Category Archives: 13180

Fix for Excessive Duplicate Contacts

If you’re running Lync in your environment you may notice that you have multiple duplicate contacts in your contacts list.






This issue also affects your ActiveSync mobile devices, such as the iPhone.






If you open one of these duplicate contacts, you will notice that the Notes field says the contact was added by Lync 2013.






This a caused by a bug in the Lync client, which adds a duplicate contact item every time you have do an IM with this contact.  The bug will be fixed in the next cumulative update (CU) for the Lync 2013 client.  In the meantime, here’s how you can fix it.



The duplicate contacts are stored in a contacts folder called Lync Contacts.  This folder is protected by Outlook so you can’t delete it from there.  You need to delete it from Outlook Web App, which does not treat it as protected.



  • Log into OWA and view your contacts.
  • Right-click the Lync Contacts folder and select Delete.



  • Click Yes to confirm you want to delete the selected folder and move all contents into the Deleted Items folder.  You can then sign out of OWA.
  • From the Outlook client you’ll need to empty your Deleted Items folder to finish getting rid of all the duplicate contacts.  You’ll then be free of them!







Apple Customer Service #FAIL



Argh!  It’s not often I have such a bad customer service experience, but here’s an example of how NOT to do things.



I decided to pre-order the Apple iPhone 5 today and had some questions about swapping SIMs, so I called 1-800-MY-APPLE.  The lady I talked to was nice enough, answered my questions, and offered to take my order.  I gave her all the information and confirmed with her that the iPhone 5 would be delivered September 21st, but when I got the confirmation email it said it will be delivered October 10 – October 16.



I called back to confirm and was told I can change the order online to pick up in an Apple store on September 21st.  The guy sent me an email with a link to change my delivery, but after following the links on the Apple.com order page, it told me I cannot change my shipping type and I must call 1-800-MY-APPLE.



Call #3.  This guy tells me that they cannot change the order to store pickup because Apple.com and the retail stores are different.  He needs to cancel the order and transfer me to the retail store order line, which he does.  The retail order lady asks, “Why do they keep doing this? You can’t order it for pickup at a store.  You’ll need to re-order it again from 1-800-MY-APPLE.  Sorry I can’t transfer you back.”



Call #4. The automated router sends me to Technical Support instead of Orders.  Apparently, those words sound alike.  I tell this guy I need to talk to someone about un-canceling an order.  No can do, but he’ll be happy to place another order for me.  I give all my information again (don’t they already have that from the first order?!?).  I wait for my confirmation email, but nothing comes.  Thankfully, I got the web order number from him.



I look up my order on Apple.com using my web order number, but I get an error saying, “The signed in account does not have access to this order.”




 



Call #5. I find out that email address, phone number, and spelling are all wrong on the order.  I got that fixed (after repeating myself a dozen times) and asked to have the confirmation emailed to me.  Sure enough, it shows again that it will be delivered October 10 – October 16.  I tell her that I was first told it would be delivered September 21st and I want to talk to a manager.  I was on hold through three complete songs (Chemical Brothers, “Call Me Maybe” and, I kid you not, “Crazy” by Patsy Cline) before she apologized for the wait and would transfer me to a manager.  What I got was an automated attendant that asked for the extension I was trying to reach.



At this point I’m so frustrated I’m going to cancel my order, but I just can’t put myself through another phone call with these people to do it right now. 



Now I know why people stand in long lines at the retail stores.

New Best Practice for RPC Timeouts in Exchange

Exchange 2010 and 2007 use RPC (Remote Procedure Calls) for all client and RPC proxy calls.  For example, email clients (Outlook, Outlook Anywhere (OA), and ActiveSync) use RPC for MAPI connectivity. 



The default keep alive time for RPC connections uses the IIS idle connection timeout, which is 15 minutes.  This usually doesn’t cause a problem on local LAN or WAN connections, but routers and switches that are used to connect Internet clients to internal Exchange servers often have more aggressive timeouts.  Typically these network devices have a 5 minute timeout which causes problems for external clients, particularly Outlook Anywhere, iPhone, and iPad clients.  Symptoms include messages stuck in the Outbox and poor email performance on the remote clients, and high CPU utilization on the Exchange Client Access Servers (CAS).








