IT tutorials
 
Technology
 

Microsoft Lync Server 2010 : Planning for Deploying External Services - Certificates

8/9/2013 11:10:26 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Provisioning certificates for Edge Servers was another sore subject in prior versions of Lync Server. This has been greatly simplified by the new certificate wizard, which automatically populates the required names and attributes based on the published topology. This section discusses the certificate requirements and considerations for organizations deciding between public certificates and privately issued certificates.

An Edge Server requires certificates for four different services:

  • Internal Edge Service

  • Access Edge Service

  • Web Conferencing Edge Service

  • A/V Edge Authentication Service

A common misconception is that all of these certificates should be purchased from a public certificate authority, which is only partly true. Only the Access Edge and Web Conferencing Edge certificates are presented to external clients, so those are the only services which require a certificate that should be purchased from a public certificate authority. Both the Edge Server internal certificate and A/V Edge Authentication Service certificate can be issued from an internal, private certificate authority that is trusted by internal clients.

Note

Probably the most confusing part of previous version Edge Server deployments was centered around the A/V Edge and A/V Authentication Edge services. The A/V Edge service actually doesn’t use a certificate, even though port 443 is involved. The A/V Authentication service, however, does require a certificate. Because the A/V Authentication service runs on the internal-facing adapter, this certificate can actually be issued by a private certificate authority. This split is a bit more hidden in Lync Server 2010 because the A/V authentication certificate automatically uses the certificate assigned to the internal Edge service.


Another common misconception is that subject alternative name (SAN) certificates are an absolute requirement, but there are only a few cases where a subject alternative name is required. First, only the Access Edge certificate needs a subject alternative name. Every other certificate can use a standard, single name SSL certificate. Furthermore, a subject alternative name certificate is required only when an organization is using multiple SIP domains or if the public name of the Access Edge service does not match the primary SIP domain.

The specific requirements for subject names and subject alternative names for Edge Servers are outlined in the following:

  • Access Edge— The subject name should match the published name of the Access Service in public DNS. If a hardware load balancer is used, this is the name clients resolve to the virtual IP address. The subject alternative name field should contain any supported SIP domains in the sip.<SIP Domain> format.

  • Web Conferencing Edge— The subject name should match the published name of the Web Conferencing Edge in public DNS. If a hardware load balancer is used, this is the name clients resolve to the virtual IP address. No subject alternative names are required.

  • A/V Edge— This service has no certificate associated, but is included here to provide the distinction from the A/V Edge Authentication service.

  • A/V Edge Authentication— The subject name has no specific name requirement, but generally matches the internal Edge Server interface name. No subject alternative names are required.

  • Internal Edge— The subject name should match the published name of the Edge Server internal pool. If a hardware load balancer is used, this is the name that resolves to the internal virtual IP address. No subject alternative names are required.

The last certificate required is not actually bound to the Edge Servers and is required for the reverse proxy.

  • Reverse Proxy— The subject name should match the published name of the external web services. The subject alternative name should contain any simple URLs for dial-in and hosted meetings.

Tip

Many times, administrators think of subject alternative names as the “in addition to” field to the certificate subject name. As a best practice, follow an “either, or” mentality, meaning clients read either the subject name or the subject alternative name field, but not both. To accommodate this, always include the subject name as one of the subject alternative names and usually as the first entry.


As an example, assume Company ABC deploys a single Edge Server, the only supported SIP domain is companyabc.com, and sip.companyabc.com is the Access Edge Server public name. In this case, only a single name SSL certificate with the subject name sip.companyabc.com is required for the Access Edge service. Company ABC also needs to purchase a second single name certificate for the Web Conferencing Edge service. In this scenario, only two publicly issued certificates are required: both with only a single name.

If Company ABC also supports another domain such as companyxyz.com, a subject alternative name certificate is required for the Access Edge Service. The subject name would be sip.companyabc.com, and the subject alternative names would be sip.companyabc.com and sip.companyxyz.com. Company ABC would not need to purchase a second single name certificate for the Web Conferencing Edge service. In this scenario, only two publicly issued certificates are required: one with subject alternative names and one without.

