Previous     Contents     Index     Next     
iPlanet Messaging Server 5.2 Administrator's Guide



Chapter 2   Configuring General Messaging Capabilities


This chapter describes the general Messaging Server tasks—such as starting and stopping services and configuring directory access—that you can perform by using Netscape Console (hereafter called Console) or by using command-line utilities. Tasks specific to individual Messaging Server services—such as POP, IMAP, HTTP, and SMTP—are described in subsequent chapters. This chapter contains the following sections:



Managing Mail Users and Mailing Lists

All user and mailing list information is stored as entries in an LDAP directory. An LDAP directory can contain a wide range of information about an organization's employees, members, clients, or other types of individuals that in one way or another "belong" to the organization. These individuals constitute the users of the organization.

In the LDAP directory, the information about users is structured for efficient searching, with each user entry identified by a set of attributes. Directory attributes associated with a user can include the user's name and other identification, division membership, job classification, physical location, name of manager, names of direct reports, access permission to various parts of the organization, and preferences of various kinds.

In an organization with electronic messaging services, many if not all users hold mail accounts. For iPlanet Messaging Server, mail-account information is not stored locally on the server; it is part of the LDAP user directory. The information for each mail account is stored as mail attributes attached to a user's entry in the directory.

Creating and managing mail users and mailing lists consists of creating and modifying user and mailing list entries in the directory. This is done using the iPlanet Delegated Administrator for Messaging, Delegated Administrator command line utilities , or by directly modifying the LDAP directory. Users and mailing list entries can also be created and using the Console, but this is NOT recommended. (See Appendix D.)

Delegated Administrator for Messaging provides full support for managing users, groups, family groups, and hosted domains. With Delegated Administrator, you can delegate user and group administration, and set up administrators per hosted domain. Delegated Administrator provides a GUI interface for administrators to manage users and groups and for end users to manage their own mail accounts. Administrators can also use the Delegated Administrator command-line utilities for managing users and groups (see the iPlanet Messaging Server Reference Manual). For more information about using Delegated Administrator, see the Delegated Administrator Installation and Administration Guide and the Delegated Administrator online help. For more information about using LDAP tools to manage users, groups, and domains, see the Messaging Server Provisioning Guide.



To View Basic Server Information



You can review some of the basic information about an installed Messaging Server by viewing its Information form in Console.

Note If you install iPlanet Directory Server 5.1, you must manage it through iPlanet Console 5.0 (installed with Directory Server 5.1). iPlanet Messaging Server 5.2 must be managed through Netscape Console 4.2 (installed with Messaging Server 5.2).



To display the Information form:

  1. In Console, open the Messaging Server whose information you want to view.

  2. Select the server's icon in the left pane.

  3. Click the Configuration tab in the left pane.

  4. Click the Information tab in the right pane, if it is not already frontmost.

    The Information form appears. It displays the server name, server root directory, installation directory, and instance directory.



Starting and Stopping Services

Services are started and stopped differently depending on whether they are installed in an HA environment or not.


To Start and Stop Services in an HA Environment

While the Messaging Server is running under HA control, you cannot use the normal Messaging Server start, restart, and stop commands to control individual Messaging Server services. Doing so will cause the HA control to think that one or more services have unexpectedly stopped at which point it will either attempt to restart all of Messaging Server or fail it over to another cluster node.

The appropriate start, stop and restart commands are shown in the tables below. Note that there are no Sun Cluster commands to start, restart, or stop a single Messaging Server service (for example, SMTP). Sun Cluster's finest granularity is that of an individual resource. Since Messaging Server is known to Sun Cluster as a resource, scswitch commands affect all Messaging Server services as a whole.

