KC Administrator Manual Release 8.0.0

Total Page:16

File Type:pdf, Size:1020Kb

KC Administrator Manual Release 8.0.0 KC Administrator Manual Release 8.0.0 Kopano BV Jul 01, 2021 Contents 1 Abstract 2 2 Introduction 3 2.1 Intended Audience..........................................3 2.2 Architecture.............................................3 2.3 Components.............................................4 2.4 Protocols and Connections......................................5 3 Installing 6 3.1 System Requirements........................................6 3.2 Installation..............................................9 3.3 Troubleshooting Installation Issues................................. 11 3.4 SSL.................................................. 12 4 Upgrading 14 4.1 Preparing............................................... 14 4.2 Creating backups........................................... 15 4.3 KC 8 dependencies.......................................... 16 4.4 Performing the Upgrade on RPM based distributions........................ 16 4.5 Performing the Upgrade on Debian based distributions....................... 16 4.6 Finalizing the upgrade........................................ 18 5 Configure KC Components 20 5.1 Configure the Kopano Server.................................... 20 5.2 Configure Kopano Konnect..................................... 27 5.3 Configure Kopano Kraph....................................... 30 5.4 Configure the Kopano Spooler.................................... 31 5.5 Configure Kopano Caldav...................................... 32 5.6 Configure Kopano Gateway (IMAP and POP3)........................... 33 5.7 Configure Kopano Quota Manager.................................. 34 5.8 Configure Kopano Search...................................... 35 5.9 Configure Kopano WebApp..................................... 37 5.10 Configure Kopano for user management with LDAP (e.g. OpenLDAP/ADS)........... 38 5.11 Postfix integration.......................................... 46 5.12 Configure Z-Push (ActiveSync for Mobile Devices)........................ 51 6 Special KC Configurations 58 6.1 Running KC components beyond localhost............................. 58 6.2 Multi-tenancy configurations..................................... 59 6.3 Multi-server setup.......................................... 64 6.4 Single Instance Attachment Storage................................. 69 i 6.5 Single Sign On with KC....................................... 70 6.6 Tracking messages with Kopano Archiver.............................. 77 6.7 Kopano Python plugin framework.................................. 78 6.8 Running KC multi-server behind Reverse Proxy.......................... 81 6.9 Running KC with Active Directory in multi-forest environment.................. 84 6.10 Configuring kopano-spamd for automatic spam/ham learning................... 85 7 Managing KC Components 86 7.1 Starting the services......................................... 86 7.2 Logging options........................................... 87 7.3 Security logging........................................... 87 7.4 Kopano statistics monitoring..................................... 90 7.5 Soft Delete system.......................................... 91 8 User Management 92 8.1 Public folder............................................. 92 8.2 General usage of kopano-admin tool................................. 92 8.3 Users management with DB plugin................................. 94 8.4 Users management with UNIX plugin................................ 97 8.5 User Management with LDAP or Active Directory......................... 98 8.6 LDAP Condition examples...................................... 103 8.7 Kopano Feature management.................................... 103 8.8 Resource configuration........................................ 105 8.9 Out of office management...................................... 106 9 Performance Tuning 108 9.1 Hardware Considerations...................................... 108 9.2 Memory Usage setup......................................... 109 9.3 Setup of modules on different servers................................ 111 10 Backup & Restore 113 10.1 Softdelete restore........................................... 113 10.2 Full database dump.......................................... 114 10.3 Brick-level backups......................................... 115 11 High Availability 116 11.1 High Availability example setups.................................. 116 11.2 Installing............................................... 118 11.3 DRBD device initialization..................................... 121 11.4 Pacemaker configuration....................................... 123 11.5 Testing configuration......................................... 126 11.6 Testing a node failure........................................ 