SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
Kayxo Exchange Appliance Connector
Technical Whitepaper
Understanding Kayxo Exchange Appliance Connector for Google Search Appliance




                                                                          1.2.0.14
Table of Contents
Technical Whitepaper Abstract .......................................................................................... 2
Prerequisites, Skills and Knowledge ................................................................................... 2
Requirements ................................................................................................................. 2
What Kayxo Exchange Appliance Connector Provides ........................................................... 3
Solution Scenarios ........................................................................................................... 3
Technical Overview .......................................................................................................... 4
   KEAC Layout ............................................................................................................... 5
Security ......................................................................................................................... 6
   Serving Results to the User ........................................................................................... 6
Configuration .................................................................................................................. 7




                   Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
                   Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
                   Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                                 Page 1
Technical Whitepaper Abstract
The Google Search Appliance (GSA) is an integrated hardware/software solution, creating a
single point for discovering information within corporate networks, intranets, and Web sites.
The Kayxo Exchange Appliance Connector for Google Search Appliance (KEAC) extends the
Google Search Appliance, enabling users to search for emails, contacts, appointments, tasks,
notes and documents stored in Microsoft Exchange, according each item’s security.
This search feature takes advantage of the corporate search power of the Google Search
Appliance and selectively unlocks the content stored in Microsoft Exchange
This paper introduces the latest release of the Kayxo Exchange Appliance Connector for Google
Search Appliance, providing the technical user with a detailed description of the ways it can be
used.



Prerequisites, Skills and Knowledge
To install, configure and administrate this product you must be at least moderately experienced
with the use of the following technologies:
       Google Search Appliance.
       Windows Server 2003.
       Internet Information Server.
       SQL Server.
       Performance monitoring and optimization techniques.



Requirements
In order to be installed, the Kayxo Exchange Appliance Connector for Google Search Appliance
requires the following:

   1.   Microsoft Exchange 2007 (32 / 64 bits) or Microsoft Exchange 2003.
   2.   Google Search Appliance (any version except Mini).
   3.   Windows 2003 Server (32 / 64 bits) with .Net 3.5 Framework.
   4.   Microsoft Visual C++ 2008 Redistributable Package (x86).
   5.   Internet Information Server 6.0.
   6.   Microsoft SQL 2008/2005/2000.
   7.   MAPI Libraries. You can install Microsoft Outlook 2003 or Microsoft Outlook 2007 in the
        machine that will be the KEAC server in order to install the MAPI Libraries.




              Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
              Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
              Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                            Page 2
What Kayxo Exchange Appliance Connector Provides
      Support for Microsoft Exchange Server 2003 and Exchange Server 2007.
      Support of Public Folders and mailboxes in any language.
      Allows to mash information already available from ECM systems, CRMs and others with
       information in Microsoft Exchange in a single search, ranked according to Google
       relevance criteria.
      Honors the Microsoft Exchange’s sharing policies or other Company policies. This means
       that only if you have permission to see something you will find it through the Google
       Search Appliance. If you don’t have permission to see it, it will not appear in the search
       results.
      Increases the value of the investment made in the Enterprise Search Platform.



Solution Scenarios

Some relevant scenarios where the Kayxo Exchange Appliance Connector for Google Search
Appliance can be used:
      Hierarchical Search: allow managers to search inside the contact, mail or task folders of
       their employees. As KEAC searches in all Microsoft Exchange Folders where the manager
       has been granted permission, the data is available no matter which of his employees has
       it.
      Document public Search: Allow the whole company to search for the content of every
       attachment of any Microsoft Exchange object that has been declared as public.
      Department Knowledge Sharing: A particular company department can share all of its
       contacts and mail data so all of its members can access them. This scenario applies
       specially to Call Centers, Technical Support, Sales, etc.




              Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
              Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
              Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                            Page 3
Technical Overview
The KEAC architecture is build around two processes:
      The push process which retrieves information from Microsoft Exchange server and loads
       it into the GSA box.
      The authorization and retrieval process that allows users to access a particular Microsoft
       Exchange server message.


