Configuring the Enterprise Vault proxy server to manage connections from Outlook Anywhere clients

Article:HOWTO37815  |  Created: 2010-12-24  |  Updated: 2012-06-27  |  Article URL http://www.symantec.com/docs/HOWTO37815
Article Type
How To


Subject


Configuring the Enterprise Vault proxy server to manage connections from Outlook Anywhere clients

If there are multiple Enterprise Vault sites, separate Enterprise Vault proxy servers are required for each site.

The Enterprise Vault server that is used as a proxy server can also host archives, if required. Alternatively, you can set up a minimal Enterprise Vault server to be used as a proxy server.

At minimum the proxy server must have the following Enterprise Vault components installed and configured:

  • Admin Service.

  • Directory service.

  • Shopping service.

  • Task Controller service.

  • Web Access application.

Clients use basic or integrated windows authentication (IWA) authentication to connect to the Enterprise Vault proxy server. If required, you can configure SSL on the Enterprise Vault proxy server to secure the client connections.

See Customizing security for the Enterprise Vault Web Access application in the Installing and Configuring manual.

If the Enterprise Vault proxy server does not host archives, then it does not require any additional configuration to support Enterprise Vault requests.

The Enterprise Vault proxy server uses anonymous connections when it connects to the Enterprise Vault servers that host archives. Detailed instructions are provided on how to configure the Enterprise Vault servers to support anonymous connections.

See Configuring Enterprise Vault servers for anonymous connections from the Enterprise Vault proxy server.

If the Enterprise Vault proxy server hosts archives, then you also need to configure the proxy server for anonymous connections.

In a clustered Enterprise Vault environment, you need to configure each node in the cluster for anonymous connections.

See About Outlook RPC over HTTP and Outlook Anywhere configurations


Legacy ID



v35876520_v34981136


Article URL http://www.symantec.com/docs/HOWTO37815


Terms of use for this information are found in Legal Notices