Skip to main content

Microsoft Lync

Connector name

agtlync

Connector type

Executable

Type (UI field value)

Microsoft Lync

Target system versions supported / tested

The agtlync connector is known to work with following versions of Microsoft Lync; other versions may work.

  • Lync 2013

  • Lync 2010

Connector status / support

Customer-Verified

Clients may contact Bravura Security support for assistance with this connector. Troubleshooting and testing must be completed in the client's test environment as Bravura Security does not maintain internal test environments for the associated target system.

The following Bravura Security Fabric operations are supported by this connector:

  • get server information

  • create account

  • delete account

  • update attributes

  • check account enabled

  • enable account

  • disable account

  • List:

    • attributes

    • accounts

For a full list and explanation of each connector operation, see Connector operations.

Preparation

The following are required on the Bravura Security Fabric server in order to integrate Connector Pack with Microsoft Lync:

  • Windows 2012 Server R2

  • Connection to Microsoft Lync 2010 or 2013 server

Before Bravura Security Fabric can manage accounts in Lync, you must:

  1. Join the server with the Active Directory domain which is the Microsoft Lync server domain.

  2. Install Microsoft Lync management tools:

    1. Log into the domain as a member of the Administrators group.

    2. Run setup for Lync core.

    3. After core installation is complete, install admintools.

  3. Verify that Lync Management Shell launches correctly and can contact the Lync server.

    If using Windows 2012 R2, you may have to manually launch Lync Management Shell through Windows PowerShell initially.

Configuring a target system administrator

Bravura Security Fabric uses a designated account (for example psadmin) to create and manage accounts for Lync.

Lync accounts are managed by an Microsoft Active Directory domain administrator. The administrative account must be created on the Lync server as a Domain User with membership in the Administrators group and the Domain Admins group.

Ensure that you set and note the account’s password. You will be required to enter the login ID and password when you add the target system to Bravura Security Fabric .

After the account is created, the services that run the connector (Transaction Monitor Service (idtm) or Proxy Service (psproxy)) need to be updated to run under this Domain account. You must grant sufficient privileges to the Domain user on the Server member before it can run the service.

Targeting Microsoft Lync

For each Microsoft Lync system, add a target system in Bravura Security Fabric (Manage the System > Resources > Target systems).

  • Type is Microsoft Lync.

  • Address using the following options:

    Domain Required

    Server Optional

    OU to list users from Optional

    Poll time after create Optional; set to 5 seconds if undefined.

    Connector fail on invalid user Optional; set to False if undefined. The address is entered in the following syntax:

    {domain=<domain>;server=<server name>;listou=<ou>;polltime=<polltime>;failOnInvalidUser<true|false>}

  • If you are using a proxy server, type the server name and port number for the proxy server in the List of proxies to run connectors on field in the format: <server name>/<port number>.

  • Lync cannot be a source of profile IDs. Another target system, such as Active Directory, must be configured as the source of profile IDs. The Active Directory system must be a member of the Lync server domain.

  • Under the Credentials tab, the ID and password are those of the target system administrator you set up earlier .

  • By default, all connectors run the Bravura Security Fabric processes on the Bravura Security Fabric server, as the local psadmin account. To enable the target system administrator to run those processes, select the Run as? checkbox.

The full list of target system parameters is explained in Target System Options.

Creating a template account

Bravura Security Fabric uses template accounts as models or "blueprints" for creating new Lync accounts. The following example illustrates how you can create a template account on your Lync server:

  1. From a domain controller, select Programs > Microsoft Lync Server 2010 > Lync Server Control Panel.

  2. Select URL to connect.

  3. From the menu on the left, select <Users>.

  4. Click Enable users, on the right pane.

  5. Click Add, and select the user you want to use as a template.

  6. Fill in required sections.

  7. Click Enable.

Configuring attributes

In order to create accounts on the Lync server, override the following Lync account attributes:

  • RegistrarPool

  • SipAddress

  • SipAddressType

  • SipDomain

Load the above attribute values from target systems and map account attributes to profile/request attributes (manually create as required). The mapped attributes should be added to the appropriate attribute group, for example BASEATTRIBUTE.

You may also need to override the Action when creating account and Action when updating account depending on how your organization generations the SIP.

When creating a template account, take the SipAddressType and SipDomain Lync attributes into consideration.

SipAddressType can be set to one of the following:

  • FirstLastName

  • EmailAddress

  • UserPrincipalName

  • SamAccountName

If either FirstLastName or SamAccountName are used, you must set SipDomain to a valid Lync domain.

By default, UserPrincipalName is used.