Solved

OCS 2007 R2 Federation

Posted on 2011-03-11
2
873 Views
Last Modified: 2013-11-29
OCS 2007 R2 Federation Scenario

Company A needs to do OCS federation with 2 companies B and C.

If I add Company B & C to the federation list, can I configure to the meet below requirements

1)Can I restrict only a group of users from Company A to communicate with Company B users and not with users from Company C
2)Can I restrict users from Company B from not viewing users from Company C

Please let me know, if we can achieve the above requirements

0
Comment
Question by:Bhima_INBLR02
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 13

Assisted Solution

by:AshwinRaj111
AshwinRaj111 earned 25 total points
ID: 35114478

1) You will be Company B and Company C to the federation List.
But you would not be able to restrict users to access to only Company B contacts. (as far as i know).

2) Company B users would have nothing to do with Company C users.
Since the Federation is between Company A -> Company B. & Company A -> Company C.

Users in Company A would be able to add contacts of Company B & Company C.

If Company B and Company C has to talk to each other then there sould be a Federation between Company B and Company C.
0
 
LVL 3

Accepted Solution

by:
dawho9 earned 25 total points
ID: 35162375
Ashwin is correct on #1.  When company A is federated to company B, that is an all or nothing ordeal.  You cannot "out of the box" do anything to prevent users from A contacting people in company B, you cannot limit whom you see on the far side.  There were some demo's early in the days of OCS of people writting UMCA applications on the edge server that did somethings to limit traffic but they were only demo's and I didn't find any commercial programs out there.

Richard
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Unified and professional email signatures help maintain a consistent company brand image to the outside world. This article shows how to create an email signature in Exchange Server 2010 using a transport rule and how to overcome native limitations …
A couple of months ago we ran into an issue that necessitated re-creating our Edge Subscriptions. However, when we attempted to execute the command: New-EdgeSubscription -filename C:\NewEdgeSub_01.xml we received an error indicating that the LDAP se…
To show how to generate a certificate request in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Servers >> Certificates…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question