right-click the name of a mailbox store that contains mailboxes in which you want to access calendar and contact data, and click Properties.

Step 14 In the <Server name> Properties dialog box, click the Security tab.

Step 15 Click Add.

Step 16 Specify the service account name, depending on the Exchange version:

Exchange 2003

a. In the Select Users, Computers, or Groups dialog box, in the Enter the Object Names to Select field, enter the name of the service account.

b. Click Check Names.

Exchange 2000

a. In the Select Users, Computers, or Groups dialog box, in the Look In list, click the name of the domain in which you created the service account.

b. In the list of users, computers, and groups, double-click the name of the service account.

The Delegate Control dialog box reappears. The account you selected appears in the Group (Recommended) or User box.


Step 17 Click OK to close the dialog box.

Step 18 In the Mailbox Store <Server name> Properties dialog box, in the Group or User Names list, click the name of the service account.

Step 19 In the Permissions For <Account name> list, in the Allow column, check the following three check boxes:

Administer Information Store

Receive As

Send As

Do not change any other permissions.

Step 20 Click OK to close the Mailbox Store <Server name> Properties dialog box.

Step 21 Repeat Step 13 through Step 20 for each additional Exchange server on which you want to access Exchange data.

Step 22 Close Exchange System Manager.


Creating and Installing SSL Certificates

In this section, you create and install an SSL certificate on each additional Exchange server on which you want to access calendar and contact data. This prevents Cisco Unity Connection from sending the credentials of the service account that you created in the "Creating the AD Service Account that Connection Uses to Access Exchange Data" section over the network as unencrypted text. It also prevents Exchange from sending calendar and contact data over the network in unencrypted text.

If you do not create and install SSL certificates, Cisco Unity Connection may still send service account credentials in an encrypted format, depending on whether you have configured one or more authentication schemes in Exchange. However, the available Exchange authentication schemes encrypt only the user name and password, not calendar and contact data, and Exchange documentation indicates that the available schemes provide varying degrees of security. We recommend that you create and install SSL certificates.


Caution Cisco Unity Connection does not support Passport authentication.

If you use another method to create and install certificates, use the applicable documentation.

This section contains four procedures. Do them in the order listed.

Do the following procedure on any server in the same domain as the Exchange servers that contain calendar and contact data that you want Connection users to be able to access.

To Install the Microsoft Certificate Services Component


Step 1 Locate either a Windows Server 2003 disc or the Cisco Unity Connection disc, which you may be prompted to insert into the DVD drive to complete the installation of the Microsoft Certificate Services component.

Step 2 Log on to Windows by using an account that is a member of the local Administrators group.

Step 3 On the Windows Start menu, click Settings > Control Panel > Add or Remove Programs.

Step 4 In the left pane of the Add or Remove Programs control panel, click Add/Remove Windows Components.

Step 5 In the Windows Components dialog box, check the Certificate Services check box. Do not change any other items.

Step 6 When the warning appears about not being able to rename the computer or to change domain membership, click Yes.

Step 7 Click Next.

Step 8 On the CA Type page, click Stand-alone Root CA, and click Next. (A stand-alone certification authority (CA) is a CA that does not require Active Directory.)

Step 9 On the CA Identifying Information page, in the Common Name for This CA field, enter a name for the certification authority.

Step 10 Accept the default value in the Distinguished Name Suffix field.

Step 11 For Validity Period, accept the default value of 5 years.

Step 12 Click Next.

Step 13 On the Certificate Database Settings page, click Next to accept the default values.

If a message appears indicating that Internet Information Services is running on the computer and must be stopped before proceeding, click Yes to stop the services.

Step 14 If you are prompted to insert the Windows Server 2003 disc into the drive, insert either the Windows Server 2003 disc or the Cisco Unity Connection disc, which contains the same required software.

Step 15 In the Completing the Windows Components Wizard dialog box, click Finish.

Step 16 Close the Add or Remove Programs control panel.


Do the following procedure on each additional Exchange server that contains calendar and contact data that you want Connection users to be able to access.

