SlideShare a Scribd company logo
Kayxo Exchange Appliance Connector
Technical Whitepaper
Understanding Kayxo Exchange Appliance Connector for Google Search Appliance




                                                                          1.2.0.14
Table of Contents
Technical Whitepaper Abstract .......................................................................................... 2
Prerequisites, Skills and Knowledge ................................................................................... 2
Requirements ................................................................................................................. 2
What Kayxo Exchange Appliance Connector Provides ........................................................... 3
Solution Scenarios ........................................................................................................... 3
Technical Overview .......................................................................................................... 4
   KEAC Layout ............................................................................................................... 5
Security ......................................................................................................................... 6
   Serving Results to the User ........................................................................................... 6
Configuration .................................................................................................................. 7




                   Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
                   Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
                   Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                                 Page 1
Technical Whitepaper Abstract
The Google Search Appliance (GSA) is an integrated hardware/software solution, creating a
single point for discovering information within corporate networks, intranets, and Web sites.
The Kayxo Exchange Appliance Connector for Google Search Appliance (KEAC) extends the
Google Search Appliance, enabling users to search for emails, contacts, appointments, tasks,
notes and documents stored in Microsoft Exchange, according each item’s security.
This search feature takes advantage of the corporate search power of the Google Search
Appliance and selectively unlocks the content stored in Microsoft Exchange
This paper introduces the latest release of the Kayxo Exchange Appliance Connector for Google
Search Appliance, providing the technical user with a detailed description of the ways it can be
used.



Prerequisites, Skills and Knowledge
To install, configure and administrate this product you must be at least moderately experienced
with the use of the following technologies:
       Google Search Appliance.
       Windows Server 2003.
       Internet Information Server.
       SQL Server.
       Performance monitoring and optimization techniques.



Requirements
In order to be installed, the Kayxo Exchange Appliance Connector for Google Search Appliance
requires the following:

   1.   Microsoft Exchange 2007 (32 / 64 bits) or Microsoft Exchange 2003.
   2.   Google Search Appliance (any version except Mini).
   3.   Windows 2003 Server (32 / 64 bits) with .Net 3.5 Framework.
   4.   Microsoft Visual C++ 2008 Redistributable Package (x86).
   5.   Internet Information Server 6.0.
   6.   Microsoft SQL 2008/2005/2000.
   7.   MAPI Libraries. You can install Microsoft Outlook 2003 or Microsoft Outlook 2007 in the
        machine that will be the KEAC server in order to install the MAPI Libraries.




              Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
              Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
              Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                            Page 2
What Kayxo Exchange Appliance Connector Provides
      Support for Microsoft Exchange Server 2003 and Exchange Server 2007.
      Support of Public Folders and mailboxes in any language.
      Allows to mash information already available from ECM systems, CRMs and others with
       information in Microsoft Exchange in a single search, ranked according to Google
       relevance criteria.
      Honors the Microsoft Exchange’s sharing policies or other Company policies. This means
       that only if you have permission to see something you will find it through the Google
       Search Appliance. If you don’t have permission to see it, it will not appear in the search
       results.
      Increases the value of the investment made in the Enterprise Search Platform.



Solution Scenarios

Some relevant scenarios where the Kayxo Exchange Appliance Connector for Google Search
Appliance can be used:
      Hierarchical Search: allow managers to search inside the contact, mail or task folders of
       their employees. As KEAC searches in all Microsoft Exchange Folders where the manager
       has been granted permission, the data is available no matter which of his employees has
       it.
      Document public Search: Allow the whole company to search for the content of every
       attachment of any Microsoft Exchange object that has been declared as public.
      Department Knowledge Sharing: A particular company department can share all of its
       contacts and mail data so all of its members can access them. This scenario applies
       specially to Call Centers, Technical Support, Sales, etc.




              Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
              Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
              Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                            Page 3
Technical Overview
The KEAC architecture is build around two processes:
      The push process which retrieves information from Microsoft Exchange server and loads
       it into the GSA box.
      The authorization and retrieval process that allows users to access a particular Microsoft
       Exchange server message.


