Outlook Web Access in Exchange 2000 Server
Outlook Web Access in Exchange 2000 Server
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed
as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted
to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented
after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO
THE INFORMATION IN THIS DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright,
no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or
by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express
written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering
subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the
furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual
property.
Microsoft, Windows, Active Directory, Outlook, Jscript, and IntelliMirror are either registered trademarks or trademarks of
Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Table of Contents
Introduction..................................................................................................... 1
Features and Limitations.................................................................................. 1
Client Support .............................................................................................. 3
Architecture ..................................................................................................... 4
Accessing a Server ........................................................................................ 5
WebDAV ...................................................................................................... 5
Usage Scenarios............................................................................................... 6
Light Messaging ............................................................................................ 6
Roving User Support ..................................................................................... 6
Kiosks ......................................................................................................... 7
Migration ..................................................................................................... 7
Planning Considerations .................................................................................. 7
Network Security .......................................................................................... 7
Authentication .............................................................................................. 8
Method 1–Basic ....................................................................................... 8
Method 2–Integrated Windows................................................................... 9
Method 3–Anonymous Access .................................................................... 9
Method 4–Secure Sockets Layer (SSL) ........................................................ 9
Capacity Planning ........................................................................................10
Usage Scenarios .....................................................................................10
Topology................................................................................................11
Load Balancing ............................................................................................11
Installation and Administration ..................................................................... 12
Setup .........................................................................................................12
Server Configuration ....................................................................................13
Outlook Web Access User Management ...........................................................14
Virtual Servers and Directories.......................................................................14
Connecting to a Virtual Server ..................................................................14
Disabling Virtual Servers ..........................................................................14
Front-End Servers ...................................................................................15
Multilanguage Support ..................................................................................15
Microsoft Outlook Web Access in
Microsoft Exchange 2000 Server
Published: March 2000
Updated: May 2002
Introduction
Microsoft® Outlook® Web Access is a tightly integrated component of Exchange 2000.
The architecture of Outlook Web Access has been completely overhauled since its
introduction in Microsoft Exchange Server version 5.0. Furthermore, enhancements to
the Exchange 2000 architecture dramatically affect the way Outlook Web Access works.
With these enhancements, Outlook Web Access offers significantly increased scalability
and functionality.
This document addresses Outlook Web Access in Exchange 2000, focusing especially on
the architecture and deployment of Outlook Web Access.
2
Microsoft Outlook Web Access in Microsoft Exchange 2000 Server
Table 1 Feature comparisons among Outlook 2000, Outlook Web Access 2000 and
Outlook Web Access 5.5
Feature Outlook 2000 Outlook Web Outlook
Access 2000 Web
Access 5.5
Basic features
E-mail Yes Yes Yes
Calendaring Yes Yes Yes
Contacts Yes Yes Yes
Tasks Yes No No
Access to embedded objects Yes Yes No
Rich text Yes Yes Yes
HTML Yes Yes No
Drag-and-drop editing Yes Yes with Internet No
Explorer 5.0
Shortcut menus Yes Yes with Internet No
Explorer 5.0
Offline use Yes No No
Journal Yes No No
Printing templates Yes No No
Advanced features
Delegate access to mailbox Yes Yes (read-only) No
Timed delivery Yes No No
Expiration Yes No No
Spelling checker Yes No No
Reminders Yes No No
Outlook rules Yes No No
Single sign-on Yes Yes* No
Client Support
• Internet Explorer 5.0 Internet Explorer 5.0 uses dynamic HTML and a
combination of Extensible Markup Language (XML) to provide a rich set of functions
for collaborative applications through the browser. Internet Explorer 5.0 provides a
user interface that is very similar to the full version of Outlook and includes
functionality such as drag-and-drop editing between folders and a tree control to
3
Microsoft Outlook Web Access in Microsoft Exchange 2000 Server
In other browsers, much of the functionality listed in Table 2 is lost because of the
backward compatibility to browsers that do not support dynamic HTML and XML.
