Coexistence, Hybrid, Migration, Federation Flashcards
What is a Federation Trust?
A relationship established between your Exchange organization and the Microsoft Federation Gateway (MFG), also known as the Azure Active Directory Authentication System (AADAS).
It is used to manage Organization Relationships between Exchange organizations, which enables Federated Sharing, which allows authenticated requests for Calendar free/busy information.
What is this?
MFG
Microsoft Federation Gateway
Acts as a trust broker between federated organizations.
Technically, it has been renamed and is now officially known as the Azure Active Directory Authentication System (AADAS). However, MFG may appear on the exam instead.
What does this stand for?
AADAS
Azure Active Directory Authentication System
The newer name for MFG.
What is Federated Sharing?
Allows for authenticated requests for Calendar information between Exchange Organizations. Also allows Mail Tips and other small features to be shared.
It requires an Organization Relationship being established through a Federated Trust.
How can sharing of Calendar information through Federated Sharing be limited?
When configuring the Organization Relationship, you can choose between sharing:
- No access
- free/busy info with time only
- free/busy info with time, subject, and location
Additionally:
- You can limit sharing to a specified security group, rather than organization-wide
- Individual users can prevent access to their own Calendar information, by removing the “Default” permissions entry on the calendar, or setting it to “No Access.”
If you want users to be able to share more details of their calendars, how can you do so?
- Configure a sharing policy for either all domains or the specific domain, which allows sharing of “All calendar appointment information”.
- This will work for both federated and non-federated Exchange organizations.
- To share with non-Exchange organizations, allow sharing with specified domain “Anonymous,” and users will select the “Publish” calendar option to share it.
What are the requirements for Federated Sharing?
Both organizations must have:
- A federation trust established with the MFG
- an Organization relationship with the other organization
- Autodiscover records in DNS
- Firewalls open for HTTPS requests
- Valid SSL certificates
What kind of certificates does Microsoft recommend for Federation?
Self-signed certificates.
You can use a third-party CA, but it is not necessary.
What is a Sharing Policy?
They control whether individual users can share calendar information with external users, including:
- users in another federated Exchange organization
- users in a non-federated Exchange organization
- users a non-Exchange mail service, such as Gmail
- publishing calendars to the internet
How are Sharing Policies applied?
Sharing Policies are assigned to mailboxes.
You can have multiple policies in an organization, but only one policy can be assigned to any given mailbox at a time.
What is Individual Sharing?
A name for the features controlled by a Sharing Policy.
How can a user publish their calendars online?
- Modify the Sharing Policy that is applied to the user’s mailbox by adding a sharing rule for a specific domain called “Anonymous”.
- Note, the Calendar virtual directory needs to be enabled on Client Access servers, and set to allow Anonymous Features. (It is by default.)
- Access is only over HTTP, so port 80 will also need to be opened from the internet to your Exchange server.
What is Cross-forest Availability?
- Allows calendar free/busy info lookups between NON-FEDERATED Exchange organizations.
- Does not involve the MFG.
- Can be used for both trusted and non-trusted AD forests.
For Cross-forest availability, what are the setup requirements regarding User accounts?
- Users and groups the in the source forest must be created as contacts in the target forest, so that they can be seen in the GAL.
- For temporary cross-forest availability setups, you can run a script to do this once.
- For ongoing setups, a GAL synchronization tool must be used so changes are always synced. Microsoft and third parties have tools available.
What does this stand for?
GAL
Global Address List
How is Cross-forest Availability controlled differently, between Trusted vs. Non-Trusted Forests?
Trusted Forests:
- Availability can be controlled on a per-user basis, because each request can be authenticated as coming from a specific user.
- Thus, Mailbox users can set different levels of calendar permissions for different users in the remote forest.
Non-trusted Forests:
- Availability is organization-wide only
- Only the “default” permissions entry on a calendar can be used to control the level of free/busy info accessible by users in the remote forest.
What are the Autodiscover Requirements for Cross-forest availability?
• For Trusted Forests:
– Either use the Autodiscover CNAME record, or:
– Export the Autodiscover SCP from one forest to another.
• For non-trusted forests,
only the Autodiscover CNAME can be used
What is Cloud Identity?
One of the Identity management models for Office 365.
Office 365 accounts are stored in Azure AD, and not integrated with any on-premises directory.
If any on-prem AD exists, it is separate and not integrated.
What is Directory Synchronization?
- One of the Identity management models for Office 365.
- The on-prem AD is the source of identity, and objects are synced to Azure AD via a directory synchronization tool.
- When cloud resources are accessed, authentication is performed by Azure AD.
What form of Identity Management is recommended for smaller organizations (1-50 users)?
Cloud Identity
What form of Identity Management is recommended for larger organizations (51 or more users)?
Directory Synchronization (either with or without ADFS)
What is Azure AD Connect?
The most recent name for Microsoft’s directory synchronization tool.
Used for syncing objects, such as users, contacts, and groups, from an on-prem AD to Azure AD for use in Office 365.
Passwords can also optionally be synchronized using Password Sync.