In the push process the Synchronizer Service executes an incremental synchronization for each
mailbox configured (only selected folders are synchronized), and stores in the KEAC database
the primary key for each inserted or MAPI message (mail, contacts, attachments, appointments
or task). The GSA loader process takes each of these keys executes a query and sends the final
Microsoft Exchange object to the GSA Server box. Both the Query Engine and the Synchronizer
uses MAPI for the underlying communication, which is the most efficient protocol to access the
Exchange Server and is also used by Microsoft Outlook.



                                                                                         GSA
                             Query Engine
                                                                                        Loader



                              Synchronizer
                                Service

                                                                                 Housekeeping
 Exchange server                                                                   services                           GSA server




                                                            Figure 1



The first step in the retrieval process is to authorize the caller’s access to the specified message.
If the user folder is configured to have public access the Authorization Service allows the access
to the item and passes the request to the Query Engine which constructs the response and
sends it back to the client.



                                                             Authorization
                         Query Engine
                                                               service




 Exchange server                                                                       GSA server




                                                            Figure 2


                   Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
                   Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
                   Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                                 Page 4
If the folder is marked as “non public”, the Authorization service retrieves in real time the
mailbox folder access control list from Microsoft Exchange and checks the caller’s access.

To avoid stressing the Microsoft Exchange Server box the service implements a cache to store
this information, given that a user can experience a minimal synchronization delay when he
browses information.


You must take into account that the ACL information is modified when the owner of the mailbox
changes the sharing permissions using Microsoft Outlook or when the Microsoft Exchange
Administrator executes security maintenance tasks.



KEAC Layout
The adapter components and services leverage on:
      Windows OS.
      Microsoft SQL Server 2000 (or above).
      MAPI.
      IIS.
      NET framework 3.5.



KEAC Layout

                      Synchronizer         GSA          Housekeeping         Authorization
   Query Engine
                        service           Loader          services             service


              MAPI                                        NET framework


                                    Microsoft SQL Server                           IIS




                                                           Figure 3




                  Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
                  Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
                  Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                                Page 5
Security
KEAC makes documents and objects stored in your Microsoft Exchange discoverable through
search. In addition to public content that is available to everyone, the search appliance can
crawl and index documents that require authentication. To protect confidentiality, at serving
time, KEAC determines if the user who is performing the search is authorized to view each
document before the search result is shown. This is because the KEAC honours the Microsoft
Exchange’s sharing and security policies. This means: only if you have permission to see it you
will find it through the Google Search Appliance. If you don’t have permission to see it, it will
not appear in search results.

It's important to understand that when controlled-access content is labeled as "public" in the
index, it will be shown in all users' search results. Because public search results are served from
the index without checking for authorization, users can discover all public content that the
search appliance has access to, regardless of whether they have authorization to view that
content or not.



Serving Results to the User
When a user performs a search request, the search appliance performs two checks before
serving secure content:
      The search appliance acquires the user's credentials to enable impersonation, or
       performs an authentication check to establish the user's identity.

      The search appliance impersonates the user, or performs an authorization check to
       determine whether the user can view the content. If the user is authorized to view the
       content, the content will appear in the user's search results.

Here we will explain the second process. If a secure content item fails, the search appliance
removes it from the list of results.
The following diagram shows the authorization sequence:



            Browser                        GSA                          Authorization
                                                                                                    Query Engine
                                                                          Module


                      Search()
                                                     Authorize (item)




                                                      Allow / Deny

                       Result




                                                       Figure 4




              Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
              Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
              Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                            Page 6
Configuration
Taking into account the complexity of the solution, the configuration process is little bit wide
and detailed. Due to the big number of processes that take part on this solution several
accounts and profiles have to be created and configured. This process could be difficult, but to
simplify the administrators’ tasks, the adapter has configuration consoles that make the
administration process more user-friendly.




                                                       Figure 5




                                                       Figure 6




              Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
              Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
              Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                            Page 7
In addition KEAC provides a Mailbox Configuration Tool. This tool uses the MAPI profile
configured previously to load and list all the folders and mailboxes that are accessible to KEAC’s
configured account. With this tool you can configure which folders and mailboxes will be
monitored and made available through the GSA searches.
The mailboxes and folders together with Public Folders are displayed in a tree-like structure
where the user can select which folders are going to be monitored and made available to the
GSA.




