Configure Exchange Connection
Email Tracking Mailbox
This is the mailbox that email transactions are sent to be processed and is the mailbox that was created in the pre-requisite setup previously. The Email Tracking Service will monitor this mailbox for new transactions so people will have their emails flagged as being ‘Transferred to SharePoint’:
These are the credentials of the account that has impersonation access to the user’s mailboxes and is the account that was created in the pre-requisite setup previously:
If you are using Exchange online, you need to put the email address as the username whereas on-premise Exchange requires a username in the format ‘domain\username’. An example of online credentials is below:
Exchange Discovery – Single Exchange Web Service Endpoint
Use this option if you only have:
- A single Exchange Server
- Multiple Exchange servers but all users access via the same Exchange Web Services (EWS) URL e.g. https://mydomain.com/EWS/Exchange.asmx
- Obtain EWS URL using Autodiscover – you should check this option.
As your environment only has a single EWS endpoint (URL) the overhead of looking it up dynamically using Autodiscover is minimal. This lookup happens once at service startup and is then cached while the service is running.
- EWS URL – if Autodiscover is not configured in your environment, you may explicitly provide the EWS URL instead
Exchange Discovery – Multiple Exchange Web Service Endpoints
Use this option if you only have: Multiple Exchange servers where the servers each have their own Exchange Web Services (EWS) URL e.g. https://server1.mydomain.com/EWS/Exchange.asmx and https://server2.mydomain.com/EWS/Exchange.asmx
When there are multiple EWS endpoints (URLs), Active Directory is used to efficiently associate users to Exchange servers. This relies on the LDAP service to provide AD lookup capabilities. The remaining settings determine how this lookup is performed.
- Perform Active Directory lookup using default LDAP path – Use this option if possible.
This will automatically discover the LDAP service to use, based on the domain that the server running the service belongs to.
Only specify an explicit LDAP path, if you need to query Active Directory in a different domain.
To specify an explicit LDAP path, you must use the LDAP protocol and specify the server and root of the query e.g. LDAP://192.168.104.16/DC=scinaptic2013,DC=com
- Authenticate with Active Directory using default credentials – this determines the credentials used to perform the LDAP lookup.
You should normally use the default credentials unless you are forced to use explicit credentials (such as when you are querying Active Directory in a different domain)
Allow SSL certificates without validation – By default, any calls made to Exchange require an SSL certificate (made over https protocol). The service will validate the returned SSL certificate to ensure it is trusted. It is recommended to not check this option unless your security requirements mean that you can run without SSL validation.