To Create a Certificate Signing Request


Step 1 Log on to Windows by using an account that is a member of the Domain Admins group.

Step 2 On the Windows Start menu, click Programs > Administrative Tools > Internet Information Services (IIS) Manager.

Step 3 If the server is running Exchange Server 2003, on the Windows Start menu, click Programs > Administrative Tools > Internet Information Services (IIS) Manager.

If the server is running Exchange 2000 Server, on the Windows Start menu, click Programs > Administrative Tools > Internet Services Manager.

Step 4 In the left pane of Internet Information Services, expand the name of this Exchange server.

Step 5 If the server is running Exchange 2000 Server, skip to Step 6.

If the server is running Exchange Server 2003, expand Web Sites.

Step 6 Right-click Default Web Site, and click Properties.

Step 7 In the Default Web Site Properties dialog box, click the Directory Security tab.

Step 8 Under Secure Communications, click Server Certificate.

Step 9 On the Welcome to the Web Server Certificate Wizard page, click Next.

Step 10 Click Create a New Certificate.

Step 11 Click Next.

Step 12 Click Prepare the Request Now, But Send It Later.

Step 13 Click Next.

Step 14 Enter a name for the certificate, and accept the default bit length.

Step 15 Click Next.

Step 16 Enter the organization information.

Step 17 Click Next.

Step 18 For the common name of the site, enter either the computer name or the fully qualified domain name of the Exchange server.

Remember whether you specified the computer name or the fully qualified domain name. You will need this information in a later procedure.


Caution The name must exactly match the host portion of any URL that will access the system by using a secure connection.

Step 19 Click Next.

Step 20 On the Geographical Information page, enter the applicable information.

Step 21 Click Next.

Step 22 On the Certificate Request File Name page, enter a path and file name, and write down the information. You will need it in a later procedure.

If this is not the server on which you installed Microsoft Certificate Services in the "To Install the Microsoft Certificate Services Component" procedure, try to choose a network location that you can access from the current server and from the server on which Microsoft Certificate Services is installed.

Step 23 Click Next.

Step 24 On the Request File Summary page, verify the request file information.

Step 25 Click Next.

Step 26 On the Completing the Web Server Certificate Wizard page, click Finish.

Step 27 Click OK to close the Default Web Site Properties dialog box.

Step 28 Close Internet Information Services Manager.

Step 29 If Microsoft Certificate Services is on another server and you were not able to save the certificate request file in a network location accessible to that server, copy the certificate request file to a removable medium (diskette, CD, or DVD).

Step 30 Repeat Step 1 through Step 29 to create a certificate signing request for each additional Exchange server that contains calendar and contact data that you want Connection users to be able to access.

Step 31 If you are not using an external certification authority, you are finished with this procedure.

If you are using an external certification authority, send the certificate request files to the CA. When the certificates return from the CA, skip to the "To Install the Certificate" procedure.


Do the following procedure for each additional Exchange server that contains calendar and contact data that you want Connection users to be able to access.

To Issue the Certificate (Only When You Are Using Microsoft Certificate Services to Issue the Certificate)


Step 1 On the server on which you installed Microsoft Certificate Services, log on to Windows by using an account that is a member of the Domain Admins group.

Step 2 On the Windows Start menu, click Programs > Administrative Tools > Certification Authority.

Step 3 In the left pane, expand Certification Authority (Local) > <Certification authority name>, where <Certification authority name> is the name that you gave to the certification authority when you installed Microsoft Certificate Services in the "To Install the Microsoft Certificate Services Component" procedure.

Step 4 Right-click the name of the certification authority, and click All Tasks > Submit New Request.

Step 5 In the Open Request File dialog box, browse to the location of the first certificate signing request file that you created in the "To Create a Certificate Signing Request" procedure, and double-click the file.

Step 6 In the left pane of Certification Authority, click Pending Requests.

Step 7 Right-click the pending request that you submitted in Step 5, and click All Tasks > Issue.

Step 8 In the left pane of Certification Authority, click Issued Certificates.

Step 9 Right-click the new certificate, and click Open.