Architecture
Outlook Web Access in Exchange 2000 is substantially different from the version
introduced with Microsoft Exchange Server version 5.0. Outlook Web Access 5.x used
Active Server Pages (ASP) to communicate with the Exchange server that used
Collaboration Data Objects (CDO) version 1.2 and Messaging Application Programming
Interface (MAPI). The effective number of users per server was limited by the
overheard needed to support interpreted scripts in ASP and to run MAPI sessions within
ASP. In this context, Outlook Web Access was actually a part of Microsoft Internet
Information Services (IIS).
Outlook Web Access in Exchange 2000 does not use MAPI to communicate with the
mailbox store and no longer uses ASP for client access. Client access continues to use
HTTP; however, Outlook Web Access is now built into the Microsoft Web Storage
System and uses IIS only to receive requests and pass them to the Web Storage
System.
IIS, which is integrated with the Microsoft Windows® 2000 operating system, handles
incoming HTTP requests from Web browsers and sends HTTP responses from
Exchange 2000 Server or Outlook Web Access. IIS receives a client request, looks at
the namespace, and passes the appropriate information for the context of the URL back
to the Web browser. If the server houses the Exchange 2000 database, Outlook Web
4
Microsoft Outlook Web Access in Microsoft Exchange 2000 Server
Access uses a high-speed channel to access the mailbox store. If the server is a front-
end server, Outlook Web Access directs the request to a back-end server using HTTP.
Accessing a Server
Clients direct specific requests to Outlook Web Access using named URLs. Often the
URL, such as http://owa.microsoft.com/exchange, directs the client to the user’s
mailbox. However, named URLs are not limited to addressing a mailbox. You can
address most functions and components of the client by defining a specific URL.
You can open a specific folder by typing the name of the folder after the mailbox name.
For example, to open a calendar, type the path to the user’s mailbox followed by
/calendar, as in http://owa.microsoft.com/exchange/juser/calendar. Likewise, you
can access the Contacts folder directly by typing the path to the client’s mailbox
followed by /contacts.
Named URLs are not limited merely to accessing folders. You can open any item and
perform many functions by using explicit URL addressing. Many option and command
verbs allow a wide range of actions. Leveraging the basic functions of named URLs can
provide fast integration of Exchange with corporate intranet sites. For more
information, see the Exchange 2000 Server Software Developer’s Kit available at
http://msdn.microsoft.com/downloads/sdks/exchange/beta.asp.
WebDAV
Internet Explorer 5.0 clients support an extension to the HTTP protocol known as
WebDAV. WebDAV enables richer manipulation of data on the server than HTTP alone,
allowing the client to work with data in a more intuitive manner. WebDAV can
accommodate all types of content, so you can use it with many types of documents.
You can potentially use WebDAV to create anything you store in a file. WebDAV
includes the following features:
• Overwrite protection (file locking) WebDAV allows users to write, edit, and
save shared documents without overwriting another person’s work, regardless of
which software program or Internet service they use.
• Namespace management Namespace management allows users to manage
Internet files and directories; for example, users can move and copy files using a
familiar paradigm. The process is similar to the way users manage word-processing
files and directories on a local computer.
• Property (metadata) access The WebDAV properties feature is an efficient
means of storing and retrieving metadata. Metadata is information about a Web
document such as the author's name, the copyright, the publication date, and
keywords that Internet search engines use to find and retrieve relevant documents.
• Client side rendering WebDAV uses XML to transfer the data from the server to
the client, allowing it to move the task of HTML rendering from the server to the
client. This essentially distributes the processing and, as a result, increases the
capacity of the server.
• Backward compatibility Exchange supports standard HTTP methods (GET,
POST, PUT, DELETE, OPTIONS) and adds new methods for WebDAV-specific
5
Microsoft Outlook Web Access in Microsoft Exchange 2000 Server
Usage Scenarios
Outlook Web Access offers a turnkey solution for many problems that businesses face
when they attempt to provide messaging to all areas of an organization. The following
sections provide a description of some of the many scenarios in which users can benefit
from the functionality of Outlook Web Access.
Light Messaging
Outlook Web Access provides an excellent alternative to the full Outlook 2000 client.
There are times when the use of a full client is either not required or simply not
practical, such as when you want to use Virtual Private Network (VPN) for messaging
access. Outlook Web Access covers these scenarios in an efficient and cost-effective
manner.