The new best practice is to adjust the RPC keep alive timeout value on the Client Access Server from 15 minutes to 2 minutes.  Since RPC is a function of Windows, not Exchange, this value is adjusted under the Windows NT registry key.  The value is located here:



HKLM\Software\Policies\Microsoft\Windows NT\RPC\MinimumConnectionTimeout



Normally the MinimumConnectionTimeout DWORD value does not exist, which means RPC uses the default value of 900 seconds (15 minutes).  To adjust it, create or modify the MinimumConnectionTimeout value and set the value to decimal 120 (seconds, or 2 minutes).  IIS must be restarted on the CAS to affect the change.







The following command will create the appropriate values:



reg add “HKLM\Software\Policies\Microsoft\Windows NT\RPC” -v “MinimumConnectionTimeout” -t REG_DWORD -d 120



The Outlook and ActiveSync clients honor this new timeout during the connection to the CAS, so both client and server now send a Keep-Alive packet after two minutes of inactivity, effectively maintaining both TCP connections needed.



A colleague of mine works for a large global company that was affected by this.  They have several thousand iPads connecting to nine load balanced CAS servers and all the CAS were peaking at 100% CPU utilization.  Once they implemented this change the average load on the CAS is now 20-30% and the iPad performance is much improved.



This is my new best practice and I make this change on every Exchange CAS deployment.  For more information about RPC over HTTP see Configuring Computers for RPC over HTTP on TechNet.

Siri Easter Eggs

Here are some fun questions to ask Siri from you new iPhone 4S:



* How much wood would a woodchuck chuck if a woodchuck could chuck wood?



* What is the meaning of life?



* I love you. Will you marry me?



* What’s the best phone? (ask repeatedly for different answers)



* Open the pod bay doors, Siri (keep asking)



* Where can I find a good Scotch?



* Which is better, AT&T or Verizon?



* Who’s your daddy?





and finally, try telling Siri:



* I need to hide a body.

Trouble with ActiveSync with iOS4 for iPhone

As reported all over the Internet, customers are having trouble with Exchange ActiveSync after upgrading their iPhones to iOS4.  Problems range from not syncing to over utilization of Exchange servers.

Apple has been nearly silent on this issue, choosing to do damage control over it’s poorly designed antenna in the new iPhone 4.

The Microsoft Exchange Team has posted on its blog more information about these issues, which is much more than anything we’ve seen or heard from Apple.  With Microsoft’s assistance, Apple released a fix that changes the timeout value that Exchange ActiveSync connection uses to four minutes, which should be long enough for the vast majority of users.

But take a look at that Apple article.  There’s virtually no technical content or explanation that describes what the new profile does, other than saying it increases the timeout value.  To what?  From what?  What was it in previous iOS versions?

All this demonstrates how the iPhone is not an enterprise ready device, primarily because Apple does not provide enterprise-class support.  Apple could learn a lot from Microsoft.  Honesty and transparency is always the best way to provide support.

How to Securely Deploy iPhones with Exchange ActiveSync – Phase 6 – End-User Deployment of the ActiveSync Profile

This is the seventh and last post in my series, How to Securely Deploy iPhones with Exchange ActiveSync in the Enterprise. To read an overview of the solution click here.  In this phase I will demonstrate the steps and procedures that the end-user will perform to configure their iPhone for ActiveSync.  I will also cover some advanced reverse proxy configurations, such as using Microsoft Threat Management Gateway (TMG), ISA, Tivoli Access Manager (TAM), etc.

As a review, the infrastructure has been built and the necessary software and certificates have been installed and configured.  Members of the ActiveSync Administrators group configure iPhone Configuration Profiles, one per iPhone, which includes the user’s ActiveSync configuration settings and the ActiveSyncUser user certificate.  Each iPhone Configuration Profile (iCP) is married to the iPhone and exported to the EAS share, which is also a website virtual directory on the CAS server.  The iCP is named for the user for which it is intended (i.e., jqsmith.mobileconfig).

In this final phase, the user authenticates to the EAS website using Safari from the iPhone.  The iPhone automatically downloads the iCP that matches the username.