Step 10 In the Certificate dialog box, click the Details tab.

Step 11 Click Copy to File.

Step 12 On the Welcome to the Certificate Export Wizard page, click Next.

Step 13 On the Export File Format page, click Base-64 Encoded X.509 (.CER).

Step 14 Click Next.

Step 15 On the File to Export page, click Browse.

Step 16 In the Save As dialog box, choose a location and enter a file name.

If this is not a server on which Internet Information Services Manager is installed, try to choose a network location that you can access from the current server and from the server on which Microsoft Certificate Services is installed.

Step 17 Write down the path and file name. You will need it in a later procedure.

Step 18 Click Save to close the Save As dialog box.

Step 19 Click Next.

Step 20 On the Completing the Certificate Export Wizard page, click Finish.

Step 21 Click OK to clear the message that indicates that the export was successful.

Step 22 Click OK to close the Certificate dialog box.

Step 23 If you created more than one certificate signing request in the "To Create a Certificate Signing Request" procedure, repeat Step 9 through Step 22 of this procedure for each certificate signing request listed under Issued Certificates.

Step 24 Close Certification Authority.

Step 25 If Internet Information Services Manager is on another server and you were not able to save the certificate request files in a network location accessible to that server, copy the certificate request files to a removable medium (diskette, CD, or DVD).


Do the following procedure for each additional Exchange server that contains calendar and contact data that you want Connection users to be able to access.

To Install the Certificate


Step 1 On one of the Exchange servers on which you created a certificate signing request in the "To Create a Certificate Signing Request" procedure, log on to Windows by using an account that is a member of the Domain Admins group.

Step 2 On the Windows Start menu, click Programs > Administrative Tools > Internet Information Services Manager.

Step 3 In the left pane, expand the name of this Exchange server.

Step 4 Right-click Default Web Site, and click Properties.

Step 5 In the Default Web Site Properties dialog box, click the Directory Security tab.

Step 6 Under Secure Communications, click Server Certificate.

Step 7 On the Web Server Certificate Wizard Welcome page, click Next.

Step 8 On the Pending Certificate Request page, click Process the Pending Request and Install the Certificate.

Step 9 Click Next.

Step 10 On the Process a Pending Request page, browse to the location where you saved the certificates, and specify the applicable file, depending on the CA that you used:

Sent the certificate request to an external CA

Specify the file that you got from the external CA.

Issued the certificate using the Windows
Certification Authority application

Specify the file that you created in Step 9 through Step 22 of the "To Issue the Certificate (Only When You Are Using Microsoft Certificate Services to Issue the Certificate)" procedure.


You may have to change the value of the Files of Type list to All Files (*.*) to see the certificates.

Step 11 On the Certificate Summary page, verify the certificate information.

Step 12 Click Next.

Step 13 On the Completing the Web Server Certificate Wizard page, click Finish to exit the Web Server Certificate wizard.

Step 14 Click OK to close the Default Web Site Properties dialog box.

Step 15 Restart IIS:

a. In the left pane of Internet Information Services Manager, right-click the name of this Exchange server, and click Restart IIS.

b. In the Stop/Start/Restart dialog box, click Restart Internet Services on <Server name>.

c. Click OK.

d. Close Internet Information Services Manager.

Step 16 Repeat Step 1 through Step 15 for each certificate that you want to install.


Creating Connection External Services to Specify the Exchange Servers That Users Can Access

In Cisco Unity Connection Administration, you create and configure one WebDav external service for each additional Exchange server that contains calendar and contact data that you want Connection users to be able to access.

To Create Connection External Services to Specify the Exchange Servers That Users Can Access


Step 1 In Cisco Unity Connection Administration, expand System Settings, then click External Services.

Step 2 Click Add New.

Step 3 In the Type list, click WebDav Service.

Step 4 In the Display Name field, enter a name that will help you identify the service when you configure Connection users to access their calendar and contact information. (For example, in the name of the service, you might include the name of the Exchange server that contains the calendar and contact data users are accessing.)