Table 2-1    Start, stop, restart in a Sun Cluster 3.0 environment

Action

Individual Resource

Entire Resource Group

Start  

scswitch -e -j resource  

sscswitch -Z -g resource_group  

Restart  

scswitch -n -j resource
scswitch -e -j
resource
 

scswitch -R -g resource_group  

Stop  

scswitch -n -j resource  

scswitch -F -g resource_group  


Table 2-2    Start, stop, restart in a Sun Cluster 2.2 environment

Action

Individual Data Service

All Registered Data Services

Start  

hareg -y data_service  

hareg -Y  

Restart  

hareg -n data_service
hareg -y data_service
 

hareg -N
hareg -Y
 

Stop  

hareg -n data_service  

hareg -N  


Table 2-3    Start, stop, restart in Veritas 1.1 environment

Action

Individual Resource

Entire Resource Group

Start  

hares -online resource -sys system  

hagrp -online group -sys system  

Restart  

hares -offline resource -sys system
hares -online resource -sys system
 

hagrp -offline group -sys system
hagrp -online group -sys system
 

Stop  

hares -offline resource -sys system  

hagrp -offline group -sys system  


To Start and Stop Services in a non-HA Environment

You can start and stop services from Console or from the command line.

You only need to run the services that your server actually uses. For example, if you are temporarily using a particular instance of Messaging Server solely as a message transfer agent (MTA), you can turn on the MTA alone. Or, if maintenance, repair, or security needs require shutting down the server, you may be able to turn off just the affected service. (If you never intend to run a particular service, you should disable it instead of just turning it off.)


Note You must first enable the POP, IMAP, and HTTP services before starting or stopping them. For more information, see Enabling and Disabling Services.



Important: If a server process crashes, other processes may hang as they wait for locks held by the server process that crashed. Therefore, if any server process crashes, you should stop all processes, then restart all processes. This includes the POP, IMAP, HTTP, and MTA processes, as well as the stored (message store) process, and any utilities that modify the message store, such as mboxutil, deliver, reconstruct, readership, or upgrade.

Console. Console provides a form that allows you to start and stop individual services and view status information about each service.

For each service—IMAP, POP, SMTP, and HTTP—the form displays the service's current state (on or off). If the service is running, the form shows the time at which the service was last started up, and it can also display other status information.

To start up, shut down, or view the status of any messaging services:

  1. From Console, open the Messaging Server whose services you want to start or stop.

  2. Get to the Services General Configuration form in either of these two ways:

    1. Click the Tasks tab, then click "Start/Stop Services".

    2. Click the Configuration tab and select the Services folder in the left pane. Then click the General tab in the right pane.

  3. The Services General Configuration form appears.

    The left column of the Process Control field lists the services supported by the server; the right column gives the basic status of each of the services (ON or OFF, plus—if it is ON—the time it was last started).

  4. To view status information about a service that is currently on, select the service in the Process Control field.

    The Service Status field displays status information about the service.

    For POP, IMAP, and HTTP the field shows the last connection time, the total number of connections, the current number of connections, the number of failed connections since the service last started, and the number of failed logins since the service last started.

    The information in this field helps you to understand the load on the server and the reliability of its service, and it can help spotlight attacks against the server's security.

  5. To turn a service on, select it in the Process Control field and click Start.

  6. To turn a service off, select it in the Process Control field and click Stop.

  7. To turn all enabled services on or off simultaneously, click the Start All or Stop All button.

Command Line. You can use the start-msg and stop-msg commands to start or stop any of the messaging services (pop, imap, http, smtp, store), as shown in the following example:

server_root/msg-instance/start-msg imap
server_root/msg-instance/stop-msg pop
server_root/msg-instance/stop-msg smtp



Note The start-msg smtp and stop-msg smtp commands start and stop all of the MTA services—not just the SMTP server. If you want more granular control when starting or stopping the MTA services, use the imsimta start and imsimta stop commands. For more information, see the Messaging Server Reference Manual.





To Configure a Greeting Message



The Messaging Server allows you to create a greeting message to be sent to each new user.

Console. To create a new-user greeting by using Console:

  1. In Console, open the Messaging Server whose new-user greeting you want to configure.

  2. Click the Configuration tab. If the server's icon in the left pane is not already highlighted, select it.

  3. Click the Miscellaneous tab in the right pane.

  4. Create a new-user greeting or make changes, as needed.

    You must format the greeting as an email message, with a header (containing at least a subject line), then a blank line, then the message body.