In the push process the Synchronizer Service executes an incremental synchronization for each
mailbox configured (only selected folders are synchronized), and stores in the KEAC database
the primary key for each inserted or MAPI message (mail, contacts, attachments, appointments
or task). The GSA loader process takes each of these keys executes a query and sends the final
Microsoft Exchange object to the GSA Server box. Both the Query Engine and the Synchronizer
uses MAPI for the underlying communication, which is the most efficient protocol to access the
Exchange Server and is also used by Microsoft Outlook.



                                                                                         GSA
                             Query Engine
                                                                                        Loader



                              Synchronizer
                                Service

                                                                                 Housekeeping
 Exchange server                                                                   services                           GSA server




                                                            Figure 1



The first step in the retrieval process is to authorize the caller’s access to the specified message.
If the user folder is configured to have public access the Authorization Service allows the access
to the item and passes the request to the Query Engine which constructs the response and
sends it back to the client.



                                                             Authorization
                         Query Engine
                                                               service




 Exchange server                                                                       GSA server




                                                            Figure 2


                   Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
                   Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
                   Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                                 Page 4
If the folder is marked as “non public”, the Authorization service retrieves in real time the
mailbox folder access control list from Microsoft Exchange and checks the caller’s access.

To avoid stressing the Microsoft Exchange Server box the service implements a cache to store
this information, given that a user can experience a minimal synchronization delay when he
browses information.


You must take into account that the ACL information is modified when the owner of the mailbox
changes the sharing permissions using Microsoft Outlook or when the Microsoft Exchange
Administrator executes security maintenance tasks.



KEAC Layout
The adapter components and services leverage on:
      Windows OS.
      Microsoft SQL Server 2000 (or above).
      MAPI.
      IIS.
      NET framework 3.5.



KEAC Layout

                      Synchronizer         GSA          Housekeeping         Authorization
   Query Engine
                        service           Loader          services             service


              MAPI                                        NET framework


                                    Microsoft SQL Server                           IIS




                                                           Figure 3




                  Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
                  Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
                  Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                                Page 5
Security
KEAC makes documents and objects stored in your Microsoft Exchange discoverable through
search. In addition to public content that is available to everyone, the search appliance can
crawl and index documents that require authentication. To protect confidentiality, at serving
time, KEAC determines if the user who is performing the search is authorized to view each
document before the search result is shown. This is because the KEAC honours the Microsoft
Exchange’s sharing and security policies. This means: only if you have permission to see it you
will find it through the Google Search Appliance. If you don’t have permission to see it, it will
not appear in search results.

It's important to understand that when controlled-access content is labeled as "public" in the
index, it will be shown in all users' search results. Because public search results are served from
the index without checking for authorization, users can discover all public content that the
search appliance has access to, regardless of whether they have authorization to view that
content or not.



Serving Results to the User
When a user performs a search request, the search appliance performs two checks before
serving secure content:
      The search appliance acquires the user's credentials to enable impersonation, or
       performs an authentication check to establish the user's identity.

      The search appliance impersonates the user, or performs an authorization check to
       determine whether the user can view the content. If the user is authorized to view the
       content, the content will appear in the user's search results.

Here we will explain the second process. If a secure content item fails, the search appliance
removes it from the list of results.
The following diagram shows the authorization sequence:



            Browser                        GSA                          Authorization
                                                                                                    Query Engine
                                                                          Module


                      Search()
                                                     Authorize (item)




                                                      Allow / Deny

                       Result




                                                       Figure 4




              Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
              Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
              Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                            Page 6
Configuration
Taking into account the complexity of the solution, the configuration process is little bit wide
and detailed. Due to the big number of processes that take part on this solution several
accounts and profiles have to be created and configured. This process could be difficult, but to
simplify the administrators’ tasks, the adapter has configuration consoles that make the
administration process more user-friendly.




                                                       Figure 5




                                                       Figure 6




              Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
              Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
              Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                            Page 7
In addition KEAC provides a Mailbox Configuration Tool. This tool uses the MAPI profile
configured previously to load and list all the folders and mailboxes that are accessible to KEAC’s
configured account. With this tool you can configure which folders and mailboxes will be
monitored and made available through the GSA searches.
The mailboxes and folders together with Public Folders are displayed in a tree-like structure
where the user can select which folders are going to be monitored and made available to the
GSA.




