就Exchange中客戶端的認證方式作一個總結。html
默認狀況下若是Exchange環境中若是搭建了CAS Array的話,客戶使用是使用NTLM認證方式。若是沒有構建CAS Array,那麼客戶端是使用Kerberos認證方式的。總結以下。ios
Scenariosapi |
Default Authentication 服務器 |
Support Kerberos?ide |
CAS Arrayui |
NTLMspa |
Yesscala |
None CAS Arrayserver |
Kerberoshtm |
Yes |
每每出於以下的需求,客戶須要在CAS Array的環境部署Kerberos。
ØKerberos authentication is necessary for your local security policy.
ØYou're encountering or anticipating NTLM scalability issues, for example, when direct MAPI connectivity to the RPC Client Access service causes intermittent NTLM failures.
ØIn large-scale customer deployments, NTLM can cause bottlenecks on Client Access servers that can result in sporadic authentication failures. Services that use NTLM authentication are more sensitive to Active Directory latency issues. These lead to authentication failures when increases in the rate of Client Access server requests are encountered.
在CAS Array的環境部署Kerberos認證的,須要在服務器端以及AD中作較多變動,具體步驟不在詳談,可參考以下文章。之前兩篇爲主,其它爲輔。
Kerberos authentication for MAPI client connection to a Client Access server array
http://support.microsoft.com/kb/2688772/en-us
Configuring Kerberos Authentication for Load-Balanced Client Access Servers
http://technet.microsoft.com/en-us/library/ff808312.aspx
Using Kerberos with a Client Access Server Array or a Load-Balancing Solution
http://technet.microsoft.com/en-us/library/ff808313.aspx
pre-required knowledge
======================
Øauto discovery
ØKerberos authentication
ØCAS Array