    When you create a message, specify its language with the drop-down list above the message field. You can create several messages in several languages, if desired. The server attempts to send the correct language version of the message to the new user based on the information described in "Configuring Languages for Auto-Reply Messages."

  5. Click Save.

Command Line. To create a new-user greeting by using the command line:

configutil -o gen.newuserforms -v value



Configuring Languages for Auto-Reply Messages



This section describes how, for notices and messages sent by the server, the server selects the language-specific version to send. It also describes how users specify a preferred language and how you can specify a default server-site language.

Users can create messages for the server to send automatically under certain specified conditions. For example, an "I am on vacation" message as an automatic reply to all incoming mail. When users create messages of this kind, they can specify that the message is written in a particular language. This allows users to create different, language-specific versions of messages that the server is to send.

Users can also specify a preferred language that indicates in which language they wish to receive automatic reply messages—if that language version is available.

The server selects the language-specific version of a message to send according to the following rules:

  1. If the user to whom the message is being sent has chosen a preferred language (see To Set a User-Preferred Language) and a language-specific version of that message exists, the server sends that version of the message. For example, if the user has chosen Japanese, and there is a Japanese version of the message, the Japanese version is sent. If a domain preferred language is available, and if there's a matching auto-reply message that is used.

  2. If the user has not chosen a preferred language or has chosen a preferred language but there is no version of the message in that language or there is no domain preferred language specified, the version that matches the default server-site language (see To Configure a Server Site Language) is sent. For example, if the default site language is Spanish and the user has chosen French but there is no French version of the message, the Spanish version is sent.

  3. If there is only one version of the message, regardless of language preference or site language, that is the version that is sent.

  4. If there is no version of the message that matches either the user's preferred language or the default site language or domain preferred language is available, and if there is more than one language version, the first message text found in the user's LDAP entry is sent.


To Set a User-Preferred Language

Users can choose a preferred language by using the Delegated Administrator for Messaging interface. Some mail clients also allow users to specify a preferred language. If the preferred language is set using Delegated Administrator, the information is stored in Directory Server.

When the server sends messages to users outside of the server's administrative domain it does not know what their preferred language is unless it is responding to an incoming message with a preferred language specified in the incoming message's header. The header fields (accept-language, Preferred-Language or X-Accept-Language) are set according to attributes specified in the user's mail client.

If there are multiple settings for the preferred language—for example, if a user has a preferred language attribute stored in the Directory Server and also has a preferred language specified in their mail client—the server chooses the preferred language in the following order:

  1. The accept-language header field of the original message.

  2. The Preferred-Language header field of the original message.

  3. The X-Accept-Language header field of the original message.

  4. The preferred language attribute of the sender (if found in the LDAP directory).


To Set a Domain Preferred Language

A domain preferred language is a default language specified for a particular domain. For example, you may wish to specify Spanish for a domain called mexico.siroe.com. Administrators can choose a domain preferred language for hosted domains by selecting the Preferred Language option when creating the domain in the Delegated Administrator for Messaging interface or by adding the LDAP attribute preferredLanguage to the domain's LDAP entry.


To Configure a Server Site Language

You can specify a default site language for your server as follows. The site language will be used to send language-specific versions of messages if no user preferred language is set.

Console. To specify a site language from Console:

  1. Open the Messaging Server you want to configure.

  2. Click the Configuration tab.

  3. In the right pane, click the Miscellaneous tab.

  4. From the site language drop-down list, choose the language you wish to use.

  5. Click Save.

Command Line. You can also specify a site language at the command line as follows:

configutil -o gen.sitelanguage -v value

where value is one of the local supported languages:

af    Afrikaans
ca    Catalan
da    Danish
de    German
en    English
es    Spanish
fi    Finnish
fr    French
ga    Irish
gl    Galician
is    Icelandic
it    Italian
ja    Japanese
nl    Dutch
no    Norwegian
pt    Portuguese
sv    Swedish



Enabling Single Sign-On (SSO)



Single sign-on allows an end user to authenticate once to use multiple applications. For example, a user can log on to Messenger Express then use Delegated Administrator for Messaging without authenticating again.