127 11.7 Testing a resource failure....................................... 127 11.8 Getting more information...................................... 127 12 Release Notes 128 12.1 Release notes for 8.5.0 (2018-02-05)................................ 128 12.2 Release notes for 8.4.7........................................ 129 12.3 Release notes for 8.4.6 (2018-02-02)................................ 129 12.4 Release notes for 8.4.5 (2017-12-15)................................ 129 12.5 Release notes for 8.4.4 (2017-11-23)................................ 129 12.6 Release notes for 8.4.3 (2017-11-07)................................ 130 12.7 Release notes for 8.4.2 (2017-11-02)................................ 130 12.8 Release notes for 8.4.1 (2017-11-01)................................ 130 12.9 Release notes for 8.4.0 (2017-10-30)................................ 130 12.10 Release notes for 8.3.5 (unreleased/state of 2017-10-31)...................... 132 12.11 Release notes for 8.3.4 (2017-09-01)................................ 132 12.12 Release notes for 8.3.3 (2017-08-09)................................ 133 12.13 Release notes for 8.3.2 [2017-07-06]................................ 133 ii 12.14 Release notes for 8.3.1 [2017-06-20]................................ 133 12.15 Release notes for 8.3.0 [2017-04-27]................................ 134 12.16 Release notes for 8.2.0 [2017-02-17]................................ 135 12.17 Kopano Core 8.1.0.......................................... 137 12.18 Kopano Core 8.0.1.......................................... 137 13 Compiling from source 139 13.1 Installing Kopano Core from Source................................. 139 13.2 Installing Kopano MMC Snap-in from Source........................... 139 14 Appendix A: Upgrade strategies 143 14.1 Upgrade from Zarafa Collaboration Platform............................ 143 15 Appendix B: LDAP attribute description 144 16 Appendix C: Example LDIF 150 17 Appendix D: Common MAPI Errors 152 18 Legal Notice 155 iii KC Administrator Manual, Release 8.0.0 Edition 8.3.0 - Kopano Team This document, the Kopano Core Administrator Manual, describes how to install, upgrade, configure and maintain KC on your system. In addition various advanced configurations and integration options are covered. Contents 1 CHAPTER 1 Abstract Kopano Core provides the core MAPI-enabled messaging stack with the stability and flexibility of the linux platform. Kopano Core acts as the solid foundation for groupware messaging based on MAPI and enabling rich web clients such as Kopano WebApp or Kopano DeskApp as well as mobile and sync clients. With the modular architecture, Kopano Core hereby allows a variety of setup scenarios, scalable from a very low powered system to a multi-datacenter setup providing messaging capabilities to tens of thousands of users. Kopano Core is entirely open source, licensed under the GNU Affero General Public License version 3, and can be downloaded from Kopano’s download servers. Kopano Core is provided in two ways: • Repositories, available to customers with a valid Kopano subscription. • Downloadable & installable packages for community usage. 2 CHAPTER 2 Introduction Kopano Groupware Core (KGC) is an open source software suite capable of providing a complete MAPI-based groupware stack with extensive interfacing capabilities. It’s architecture is very modular, makes use of standards wherever possible, and integrates with common open source components. This document explains how to perform the most common administrative tasks with KGC. Important: Although we, Kopano, try our best to keep the information in this manual as accurate as possible, we reserve the right to modify this information at any time, without prior notice. 2.1 Intended Audience This manual is intended for system administrators responsible for installing, maintaining, and supporting the KGC deployment. We assume readers of this manual will a thorough understanding of: • Linux system administration concepts and tasks • Email communication standards • Security concepts • Directory services • Database management 2.2 Architecture In accord with the UNIX philosophy, KGC consists of components that each take care of a well defined task. See the KGC Architecture Diagram which describes the relationships between the components and the protocols used. This diagram describes a simple setup as used by most of our customers. Only the most commonly used components are shown in the diagram. The top part of the diagram shows the clients: software appliances by which users access their data. Some of these appliances are desktop applications, some are mobile applications. 3 KC Administrator Manual, Release 8.0.0 In between “The Internet” and the “Kopano Server”, the infrastructure components of Kopano (blue) and some common infrastructure components (grey) can be found. These