                                                          Figure 7




Kayxo is a registered trademark of Quantum System
Microsoft Outlook is a registered trademark of Microsoft Corporation in the United States and/or other countries.

                 Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101
                 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101
                 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99



                                                                                                                               Page 8

More Related Content

What's hot

Material modulo03 asf6501(6425-b_02)
Material   modulo03 asf6501(6425-b_02)Material   modulo03 asf6501(6425-b_02)
Material modulo03 asf6501(6425-b_02)
JSantanderQ
 
Material modulo01 asf6501(6419-a_01)
Material   modulo01 asf6501(6419-a_01)Material   modulo01 asf6501(6419-a_01)
Material modulo01 asf6501(6419-a_01)
JSantanderQ
 
Material modulo04 asf6501(6425-a_01)
Material   modulo04 asf6501(6425-a_01)Material   modulo04 asf6501(6425-a_01)
Material modulo04 asf6501(6425-a_01)
JSantanderQ
 
Material modulo02 asf6501(6425-b_01)
Material   modulo02 asf6501(6425-b_01)Material   modulo02 asf6501(6425-b_01)
Material modulo02 asf6501(6425-b_01)
JSantanderQ
 
Ob loading data_oracle
Ob loading data_oracleOb loading data_oracle
Ob loading data_oracle
Steve Xu
 

What's hot (8)

An efficient concurrent access on cloud database using secureDBAAS
An efficient concurrent access on cloud database using secureDBAASAn efficient concurrent access on cloud database using secureDBAAS
An efficient concurrent access on cloud database using secureDBAAS
 
MX-Sync Brochure
MX-Sync BrochureMX-Sync Brochure
MX-Sync Brochure
 
Material modulo03 asf6501(6425-b_02)
Material   modulo03 asf6501(6425-b_02)Material   modulo03 asf6501(6425-b_02)
Material modulo03 asf6501(6425-b_02)
 
Material modulo01 asf6501(6419-a_01)
Material   modulo01 asf6501(6419-a_01)Material   modulo01 asf6501(6419-a_01)
Material modulo01 asf6501(6419-a_01)
 
Material modulo04 asf6501(6425-a_01)
Material   modulo04 asf6501(6425-a_01)Material   modulo04 asf6501(6425-a_01)
Material modulo04 asf6501(6425-a_01)
 
Material modulo02 asf6501(6425-b_01)
Material   modulo02 asf6501(6425-b_01)Material   modulo02 asf6501(6425-b_01)
Material modulo02 asf6501(6425-b_01)
 
IRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud StorageIRJET - Confidential Image De-Duplication in Cloud Storage
IRJET - Confidential Image De-Duplication in Cloud Storage
 
Ob loading data_oracle
Ob loading data_oracleOb loading data_oracle
Ob loading data_oracle
 

Viewers also liked

Review of Jan Servaes’ Development Communication Theory
Review of Jan Servaes’ Development Communication TheoryReview of Jan Servaes’ Development Communication Theory
Review of Jan Servaes’ Development Communication Theory
City University of Hong Kong
 

Viewers also liked (11)

Happy New Year 2010 !!!
Happy  New  Year 2010 !!!Happy  New  Year 2010 !!!
Happy New Year 2010 !!!
 
DIGITAL PEN AND PAPER SOLUTION
DIGITAL PEN AND PAPER SOLUTIONDIGITAL PEN AND PAPER SOLUTION
DIGITAL PEN AND PAPER SOLUTION
 
中国蓝Vs中国黄
中国蓝Vs中国黄中国蓝Vs中国黄
中国蓝Vs中国黄
 
Preparing AAP Training
Preparing AAP TrainingPreparing AAP Training
Preparing AAP Training
 
中国蓝Vs中国黄
中国蓝Vs中国黄中国蓝Vs中国黄
中国蓝Vs中国黄
 
Review of Jan Servaes’ Development Communication Theory
Review of Jan Servaes’ Development Communication TheoryReview of Jan Servaes’ Development Communication Theory
Review of Jan Servaes’ Development Communication Theory
 