Step 5 In the Server Base URL field, enter the URL for the Exchange server that contains calendar and contact data that you want Connection users to be able to access. Use the format https://<Exchange server>/Exchange/ where <Exchange server> is the computer name, the fully qualified domain name, or the IP address of the Exchange server.

If you enter the computer name or the fully qualified domain name of the Exchange server, the value that you enter for <Exchange server> must exactly match the value that you entered in Step 18 of the "To Create a Certificate Signing Request" procedure.


Caution If you enter http instead of https, and if you do the procedure in the "Requiring Secure Communication Between Connection and Exchange (Optional But Recommended)" section, attempts to transfer calendar and contact data from Exchange to Cisco Unity Connection will fail. If you enter http instead of https, and if you do not do the procedure in that section, calendar and contact data will not be encrypted before it is transferred from Exchange to Cisco Unity Connection.

Step 6 Confirm that the Access Enabled check box is checked.

Step 7 In the Service Login field, enter the Active Directory user logon name of the service account that you created in the "To Create the AD Service Account that Cisco Unity Connection Uses to Access Exchange Data" procedure. Use the format <Domain name>\<Account name>.

Note the "\" between <Domain name> and <Account name>. If you use a "/", the WebDav service will not work.

Step 8 In the Service Password field, enter the password for the service account.

Step 9 Click Save.

Step 10 If you have created external services for all of the Exchange servers that you want to allow users to access, skip the rest of this procedure.

If you want users to be able to access additional Exchange servers, on the External Service menu, click New External Service.

Step 11 Repeat Step 3 through Step 10 until you have created all of the required external services.


Configuring the Connection Server to Trust Exchange Certificates

To make the Cisco Unity Connection server trust the certificates for the additional Exchange servers, you need to add the certification authority's signing certificate to the root certificate store for the Connection server.

To Configure the Cisco Unity Connection Server to Trust Exchange Certificates


Step 1 On the server on which you installed certification authority, log on to Windows by using an account that is a member of the local Administrators group.

Step 2 On the Windows Start menu, click Programs > Administrative Tools > Certification Authority.

Step 3 In the left pane, expand Certification Authority (Local).

Step 4 Right-click the name of the certification authority, and click Properties.

Step 5 In the <Certification authority name> Properties dialog box, on the General tab, in the CA Certificates list, click the name of one of the certificates that you created for the Exchange servers.

Step 6 Click View Certificate.

Step 7 In the Certificate dialog box, click the Details tab.

Step 8 Click Copy to File.

Step 9 On the Welcome to the Certificate Export Wizard page, click Next.

Step 10 On the Export File Format page, click Base-64 Encoded X.509 (.CER).

Step 11 Click Next.

Step 12 On the File to Export page, enter a temporary path and file name of the certificate export file (for example, c:\cacert.cer).

Step 13 Click Next.

Step 14 On the Completing the Certificate Export Wizard page, click Finish.

Step 15 Click OK to close the "Export successful" message box.

Step 16 Click OK to close the Certificate dialog box.

Step 17 Click OK to close the <Server name> Properties dialog box.

Step 18 Close Certification Authority.

Step 19 Copy the certificate export file that you specified in Step 12 to the Connection server, and save it in the Utilities directory on the drive where Connection software is installed (usually drive G).

Step 20 On the Windows Start menu, click Programs > Accessories > Command Prompt.

Step 21 Change to the Utilities directory.

Step 22 Run the following command, where <Certificate export file.cer> is the name of the certificate export file that you created in Step 12:

certmgr /add /c <certificate export file.cer> /r localMachine /s root

Note that the name of the application is certmgr, not CuCertMgr, which is in the same directory.


Requiring Secure Communication Between Connection and Exchange (Optional But Recommended)

Several of the procedures earlier in this chapter help to secure, by encryption, the calendar and contact data that is transferred from Exchange to Cisco Unity Connection. However, if you specified an http URL instead of an https URL when you did the procedure in the "Creating Connection External Services to Specify the Exchange Servers That Users Can Access" section, the data is not encrypted before it is sent over the network.