Recommended publications
  • Kopanomeet Release 1.0
    KopanoMeet Release 1.0 Kopano BV May 01, 2020 Contents 1 Introduction 2 2 Installation 3 2.1 System requirements.........................................3 2.2 Installation..............................................3 3 Special configuration 9 3.1 Configuring the applications grid in Kopano Meet.........................9 3.2 Enabling guest users for Meeting rooms...............................9 3.3 Enabling screensharing........................................ 12 4 Advanced Settings 13 4.1 Influencing Meet behaviour through URL fragments........................ 13 5 User manual 15 5.1 First steps............................................... 15 5.2 General overview........................................... 15 5.3 Joining a meeting........................................... 16 5.4 One-to-one calls........................................... 16 5.5 Groups, public vs. private...................................... 16 5.6 Inviting users and guests to a group................................. 19 5.7 Sharing your screen......................................... 21 5.8 Doing an “audio only” meeting................................... 21 5.9 Selecting the right Camera/Microphone/Speaker.......................... 23 6 Frequently asked questions (FAQ) 24 6.1 Known Issues............................................. 26 7 Legal Notice 28 i KopanoMeet, Release 1.0 This document, the Kopano Meet manual provides administrators with information on how to install and configure the Kopano Meet for WebRTC calls and conferences. Contents 1 CHAPTER 1 Introduction
    [Show full text]
  • Today's Howtos Today's Howtos
    Published on Tux Machines (http://www.tuxmachines.org) Home > content > today's howtos today's howtos By Roy Schestowitz Created 09/12/2020 - 5:46am Submitted by Roy Schestowitz on Wednesday 9th of December 2020 05:46:15 AM Filed under HowTos [1] How to Install Nginx with Google PageSpeed on Ubuntu 20.04 [2] Nginx is a free and open-source web server that powers many sites on the internet. It can be used as a reverse proxy and load balancer. It is known for its high-performance and stability. ngx_pagespeed is an open-source Nginx module that can be used to optimize your website performance. It is developed by Google and reduces the page load time and speed up the website response time. Install and Configure ZFS on FreeBSD ? Linux Hint [3] This article will demonstrate how to set up FreeBSD 12.0, the latest version, on Zettabyte File System, or ZFS. The method we?ll employ is going to use BSDinstall and consequently allocate all of the disks to host the FreeBSD system. How to Share Files Between Windows and Linux [4] File sharing is the action of sending a file or more from one computer to another. In theory, it?s a simple thing. The process is quite simple and straightforward if both of the computers are running the same operating system. When it?s different, things get a bit complicated. How To Install Firefox on CentOS 8 - idroot [5] In this tutorial, we will show you how to install Firefox on CentOS 8. For those of you who didn?t know, Firefox is the default web browser in a number of Linux distributions and CentOS is one of them.
    [Show full text]
  • ZCP 6.40 (Build 34695) Zarafa Collaboration Platform
    ZCP 6.40 (build 34695) Zarafa Collaboration Platform The User Manual Zarafa Collaboration Platform ZCP 6.40 (build 34695) Zarafa Collaboration Platform The User Manual Edition 2.0 Copyright © 2011 Zarafa BV. The text of and illustrations in this document are licensed by Zarafa BV under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at the creativecommons.org website4. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Red Hat®, Red Hat Enterprise Linux®, Fedora® and RHCE® are trademarks of Red Hat, Inc., registered in the United States and other countries. Ubuntu® and Canonical® are registered trademarks of Canonical Ltd. Debian® is a registered trademark of Software in the Public Interest, Inc. SUSE® and eDirectory® are registered trademarks of Novell, Inc. Microsoft® Windows®, Microsoft Office Outlook®, Microsoft Exchange® and Microsoft Active Directory® are registered trademarks of Microsoft Corporation in the United States and/or other countries. The Trademark BlackBerry® is owned by Research In Motion Limited and is registered in the United States and may be pending or registered in other countries. Zarafa BV is not endorsed, sponsored, affiliated with or otherwise authorized by Research In Motion Limited. All trademarks are the property of their respective owners. Disclaimer: Although all documentation is written and compiled with care, Zarafa is not responsible for direct actions or consequences derived from using this documentation, including unclear instructions or missing information not contained in these documents.