Not every user in an organization requires full messaging functionality. For instance,
the deployment of Microsoft Office or Outlook 2000 may not be justified for computers
that function as task stations or application stations. Nor would the users of these types
of workstations require enhanced messaging functionality.
Knowing the limitations of the Outlook Web Access client can help you determine which
users are candidates for light messaging. In short, those users who would not normally
receive Office 2000 probably do not require Outlook 2000.
Furthermore, Outlook Web Access uses HTTP for transport, making it particularly well
suited for use over high-latency networks.
6
Microsoft Outlook Web Access in Microsoft Exchange 2000 Server
Kiosks
The kiosk scenario places computers in strategic locations such as factory floors,
common areas, conference rooms, and so forth, providing users with access to e-mail,
calendaring, and other basic messaging functions. This type of solution is particularly
attractive if you want to provide general access to posted public folders.
Migration
Providing continuous functionality to users during a migration is another common
challenge for system administrators. Migration should cause as little disruption as
possible. To this end, you can migrate small groups simultaneously and deploy custom
client configurations to achieve a period of coexistence.
Outlook Web Access is a great solution to the problems that arise from client software
coexistence. Although not suitable as a full client replacement, you can easily deploy
Outlook Web Access, thereby allowing users to experience the benefits of Exchange as
soon as the back-end server is operational.
When used in conjunction with Internet Explorer 5.0, the Outlook Web Access interface
is so similar to the full client interface that users adapt quickly to either client.
Migration from other messaging systems to Exchange 2000 Server involves deployment
considerations not encountered during a Microsoft product upgrade. Outlook Web
Access again provides a good interim client access solution, which mitigates the
operational impact normally associated with extended migration periods.
Planning Considerations
Although Outlook Web Access is operational with very little administrative configuration,
you must plan some strategic points before deployment. The points that you must
primarily address are logical and physical server placement, the client authentication
method, and capacity planning.
Network Security
You can install Outlook Web Access in either a single-server or multi-server
environment. In a single-server environment, the client connects directly to the
Exchange server that houses the mailbox. An Exchange virtual root and a public virtual
root are added to Internet Information Services (IIS). These virtual roots point to their
corresponding directories in Exchange.
A multi-server topology involves front-end and back-end servers, offering several
choices for server placement relative to the corporate perimeter network. Back-end
servers almost always reside within the corporate WAN. Front-end servers can be
placed on the perimeter network, in the demilitarized zone, or on the internal network.
For more information about multi-server configurations, see the technical paper
Microsoft Exchange 2000 Server Front-End and Back-End Topology at
http://go.microsoft.com/fwlink/?linkid=4721.
7
Microsoft Outlook Web Access in Microsoft Exchange 2000 Server
Authentication
A number of options are available for Outlook Web Access authentication. Choosing the
appropriate mechanism is usually a matter of the capabilities of the client operating
system and specific security policies.
The default authentication methods for Outlook Web Access in a single-server
environment are Basic and Integrated Windows authentication. You set authentication
on the HTTP virtual servers configured for Outlook Web Access.
Note Outlook Web Access does not have a button for logging off. To log off the
session, the user must close the browser.
The following are the available options for authentication:
• Method 1–Basic Uses clear text to perform a simple challenge and response.
• Method 2–Integrated Windows Leverages the native security attributes of the
client.
• Method 3–Anonymous Provides access to public folders that are intended for
general access.
• Method 4–Secure Sockets Layer (SSL) Although not an authentication method,
SSL provides a secure communications channel that can be used in combination
with any of the above methods.
For more information about authentication methods in a front-end and back-end server
configuration, see the technical paper Microsoft Exchange 2000 Server Front-End and
Back-End Topology at http://go.microsoft.com/fwlink/?linkid=4721.
The following sections describe Outlook Web Access authentication in more detail.
Method 1–Basic
Basic authentication is commonly used on intranets. Unlike the NTLM protocol, which
accepts established users’ identification through the access token, Basic authentication
relies on users to enter their user name, domain, and password to authenticate to
Outlook Web Access.
Pros
• Basic authentication is independent of the browser, which makes it independent of
the platform.