Here are the steps in detail:

The user is instructed to tap Safari on the iPhone and navigate to https://webmail.companyabc.com/eas (where webmail.companyabc.com is the public FQDN for the CAS server).  The user logs into the Secure Website using the user’s AD logon name and password, as shown:


After successfully logging in, the iPhone will download the user-specific ActiveSync Configuration Profile, as shown.


The green Verified indication signifies that the profile was encrypted and signed for this device.

If the user taps More Details on the profile, the details of the configuration profile are displayed showing the ActiveSync server and the email address used in the configuration profile, as shown.  Note that the user cannot tell that a user certificate is embedded in the configuration profile.


Back on the Install Profile screen, tap Install and Install Now to begin installing the profile.

Note that the iPhone only supports one Exchange ActiveSync profile at a time (I sincerely hope this changes in the near future).  If the user already has Exchange ActiveSync configured, the iPhone will display the warning, “Can’t install Profile. Only one Exchange account can be set up at a given time.”  Remove the existing ActiveSync settings and begin the process again.

If the iPhone already has a passcode configured, the user will need to enter it at this time to begin installing the profile.

During installation of the profile the user is prompted for his/her AD password to connect to their mailbox, as shown:


Enter the AD password, tap Return, and then tap Next to complete installation of the profile.  When the profile has been successfully installed, tap Done.  The user can now close Safari.

If a device lock passcode has been configured in the Exchange ActiveSync Policy, the iPhone will display a message that the user must accept the new policy.  It will then prompt the user for a passcode using the complexity requirements specified in the EAS policy.

It may take a few minutes to complete synchronizing the user’s email, calendar, contacts and tasks for the first time.

If at any time in the future the user needs to re-install the ActiveSync Profile on the iPhone (for example, after a hardware reset or software restore), simply follow these steps again.

Removing the ActiveSync Profile
If the user wants to remove the ActiveSync Profile, follow these steps.  Removing the ActiveSync profile also removes the user certificate from the iPhone.

Tap Settings on the iPhone home screen and then tap General.  Scroll to the bottom and tap Profiles.  Tap the profile to remove and then tap Remove.  If the iPhone has a passcode configured, it must be entered to remove the profile.


Reverse Proxy Scenarios
Some environments secure their Client Access Servers from direct Internet communication using Microsoft ISA, Threat Management Gateway (TMG) server, or another reverse proxy solution.

In these scenarios, the public ActiveSync connection and authentication is made at the reverse proxy.  The reverse proxy then proxies the authentication to the internal CAS server(s).  The CAS servers, themselves, act as reverse proxies to the mailbox servers.

With an environment such as this, you need to install the certificate and private key on the reverse proxy server(s).  The reverse proxies need to be configured to require client certificates and use Basic Authentication.  They must then pass the certificate, username, password to the CAS servers to complete the connection.  This diagram should help.


I hope this series helps you with the deployment of iPhones in your Exchange ActiveSync environment.  I welcome your comments.


This concludes my series, How to Securely Deploy iPhones with Exchange ActiveSync in the Enterprise.

Other articles in this series:

How to Securely Deploy iPhones with Exchange ActiveSync – Phase 5 – Creating the Website for iPhone Profile Deployment

This is the sixth post in my series, How to Securely Deploy iPhones with Exchange ActiveSync in the Enterprise. To read an overview of the solution click here.  In this phase, we will create the deployment website that end-users will use to download the appropriate iPhone Configuration Profile created in Phase 4.

Since you’re most likely using Outlook Web Access served up by the CAS servers, these make a natural choice for hosting the website.  I’ll cover how to do this using a single CAS server and then follow up with guidance and best practices for environments with multiple CAS servers.

Add the ASP Role Service to the Web Server
Begin by logging into the CAS server with administrator credentials and opening Server Manager.  Expand Roles and select Web Server (IIS).  Right-click Web Server (IIS) and select Add Role Services.  Under Application Development add the ASP role service, as shown.


Click Next and Install to complete the installation.  No restart is required.

Create the EAS Virtual Directory
Open Internet Information Services (IIS) Manager.  Expand the CAS server name > Sites > Default Web Site.  Right-click Default Web Site and choose Add Virtual Directory.  Enter EAS for the Alias and click the (…) button to browse for the Physical Path.  Navigate to C:\inetpub\wwwroot and click the Make New Folder button.  Name the new folder EAS and click OK twice.