Do the following procedure on each additional Exchange server so that if a Connection administrator accidentally specifies an http URL when updating the list of Exchange servers that users can access, any attempt to transfer unencrypted Exchange data will fail. However, note that this is a global setting. For every Exchange server on which you have done this procedure, all web clients that access Exchange data on that server will be required to use an https URL.

To Configure Exchange to Require Secure Communication with Connection


Step 1 Confirm that no other applications will be affected when Internet Information Services is configured to require Web clients to use https URLs to access Exchange data.

Step 2 Log on to an Exchange server that contains mailboxes from which Cisco Unity Connection users want to import calendars or contacts.

Step 3 If the server is running Exchange Server 2003, on the Windows Start menu, click Programs > Administrative Tools > Internet Information Services (IIS) Manager.

If the server is running Exchange 2000 Server, on the Windows Start menu, click Programs > Administrative Tools > Internet Services Manager.

Step 4 In the left pane of Internet Information Services, expand the name of this Exchange server.

Step 5 If the server is running Exchange 2000 Server, skip to Step 6.

If the server is running Exchange Server 2003, expand Web Sites.

Step 6 Right-click Default Web Site, and click Properties.

Step 7 In the Default Web Site Properties dialog box, click the Directory Security tab.

Step 8 Under Secure Communications, click Edit.

Step 9 In the Secure Communications dialog box, check the Require Secure Channel (SSL) check box.

Step 10 Click OK to close the Secure Communications dialog box.

Step 11 Click OK to close the Default Web Site Properties dialog box.

Step 12 Close Internet Information Services.

Step 13 If you are prompted to turn on this setting for child nodes, select the child nodes on which you want to enable this setting and click OK.

Step 14 Repeat Step 1 through Step 13 on each additional Exchange server that contains mailboxes from which Cisco Unity Connection users want to import calendar or contact data.


Updating or Creating Connection User External Service Accounts to Access the Additional Exchange Servers

In this section you update existing external service accounts for each Cisco Unity Connection user—or create new accounts—to allow users to access calendar and contact data on the additional Exchange servers. It assumes the following conditions have been met:

The Connection user accounts to which you want to give access to calendar and contact data exist.

The accounts are assigned to a class of service in which the option Allow Users to Use Personal Call Transfer Rules is enabled.

This section contains two procedures. Do the applicable procedure, depending on whether you are updating existing user external service accounts or creating new accounts.

To Update Existing Connection User External Service Accounts to Access the Additional Exchange Servers


Step 1 In Cisco Unity Connection Administration, expand Users.

Step 2 On the Search Users page, in the Search Results table, click the alias of the applicable user.

If the user does not appear in the search results table, set the applicable parameters in the search fields at the top of the page, and click Find.

Step 3 On the Edit User Basics page, on the Edit menu, click External Service Accounts.

Step 4 On the External Service Accounts page, click the name of the external service account that was originally created for Connection access to Exchange calendar and contact data.

If there is more than one external service account, use the account for which the value in the Service Type list is WebDav.

Step 5 Confirm that the value of the Account Login field is the Active Directory user logon name for the user.

Step 6 Change the value of the Server URL Suffix field to the new Exchange account logon name for the user.

Step 7 Click Save.

Step 8 Repeat Step 2 through Step 7 for each additional user.


To Create New Connection User External Service Accounts to Access the Additional Exchange Servers


Step 1 In Cisco Unity Connection Administration, expand Users.

Step 2 On the Search Users page, in the Search Results table, click the alias of the applicable user.

If the user does not appear in the search results table, set the applicable parameters in the search fields at the top of the page, and click Find.

Step 3 On the Edit User Basics page, on the Edit menu, click External Service Accounts.

Step 4 Click Add New.

Step 5 In the Account Login field, enter the Active Directory user logon name for the user.

Step 6 In the Service Type list, select WebDav.

Step 7 In the Remote Server list, select the name of the WebDav service.

Step 8 In the Server URL Suffix field, enter the Exchange account logon name for the user.

Step 9 Click Save.

Step 10 Repeat Step 2 through Step 9 for each additional user.