• Basic authentication allows the use of a front-end server.
Cons
• Basic authentication results in the transmission of unencrypted passwords over the
network, which makes it a relatively insecure method of authentication.
• Users must enter their user name, domain, and password each time they log on.
8
Microsoft Outlook Web Access in Microsoft Exchange 2000 Server
Pros
• Integrated Windows authentication encrypts the client’s password, which provides
excellent security.
• Integrated Windows authentication provides native authentication from Windows
networking clients and allows browser access without prompting the user for user
ID and password.
• Windows 2000 clients running Internet Explorer 5.0 use Kerberos.
Cons
• Integrated Windows authentication does not work with browsers other than Internet
Explorer 4 and 5.
• Integrated Windows authentication is not available in a front-end and back-end
server configuration.
Pros
• All browsers support Anonymous access; it is an easy way to provide insecure
access to public folder data.
• A single point of configuration makes administration simple.
Cons
• Anonymous access does not identify users uniquely. Consequently, you cannot track
usage by user.
Pros
• The entire communications session is encrypted.
9
Microsoft Outlook Web Access in Microsoft Exchange 2000 Server
Cons
• SSL requires a substantial amount of overhead for creating and dismantling
sessions. Thus, SSL communications reduce the overall performance of the
authenticating server.
• With Basic, users must enter their user name, domain, and password each time
they log on.
Capacity Planning
Although the improved performance of Outlook Web Access in Exchange 2000 eases
the load on servers, planning the number of users per Outlook Web Access server can
be difficult due to the high dependence on client usage behaviors. For example,
calendar functions require more server processing than message functions.
Outlook Web Access is often used as a complement to full client access. In this case, a
prudent figure for planning concurrent Outlook Web Access usage is approximately 10
percent of the user population.
The following sections give other suggestions for Outlook Web Access planning.
Usage Scenarios
Possible usage scenarios include using Outlook Web Access in conjunction with Outlook,
or using Outlook Web Access on all clients. A limited Outlook Web Access deployment
has fewer concurrent users and thus requires fewer resources. A full Outlook Web
Access deployment expands the requirement to a multi-server environment that uses
separate front-end servers to distribute the client load to several back-end servers.
Calculating resource requirements for Outlook Web Access is similar to capacity
planning for a conventional Exchange deployment — deploy one instance of Outlook
Web Access, and then monitor usage and performance.
Performance counters in System Monitor can provide useful data about:
• Logon attempts per day
• Number of messages read
• Number of messages sent
• Session time
• Outlook Web Access connections
Note Outlook Web Access does not have a button for logging off. To log off the
session, the user must close the browser.
10
Microsoft Outlook Web Access in Microsoft Exchange 2000 Server
Topology
The topology affects the number of users served by a particular server.
If you are using multiple servers in your organization, you should use front-end and
back-end server architecture to deploy Outlook Web Access. With this topology, the
front-end server sends HTTP requests to a back-end server running Outlook Web
Access. All front-end servers appear as one computer to Internet clients. The front-end
server first performs a lookup in the Microsoft Active Directory® directory service to
determine which back-end server receives the request, and then relays the request to
the appropriate server.
The primary advantage of front-end and back-end server architecture is the single
consistent namespace. Users do not need to remember the servers on which their
mailboxes are located, and you do not need to notify users when moving their
mailboxes. The alternative to a single namespace is to provide each user with a specific
server name, as you do in a single-server scenario. This complicates administration and
compromises flexibility because each time you move mailboxes to another server, you
must inform each user. With a single namespace, you can add and remove servers and
move mailboxes from server to server, and users can still use the same URL. Creating a
single namespace also ensures that Outlook Web Access remains scalable as your
organization grows.
Front-end and back-end server architecture provides an additional advantage when
using SSL encryption. Front-end servers can handle all encryption and decryption
processing, which improves network performance by removing processing tasks from
back-end servers.
Load Balancing
When you deploy multiple Outlook Web Access servers, you can balance their load
manually by assigning groups of users to a particular server. Compared with other
techniques, this has a substantial amount of administrative overhead because the
administrator must adjust these groupings manually and monitor the results.
