contentACCESS documentation – version 3.4

  1. Introduction to contentACCESS
    1. Services provided by contentACCESS
    2. Software requirements
  2. contentACCESS setup package
    1. Installation of contentACCESS
      1. EULA
      2. Installation type
      3. Components
      4. Prerequisites
      5. Base folder
      6. Service settings
      7. Database connection
      8. contentACCESS Central Administration
      9. contentACCESS Web Services (Proxy)
      10. contentWEB
      11. Central login
      12. Virtual drive
      13. Search service
      14. SMTP server
      15. Overview
      16. Installation
      17. Summary
  3. contentACCESS components
    1. contentACCESS Central Administration
      1. Central administration login
      2. contentACCESS Automated single sign on
      3. Central Administration logout
      4. contentACCESS Central Administration user interface
    2. contentWEB
      1. Logging in to contentWEB
      2. contentWEB Automated single sign on
    3. Virtual drive
    4. contentACCESS Web Services (Proxy)
    5. Central login page
  4. contentACCESS Tools
    1. Installing Outlook forms
    2. Legacy email archive connectors
    3. Legacy archive connector for Metalogix Archive Manager Exchange Edition (MAM EE)
    4. Legacy archive connector for Email Lifecycle Manager (ELM)
    5. Installing TECH-ARROW’s WinShortcutter
    6. contentACCESS Outlook add-in
      1. Installation of contentACCESS Outlook add-in
      2. How to use contentACCESS Outlook add-in
  5. Tenants in contentACCESS
    1. How to create a new tenant
    2. Tenant limitations
    3. How to provide access to a tenant (adding new tenant administrators)
    4. Tenant administrator invitation types
    5. Tenant associations
      1. Tenant - database association
      2. Tenant - user association
    6. Tenant deletion
  6. General system configurations
    1. Connection
    2. User interface
    3. Users in contentACCESS
    4. Invitations
    5. Roles
      1. Creating roles
      2. Role details
      3. Role assignment
      4. Defining specific permissions of a role assignment
      5. Editing roles, editing role assignments
      6. Role cloning
      7. General use cases of how to create/assign roles
      8. Managing access to contentACCESS objects
    6. Login providers
      1. Login providers’ context menu options
      2. External login provider configuration
        1. Configuring Google OAuth
        2. Configuring Office 365 login provider
        3. Exchange login provider
        4. External AD login provider
      3. Associating an enabled provider with a user login
      4. contentACCESS users in third party systems
    7. System
    8. Licensing
      1. How to activate your license key
    9. Notifications
    10. Monitoring — how to find out possible misconfigurations / reasons of potential system/job failures
    11. Auditing
    12. Distributed environment in contentACCESS — Clusters
    13. Statistics
    14. Legal hold
    15. Task runner
    16. Indexing
    17. SMTP Servers
    18. SMTP Mappings
    19. How to create/configure databases — All databases
  7. Common features
    1. Databases
    2. Schedules
    3. Retentions
    4. Storages
      1. Google drive storage
      2. Amazon S3
    5. Exchange connections
      1. Exchange performance settings – turning off the Exchange throttling policies
      2. Hybrid Exchange environments in the Email Archive system
    6. Importing contentACCESS configurations from files
      1. Manual import of Exchange servers/groups/mailboxes to the contentACCESS Address book
      2. Importing File Archive root folders to be archived
  8. Creating new jobs in contentACCESS
  9. Jobs’ page, jobs’ context menu
  10. File Archive
    1. Introduction to File system archive
    2. File archive settings
    3. File archive Databases
    4. File archive System settings
    5. File archive Retentions
    6. File archive Storages
    7. Root folders
    8. Aliases
    9. File archive Schedules
    10. Provisioning settings and managing access to contentWEB
    11. Remote agents
    12. Configuring aliases
    13. Configuration of jobs available in contentACCESS File Archive
    14. Configuration of File system archive job
    15. Configuration of a File system restore job
    16. Configuration of File system recovery job
    17. Configuration of Delete job in File archive
    18. Configuration of File system shortcut synchronization job
    19. Configuration of Remote shortcutting job
    20. Active/inactive documents in File system archive
  11. Email Archive
    1. Important settings before creating an Email Archive job
    2. Database settings
    3. Email archive System settings
    4. Email archive Provisioning settings
    5. Retention settings
    6. Shortcuts in email archiving
    7. Storing of archived emails
      1. LoboDMS storage
    8. Creating email archive schedulers
    9. User experience
    10. Exchange 2013+: Mail app in OWA 2013+ or on MS Outlook 2013+ desktop version
    11. Exchange 2010: OWA 2010 integration
    12. Address book objects
      1. Adding address book objects manually
    13. Granting access rights for mailbox users and explicit users to view the mailbox archive
    14. Creating contentWEB users (option 1)
    15. Manage access to a mailbox archive (option 2)
    16. Database and store assignment in email archiving
    17. How to assign database and storage to an Exchange group?
    18. How to assign database and storage to a mailbox?
    19. How to move data from source database/storage into a second (target) database/storage?
    20. Creating Email archive jobs: archive, restore, recovery, delete, mailbox move, shortcut synchronizaion, shortcut repair
    21. Email archive job
      1. Email archive job configuration
    22. Email restore job
      1. Email restore job configuration
    23. Email recovery job
      1. Email recovery job configuration
    24. Configuration of Delete job in Email archive
    25. Mailbox move job
      1. Mailbox move job configration
    26. Shortcut synchronization job
      1. Shortcut synchronization job configuration
    27. Shortcut repair job
      1. Shortcut repair job configuration
    28. Public folder archiving
      1. How to configure a job to archive public folders
      2. Public folders in the contentWEB archive
      3. User permissions to public folders
      4. Public Folder archiving in hybrid Exchange environments
    29. SMTP archiving
  12. SharePoint archive plugin
    1. SharePoint Archive settings
    2. SharePoint Archive job configuration
    3. SharePoint recovery job configuration
    4. Configuration of Delete job in SharePoint archive
    5. SharePoint archive Provisioning settings
    6. SharePoint Publishing job
    7. SharePoint in the contentWEB archive
  13. Custom plugins
    1. Email management job configuration
    2. Storage replication plugin
    3. Sharing plugin
    4. Datengut plugin
    5. Email synchronizer plugin
    6. Categorize to Public folders plugin
    7. LoboDMS plugin
  14. ThreatTest
    1. ThreatTest configuration
      1. ThreatTest Databases
      2. ThreatTest System settings
      3. ThreatTest Schedules
      4. ThreatTest User experience
      5. ThreatTest Statistics
      6. ThreatTest Job
    2. Using ThreatTest App
  15. officeGATE
  16. contentACCESS Mobile
  17. Virtual drive configurations
  18. Application settings
  19. Terms of use
  20. FAQ
    1. Download sample for the file to be imported does not work
    2. Archiving is not working if MAPI is set to communicate with the Exchange server
    3. Virtual drive is still appearing after the uninstall
    4. Outlook forms problems
    5. Unable to open shortcuts of archived files on the server side
    6. Samples are not shown using 'Show sample" option in the Import dialog
    7. Do I need to create separate tenants for file archiving and email archiving
    8. What is the recommended database size for email, file and Sharepoint archiving
    9. The TEMP folder is running out of space when archiving big files
    10. The attachment could not be opened
    11. After updating Exchange 2013, the EWS connection might not work in contentACCESS
    12. If Windows authentication is not working in contentACCESS and an alias was created for contentACCESS
    13. contentACCESS Outlook add-in certificate issue
    14. PowerShell scripts for setting up Email archive
    15. Solution for Outlook security patches
    16. Solution for Outlook security patches through GPO
    17. Solution for indexing PDF files
    18. Mycompanyarchive SuperUser mailbox configuration