Configure the EAS WebSite Permissions
Right-click the new EAS virtual directory and choose Edit Permissions.  Click the Sharing tab and configure the EAS share with the following share permissions: Add ActiveSync Users (Read) and ActiveSync Admins (Full Control).  Remove Everyone from the share permissions. 

On the Security tab click Advanced and Change Permissions.  Uncheck Include inheritable permissions from this object’s parent, click Add (for Windows Server 2008, click Copy), and click OK twice.  Click Edit and remove the Users (CASname\Users) group.  Add ActiveSync Users (Read & Execute, List Folder Contents, Read) and ActiveSync Admins (Full Control), and click OK twice.

Configure the EAS WebSite Authentication
Select the EAS website and double-click Authentication.  Disable Anonymous Authentication and enable Basic Authentication.  Select Basic Authentication and click Edit in the Actions pane.  Enter the domain name for the Default Domain and click OK.

Configure MIME Handling
MIME handling tells the web server how to handle different file extensions and associates file extensions with applications.

Select the EAS website and double-click MIME Types.  Click Add in the Actions pane.  Enter mobileconfig for the File name extension and application/iphone-configuration for the MIME type, as shown, then click OK.


Create the Default Document for the EAS Website
We now need to create a default ASP document for the folder.  This ASP page will be used to cause the iPhone to automatically download the correct iPhone Configuration Profile.

Download the default.asp page here.  Edit default.asp to replace webmail.companyabc.com in the second to last line with the FQDN of your publicly available CAS server.  Save the file in the EAS folder.  You can now close Internet Information Services (IIS) Manager.

Putting It All Together
Now that we have the EAS share and website configured, it’s simply a matter of exporting the iPhone configuration profiles to the EAS share (as described in Phase 4), using the ActiveSync user’s logon name as the name of the file (for example, jqsmith.mobileconfig). 

You then instruct the user to enter https://webmail.companyabc.com/eas in Safari from the iPhone.  The user will be prompted for authentication to access the website.  After the user enters his/her AD username and password, the iPhone Configuration Profile that matches the logon name will be downloaded to install on the iPhone.  I’ll cover those steps in detail in the final phase.

Special Configuration for Multiple CAS Servers
If your environment has more than one CAS server in a load-balancing solution used for OWA, you need to perform the procedures above for each of those CAS servers.

You will also need to make sure that you copy the encrypted and signed iPhone Configuration Profiles to each CAS server’s EAS share when you export it.  If this pertains to your environment, I recommend using DFS to replicate and distribute the profiles amongst the participating CAS servers.  With DFS you can save the iPhone Configuration Profiles to \\domain\EAS and it will replicate to all the CAS servers automatically.

This completes the configuration of the EAS deployment website.





This concludes Phase 5 of my series, How to Securely Deploy iPhones with Exchange ActiveSync in the Enterprise.  In the last phase I will provide the end-user instructions and procedures.

Other articles in this series:

How to Securely Deploy iPhones with Exchange ActiveSync – Phase 4 – Creating the iPhone Configuration Profile

This is the fifth post in my series, How to Securely Deploy iPhones with Exchange ActiveSync in the Enterprise. To read an overview of the solution click here. In this phase, we will create iPhone Configuration Profiles using Apple’s iPhone Configuration Utility.  I will also show you how to embed the user certificate and private key into the profile and how to marry the profile to a specific iPhone. 

Let’s get started.

First, you will need to download and install the Apple iPhone Configuration Utility (iCU).  The latest version as of this writing is version 2.1.0.163 and is the one I will use here.  The iCU only installs on Windows XP SP3 or Windows Vista SP1 or greater.  It will not install on Windows Server.  It also requires NET 3.5 SP1.

Note: The iCU is not an enterprise class software program.  All the configurations, hardware profiles and configuration profiles are stored locally on the workstation in %USERPROFILE%\Local Settings\Application Data\Apple Computer\MobileDevice folder.  For this reason, I recommend using a single workstation for iPhone management and to backup this folder and child folders to a network location periodically.