    [Show full text]
  • About SEP Sesam Hybrid Backup and Disaster Recovery
    Hybrid Backup & Disaster Recovery SEP sesam’s Backup & Disaster Recovery Capabilities for the Red Hat Ecosystem 1 Global Storage Management SEP sesam’s Backup and Disaster Recovery Capabilities for the Red Hat Ecosystem Table of Contents Table of Contents 1 About this Document 3 About SEP 3 About SEP sesam Hybrid Backup and Disaster Recovery 3 SEP’s Mission 4 Red Hat Statement 4 SEP‘s Collaboration with Red Hat 5 Value Proposition for Red Hat Solutions 5 Red Hat® Enterprise Linux 7 Bare Metal Recovery Capability for Linux 8 Red Hat® Virtualization 8 Red Hat® Virtualization Backup White Paper 8 Red Hat® Storage 9 SEP‘s Collaboration with SAP 9 SAP HANA Certifications 10 SAP Ecosystem - Protection Overview 10 Datacenter 10 Platforms 10 Hypervisors 10 Operating Systems 10 Databases 11 Applications 11 SAP Statement 11 SEP sesam Customer References in SAP Environments 11 Uniorg 11 Kwizda 12 Linck 12 Inecom Business Solutions 12 Service Provider and Cloud engagement 12 SEP was named one of the 2018 Gartner Peer Insights Customers’ 12 Choice for Data Center Backup and Recovery Software Here are a few examples of our customers statements: 13 Summary / Authors 13 www.sepsoftware.com I SEP sesam’s Backup and Disaster Recovery Capabilities for the Red Hat Ecosystem 2 Global Storage Management SEP sesam’s Backup and Disaster Recovery Capabilities for the Red Hat Ecosystem About this Document This document serves a Red Hat® and SEP value proposition for the joint solutions. Beside of general information we will highlight the sup- port of Red Hat® Virtualization, Red Hat® Enterprise Linux®, Red Hat® Storage, SAP and Service Providers.
    [Show full text]
  • Scenarios for Univention Corporate Server Table of Contents
    Scenarios for Univention Corporate Server Table of Contents 1. Lawyer's office .................................................................................................................... 3 1.1. Initial situation .......................................................................................................... 3 1.2. Systems and services ................................................................................................. 3 1.3. Management of user accounts ...................................................................................... 4 1.4. Managing the Windows computers ............................................................................... 5 1.5. Storage management .................................................................................................. 5 1.6. Single sign-on with a specialist legal application ............................................................. 5 1.7. Printer services ......................................................................................................... 6 1.8. Groupware ............................................................................................................... 6 1.9. Web proxy and web cache .......................................................................................... 6 1.10. Backup .................................................................................................................. 6 1.11. Outlook .................................................................................................................
    [Show full text]
  • Mcafee Foundstone Fsl Update
    2017-JUL-27 FSL version 7.5.946 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release. NEW CHECKS 22152 - (JSA10802) Juniper Junos Insufficient Authentication Security Bypass Vulnerability Category: SSH Module -> NonIntrusive -> SSH Miscellaneous Risk Level: High CVE: CVE-2017-10601 Description A security-bypass vulnerability is present in some versions of Juniper Junos OS. Observation Juniper Junos OS is an operating system used in Juniper devices. A security-bypass vulnerability is present in some versions of Juniper Junos OS. The flaw lies in the Juniper Junos OS. Successful exploitation could allow a remote attacker to bypass authentication and gain access on the target system. 22161 - (JSA10791) Juniper Junos SRX Hardcoded Credentials Vulnerability Category: SSH Module -> NonIntrusive -> SSH Miscellaneous Risk Level: High CVE: CVE-2017-2343 Description An information disclosure vulnerability is present in some versions of Juniper Junos OS. Observation Juniper Junos OS is an operating system used in Juniper devices. An information disclosure vulnerability is present in some versions of Juniper Junos OS. The flaw lies in the UserFW services authentication API. Successful exploitation could allow an unauthenticated, remote attacker to gain access to sensitive information. 141631 - Red Hat Enterprise Linux RHSA-2017-1798 Update Is Not Installed Category: SSH Module -> NonIntrusive -> Red Hat Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2017-7895 Description The scan detected that the host is missing the following update: RHSA-2017-1798 Observation Updates often remediate critical security problems that should be quickly addressed.