中国蓝Vs中国黄
中国蓝Vs中国黄中国蓝Vs中国黄
中国蓝Vs中国黄
 
Citrix Presentation
Citrix PresentationCitrix Presentation
Citrix Presentation
 
Employee Relations
Employee RelationsEmployee Relations
Employee Relations
 
Affirmative Action Presentation
Affirmative Action PresentationAffirmative Action Presentation
Affirmative Action Presentation
 
Palliative Care Presentation
Palliative Care PresentationPalliative Care Presentation
Palliative Care Presentation
 

Similar to KEAC - Whitepaper - Kayxo Exchange Adapter for BizTalk

Windowsserver2003twpppt
Windowsserver2003twppptWindowsserver2003twpppt
Windowsserver2003twpppt
Mizuhashi Yuki
 

Similar to KEAC - Whitepaper - Kayxo Exchange Adapter for BizTalk (20)

KEAB - Technical Whitepaper - Kayxo Exchange Adapter for BizTalk
KEAB - Technical Whitepaper - Kayxo Exchange Adapter for BizTalk KEAB - Technical Whitepaper - Kayxo Exchange Adapter for BizTalk
KEAB - Technical Whitepaper - Kayxo Exchange Adapter for BizTalk
 
Integration Approach for MES
Integration Approach for MESIntegration Approach for MES
Integration Approach for MES
 
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
Database@Home : Data Driven Apps - Data-driven Microservices Architecture wit...
 
Exchange 2010 SP2 & Tips
Exchange 2010 SP2 & TipsExchange 2010 SP2 & Tips
Exchange 2010 SP2 & Tips
 
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
 
Exchange mailbox admin
Exchange mailbox adminExchange mailbox admin
Exchange mailbox admin
 
Enhancing Apache Kafka for Large Scale Real-Time Data Pipeline at Tencent | K...
Enhancing Apache Kafka for Large Scale Real-Time Data Pipeline at Tencent | K...Enhancing Apache Kafka for Large Scale Real-Time Data Pipeline at Tencent | K...
Enhancing Apache Kafka for Large Scale Real-Time Data Pipeline at Tencent | K...
 
KP Partners: DataStax and Analytics Implementation Methodology
KP Partners: DataStax and Analytics Implementation MethodologyKP Partners: DataStax and Analytics Implementation Methodology
KP Partners: DataStax and Analytics Implementation Methodology
 
How to Wield Kentico 9 in the Real World
How to Wield Kentico 9 in the Real WorldHow to Wield Kentico 9 in the Real World
How to Wield Kentico 9 in the Real World
 
Business case study how one product deployed in 3 diverse enterprises reaped ...
Business case study how one product deployed in 3 diverse enterprises reaped ...Business case study how one product deployed in 3 diverse enterprises reaped ...
Business case study how one product deployed in 3 diverse enterprises reaped ...
 
RFP-Final3
RFP-Final3RFP-Final3
RFP-Final3
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
Kafka and event driven architecture -apacoug20
Kafka and event driven architecture -apacoug20Kafka and event driven architecture -apacoug20
Kafka and event driven architecture -apacoug20
 
Kafka and event driven architecture -og yatra20
Kafka and event driven architecture -og yatra20Kafka and event driven architecture -og yatra20
Kafka and event driven architecture -og yatra20
 
Technology Overview
Technology OverviewTechnology Overview
Technology Overview
 
Rha cluster suite wppdf
Rha cluster suite wppdfRha cluster suite wppdf
Rha cluster suite wppdf
 
Windowsserver2003twpppt
Windowsserver2003twppptWindowsserver2003twpppt
Windowsserver2003twpppt
 
EO-TH-v2-End-Users.pptx
EO-TH-v2-End-Users.pptxEO-TH-v2-End-Users.pptx
EO-TH-v2-End-Users.pptx
 
Office 365 introduction and technical overview
Office 365 introduction and technical overviewOffice 365 introduction and technical overview
Office 365 introduction and technical overview
 
Catalogic ECX: Snapshot and Replication Automation for Pure Storage
Catalogic ECX: Snapshot and Replication Automation for Pure StorageCatalogic ECX: Snapshot and Replication Automation for Pure Storage
Catalogic ECX: Snapshot and Replication Automation for Pure Storage
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Ransomware Mallox [EN].pdf
Ransomware         Mallox       [EN].pdfRansomware         Mallox       [EN].pdf
Ransomware Mallox [EN].pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath New York Community Day in-person event
UiPath New York Community Day in-person eventUiPath New York Community Day in-person event
UiPath New York Community Day in-person event
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