To enable single sign-on between applications, you must configure each application. This section describes how to enable single sign-on between Messenger Express and Delegated Administrator. See "To Enable Single Sign-on Between Messenger Express and the Delegated Administrator for Messaging".


Messenger Express SSO Configuration Parameters

You can modify the single sign-on configuration parameters for Messenger Express, shown in Table 2-4, by using the configutil command. For more information about configutil, see the Messaging Server Reference Manual.


Table 2-4    Messenger Express Single Sign-On Parameters

Parameter

Description

local.webmail.sso.enable  

Enables or disables all single sign-on functionality, including accepting and verifying SSO cookies presented by the client when the login page is fetched, returning an SSO cookie to the client on successful login and responding to requests from other SSO partners to verify its own cookies.

If set to any non-zero value, the server performs all SSO functions.

If set to zero, the server does not perform any of these SSO functions.

The default value is zero.  

local.webmail.sso.prefix  

The string value of this parameter is used as the prefix value when formatting SSO cookies set by the HTTP server. Only SSO cookies with this prefix will be recognized by the server; all other SSO cookies will be ignored.

A null value for this parameter effectively disables all SSO functionality on the server.

The default value is null.  

local.webmail.sso.id  

The string value of this parameter is used as the application ID value when formatting SSO cookies set by the Messenger Express HTTP server.

The default value is null.  

local.webmail.sso.
cookiedomain
 

The string value of this parameter is used to set the cookie domain value of all SSO cookies set by the Messenger Express HTTP server.

The default value is null.  

local.webmail.sso.
singlesignoff
 

The integer value of this parameter, if set to any non-zero value, clears all SSO cookies on the client with prefix values matching the value configured in local.webmail.sso.prefix when the client logs out.

If set to zero, Messenger Express will clear its own SSO cookie when the client logs out.

The default value is zero.  

local.sso.appid.verifyurl  

Sets the verify URL values for peer SSO applications. appid is the application ID of a peer SSO application whose SSO cookies are to be honored. For example, the appid for Delegated Administrator is nda45.

There should be one parameter defined for each trusted peer SSO application. The standard form of the verify URL is:

http://nda-host:port/VerifySSO?  

So to enable single sign-on for Messenger Express, you would set the configuration parameters as follows (your default domain is eng.siroe.com)

configutil -o local.sso.appid.verifyurl -v "http://nda-host:port/verifySSO?"
configutil -o local.webmail.sso.enable -v 1
configutil -o local.webmail.sso.prefix -v ssogrp1
configutil -o local.webmail.sso.id -v msg50
configutil -o local.webmail.sso.cookiedomain -v ".siroe.com"
configutil -o local.webmail.sso.singlesignoff -v 1


To Enable Single Sign-on Between Messenger Express and the Delegated Administrator for Messaging

To enable single sign-on between Messenger Express and Delegated Administrator, you must perform additional steps as follows:

  1. Configure Directory Server

    1. Create a proxy user account entry in the Directory Server

    2. Create an ACI (Access Control Instructions) for proxy authentication

  2. Configure Delegated Administrator

    1. Add the proxy user credentials

    2. Add the single sign-on cookie information

    3. Add the participating servers verification URL

  3. Restart the Enterprise Server

To configure Directory Server, you will use the ldapmodify utility. For more information about this utility, see your Directory Server documentation.

To configure Delegated Administrator, you will modify the following configuration files:

iDA_server_root/nda/classes/netscape/nda/servlet/resource.properties

Web_server_root/https-instancename/config/servlets.properties

Web_server_root/https-instancename/config/contexts.properties


Step 1a. Create a Proxy User Account

The proxy user account allows users to bind to the Directory Server for proxy authentication. For example, the following is an example of a proxy user account entry:

dn: uid=proxy, ou=people, o=siroe.com, o=isp
objectclass: top
objectclass: person
objectclass: organizationalperson
objectclass: inetorgperson
uid: proxy
givenname: Proxy
sn: Auth
cn: Proxy Auth
userpassword: proxypassword