                                                          Figure 7




Kayxo is a registered trademark of Quantum System
Microsoft Outlook is a registered trademark of Microsoft Corporation in the United States and/or other countries.

                 Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
                 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
                 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                               Page 8

Contenu connexe

Tendances

An efficient concurrent access on cloud database using secureDBAAS
An efficient concurrent access on cloud database using secureDBAASAn efficient concurrent access on cloud database using secureDBAAS
An efficient concurrent access on cloud database using secureDBAASIJTET Journal
 
Material modulo03 asf6501(6425-b_02)
Material   modulo03 asf6501(6425-b_02)Material   modulo03 asf6501(6425-b_02)
Material modulo03 asf6501(6425-b_02)JSantanderQ
 
Material modulo01 asf6501(6419-a_01)
Material   modulo01 asf6501(6419-a_01)Material   modulo01 asf6501(6419-a_01)
Material modulo01 asf6501(6419-a_01)JSantanderQ
 
Material modulo04 asf6501(6425-a_01)
Material   modulo04 asf6501(6425-a_01)Material   modulo04 asf6501(6425-a_01)
Material modulo04 asf6501(6425-a_01)JSantanderQ
 
Material modulo02 asf6501(6425-b_01)
Material   modulo02 asf6501(6425-b_01)Material   modulo02 asf6501(6425-b_01)
Material modulo02 asf6501(6425-b_01)JSantanderQ
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET Journal
 
Ob loading data_oracle
Ob loading data_oracleOb loading data_oracle
Ob loading data_oracleSteve Xu
 

Tendances (8)

An efficient concurrent access on cloud database using secureDBAAS
An efficient concurrent access on cloud database using secureDBAASAn efficient concurrent access on cloud database using secureDBAAS
An efficient concurrent access on cloud database using secureDBAAS
 
MX-Sync Brochure
MX-Sync BrochureMX-Sync Brochure
MX-Sync Brochure
 
Material modulo03 asf6501(6425-b_02)
Material   modulo03 asf6501(6425-b_02)Material   modulo03 asf6501(6425-b_02)
Material modulo03 asf6501(6425-b_02)
 
Material modulo01 asf6501(6419-a_01)
Material   modulo01 asf6501(6419-a_01)Material   modulo01 asf6501(6419-a_01)
Material modulo01 asf6501(6419-a_01)
 
Material modulo04 asf6501(6425-a_01)
Material   modulo04 asf6501(6425-a_01)Material   modulo04 asf6501(6425-a_01)
Material modulo04 asf6501(6425-a_01)
 
Material modulo02 asf6501(6425-b_01)
Material   modulo02 asf6501(6425-b_01)Material   modulo02 asf6501(6425-b_01)
Material modulo02 asf6501(6425-b_01)
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud Storage
 
Ob loading data_oracle
Ob loading data_oracleOb loading data_oracle
Ob loading data_oracle
 

En vedette

DIGITAL PEN AND PAPER SOLUTION
DIGITAL PEN AND PAPER SOLUTIONDIGITAL PEN AND PAPER SOLUTION
DIGITAL PEN AND PAPER SOLUTIONKayxo
 
中国蓝Vs中国黄
中国蓝Vs中国黄中国蓝Vs中国黄
中国蓝Vs中国黄daydayup
 
Preparing AAP Training
Preparing AAP TrainingPreparing AAP Training
Preparing AAP Trainingtimothy_m
 
中国蓝Vs中国黄
中国蓝Vs中国黄中国蓝Vs中国黄
中国蓝Vs中国黄daydayup
 
Review of Jan Servaes’ Development Communication Theory
Review of Jan Servaes’ Development Communication TheoryReview of Jan Servaes’ Development Communication Theory
Review of Jan Servaes’ Development Communication TheoryCity University of Hong Kong
 
中国蓝Vs中国黄
中国蓝Vs中国黄中国蓝Vs中国黄
中国蓝Vs中国黄daydayup
 
Citrix Presentation
Citrix PresentationCitrix Presentation
Citrix Presentationyoon1
 
Employee Relations
Employee RelationsEmployee Relations
Employee Relationstimothy_m
 
Affirmative Action Presentation
Affirmative Action PresentationAffirmative Action Presentation
Affirmative Action Presentationtimothy_m
 
Palliative Care Presentation
Palliative Care PresentationPalliative Care Presentation
Palliative Care Presentationguestfed9d3
 

En vedette (11)

Happy New Year 2010 !!!
Happy  New  Year 2010 !!!Happy  New  Year 2010 !!!
Happy New Year 2010 !!!
 