KEAC - Whitepaper - Kayxo Exchange Adapter for BizTalk

  • 1. Kayxo Exchange Appliance Connector Technical Whitepaper Understanding Kayxo Exchange Appliance Connector for Google Search Appliance 1.2.0.14
  • 2. Table of Contents Technical Whitepaper Abstract .......................................................................................... 2 Prerequisites, Skills and Knowledge ................................................................................... 2 Requirements ................................................................................................................. 2 What Kayxo Exchange Appliance Connector Provides ........................................................... 3 Solution Scenarios ........................................................................................................... 3 Technical Overview .......................................................................................................... 4 KEAC Layout ............................................................................................................... 5 Security ......................................................................................................................... 6 Serving Results to the User ........................................................................................... 6 Configuration .................................................................................................................. 7 Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 1
  • 3. Technical Whitepaper Abstract The Google Search Appliance (GSA) is an integrated hardware/software solution, creating a single point for discovering information within corporate networks, intranets, and Web sites. The Kayxo Exchange Appliance Connector for Google Search Appliance (KEAC) extends the Google Search Appliance, enabling users to search for emails, contacts, appointments, tasks, notes and documents stored in Microsoft Exchange, according each item’s security. This search feature takes advantage of the corporate search power of the Google Search Appliance and selectively unlocks the content stored in Microsoft Exchange This paper introduces the latest release of the Kayxo Exchange Appliance Connector for Google Search Appliance, providing the technical user with a detailed description of the ways it can be used. Prerequisites, Skills and Knowledge To install, configure and administrate this product you must be at least moderately experienced with the use of the following technologies:  Google Search Appliance.  Windows Server 2003.  Internet Information Server.  SQL Server.  Performance monitoring and optimization techniques. Requirements In order to be installed, the Kayxo Exchange Appliance Connector for Google Search Appliance requires the following: 1. Microsoft Exchange 2007 (32 / 64 bits) or Microsoft Exchange 2003. 2. Google Search Appliance (any version except Mini). 3. Windows 2003 Server (32 / 64 bits) with .Net 3.5 Framework. 4. Microsoft Visual C++ 2008 Redistributable Package (x86). 5. Internet Information Server 6.0. 6. Microsoft SQL 2008/2005/2000. 7. MAPI Libraries. You can install Microsoft Outlook 2003 or Microsoft Outlook 2007 in the machine that will be the KEAC server in order to install the MAPI Libraries. Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 2
  • 4. What Kayxo Exchange Appliance Connector Provides  Support for Microsoft Exchange Server 2003 and Exchange Server 2007.  Support of Public Folders and mailboxes in any language.  Allows to mash information already available from ECM systems, CRMs and others with information in Microsoft Exchange in a single search, ranked according to Google relevance criteria.  Honors the Microsoft Exchange’s sharing policies or other Company policies. This means that only if you have permission to see something you will find it through the Google Search Appliance. If you don’t have permission to see it, it will not appear in the search results.  Increases the value of the investment made in the Enterprise Search Platform. Solution Scenarios Some relevant scenarios where the Kayxo Exchange Appliance Connector for Google Search Appliance can be used:  Hierarchical Search: allow managers to search inside the contact, mail or task folders of their employees. As KEAC searches in all Microsoft Exchange Folders where the manager has been granted permission, the data is available no matter which of his employees has it.  Document public Search: Allow the whole company to search for the content of every attachment of any Microsoft Exchange object that has been declared as public.  Department Knowledge Sharing: A particular company department can share all of its contacts and mail data so all of its members can access them. This scenario applies specially to Call Centers, Technical Support, Sales, etc. Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 3