Begin the configuration process by logging into the workstation with the credentials used to request and install the user certificate created in Phase 1.  This user has the ActiveSyncUser user certificate stored in his/her personal certificate store.  It will be needed later in this process.

Before the iPhone can be configured it must be activated on the AT&T network.  This is performed using iTunes.  Simply launch iTunes, connect the new iPhone to the computer using the USB cable, and follow the iTunes Setup Assistant.  Once the iPhone is activated you can close iTunes.

Now launch the iPhone Configuration Utility.  The iPhone will automatically be added to the Devices Library in the iCU, as shown below:


In the Devices library, click the iPhone and enter the user’s name and email address to identify the device profile.  Note that most iPhones will have the helpful name “iPhone”, so the Contact info you enter here will help you out later.

Now click the Configuration Profiles library and click the New icon to create a new base configuration profile.  The base configuration profile can be used for configuration settings that cannot be made using the Exchange ActiveSync Policy, such as iPhone Restrictions or VPN settings.  Apple calls these configurations “payloads”.

To create a new base configuration, select the General (Mandatory) setting and enter a Name, Identifier, Organization, and Description, as shown. 


Choose whether the base configuration profile can be removed.  Choices are Always, With Authentication (using a password), or Never.  For base configurations, I recommend With Authentication to prevent end-users from easily removing company restrictions.  You must then supply the Authorization password.  Notice there is no “Save” button anywhere.  Whatever you configure is written immediately to the configuration profile(s).

You can now configure your base configuration settings and restrictions, as shown.  Refer to the iCU help for configuration settings.  If you want to delete a payload from a profile, click the minus sign in the top right corner of the configuration item.


I recommend using Exchange 2007 / 2010 ActiveSync over-the-air policies for any configuration that can be configured using them (for example, device locking duration and passcode complexity).  This will give you the greatest amount of flexibility and will allow you to make changes on the fly.

Now deploy the iPhone Base Profile to the iPhone by clicking the iPhone name under DEVICES on the left pane.  Select the iPhone Base Profile and click Install.


The iPhone will prompt you to install the iPhone Base Profile, as shown below.  Tap Install and the Install Now.  After the profile installs, tap Done.


Back in the iCU, click the Configuration Profiles library.  Click the New icon again to create the ActiveSync Profile.  Configure the General (Mandatory) section as shown:


I recommend setting Security so that the ActiveSync Profile can Always be removed.  This will allow users to remove the EAS profile, which will help later if you ever need to re-deploy the EAS profile.

Now click the Exchange ActiveSync section and configure your ActiveSync settings for the iPhone.  Enter the Account Name, Exchange ActiveSync Host, Domain, User, and Email Address, as shown:


Do not enter the user’s password.  The iPhone will prompt the user for any field you leave blank when it installs the profile.  Going forward, the only items you will need to configure for subsequent ActiveSync profiles are the User and Email Address.

Click the + sign under Authentication Credential Name.  The Personal Certificate Store will open for you to add the ActiveSyncUser user certificate to the Exchange ActiveSync profile, as shown:


Enter the password you entered for the certificate’s private key in Phase 1.  The certificate and private key will be added to the Exchange ActiveSync configuration.  Check Include Authentication Credential Passphrase to include it in the profile, otherwise the device will prompt the user for the passphrase (not good).


You now have a fully configured iPhone ActiveSync Configuration Profile.  All that’s left is to export the ActiveSync Profile so that the user can install it.  You need the user to do this because the profile will prompt for the user’s Active Directory password (something I hope you don’t know).

Ensure that the ActiveSync Profile is selected and click the Export button.  The Export Configuration Profile window will open.  Select Create and sign encrytped configuration profile for each selected device from the dropdown box and select the correct device, as shown below.  Then click Export.  This will “marry” the ActiveSync configuration profile to the selected device, preventing it from being installed on any other iPhone.  This is how we meet the requirement that “only authorized devices can access Activesync”.


Now I need to jump forward a bit.  In the next phase, I will explain how to create the deployment website.  For now, let’s assume that the website already exists and that the UNC path to the share for that website is \\EXCAS1\eas.  Save the configuration profile to that share, naming the profile with the AD user’s logon name (for example, jqsmith.mobileconfig).