DIGITAL PEN AND PAPER SOLUTION
DIGITAL PEN AND PAPER SOLUTIONDIGITAL PEN AND PAPER SOLUTION
DIGITAL PEN AND PAPER SOLUTION
 
中国蓝Vs中国黄
中国蓝Vs中国黄中国蓝Vs中国黄
中国蓝Vs中国黄
 
Preparing AAP Training
Preparing AAP TrainingPreparing AAP Training
Preparing AAP Training
 
中国蓝Vs中国黄
中国蓝Vs中国黄中国蓝Vs中国黄
中国蓝Vs中国黄
 
Review of Jan Servaes’ Development Communication Theory
Review of Jan Servaes’ Development Communication TheoryReview of Jan Servaes’ Development Communication Theory
Review of Jan Servaes’ Development Communication Theory
 
中国蓝Vs中国黄
中国蓝Vs中国黄中国蓝Vs中国黄
中国蓝Vs中国黄
 
Citrix Presentation
Citrix PresentationCitrix Presentation
Citrix Presentation
 
Employee Relations
Employee RelationsEmployee Relations
Employee Relations
 
Affirmative Action Presentation
Affirmative Action PresentationAffirmative Action Presentation
Affirmative Action Presentation
 
Palliative Care Presentation
Palliative Care PresentationPalliative Care Presentation
Palliative Care Presentation
 

Similaire à KEAC - Whitepaper - Kayxo Exchange Adapter for BizTalk

KEAB - Technical Whitepaper - Kayxo Exchange Adapter for BizTalk
KEAB - Technical Whitepaper - Kayxo Exchange Adapter for BizTalk KEAB - Technical Whitepaper - Kayxo Exchange Adapter for BizTalk
KEAB - Technical Whitepaper - Kayxo Exchange Adapter for BizTalk Kayxo
 
Integration Approach for MES
Integration Approach for MESIntegration Approach for MES
Integration Approach for MESVinod Kumar
 
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...Tammy Bednar
 
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosGina Montgomery, V-TSP
 
Exchange mailbox admin
Exchange mailbox adminExchange mailbox admin
Exchange mailbox adminLuis Martinez
 
Enhancing Apache Kafka for Large Scale Real-Time Data Pipeline at Tencent | K...
Enhancing Apache Kafka for Large Scale Real-Time Data Pipeline at Tencent | K...Enhancing Apache Kafka for Large Scale Real-Time Data Pipeline at Tencent | K...
Enhancing Apache Kafka for Large Scale Real-Time Data Pipeline at Tencent | K...HostedbyConfluent
 
KP Partners: DataStax and Analytics Implementation Methodology
KP Partners: DataStax and Analytics Implementation MethodologyKP Partners: DataStax and Analytics Implementation Methodology
KP Partners: DataStax and Analytics Implementation MethodologyDataStax Academy
 
How to Wield Kentico 9 in the Real World
How to Wield Kentico 9 in the Real WorldHow to Wield Kentico 9 in the Real World
How to Wield Kentico 9 in the Real WorldBrian McKeiver
 
Business case study how one product deployed in 3 diverse enterprises reaped ...
Business case study how one product deployed in 3 diverse enterprises reaped ...Business case study how one product deployed in 3 diverse enterprises reaped ...
Business case study how one product deployed in 3 diverse enterprises reaped ...Mithi SkyConnect
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...IRJET Journal
 
Kafka and event driven architecture -og yatra20
Kafka and event driven architecture -og yatra20Kafka and event driven architecture -og yatra20
Kafka and event driven architecture -og yatra20Vinay Kumar
 
Kafka and event driven architecture -apacoug20
Kafka and event driven architecture -apacoug20Kafka and event driven architecture -apacoug20
Kafka and event driven architecture -apacoug20Vinay Kumar
 
Technology Overview
Technology OverviewTechnology Overview
Technology OverviewLiran Zelkha
 
Rha cluster suite wppdf
Rha cluster suite wppdfRha cluster suite wppdf
Rha cluster suite wppdfprojectmgmt456
 
Windowsserver2003twpppt
Windowsserver2003twppptWindowsserver2003twpppt
Windowsserver2003twppptMizuhashi Yuki
 
EO-TH-v2-End-Users.pptx
EO-TH-v2-End-Users.pptxEO-TH-v2-End-Users.pptx
EO-TH-v2-End-Users.pptxssuser9dddf7
 
Office 365 introduction and technical overview
Office 365 introduction and technical overviewOffice 365 introduction and technical overview
Office 365 introduction and technical overviewMotty Ben Atia
 
Catalogic ECX: Snapshot and Replication Automation for Pure Storage
Catalogic ECX: Snapshot and Replication Automation for Pure StorageCatalogic ECX: Snapshot and Replication Automation for Pure Storage
Catalogic ECX: Snapshot and Replication Automation for Pure StorageCatalogic Software
 

Similaire à KEAC - Whitepaper - Kayxo Exchange Adapter for BizTalk (20)

KEAB - Technical Whitepaper - Kayxo Exchange Adapter for BizTalk
KEAB - Technical Whitepaper - Kayxo Exchange Adapter for BizTalk KEAB - Technical Whitepaper - Kayxo Exchange Adapter for BizTalk
KEAB - Technical Whitepaper - Kayxo Exchange Adapter for BizTalk
 
Integration Approach for MES
Integration Approach for MESIntegration Approach for MES
Integration Approach for MES
 
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
 
Exchange 2010 SP2 & Tips
Exchange 2010 SP2 & TipsExchange 2010 SP2 & Tips
Exchange 2010 SP2 & Tips
 
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
 
Exchange mailbox admin
Exchange mailbox adminExchange mailbox admin
Exchange mailbox admin
 
Enhancing Apache Kafka for Large Scale Real-Time Data Pipeline at Tencent | K...
Enhancing Apache Kafka for Large Scale Real-Time Data Pipeline at Tencent | K...Enhancing Apache Kafka for Large Scale Real-Time Data Pipeline at Tencent | K...
Enhancing Apache Kafka for Large Scale Real-Time Data Pipeline at Tencent | K...
 
KP Partners: DataStax and Analytics Implementation Methodology
KP Partners: DataStax and Analytics Implementation MethodologyKP Partners: DataStax and Analytics Implementation Methodology
KP Partners: DataStax and Analytics Implementation Methodology
 
How to Wield Kentico 9 in the Real World
How to Wield Kentico 9 in the Real WorldHow to Wield Kentico 9 in the Real World
How to Wield Kentico 9 in the Real World
 
Business case study how one product deployed in 3 diverse enterprises reaped ...
Business case study how one product deployed in 3 diverse enterprises reaped ...Business case study how one product deployed in 3 diverse enterprises reaped ...
Business case study how one product deployed in 3 diverse enterprises reaped ...
 
RFP-Final3
RFP-Final3RFP-Final3
RFP-Final3
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
Kafka and event driven architecture -og yatra20
Kafka and event driven architecture -og yatra20Kafka and event driven architecture -og yatra20
Kafka and event driven architecture -og yatra20
 
Kafka and event driven architecture -apacoug20
Kafka and event driven architecture -apacoug20Kafka and event driven architecture -apacoug20
Kafka and event driven architecture -apacoug20
 
Technology Overview
Technology OverviewTechnology Overview
Technology Overview
 
Rha cluster suite wppdf
Rha cluster suite wppdfRha cluster suite wppdf
Rha cluster suite wppdf
 
Windowsserver2003twpppt
Windowsserver2003twppptWindowsserver2003twpppt
Windowsserver2003twpppt
 
EO-TH-v2-End-Users.pptx
EO-TH-v2-End-Users.pptxEO-TH-v2-End-Users.pptx
EO-TH-v2-End-Users.pptx
 