Step 1b. Create an ACI for Proxy Authentication

Next, using the ldapmodify utility, create an ACI for the suffixes you created at install time:

  • osiroot - The suffix you entered to store the user data

  • dcroot - The suffix you entered to store the domain information

  • osiroot - The suffix you entered to store the configuration information (the default is osiroot)

For example, the following is an example of an ACI entry:

dn: o=isp
changetype: modify
add: aci
aci: (target="ldap:///o=isp")(targetattr="*")(version 3.0; acl
"proxy";allow (proxy) userdn="ldap:///uid=proxy, ou=people,
     o=siroe.com, o=isp";)


Step 2a. Add the Proxy User Credentials to the resource.properties File

To configure Delegated Administrator for proxy authentication, uncomment and modify the following entries in the Delegated Administrator iDA_server_root/nda/classes/netscape/nda/servlet/resource.properties file:

LDAPDatabaseInterface-ldapauthdn=Proxy_Auth_DN

LDAPDatabaseInterface-ldapauthpw=Proxy_Auth_Password

For example:

LDAPDatabaseInterface-ldapauthdn=
   uid=proxy, ou=people,o=siroe.com, o=mailqa
   LDAPDatabaseInterface-ldapauthpw=proxypassword


Step 2b. Add the Single Sign-On Cookie Information

To add the single sign-on cookie information, define a context identifier for Delegated Administrator and specify a cookie name for the context, as follows:

  • To define a context identifier, edit the Enterprise Server Web_Server_Root/https-instancename/config/servlets.properties file and uncomment all lines containing the text servlet.xxxxx.context=ims50.

  • To specify a cookie name for the context in the Delegated Administrator configuration, add the following entry to the Delegated Administrator iDA_server_root/nda/classes/netscape/nda/servlet/resource.properties file:

    NDAAuth-singleSignOnId=ssogrp1-
    NDAAuth-applicationId=nda45

  • To specify a cookie name for the context in the Enterprise Server configuration, add the following entry to the Enterprise Server Web_Server_Root/https-instancename/config/contexts.properties file:

    context.ims50.sessionCookie=ssogrp1-nda45


Step 2c. Add the Participating Servers Verification URL

To verify a single sign-on cookie it received, Delegated Administrator must know who to contact. You must provide a verification URL for all known participating servers.

For purposes of the following example, assume Messenger Express is installed and its application ID is msg50. Edit the Delegated Administrator iDA_server_root/nda/classes/netscape/nda/servlet/resource.properties file and add an entry such as:

verificationurl-ssogrp1-msg50=http://webmail_hostname:port/VerifySSO?
verificationurl-ssogrp1-nda45=http://nda_hostname:port/VerifySSO?

Step 3. Restart the Enterprise Server

After you've made the configuration changes described in steps 1a through 2c, you must restart the Enterprise Server for the changes to take effect.



To Customize Directory Lookups



iPlanet Messaging Server cannot function without an LDAP-based directory system such as the iPlanet Directory Server. Messaging Server and Console require directory access for three purposes:

  • When you first install a Messaging Server, you enter configuration settings for the server. These settings are stored in a central configuration directory. Part of the installation process includes configuring the connection to that directory.

  • When you create or update account information for mail users or mail groups, the information is stored in a directory called the user directory. Your server group's Administration Server is configured at installation so that when you access Users and Groups, Console connects by default to the user directory that defines your administrative topology—the set of iPlanet servers that all share the same configuration directory and user directory.

  • When routing messages and delivering mail to mailboxes, Messaging Server looks up information about the sender or recipients in the user directory. By default, Messaging Server looks in the same user directory that its Administration Server has been configured to use.

You can modify each of these directory-configuration settings in the following ways:

  • The Administration Server interface of Console lets you change the connection settings for the configuration directory. (For more information, see the Administration Server chapter of Managing Servers with Netscape Console.)

  • The Users and Groups interface of Console lets you temporarily connect to a different user directory from the default when making changes to user and group information. (For more information, see the Users and Groups chapter of Managing Servers with Netscape Console.)

  • The Messaging Server interface of Console lets you configure your Messaging Server to connect to a different user directory from the default defined by the Administration Server. This is the configuration task discussed in this section.