Congratulations!  You have now created a unique ActiveSync configuration profile with the embedded ActiveSyncUser user certificate, and encypted and married the profile to a specific iPhone.



This concludes Phase 4 of my series, How to Securely Deploy iPhones with Exchange ActiveSync in the Enterprise.  The next phase will cover how to create the website for end-user iPhone profile deployment.

Other articles in this series:

How to Securely Deploy iPhones with Exchange ActiveSync – Phase 3 – Publishing User Certificates to Active Directory

This is the fourth post in my series, How to Securely Deploy iPhones with Exchange ActiveSync in the Enterprise. To read an overview of the solution click here. In this phase, we will publish the same user certificate to each user object in Active Directory that is a member of the ActiveSync Users security group.

As mentioned earlier, ActiveSync will be configured to require user certificates for authentication.  This means that the user needs a user certificate with the private key and ActiveSync will check this certificate for a matching certificate in Active Directory.  We need to publish the user accounts in Active Directory, as shown below.


When you view the properties of the published certificate, you see that it was issued by the CA (W2K8R2-CA) and that the certification path is valid, since we published the root CA certificate to all machines in the domain using Group Policy in Phase 2.


While this is a fairly simple process to do, I wrestled with different ways of doing it programmatically.  I finally decided to use VBScript to publish the certificate to AD.  I chose VBScript instead of PowerShell because I could not be certain that the ActiveSync Administrator(s) would have PowerShell installed.

The script uses CAPICOM, which is a security technology from Microsoft that allows Microsoft Visual Basic, Visual Basic Script, ASP, and C++ programmers to easily incorporate digital signing and encryption into their application.  To use CAPICOM, you must download and register the CAPICOM.DLL on the computer that runs the script.  The script automatically registers the DLL, as long as it resides in the same network share where the ActiveSync user certificate resides.

First, download CAPICOM and extract the contents to get the CAPICOM.DLL file (we have no need for any of the other files or examples).  Then create a network share that the mobile administrators have access to (for example \\fileserver\iPhone).  Copy the CAPICOM.DLL, the ActiveSyncUser.cer user certificate (exported in Phase 1), and the vbscript below to the share.  You will need to edit the script to reflect the name you used for your ActiveSync Users group in AD, the path to CAPICOM.DLL and the user certificate, and the name of the user certificate if necessary.

Here’s the Publish Mobile Cert.vbs script:

‘======================================================================================================================================
‘Publish Mobile Cert.vbs –
The admin running the script must have rights to modify the user accounts that are members of the ActiveSync Users group in AD.

‘Jeff Guillet
’02/10/2010

‘This script publishes the mobile user certificate into Active Directory for all members of the ActiveSync Users security group

‘Micosoft link for CAPICOM: http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=860EE43A-A843-462F-ABB5-FF88EA5896F6
‘=======================================================================================================================================


On Error Resume Next


‘Configure constants
Const ADS_PROPERTY_UPDATE = 2
Const ADS_PROPERTY_APPEND = 3


‘————————————————————————–
‘Modify the three variables below, as required
‘————————————————————————–
eASUsersGroup = “ActiveSync Users”
pathToFiles = “\\fileserver\iPhone\”
certFile = “ActiveSyncUser.cer”
‘————————————————————————–


msg = “This script publishes the ‘” & certFile & “‘ certificate to all members of” & vbCRLF
msg = msg & “the ‘” & eASUsersGroup & “‘ security group. Do you want to continue?”
r = MsgBox(msg, vbYesNo + vbQuestion, “Publish Mobile Cert”)
If r = vbNo then Wscript.Quit


‘Create log file
Set fso = CreateObject(“Scripting.FileSystemObject”)
Set FullLog = fso.OpenTextFile(pathToFiles & “Publish Mobile Cert.log”, 8, True)