Office 365 introduction and technical overview
Office 365 introduction and technical overviewOffice 365 introduction and technical overview
Office 365 introduction and technical overview
 
Catalogic ECX: Snapshot and Replication Automation for Pure Storage
Catalogic ECX: Snapshot and Replication Automation for Pure StorageCatalogic ECX: Snapshot and Replication Automation for Pure Storage
Catalogic ECX: Snapshot and Replication Automation for Pure Storage
 

Dernier

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Dernier (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

KEAC - Whitepaper - Kayxo Exchange Adapter for BizTalk

  • 1. Kayxo Exchange Appliance Connector Technical Whitepaper Understanding Kayxo Exchange Appliance Connector for Google Search Appliance 1.2.0.14
  • 2. Table of Contents Technical Whitepaper Abstract .......................................................................................... 2 Prerequisites, Skills and Knowledge ................................................................................... 2 Requirements ................................................................................................................. 2 What Kayxo Exchange Appliance Connector Provides ........................................................... 3 Solution Scenarios ........................................................................................................... 3 Technical Overview .......................................................................................................... 4 KEAC Layout ............................................................................................................... 5 Security ......................................................................................................................... 6 Serving Results to the User ........................................................................................... 6 Configuration .................................................................................................................. 7 Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 1
  • 3. Technical Whitepaper Abstract The Google Search Appliance (GSA) is an integrated hardware/software solution, creating a single point for discovering information within corporate networks, intranets, and Web sites. The Kayxo Exchange Appliance Connector for Google Search Appliance (KEAC) extends the Google Search Appliance, enabling users to search for emails, contacts, appointments, tasks, notes and documents stored in Microsoft Exchange, according each item’s security. This search feature takes advantage of the corporate search power of the Google Search Appliance and selectively unlocks the content stored in Microsoft Exchange This paper introduces the latest release of the Kayxo Exchange Appliance Connector for Google Search Appliance, providing the technical user with a detailed description of the ways it can be used. Prerequisites, Skills and Knowledge To install, configure and administrate this product you must be at least moderately experienced with the use of the following technologies:  Google Search Appliance.  Windows Server 2003.  Internet Information Server.  SQL Server.  Performance monitoring and optimization techniques. Requirements In order to be installed, the Kayxo Exchange Appliance Connector for Google Search Appliance requires the following: 1. Microsoft Exchange 2007 (32 / 64 bits) or Microsoft Exchange 2003. 2. Google Search Appliance (any version except Mini). 3. Windows 2003 Server (32 / 64 bits) with .Net 3.5 Framework. 4. Microsoft Visual C++ 2008 Redistributable Package (x86). 5. Internet Information Server 6.0. 6. Microsoft SQL 2008/2005/2000. 7. MAPI Libraries. You can install Microsoft Outlook 2003 or Microsoft Outlook 2007 in the machine that will be the KEAC server in order to install the MAPI Libraries. Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 2
  • 4. What Kayxo Exchange Appliance Connector Provides  Support for Microsoft Exchange Server 2003 and Exchange Server 2007.  Support of Public Folders and mailboxes in any language.  Allows to mash information already available from ECM systems, CRMs and others with information in Microsoft Exchange in a single search, ranked according to Google relevance criteria.  Honors the Microsoft Exchange’s sharing policies or other Company policies. This means that only if you have permission to see something you will find it through the Google Search Appliance. If you don’t have permission to see it, it will not appear in the search results.  Increases the value of the investment made in the Enterprise Search Platform. Solution Scenarios Some relevant scenarios where the Kayxo Exchange Appliance Connector for Google Search Appliance can be used:  Hierarchical Search: allow managers to search inside the contact, mail or task folders of their employees. As KEAC searches in all Microsoft Exchange Folders where the manager has been granted permission, the data is available no matter which of his employees has it.  Document public Search: Allow the whole company to search for the content of every attachment of any Microsoft Exchange object that has been declared as public.  Department Knowledge Sharing: A particular company department can share all of its contacts and mail data so all of its members can access them. This scenario applies specially to Call Centers, Technical Support, Sales, etc. Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 3