  • 5. Technical Overview The KEAC architecture is build around two processes:  The push process which retrieves information from Microsoft Exchange server and loads it into the GSA box.  The authorization and retrieval process that allows users to access a particular Microsoft Exchange server message. In the push process the Synchronizer Service executes an incremental synchronization for each mailbox configured (only selected folders are synchronized), and stores in the KEAC database the primary key for each inserted or MAPI message (mail, contacts, attachments, appointments or task). The GSA loader process takes each of these keys executes a query and sends the final Microsoft Exchange object to the GSA Server box. Both the Query Engine and the Synchronizer uses MAPI for the underlying communication, which is the most efficient protocol to access the Exchange Server and is also used by Microsoft Outlook. GSA Query Engine Loader Synchronizer Service Housekeeping Exchange server services GSA server Figure 1 The first step in the retrieval process is to authorize the caller’s access to the specified message. If the user folder is configured to have public access the Authorization Service allows the access to the item and passes the request to the Query Engine which constructs the response and sends it back to the client. Authorization Query Engine service Exchange server GSA server Figure 2 Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 4
  • 6. If the folder is marked as “non public”, the Authorization service retrieves in real time the mailbox folder access control list from Microsoft Exchange and checks the caller’s access. To avoid stressing the Microsoft Exchange Server box the service implements a cache to store this information, given that a user can experience a minimal synchronization delay when he browses information. You must take into account that the ACL information is modified when the owner of the mailbox changes the sharing permissions using Microsoft Outlook or when the Microsoft Exchange Administrator executes security maintenance tasks. KEAC Layout The adapter components and services leverage on:  Windows OS.  Microsoft SQL Server 2000 (or above).  MAPI.  IIS.  NET framework 3.5. KEAC Layout Synchronizer GSA Housekeeping Authorization Query Engine service Loader services service MAPI NET framework Microsoft SQL Server IIS Figure 3 Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 5
  • 7. Security KEAC makes documents and objects stored in your Microsoft Exchange discoverable through search. In addition to public content that is available to everyone, the search appliance can crawl and index documents that require authentication. To protect confidentiality, at serving time, KEAC determines if the user who is performing the search is authorized to view each document before the search result is shown. This is because the KEAC honours the Microsoft Exchange’s sharing and security policies. This means: only if you have permission to see it you will find it through the Google Search Appliance. If you don’t have permission to see it, it will not appear in search results. It's important to understand that when controlled-access content is labeled as "public" in the index, it will be shown in all users' search results. Because public search results are served from the index without checking for authorization, users can discover all public content that the search appliance has access to, regardless of whether they have authorization to view that content or not. Serving Results to the User When a user performs a search request, the search appliance performs two checks before serving secure content:  The search appliance acquires the user's credentials to enable impersonation, or performs an authentication check to establish the user's identity.  The search appliance impersonates the user, or performs an authorization check to determine whether the user can view the content. If the user is authorized to view the content, the content will appear in the user's search results. Here we will explain the second process. If a secure content item fails, the search appliance removes it from the list of results. The following diagram shows the authorization sequence: Browser GSA Authorization Query Engine Module Search() Authorize (item) Allow / Deny Result Figure 4 Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 6
  • 8. Configuration Taking into account the complexity of the solution, the configuration process is little bit wide and detailed. Due to the big number of processes that take part on this solution several accounts and profiles have to be created and configured. This process could be difficult, but to simplify the administrators’ tasks, the adapter has configuration consoles that make the administration process more user-friendly. Figure 5 Figure 6 Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 7
  • 9. In addition KEAC provides a Mailbox Configuration Tool. This tool uses the MAPI profile configured previously to load and list all the folders and mailboxes that are accessible to KEAC’s configured account. With this tool you can configure which folders and mailboxes will be monitored and made available through the GSA searches. The mailboxes and folders together with Public Folders are displayed in a tree-like structure where the user can select which folders are going to be monitored and made available to the GSA. Figure 7 Kayxo is a registered trademark of Quantum System Microsoft Outlook is a registered trademark of Microsoft Corporation in the United States and/or other countries. Denmark: Sankt Annæ Plads 28, 1250 København K. Phone +45 4693 1515 / Fax +45 4693 1414 ext. 101 Argentina: Viamonte 1755, C1055ABG. Buenos Aires. Phone: +54 11 5171-5500 / Fax: +54 11 5171-5500 ext. 101 Germany: Am Zollstock 12 - 14 D-64546. Mörfelden- Walldorf. Phone: +49-6105-4048-10 / Fax: +49-6105-4048-99 Page 8