3.4.contentACCESS Web Services (Proxy)

Most companies understand that sensitive information/data should be transmitted using a secure connection. TECH-ARROW also reacted on this demand and offers a secure connection, i.e. HTTPS connection to enable communication between the user and the contentACCESS server. To use the HTTPS security, it is required to install a proxy server, which will enable for the user to communicate with the contentACCESS server. The contentACCESS Proxy is one of the contentACCESS components that are included in the contentACCESS setup package.

Note: Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP the protocol over which data are sent between client (as in our case the Outlook form) and the contentACCESS server that you are connected to. The “S” at the end of HTTPS stands for “Secure”. It means all communications between the client and the server are encrypted. HTTPS is often used to protect highly confidential online transactions. HTTPS pages use one of two secure protocols to encrypt communications – SSL (Secure Socket Layer) or TSL (Transport Layer Security)(proxy that we will install uses SSL). Both of these protocols use what is known as asymmetric Public Key infrastucture (PKI) system. This PKI system uses two “keys” to encrypt communications, a “public key”, and a “private key”. Anything encrypted by the public key can only be decrypted by the private key and vica-versa.

Documentation28

How to allow HTTPS secure connection between the proxy server and the contentACCESS in case of need?

The contentACCESS setup package cannot configure the contentACCESS Proxy to use https on the Internet Information Services (IIS), therefore this must be set manually. It is also necessary to mention that the proxy server must be installed with the “https” connection from the contentACCESS package, otherwise it is not possible to establish HTTPS connection between the proxy server and contentACCESS.

Once the contentACCESS Proxy is installed, continue according to the next steps:

  1. Open Internet Information Services (IIS) Manager on the computer where the proxy server is installed.
  2. Import the company’s SSL Certificate

a. Click on the server name – “TANEWS (TANEWS\Administrator)” in our case – and under section IIS double click on Server Certificates:

Documentation37


b. Import the certificate. In the upper right corner of the Actions pane click on Import and in the Import certificate window browse for the company’s certificate, open it, then enter the password to it and click on OK:

Documentation38

Documentation39


c. Bindings configuration. Now enable the access to the proxy from HTTPS. Search for the node contentACCESSWS in the Connections pane. Double click on the Default Web Site in the pane, and in the upper right corner of the Actions pane click on Bindings option.

cACCESS 2.9 doc 12 cACCESS 2.9 doc 13

Screenshot A                                                                                     Screenshot B

In the Site Bindings window, click on Add. In the Add site binding window, under Type select “https” from the dropdown list, enter the Host name and select the SSL certificate from the dropdown list. Then click on OK.

Documentation42


Cancellation of HTTP-allowance:

  1. a) If you would like to stop using the HTTP connection, unfold the appropriate site in the Connections pane and click on the proxy (contentACCESSWS), then double click on SSL Settings option under IIS section (Screenshot A). The SSL Settings page will open. Here check checkbox Require SSL (Screenshot B).

    cACCESS 2.9 doc 14 cACCESS 2.9 doc 15

  2. In the right hand corner click on Apply to save these changes.

    Documentation45


    To check, if the communication between the proxy and the contentACCESS is well established, enter the following URL into the browser:
    https://[HostName]/contentACCESSWS/MobilityService.svc/ping.
    If the connection was well established, then the ping result will show OK.

Yes No Suggest edit
Help Guide Powered by Documentor
Suggest Edit