Reconfiguring your Messaging Server to connect to a different user directory for user and group lookups is strictly optional. In most cases, the user directory that defines your server's administrative domain is the one used by all servers in the domain.

Note If you specify a custom user directory for your Messaging Server lookups, you must also specify that same directory whenever you access the Users and Groups interface of Console to make changes to the directory's user or group information. For more information, see "."



Console. To modify the Messaging Server LDAP user-lookup settings by using Console:

  1. From Console, open the Messaging Server whose LDAP connection you want to customize.

  2. Click the Configuration tab.

  3. Select the Services folder in the left pane.

  4. Select the LDAP tab in the right pane. The LDAP form appears.

    The LDAP form displays the configuration settings for both the configuration directory and the user directory. The configuration-directory settings, however, are read-only in this form. See the Administration Server chapter of Managing Servers with Netscape Console if you need to change them.

  5. To change the user-directory connection settings, click the box labeled "Use messaging server specific directory settings".

  6. Update the LDAP configuration by entering or modifying any of the following information (for explanations of directory concepts, including definitions of terms such as distinguished name, see the Directory Server Administrator's Guide):

    Host name: The name of the host machine on which the directory containing your installation's user information resides. This is typically not the same as the Messaging Server host, although for very small installations it might be.

    Port number: The port number on the directory host that Messaging Server must use to access the directory for user lookup. This number is defined by the directory administrator, and may not necessarily be the default port number (389).

    Base DN: The search base—the distinguished name of a directory entry that represents the starting point for user lookups. To speed the lookup process, the search base should be as close as possible in the directory tree to the information being sought. If your installation's directory tree has a "people" or "users" branch, that is a reasonable starting point.

    Bind DN: The distinguished name that your Messaging Server uses to represent itself when it connects to the directory server for lookups. The bind DN must be the distinguished name of an entry in the user directory itself that has been given search privileges to the user portion of the directory. If the directory allows anonymous search access, you can leave this entry blank.

  7. To change the password used, in conjunction with the Bind DN, to authenticate this Messaging Server to the LDAP directory for user lookups, click the Change Bind password button. A Password-Entry window opens, into which you can enter the updated password.

    Your own security policies should determine what password you use in this situation. Initially, the password is set to no password. The password is not used if you have specified anonymous access by leaving the Bind DN field blank.

    This step updates the password stored in server configuration, but does not change the password in the LDAP server. This account is also used for PAB lookups by default. The following two steps need to be performed after the password has been changed.

  8. Modify the password for the user specified in the configuration attribute local.ugldapbinddn. This user account exists in the directory server specified in configuration attribute local.ugldaphost.

  9. If the same account is used for PAB access, specified in the attributes local.service.pab.ldapbinddn and local.service.pab.ldaphost, then the password stored in local.service.pab.ldappasswd must be updated.

To return to using the default user directory, uncheck the "Use messaging server specific directory settings" box.

Command Line. You can also set values for the user-directory connection settings at the command line as follows. Be sure to also set the LDAP and PAB password as described in the steps 8 and 9 above.

To specify whether to use messaging server specific directory settings:

configutil -o local.ugldapuselocal -v [ yes | no ]

To specify the LDAP host name for user lookup:

configutil -o local.ugldaphost -v name

To specify the LDAP port number for user lookup:

configutil -o local.ugldapport -v number

To specify the LDAP base DN for user lookup:

configutil -o local.ugldapbasedn -v basedn

To specify the LDAP bind DN for user lookup:

configutil -o local.ugldapbinddn -v binddn



Encryption Settings



You can use Console to enable Secure Sockets Layer (SSL) encryption and authentication for Messaging Server and to select the specific encryption ciphers that the server will support across all of its services.

Although this task is a general configuration task, it is described in the section "Enabling SSL" in Chapter 12 "Configuring Security and Access Control" which also contains background information on all security and access-control topics for Messaging Server.


Previous     Contents     Index     Next     
Copyright © 2002 Sun Microsystems, Inc. All rights reserved.

Last Updated February 27, 2002