  • 5. Technical Overview The KEAC architecture is build around two processes:  The push process which retrieves information from Microsoft Exchange server and loads it into the GSA box.  The authorization and retrieval process that allows users to access a particular Microsoft Exchange server message. In the push process the Synchronizer Service executes an incremental synchronization for each mailbox configured (only selected folders are synchronized), and stores in the KEAC database the primary key for each inserted or MAPI message (mail, contacts, attachments, appointments or task). The GSA loader process takes each of these keys executes a query and sends the final Microsoft Exchange object to the GSA Server box. Both the Query Engine and the Synchronizer uses MAPI for the underlying communication, which is the most efficient protocol to access the Exchange Server and is also used by Microsoft Outlook. GSA Query Engine Loader Synchronizer Service Housekeeping Exchange server services GSA server Figure 1 The first step in the retrieval process is to authorize the caller’s access to the specified message. If the user folder is configured to have public access the Authorization Service allows the access to the item and passes the request to the Query Engine which constructs the response and sends it back to the client. Authorization Query Engine service Exchange server GSA server Figure 2 Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 4
  • 6. If the folder is marked as “non public”, the Authorization service retrieves in real time the mailbox folder access control list from Microsoft Exchange and checks the caller’s access. To avoid stressing the Microsoft Exchange Server box the service implements a cache to store this information, given that a user can experience a minimal synchronization delay when he browses information. You must take into account that the ACL information is modified when the owner of the mailbox changes the sharing permissions using Microsoft Outlook or when the Microsoft Exchange Administrator executes security maintenance tasks. KEAC Layout The adapter components and services leverage on:  Windows OS.  Microsoft SQL Server 2000 (or above).  MAPI.  IIS.  NET framework 3.5. KEAC Layout Synchronizer GSA Housekeeping Authorization Query Engine service Loader services service MAPI NET framework Microsoft SQL Server IIS Figure 3 Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 5
  • 7. Security KEAC makes documents and objects stored in your Microsoft Exchange discoverable through search. In addition to public content that is available to everyone, the search appliance can crawl and index documents that require authentication. To protect confidentiality, at serving time, KEAC determines if the user who is performing the search is authorized to view each document before the search result is shown. This is because the KEAC honours the Microsoft Exchange’s sharing and security policies. This means: only if you have permission to see it you will find it through the Google Search Appliance. If you don’t have permission to see it, it will not appear in search results. It's important to understand that when controlled-access content is labeled as "public" in the index, it will be shown in all users' search results. Because public search results are served from the index without checking for authorization, users can discover all public content that the search appliance has access to, regardless of whether they have authorization to view that content or not. Serving Results to the User When a user performs a search request, the search appliance performs two checks before serving secure content:  The search appliance acquires the user's credentials to enable impersonation, or performs an authentication check to establish the user's identity.  The search appliance impersonates the user, or performs an authorization check to determine whether the user can view the content. If the user is authorized to view the content, the content will appear in the user's search results. Here we will explain the second process. If a secure content item fails, the search appliance removes it from the list of results. The following diagram shows the authorization sequence: Browser GSA Authorization Query Engine Module Search() Authorize (item) Allow / Deny Result Figure 4 Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 6
  • 8. Configuration Taking into account the complexity of the solution, the configuration process is little bit wide and detailed. Due to the big number of processes that take part on this solution several accounts and profiles have to be created and configured. This process could be difficult, but to simplify the administrators’ tasks, the adapter has configuration consoles that make the administration process more user-friendly. Figure 5 Figure 6 Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 7
  • 9. In addition KEAC provides a Mailbox Configuration Tool. This tool uses the MAPI profile configured previously to load and list all the folders and mailboxes that are accessible to KEAC’s configured account. With this tool you can configure which folders and mailboxes will be monitored and made available through the GSA searches. The mailboxes and folders together with Public Folders are displayed in a tree-like structure where the user can select which folders are going to be monitored and made available to the GSA. Figure 7 Kayxo is a registered trademark of Quantum System Microsoft Outlook is a registered trademark of Microsoft Corporation in the United States and/or other countries. Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 8