Calories destroyed: 222.2
Calories destroyed: 222.2
So, in the last entry I mentioned that a lot of people use the delegation feature in Exchange when their workflow and business processes could benefit from the use of sharing permissions instead. Why would it be useful for you to implement this workaround? Let’s clarify a little bit.
Many companies today are finding the RPC over HTTPs (a.k.a. Outlook Anywhere in 2007) scenario to be quite an interesting deployment method. I’m here to tell you, battle scarred and worn… I’ve deployed RPC over HTTPs as the primary topology for an Exchange environment. We’re talking 80% of the population. It presents some unique challenges, but we won’t go into all of those here and now. Ask me later sometime about non-paged pool memory and I’ll share horror stories with you.
As of Exchange 2003 SP2, Microsoft made one of their famous changes in how things operate within Exchange. Apparently, a complaint from customers resulted in the correction of a “security issue.” The issue at hand was that if you were to pull up the “Connection Status” window in Outlook 2003 or 2007, you would see the names of global catalog servers listed for your directory connections. (Ref: to open Connection Status, ctrl-right-click on the Outlook icon in your systray and choose “Connection Status.” The Directory connections are what I’m referring to). In Exchange 2003 SP2, the global catalog references are now handled by the backend servers. Your requests are proxied by those backend mailbox servers on your behalf, therefore you will see your backend mailbox server listed as your Directory server.
If you’re fortunate enough to have an Outlook client on the same basic network as your servers and you can use straight-up MAPI, this doesn’t pose much of a problem to you. However, you should still see below about the hidden delegates limitations.
In an RPC over HTTPS deployment scenario, let’s take an example architecture and consider how your client connections are processed:
client (port 443 connection) –> ISA Server –> Front-end server –> Backend server (proxy request) –> global catalog DC
This means for each directory request, your transaction passes through three servers before reaching the 4th server to be processed. The request is then routed back through that same chain. As you can see, there’s a lot that can happen there.
Now then. Let’s say you have a shared resource calendar that 30 people use as part of a standard process. It could be a conference room, whatever. Let’s say that you decide that all 30 of these people need access to the calendar as a delegate. We won’t talk about whatever silly decisions you made to get you to this conclusion, we’ll just talk about what happens.
You open your Outlook client, log into the resource mailbox, and open Tools/Options/Delegates tab and begin to add your 30 delegates.
Notice that as you start to add delegates, things start to slow down around the 10th or 15th delegate or so. Open your connection status window and note that your Directory queries are running unusually high. Keep adding those delegates and keep watching your client slow to a crawl – but watch those directory queries go into the thousands.
If you’re lucky enough to get to punch the OK button to save your changes, you’re likely going to be sitting there for another 30-45 minutes. If you’re in a resource forest setup, you could be waiting up to an hour or 90 minutes or so. No, I’m not kidding. It will take that long to process your delegates changes.
Now let’s remember, I did say that if you’re lucky enough to have a direct MAPI connection to your Exchange environment, chances are this isn’t going to happen to you. You will, however, run into the unwritten limitations.
So by this point, you’re probably wondering what has happened to your client. You may even perform an “end task” on Outlook… which, honestly, wouldn’t be a very good idea at this point. You really need to let the client complete, regardless of how hosed it appears. If your Outlook client ever does finish, I challenge you to open Tools/Options/Delegates tab and endure another long wait with your connection status window open. I would wager that your Directory connections spin off into the five digit thousands or so.
Alright, so now you see part of the problem. The customer has a business process that led them to want to use this feature and the feature is essentially broken for a large number of delegates. If you’re like any other sysadmin out there, you’re probably on the phone to Microsoft by now.
Here’s what you’ll be told. Microsoft has actually only tested the delegates feature with no more than 4 delegates. That’s right – 4 delegates. There you have it – an undocumented rule on how many delegates you should have – no more than 4.
It gets better. Delegates count as part of your 32kb limit per mailbox on the rules. If you add too many delegates, you may find yourself out of room to add rules to the mailbox – or vice versa.
Microsoft is going to use this as an out – because quite frankly, up until now, no one has tried to use the delegates feature the way you’re using it, etc. etc. You’re screwed. You now get to play the customer management game and convince them that right-clicking on the calendar folder and adding permissions on the Sharing tab is what they really meant to do.
But you get to convince them of that after you remove all of the delegates… and that means opening that tab and letting it sit overnight, just so you can remove the delegates.
In a resource forest setup, it’s important to note that the identities of your users come from the trusted forests, not the forest that your Exchange organization is built in.
Oh… wait… what do you mean what’s a resource forest?
A resource forest is a Microsoft-supported method for creating a brand new Active Directory and using it to deploy services separately from your user accounts. There may be several technical or political reasons to do this – but should you result in this design decision, you need to make sure that your enterprise has several things going right for it in the process area.
