Microsoft Lync
Connector name |
|
Connector type | Executable |
Type (UI field value) | Microsoft Lync |
Target system versions supported / tested | The
|
Connector status / support | Customer-Verified Clients may contact Bravura Security support for assistance with this connector. Troubleshooting and testing must be completed in the client's test environment as Bravura Security does not maintain internal test environments for the associated target system. |
The following Bravura Security Fabric operations are supported by this connector:
get server information
create account
delete account
update attributes
check account enabled
enable account
disable account
List:
attributes
accounts
For a full list and explanation of each connector operation, see Connector operations.
Preparation
The following are required on the Bravura Security Fabric server in order to integrate Connector Pack with Microsoft Lync:
Windows 2012 Server R2
Connection to Microsoft Lync 2010 or 2013 server
Before Bravura Security Fabric can manage accounts in Lync, you must:
Join the server with the Active Directory domain which is the Microsoft Lync server domain.
Install Microsoft Lync management tools:
Log into the domain as a member of the Administrators group.
Run
setupfor Lync core.After core installation is complete, install
admintools.
Verify that Lync Management Shell launches correctly and can contact the Lync server.
If using Windows 2012 R2, you may have to manually launch Lync Management Shell through Windows PowerShell initially.
Configuring a target system administrator
Bravura Security Fabric uses a designated account (for example psadmin) to create and manage accounts for Lync.
Lync accounts are managed by an Microsoft Active Directory domain administrator. The administrative account must be created on the Lync server as a Domain User with membership in the Administrators group and the Domain Admins group.
Ensure that you set and note the account’s password. You will be required to enter the login ID and password when you add the target system to Bravura Security Fabric .
After the account is created, the services that run the connector (Transaction Monitor Service (idtm) or Proxy Service (psproxy)) need to be updated to run under this Domain account. You must grant sufficient privileges to the Domain user on the Server member before it can run the service.
Targeting Microsoft Lync
For each Microsoft Lync system, add a target system in Bravura Security Fabric (Manage the System > Resources > Target systems).
Type is Microsoft Lync.
Address using the following options:
Domain Required
Server Optional
OU to list users from Optional
Poll time after create Optional; set to 5 seconds if undefined.
Connector fail on invalid user Optional; set to False if undefined. The address is entered in the following syntax:
{domain=<domain>;server=<server name>;listou=<ou>;polltime=<polltime>;failOnInvalidUser<true|false>}If you are using a proxy server, type the server name and port number for the proxy server in the List of proxies to run connectors on field in the format: <server name>/<port number>.
Lync cannot be a source of profile IDs. Another target system, such as Active Directory, must be configured as the source of profile IDs. The Active Directory system must be a member of the Lync server domain.
Under the Credentials tab, the ID and password are those of the target system administrator you set up earlier .
By default, all connectors run the Bravura Security Fabric processes on the Bravura Security Fabric server, as the local psadmin account. To enable the target system administrator to run those processes, select the Run as? checkbox.
The full list of target system parameters is explained in Target System Options.
Creating a template account
Bravura Security Fabric uses template accounts as models or "blueprints" for creating new Lync accounts. The following example illustrates how you can create a template account on your Lync server:
From a domain controller, select Programs > Microsoft Lync Server 2010 > Lync Server Control Panel.
Select URL to connect.
From the menu on the left, select <Users>.
Click Enable users, on the right pane.
Click Add, and select the user you want to use as a template.
Fill in required sections.
Click Enable.
Configuring attributes
In order to create accounts on the Lync server, override the following Lync account attributes:
RegistrarPool
SipAddress
SipAddressType
SipDomain
Load the above attribute values from target systems and map account attributes to profile/request attributes (manually create as required). The mapped attributes should be added to the appropriate attribute group, for example BASEATTRIBUTE.
You may also need to override the Action when creating account and Action when updating account depending on how your organization generations the SIP.
When creating a template account, take the SipAddressType and SipDomain Lync attributes into consideration.
SipAddressType can be set to one of the following:
FirstLastName
EmailAddress
UserPrincipalName
SamAccountName
If either FirstLastName or SamAccountName are used, you must set SipDomain to a valid Lync domain.
By default, UserPrincipalName is used.