Table 1 outlines what type of certificate is recommended for each service on an Edge Server.

Table 1. External Access Server Certificates
ServiceCertificate AuthoritySubject Alternative Names
Access EdgePublicAdditional SIP domains
Web Conferencing EdgePublicNo
A/V EdgeNoneNo
A/V Edge AuthenticationPrivateNo
Internal EdgePrivateNo
Reverse ProxyPublicSimple URLs

When using multiple Edge Servers, the certificates must be installed on each Edge Server that is being load-balanced together. Depending on the certificate, vendor certificates can be licensed for one or more severs, but generally the same public certificate can be placed on each of the Edge Servers in the pool.

Note

If Public IM Connectivity to AOL is used, the certificate for the Access Edge Service must have Client Enhanced Key Usage (EKU) enabled.


Organizations should decide on a certificate vendor prior to the Lync Server deployment. Microsoft has partnered with a few certificate vendors to ensure that the X.509 certificates work with Lync Server. Those vendors are listed here:

  • Entrust

  • Comodo

  • Digicert

  • GoDaddy

Certificates from other vendors also work if all clients trust the certificate, but Microsoft has not verified those vendors. The vendors listed previously have the best compatibility between different server, desktop, and device platforms.

Tip

Be sure to use the same advice here when planning for a reverse proxy server and install any internal certificate chains on the reverse proxy. To complete an SSL bridging scenario, the reverse proxy needs to trust the certificates presented by the internal pool member servers.


Using Single Subject Alternative Name Certificates

A newly supported scenario in Lync Server is the capability to use a single certificate that contains many subject alternative names. This certificate can then be exported and used on both Edge Servers and reverse proxy servers. Although this simplifies the number of certificates required, it might not actually be any less expensive than using a few single name certificates. This may vary depending on the number of SIP domains and simple URLs configured. The advantage to this approach is names for the simple URLs for meetings or dial-in conferencing can be added to the same certificate and used on the reverse proxy server.

Following is an example of what a certificate like this looks like that would then be placed on each Edge Server and reverse proxy server. Each Edge Server still requires a separate, internally issued certificate for the internal-facing interface. In this scenario, a single subject alternative name certificate can be placed on all Edge Servers and reverse proxy servers.

Subject name: sip.companyabc.com

Subject alternative names: sip.companyabc.com, webconf.companyabc.com, av.companyabc.com, lyncpoolweb.companyabc.com, dialin.companyabc.com, and meet.companyabc.com

Wildcard Certificates

Wildcard certificates in the format of *.<domain> have become increasingly popular because they provide a way to secure a large number of websites at a low cost by using only a single certificate. Unfortunately, many functions in Lync Server simply don’t work well or at all if a wildcard certificate is used. Even if it does appear to work for some clients or features, it can produce some odd behavior which makes troubleshooting very difficult. At this time, the recommendation is to avoid using a wildcard certificate for any Lync Server roles.

Caution

Because the reverse proxy functionality is basic, it is acceptable to use a wildcard certificate for the external web services or meeting pages. Just avoid using it on an Edge Server.

 
Others
 
- Windows 8 Tile-Based Apps : Music (part 2) - To create and save a playlist, To add songs to a playlist
- Windows 8 Tile-Based Apps : Music (part 1) - To play a song
- Windows 8 Tile-Based Apps : Photos
- Windows 8 Tile-Based Apps : Mail and Messaging
- Sharepoint 2013 : Configuring and Managing Enterprise Search - SEARCH ARCHITECTURE (part 2)
- Sharepoint 2013 : Configuring and Managing Enterprise Search - SEARCH ARCHITECTURE (part 1)
- SQL Server 2012 : Client Connectivity - SQL Server Native Client Features
- SQL Server 2012 : Client Connectivity - Enabling Server Connectivity
- Windows 7 : Add Someone to Your Contacts
- Windows 7 : Send an E-mail Message
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us