Round robin Domain Name System (DNS) can degrade performance on servers that use
SSL because session state information is maintained on the server. If DNS redirects the
request to another server, that state information is lost and the session must be rebuilt.
The recommendation for load balancing between Outlook Web Access front-end servers
is to use Network Load Balancing available in Windows 2000 or, if very high
performance is required, hardware load balancing.
With Network Load Balancing, all participating server nodes receive client requests.
Each Network Load Balancing server or Outlook Web Access front-end server uses a
special algorithm based on the IP address of the connecting client to determine if the
front-end server should handle the incoming request. If so, it passes the request up the
network layer. If not, it discards the request.
Separate network interface cards (NICs) are recommended for inter-server
communication in a Network Load Balancing environment. Using this private network, a
“heartbeat” is sent between Network Load Balancing servers so that those servers can
11
Microsoft Outlook Web Access in Microsoft Exchange 2000 Server
Setup
Outlook Web Access is installed as part of the default setup of Exchange 2000; it
requires Windows 2000 and IIS 5.0 to be installed.
Table 3 describes the directories relevant to Outlook Web Access that are installed
during Exchange 2000 setup.
12
Microsoft Outlook Web Access in Microsoft Exchange 2000 Server
Exchange 2000 setup creates the following four virtual IIS directories that are used by
Outlook Web Access.
Server Configuration
By default, Outlook Web Access is configured to allow access to users’ mailboxes and
the default public folder tree. However, you can configure the server to provide
customized access for HTTP/WebDAV clients. You can specify items such as:
• Which users can access the server from a Web browser.
• Which authentication methods to allow.
• Which public folders are exposed to users.
To perform this configuration, you use Exchange System Manager and Active Directory
Users and Computers in Microsoft Management Console (MMC). The changes you make
are stored in Active Directory and then applied by the appropriate Exchange server.
Note The virtual Web servers and directories that you create with the Exchange
Administration tool also appear in the Internet Services Manager console.
Configuration changes made in the Exchange Administration tool overwrite changes
made to similar items with Internet Services Manager. Use only Internet Services
Manager to make changes to items that are not available in the Exchange
Administration tool.
13
Microsoft Outlook Web Access in Microsoft Exchange 2000 Server
14
Microsoft Outlook Web Access in Microsoft Exchange 2000 Server
Exchange access, you can remove the Exchange, Exadmin, and public virtual
directories. You can also configure security to disable access. Removing virtual
directories effectively disables management of public folders on that server.
For each virtual server, you can configure multiple virtual directories to point to
different public folders or to the private mailbox store. Keep in mind, however, that
each virtual server should have a corresponding DNS alias to provide named access to
the virtual server. In Exchange 2000, virtual directories can be created within other
virtual directories, allowing you to create your own Web-accessible hierarchy. This
hierarchy can then be traversed through Web folders or used by your Web applications.
Virtual directories are similar to the public folder shortcuts that were used in previous
versions of Exchange.
Front-End Servers
To configure a front-end server in Exchange 2000, you must select the This is a front
end server check box in the server’s Properties dialog box, and then restart the
Exchange and IIS services or restart the computer.
By selecting this check box, you are instructing the HTTP, POP3, and IMAP4
components of Exchange to redirect all traffic to a back-end server that contains the
user’s mailbox. The Exchange Information Store remains intact on the server and is
available to MAPI clients; however, it is not accessed by these three protocols.
Important It is recommended that you configure front-end servers immediately
after the installation of Exchange 2000 Server.
Multilanguage Support
Outlook Web Access in Exchange 2000 supports twenty-three languages natively:
Catalan, Chinese (Traditional), Chinese (Simplified), Czech, Danish, Dutch, English,
Finnish, French, German, Greek, Hungarian, Italian, Japanese, Korean, Norwegian,
Polish, Portuguese (Brazil), Portuguese (Portugal), Russian, Spanish, Swedish, and
Turkish.
Does this paper help you? Give us your feedback. On a scale of 1 (poor) to 5
(excellent), how do you rate this paper?
mailto:[email protected]?subject=Feedback: Microsoft Outlook Web Access in
Microsoft Exchange 2000 Server
15