    [Show full text]
  • Thanos Tsouanas --- C.V
    Curriculum Vitæ Thanos Tsouanas 02/05/2017 I Personal details hello photo full name: Athanasios (Thanos) Tsouanas date of birth: 22/02/1983 place of birth: Athens, Greece nationality: Hellenic office address: IMD, Universidade Federal do Rio Grande do Norte Av. Cap. Mor Gouveia, S/N CEP: 59063-400, Natal{RN, Brasil phone number: (+55) (84) 9 8106-9789 (mobile, Telegram, WhatsApp) email address: [email protected] personal website: http://www.tsouanas.org/ GitHub: http://github.com/tsouanas Spoken languages Greek (native); English (proficient); Brazilian Portuguese (fluent). I Studies & academic positions 2016 { Associate professor (permanent position) in Instituto Metr´opole Digital of Universidade Federal do Rio Grande do Norte (UFRN), Brazil. 2015 Postdoctoral researcher in the Mathematics Department of Universidade Federal do Rio Grande do Norte (UFRN), Brazil. 2014 PhD from Ecole´ Normale Superieure´ de Lyon, under the supervision of Olivier Laurent, in the field of theoretical computer science. I was employed by CNRS under the Marie Curie fellowship \MALOA", and had a 1-month secondment split between the University of Oxford (in the team of Luke Ong) and Ecole´ Polytechnique (in the team of Dale Miller). Thesis title: On the Semantics of Disjunctive Logic Programs1 2010 Master of Science degree from MPLA (graduate program in Logic, Algorithms and Computation of the University of Athens and of the Technical University of Athens),2 mathematical logic specialty, grade 8.23/10. 2007 Bachelor's degree from the Department of Mathematics of the University of Athens, specialty of pure mathematics, grade \excellent" (8.51/10). Seminars and schools • Logoi school on Linear Logic and Geometry of Interaction.
    [Show full text]
  • Military-Grade Cyber Security
    MILITARY-GRADE CYBER SECURITY EdgeWave ePrism Email Security Email Archive Email Volume is Growing The volume of email your business has to process has grown over 500% in the last 10 years and there appears to be no decline in sight. It is likely the amount will continue to increase, pushing your organization’s email servers to the limit, resulting in costly downtime and reduced productivity. Of even greater concern are industry-wide legal and regulatory requirements mandating that you retain all your organization’s email in an unalterable state. A comprehensive email archiving solution will not only help you meet corporate, legal and regulatory requirements, it can also help your organization achieve other critical goals. • Simplify mailbox management, shrink storage costs and reduce backup windows • Protect critical business information and intellectual property • Accelerate legal discovery and enforce corporate email policies EdgeWave has the Solution EdgeWave Email Archive is a secure enterprise SaaS solution for storage management that retains your email in an unalterable state to help meet compliance requirements, provide litigation support and meet corporate best practices guidelines. EdgeWave’s policybased archiving and built-in reporting features combine with easy-to-use management tools to assure your archived messages are indexed and easy to retrieve whenever you need them. EdgeWave’s feature-rich email archiving supports client software integration, email stubbing to maximize server storage, mobilearchive access, litigation support tools, centralizing, importing all historical emails and more. EdgeWave Email Archive supports all major messaging servers including Exchange, Domino, GroupWise, and Linux-based environments and can be deployed easily with minimal resource expenditures.
    [Show full text]
  • WNUMERZE WIADOMOŚCI 4Iphone Rozpędzi Gospodarkę USA
    WNUMERZE WIADOMOŚCI 4iPhone rozpędzi gospodarkę USA. Po premierze nowego telefonu Apple’a kry- BLOGI tycy stwierdzili, że to próba przepakowania znanych pomysłów w nowe pudełko. WIEMY GDZIE TRAFIŁ EKSPREZES SYGNITY Rozejrzyj się, jesteś w ukrytej ka- 6 Norbert Biedrzycki został ogłoszony no- merze. Kamer y wrosły na stałe w krajobraz wym prezesem Grupy ABC Data. Pełnić infrastruktury miejskiej. Część z nich obowiązki będzie od listopada br. działa w sieci miejskiego monitoringu, który Dotychczasowy prezes Michał Rumiński w przestrzeni publicznej patrzy na wszystko. oraz członek zarządu Konrad Sitnik złożyli rezygnacje. Na pewno Norbert PESEL i CEPiK zostaną przebu- 7 Biedrzycki będzie musiał posprzątać dowane. Dzięki zmianom w rejestrach po nieudanej inwestycji ABC Data obywateli i pojazdów Skarb Państwa w Rumunii. Będzie mógł wykorzystać ma oszczędzić w ciągu pięciu lat nawet doświadczenia w Sygnity… 120 mln zł. Bywalec, blog redakcyjny Computerworld 7 Polska przejmuje obsługę biznesu. Eksperci Związku Liderów Sektora Usług ŚWIATŁOWÓD W KAŻDYM DOMU Biznesowych w Polsce przewidują, że za w centrum (KTÓRY CZYNI SZALONYM) kilka lat możemy stać się liderem zaawanso- uwagi 16 Ministerstwo Administracji i Cyfryzacji wanych usług dla biznesu. zaproponowało właśnie, by każdy nowy dom wielorodzinny miał dostęp do Ultrabook zrozumie mowę i gest. 8 Trojan zamiast kreta Internetu i to, jak wynika z cytowanych Podczas konferencji IDF 2012 Intel wypowiedzi, „po kablu” (światłowodzie). zaprezentował wizję rozwoju technologii Przestępcy coraz rzadziej potrzebują współpracowników Propozycja jest opisana sensownie, mobilnych. wewnątrz firmy, by wykraść z niej informacje. Trojany są MAiC ogólnie prezentuje dość wysoki poziom uzasadnienia i konsultacji Komisja Europejska nie cofnie skuteczne, tańsze i trudne do wykrycia. Działy IT muszą 9 projektów na tle innych resortów.
    [Show full text]
  • Samba-3 by Example
    Samba-3 by Example Practical Exercises in Successful Samba Deployment John H. Terpstra May 27, 2009 ABOUT THE COVER ARTWORK The cover artwork of this book continues the freedom theme of the first edition of \Samba-3 by Example". The history of civilization demonstrates the fragile nature of freedom. It can be lost in a moment, and once lost, the cost of recovering liberty can be incredible. The last edition cover featured Alfred the Great who liberated England from the constant assault of Vikings and Norsemen. Events in England that finally liberated the common people came about in small steps, but the result should not be under-estimated. Today, as always, freedom and liberty are seldom appreciated until they are lost. If we can not quantify what is the value of freedom, we shall be little motivated to protect it. Samba-3 by Example Cover Artwork: The British houses of parliament are a symbol of the Westminster system of government. This form of government permits the people to govern themselves at the lowest level, yet it provides for courts of appeal that are designed to protect freedom and to hold back all forces of tyranny. The clock is a pertinent symbol of the importance of time and place. The information technology industry is being challenged by the imposition of new laws, hostile litigation, and the imposition of significant constraint of practice that threatens to remove the freedom to develop and deploy open source software solutions. Samba is a software solution that epitomizes freedom of choice in network interoperability for Microsoft Windows clients.