‘Check for and set dependencies
‘–Check for CAPICOM.DLL
Set FSO = CreateObject(“Scripting.FileSystemObject”)
If NOT FSO.FileExists (“C:\Windows\System32\capicom.dll”) Then
If NOT FSO.FileExists (pathToFiles & “capicom.dll”) Then
MsgBox pathToFiles & “capicom.dll is missing. Cannot continue.”, vbCritical, “Missing File”
Wscript.Quit
Else
FSO.CopyFile pathToFiles & “capicom.dll”, “C:\Windows\System32\”
End if
End if
‘–Check for certificate
If NOT FSO.FileExists (pathToFiles & certFile) Then
MsgBox pathToFiles & certFile & ” is missing. Cannot continue.”, vbCritical, “Missing File”
Wscript.Quit
End If
‘–Register CAPICOM.DLL
Set WshShell = WScript.CreateObject(“WScript.Shell”)
Return = WshShell.Run(“regsvr32 C:\Windows\System32\capicom.dll /s”, 0, true)

‘Load the certificate file and convert it to Base-64
Set Certificate = CreateObject(“CAPICOM.Certificate”)
Certificate.Load pathToFiles & certFile
BinaryEncodedCertificate = Certificate.Export(CAPICOM_ENCODE_BINARY)
Set Utilities = CreateObject(“CAPICOM.Utilities”)
ArrayEncodedCertificate = Utilities.BinaryStringToByteArray(BinaryEncodedCertificate)

‘Configure connection to Active Directory
Set con = CreateObject(“ADODB.Connection”)
con.Provider = “ADsDSOObject”
con.Open “DS Query”
Set command = CreateObject(“ADODB.Command”)
Set command.ActiveConnection = con
command.Properties(“searchscope”) = 2
command.Properties(“Page Size”) = 20000
command.Properties(“Timeout”) = 180

‘Get default domain
Set oRoot = GetObject(“LDAP://rootDSE”)
oDomain = “LDAP://” & oRoot.Get(“defaultNamingContext”)

‘Construct and execute query to get the eASUsersGroup
command.CommandText = “SELECT AdsPath FROM ‘” & oDomain & “‘ WHERE name = ‘” & eASUsersGroup & “‘ AND objectClass = ‘Group'”
Set rs = Command.Execute

‘Append to the log file
FullLog.writeline String(75, “=”)
FullLog.writeline “Publish Mobile Cert.vbs”
FullLog.writeline Now
FullLog.Writeline “Adding the mobile user certificate to the following users:”
FullLog.writeline String(75, “-“)

‘Loop through the result set
Do While NOT rs.EOF
Set oGroup = GetObject(rs.fields(0))
groupDN = oGroup.distinguishedName
‘Publish the certificate to each member of the group
For Each Member In oGroup.Members
userCount = userCount + 1
‘Append the certificate to the user’s certificate store in Active Directory
Set UserObj = GetObject(“LDAP://” & member.distinguishedName)
UserObj.PutEx ADS_PROPERTY_APPEND, “userCertificate”, Array(ArrayEncodedCertificate)
UserObj.SetInfo
If Err.Number = 0 Then
FullLog.writeline member.distinguishedName
Else
FullLog.writeline “Unable to update user: ” & member.distinguishedName
errorCount = errorCount + 1
End If
Next
Exit Do
Loop

FullLog.writeline String(75, “=”) & vbCRLF & vbCRLF

msg = “Successfully published the certificate to ” & userCount – errorCount & ” user accounts.” & vbCRLF
msg = msg & “Review the Publish Mobile Cert.log for details.”
If errorCount > 0 Then
msg = msg & vbCRLF & vbCRLF & errorCount & ” error(s) were encountered.”
MsgBox msg, vbExclamation, “Publish Mobile Cert”
Else
MsgBox msg, vbInformation, “Publish Mobile Cert”
End If
Here’s a link to the script for those of you averse to copying and pasting.

To run the script you must have rights to modify the user accounts that are members of the ActiveSync Users security group.  Simply double-click the script to run it.  The script will register CAPICOM.DLL, connect to Active Directory and search for the ActiveSync Users group, enumerate all the members of the group, and publish the ActiveSync user certificate to each user.  A log file is generated in the folder path specified in the script each time it is run.

We have now completed publishing the ActiveSync user certificate to the user accounts in Active Directory that are members of the ActiveSync Users group.



This concludes Phase 3 of my series, How to Securely Deploy iPhones with Exchange ActiveSync in the Enterprise. The next phase will cover how to create the iPhone Configuration Profile using Apple’s iPhone Configuration Utility.

Other articles in this series: