In this post, i will show you the basic configuration of Client Access Server role.
Client Access Server Role Configurations
1. Client Access Array
Create CAS Array
1.
In the AD DNS, create a new host A records. Name the record to OUTLOOK01.internal.local. Set the TTL to 5 minutes.
2.
Open the EMS, and enter the following cmdlet
New-ClientAccessArray -Fqdn "OUTLOOK01.internal.local" -Site "HQ" -Name "OUTLOOK01.internal.local"
3.
Enter the following cmdlet to verify
Get-ClientAccessArray "OUTLOOK01.internal.local" | fl Name, Members
Set Mailbox Database into Client Access Array
1.
Enter the following cmdlet to set mailbox database
Set-MailboxDatabase “<DATABASE NAME>” –RpcClientAccessServer OUTLOOK01.internal.local
Replace the <DATABASE NAME> = the database name of the mailbox database
2.
Enter the following cmdlet to verify
Get-MailboxDatabase | fl Name, RpcClientAccessServer
2. Certification Configuration
Generate New Exchange Certificate
1. Enter the following cmdlet via EMS in EXCH01
Set-Content -path "d:\mail_cert.req" -Value (New-ExchangeCertificate -GenerateRequest -KeySize 2048 -SubjectName "C=XX, S=XX, L=XX, O=XX, OU=IT, CN=mail.external.com" -DomainName mail.external.com, autodiscover.external.com, rms.external.com -PrivateKeyExportable $True)
2. The request file will be generated into d:\. Get the mail_cert.req file and submit to the authorize certificate authority. During this setup, Digicert was selected, thus submit the mail_cert.req to DigiCert.
3. DigiCert will issue a certificate after the submission the mail_cert.req file. Get the certificate and copy into EXCH01.
4. In the EMC, select “This is a pending certificate signing request (CSR)” and choose “Complete Pending Request”.
5. Browse the certificate that you have copied into EXCH01 in step 3.
6. Finish
7.
You have completed the certificate request
Export Certificate
1.
In the EMC, select the newly requested certificate and choose “Export Exchange Certificate”.
2.
Name the export certificate and store into a location. This certificate will be used for EXCH02, RMS01, RMS02, UAG01 and UAG02. Enter a password to protect certificate. The entered password is used for importing.
3.
Finish. Copy the exported certificate into EXCH02, RMS01, RMS02, UAG01 and UAG02.
Import Certificate
1.
In the EMC, Select EXCH02 and choose “Import Exchange Certificate”
2.
Browse for the certificate and enter the password.
3.
Ensure the EXCH02 is listed in the server list
4.
Click “Import”
5.
Finish
6.
Certificate has been imported into EXCH02
Assign Service to Certificate
1. Select the newly imported certificate and choose “Assign Services to certificate”
2. Ensure both EXCH01 and EXCH02 were selected
3. Assign and select the required services and Next
4.
Assign
5. Yes to All to confirm the action for both windows.
6. Finish
7. The services was assigned to certificate
3. Outlook Web App Configuration
NOTE: Both EXCH01 and EXCH02 have the identical configuration.
4. Exchange Control Panel Configuration
NOTE: Both EXCH01 and EXCH02 have the identical configuration.
5. Exchange ActiveSync Configuration
NOTE: Both EXCH01 and EXCH02 have the identical configuration.
6. Offline Address Book Configuration
NOTE: Both EXCH01 and EXCH02 have the identical configuration.
1.
Open the EMS and enter the following cmdlet
Set-OabVirtualDirectory -Identity EXCH01\"OAB (Default Web Site)" -InternalUrl https://mail.external.com/OAB -BasicAuthentication:$True
Set-OabVirtualDirectory -Identity EXCH02\"OAB (Default Web Site)" -InternalUrl https://mail.external.com/OAB -BasicAuthentication:$True
2.
Enter the following cmdlet to verify
Get-OabVirtualDirectory | fl name,server,internalurl,externalurl,*authen*

7. Exchange Web Service Configuration
NOTE: Both EXCH01 and EXCH02 have the identical configuration.
1.
Open the EMS and enter the following cmdlet
Set-WebServicesVirtualDirectory -Identity EXCH01\"EWS (Default Web Site)" -InternalUrl https://mail.external.com/ews/exchange.asmx -BasicAuthentication:$True
Set-WebServicesVirtualDirectory -Identity EXCH02\"EWS (Default Web Site)" -InternalUrl https://mail.external.com/ews/exchange.asmx -BasicAuthentication:$True
2.
Enter the following cmdlet to verify
Get-WebServicesVirtualDirectory | fl name,server,internalurl,externalurl,*authen*
8. Outlook Anywhere Configuration
NOTE: Both EXCH01 and EXCH02 have the identical configuration.
1. In the EMC, select EXCH01 and choose “Enable Outlook Anywhere”
2. Enter external hostname mail.external.com and choose basic authentication
3. Finish
4. Repeat the step 1 to step 3 for EXCH02
9. Autodiscover Service Configuration
NOTE: Both EXCH01 and EXCH02 have the identical configuration.
1.
Enter the following to set the AutodiscoverServiceInternalUri
Set-ClientAccessServer -Identity EXCH01 -AutoDiscoverServiceInternalUri https://mail.external.com/Autodiscover/Autodiscover.xml
Set-ClientAccessServer -Identity EXCH02 -AutoDiscoverServiceInternalUri https://mail.external.com/Autodiscover/Autodiscover.xml
2.
Enter the following cmdlet to verify
Get-ClientAccessServer | fl name,server,*uri*
10. Configure Change Password Feature in OWA
NOTE: Both EXCH01 and EXCH02 have the identical configuration.
1.
Logon to EXCH01 and navigate to Start > Run > regedit. Locate the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MSExchange OWA
2.
Create the following DWORD (32-bit) value
3.
Name it to ChangeExpiredPasswordEnabled. The value type will be REG_DWORD. Set the value of ChangeExpiredPasswordEnabled to 1. Exit Registry Editor
4.
Navigate to Start > Run > Services.msc. Restart IIS
5.
Repeat step 1 to step 4 for EXCH02