    [Show full text]
  • Getting Ready for Samba4
    Getting Ready for Samba4 Samba Team member Andrew Bartlett explores the world of Samba4, its development status, what you can (and can’t) do with Samba4, and — most importantly– when you can expect to start using Samba4 in a production environment. Andrew Bartlett Thursday, April 3rd, 2008 Ever wanted to run an Active Directory Domain Controller on your Linux server? Did you run a Samba 3.0 DC, but had to move to Active Directory, or worried you might need to? Interested in the leading edge of Samba development, and wondering what the preceding questions mean? Without Samba, Linux, Windows and Macintosh computers could not share files and printers with each other, and networks of windows computers could only use Microsoft’s products to implement consistent user names and passwords across an organisation, something known as domain control. Since Samba was last covered by Linux Magazine in 2002, it seems the whole world has changed. Yet for members of the Samba Team the task remains to provide the Free Software community with a solid implementation of the Common Internet File System (CIFS) protocol, and with that a bridge into the Windows world. It is in that pursuit of interoperability that the Samba Team has continued, soon (at the time of writing) releasing version 3.2.0 of Samba, and alpha releases of Samba4. But Samba4 is more than just a new version of Samba, and more akin to a new development effort. Largely rewritten to handle the problems of interacting with modern versions of Microsoft’s Windows suite, Samba4 has been a storehouse of testing and innovation.
    [Show full text]
  • Folien Ca. 3MB
    Es muss nicht immer Exchange sein – Mit auserlesenen Kochrezepten für Kunst- und Musikhochschulen Dr.-Ing. Andreas Bischoff 1. Treffen der Kunst- und Musik-HS-NRW-IT 30.8.2017 Kleine Übersicht Agenda – Wie macht das die Uni-Duisburg-Essen (UDE)? – Warum überhaupt Groupware, Mail reicht doch aus? • Termine und Mobile – Mobile – Mobile – Diversity! • E-Mail → heute → Webmail! – Strategische Entscheidungen – Kommerzielle Groupware-Lösungen • MS-Exchange und die Konkurrenten – Kommerzielle Groupware Lösungen in der Cloud • hosted Exchange – Open Source Alternativen • Self made – hosted Andreas Bischoff Muss es immer Exchange sein? 1. Treffen Musik-und KunstHS-IT 30.8.2017 Mailumgebung an der UDE Mailumgebung – (2016: transportierte Mails ~ 67.901.120 - abgelehnte Mails ~ 48.891.366) Unix-Mail (1,5 VZÄ) ca. – 69330 Postfächer, im Wesentlichen Studierende, 200mB Quota pro Postfach – 150 Maildomänen uni-due.de, uni-duisburg-essen.de, uni-duisburg.de, uni- essen.de, ……, Mailrouting über LDAP – Anti-Spam (Heinlein-Open-Source, bisher Ironport 30T€/Jahr Jetzt 5T€ f.Signaturen) – Listenserver (Mailinglisten), befüllt aus IDM – Teilweise Weitergabe an dezentrale Mailserver in den Fakultäten Exchange 2010 (1,5 VZÄ) – 7270 Postfächer, im Wesentlichen MA wegen CAL Lizenzen, 2GB Postfächer, teils auch größer 4-8GB – wird gern missbraucht als DMS – Derzeit Migration nach Exchange 2016, getrieben durch MS-Produktpolitik (Windows 10→neues AD→ neuer Exchange Server) – Kemp-Loadbalancer (für Exchange2016 auch Geo-Loadbalancer) Andreas Bischoff Muss es immer Exchange sein? 1. Treffen Musik-und KunstHS-IT 30.8.2017 Mailumgebung an der UDE Mailumgebung Enge Kopplung an das IDM – hoch automatisiert – Befüllung von tagesaktuellen Mailinglisten – Provisionierung von Mailboxen über LDAP und AD an Exchange und Unix-Mail – Mailrouting (der 150 Maildomainen auf die Zielsysteme im ZIM und die dezentralen Mailserver) per LDAP – Benutzerverwaltung für Manuelle Eingriffe 1,5 VZÄ + 1st Level Support (SHKs) Andreas Bischoff Muss es immer Exchange sein? 1.
    [Show full text]