Solved

Sharing Resources and Global Address List between 2 trusted domains

Posted on 2010-08-31
10
4,037 Views
Last Modified: 2012-06-27
Hello, I have two domains with a 2 way trust and I am looking for a way that users on both domains can book resources in the other domain (respectively).  I also need to share the GAL.  Is this possible without MS Identity Lifecycle Manager?  One domain is a 2008 domain, the other an 03 domain.  Both Exchange systems are Exchange 2010. Kindly advise as to what other information I need to provide.

Thank you!
0
Comment
Question by:SimradOptronics
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
  • 2
  • +2
10 Comments
 
LVL 32

Expert Comment

by:endital1097
ID: 33569533
if the two exchange organizations are not in the same organization you cannot share resources without something like GALSynch (ILM)
you need to have the meeting request be received wherever the mailbox resides so that autoaccept maintains the free/busy
0
 
LVL 32

Expert Comment

by:endital1097
ID: 33569538
that sounded terrible
if the two domains are not in the same exchange organization...
0
 
LVL 28

Expert Comment

by:sunnyc7
ID: 33570712
endital is right
If you dont want to go ILM way, there's another tool which does this job.
http://www.netsec.de/en/products/galsync/


0
Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

 

Author Comment

by:SimradOptronics
ID: 33574253
Hi Thank you for your reply.

I found this article about setting up a Federation between external Exchange 2010 organizations, it looks like it will solve our issue.

 http://technet.microsoft.com/en-us/library/dd351109.aspx

0
 
LVL 3

Expert Comment

by:Tommy_Cooper
ID: 33574904
How many users do you have? Is it practical to create contacts in the target domain for every mailbox you have in the source domain? This could be simply scripted using EMC/powershell.
0
 
LVL 32

Expert Comment

by:endital1097
ID: 33575059
The federation allows you to share free busy across organizations. It does not allow for auto accept
0
 

Author Comment

by:SimradOptronics
ID: 33575593
We have roughly 170 Users in one domain, and about 75 in the second. Not sure if manually making the lists will work.
0
 
LVL 28

Expert Comment

by:sunnyc7
ID: 33575722
I think you should consider ilm if you have that many users.
Atleast you will have a solution that works with documentation, rather than going about the whole process in a trial and error fashion
0
 
LVL 1

Expert Comment

by:jimjohnston
ID: 33762643
ILM/FIM/IIFP will do your GALSync,  IIFP product support was extended and will provide the basic GALSync functionality at no cost.  We do not sync free/busy as part of the GALSync.
0
 

Accepted Solution

by:
SimradOptronics earned 0 total points
ID: 33948274
We are going to use a 3rd party sync program as you have suggested.  Thanks everyone.
0

Featured Post

Ready to get started with anonymous questions?

It's easy! Check out this step-by-step guide for asking an anonymous question on Experts Exchange.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There are times when we need to generate a report on the inbox rules, where users have set up forwarding externally in their mailbox. In this article, I will be sharing a script I wrote to generate the report in CSV format.
A couple of months ago we ran into an issue that necessitated re-creating our Edge Subscriptions. However, when we attempted to execute the command: New-EdgeSubscription -filename C:\NewEdgeSub_01.xml we received an error indicating that the LDAP se…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question