In a resource forest with Exchange deployed into it, you still have user accounts – but they are disabled. They are empty “zombie” user accounts. The “soul” of the account is referenced back to the trusted userid in the trusted forest. How does one do that, you might ask? Create an account and disable it – then right-click on the account and choose “Exchange tasks.” Choose “Associate with external account” and you will do just that – associate the soul of a user with a zombie in the resource forest.
This presents some unique challenges.
When assigning permissions or delegate settings in your Exchange forest, the SID that is associated with the ACL is the SID of the user in the trusted forest, not the SID of the disabled zombie account. This means that if you assign delegates or permissions on a user and the userid is destroyed in the trusted resource forest, you now have a “ghost” – or more specifically, a “ghost SID.”
Take the following example:
Bing, you have a ghost SID problem. Can you tell me which step created the NDR/ghost SID issue? That’s right, class… it’s when Roger was fired for looking at pr0n. When Roger was fired and his SID was destroyed, the SID was still associated in Julie’s mailbox but no longer resolves correctly. Thus, when Brenda sent the invite, Exchange tried to “do the right thing” but it sent a copy of the invite to a ghost.
Now you might see the light with what I mentioned earlier… if you’re going to have this kind of setup, make sure your enterprise has the processes together. What should have happened is that if they deleted Roger’s contoso.com account, they should also delete his mail.breadandbutter.com account. Without that deletion, no one has any clue that Roger is MIA… including Exchange.
How do you resolve it? One of two ways:
1. Open Julie’s delegates settings and remove the SID listed there
2. Open Julie’s mailbox with pfdavadmin and remove the SID listed there on the calendar folder
You will see Roger’s SID instead of his name because the domain is trying to resolve Roger’s SID on the trusted domain, not the resource forest. Since the SID does not resolve, all you see is the SID itself. That indicates a problem.
Now then. Combine this issue with the problem of people putting 30-40 delegates on a mailbox and you have the makings for a real customer management crisis. The devil’s in the design and documentation, folks. Pay attention to what your users are doing and why. Otherwise, they could work themselves into a very confusing scenario much like this and hey, any confusing scenario equals more stress for you.
Write them a spiffy Word document that steers them clear of the delegates tab and you’ll be sitting Tazo tea the rest of the afternoon. Assuming those sheep read documentation, that is. We all know what to think about that, don’t we?
There’s a monster post on the Exchange blog about problems with assigning delegates and/or updating distribution list memberships from the Outlook client.
I can say that we’ve definitely suffered from some of the goofy issues in this article. One item they do not cover is that as a general rule, you should not be assigning more than 4 delegates to your mailbox if you can help it. All too often, people use the delegation feature to work through a business process that can be solved with simple sharing permissions.
But I digress. Here’s the blog post.
So, I’m sitting there watching TV, right? A bumper in the commercial comes from the local TV station and it proclaims that part of the sponsorship was from the “Alabama Chicken and Egg Festival.”
Immediate image springs to mind of a bunch of ruby-throated individuals sitting around in lawn chairs, pondering quietly.
Not too very long ago I came to the realization that in the past, I didn’t use computers to do much. It could be that I didn’t really have much to do aside from playing games and writing the occasional resume’, but as far as productivity goes, I’d never quite been in a job that required me to use the computer to be productive, in a way of speaking. I was never required to pump out much in the way of Excel spreadsheets, or Access databases. I was never required to do much more than the occasional Word document.
For that very reason, I never really found myself developing any methods to keep my affairs in order on the PC. I had general locations to store items and data, but I never actually used it. I desired to do creative things like make movies or work scripts, but I never actually had the motivation to try (those of you who know me well know that my motivation to do anything creative started to die around 1999 – I am workng to ressurrect it somehow).
My jobs mainly required just for me to fix other computers so other people could be productive. So for me to be productive, I just had to fix things so other people could be productive.
Little did I know that I was developing a few rules under the covers for myself in managing day-to-day tasks like e-mail or a workflow for items on the computer. Little did I know that if I didn’t stick to this workflow, I often found myself feeling overwhelmed.
I decided on the way in to work today that I might share some of these rules that I have with you, the reader, just in case any of it means shit to you. If it helps, fantastic. If not, sorry.
It should also be pointed out that part of the reason I am suddenly interested in this is because since my conversion to a wannabe-Mac-user, I’ve found myself wanting to use the computer to do productive things instead of playing games or fixing it. That’s a positive impact to me; one that I’m hoping will revive that creative spirit.
In the meantime, look to me for future articles about:
I should also point out that I’ve become quite interested in the aspect of productivity. Probably my number one rule of late has been to find and develop two workflows – one for professional day-to-day jobbing and one for personal projects. Keeping them separate has been important to me, regardless of the fact that occasionally one invades the other.
All of these are topics we’ll cover. Should I perhaps make a separate category for this mess so you can filter it out if you don’t want to read it? Thoughts?