Planning for Management

Lync Server 2013 follows the currently popular model of role-based access control (RBAC). The concept is that one defines a role, typically based around common tasks, and then delegates the performance of these tasks to the role group. Existing security groups or individuals are then populated into that role group to grant them the necessary rights to perform the tasks.

Lync Server 2013 has eleven RBAC groups that cover most of the commonly delegated tasks within Lync Server 2013. These groups and their allowed tasks are as listed here:

CsAdministrator—Members of this group can perform all administrative tasks and modify all settings within Lync Server 2013. This includes creating and assigning roles, and modification or creation of new sites, pools, and services.

CsUserAdministrator—Members of this group can enable or disable users for Lync Server 2013. They can also move users and assign existing policies to users. They can neither create new policies nor modify existing policies.

CsVoiceAdministrator—Members of this group can manage, monitor, and troubleshoot servers and services. They can prevent new connections to servers, apply software updates, and start and stop services. They cannot, however, make changes that affect global configuration.

CsServerAdministrator—Members of this group can manage and troubleshoot servers and services including preventing new connections, starting and stopping services, and applying software updates.

CsViewOnlyAdministrator—Members of this group can view the deployment, including server and user information, in order to monitor deployment health.

CsHelpDesk—Members of this group can view the deployment, including users’ properties and policies. They can also run specific troubleshooting tasks. They can change neither user properties or policies nor server configuration or services.

CsArchivingAdministrator—Members of this group can modify archiving configuration and policies.

CsResponseGroupAdministrator—Members of this group can manage the configuration of the Response Group application within a site.

CsLocationAdministrator—This group offers the lowest level of rights for Enhanced 911 (E911) management. This includes creating E911 locations and network identifiers and enables associating these with each other. This role is assigned with a global scope as opposed to a site-specific scope.

CsPersistentChatAdministrator—Members of this group can manage Persistent Chat features and rooms.

CsResponseGroupAdministrator—Members of this group can manage response groups. It can be scoped to specific response groups on a granular level.

To comply with RBAC best practices, do not assign users to roles with global scopes if they are supposed to administer only a limited set of servers or users. This means creating additional role-based groups with similar rights to previous groups, but applied to a more limited scope because all default role groups in Lync Server 2013 have a global scope. That is to say, the rights apply to all users and to servers in all sites.

These scoped role groups can be created through the PowerShell cmdlets provided with Lync Server 2013 by using an existing global group as a template and by assigning the rights to a precreated group in Active Directory. For example:

New-CsAdminRole –Identity "Site01 Server Administrators" –Template CsServerAdministrator
–ConfigScopes "site:Site01"

This cmdlet gives the Site01 Server Administrators group the same rights as the predefined CsServerAdministrator role, but rather than giving the rights globally, the rights apply only to servers in Site01.

A similar process can be used to create a role that is scoped based on users rather than on sites:

New-CsAdminRole –Identity "Finance Users Administrators" –Template CsUserAdministrator
–UserScopes "OU:OU=Finance, OU=Corporate Users, DC=CompanyABC, DC=com"

This grants a group called Finance Users Administrators rights similar to the predefined CsUserAdministrator group, but rather than getting the rights across all user objects, they will be limited to user objects in the Finance OU as defined in the cmdlet.

After the necessary role groups have been defined, simply add users or other groups to the role groups through Active Directory Users and Computers.


Note

When users are placed into either a new security group or a role group, they need to log out and then log on for the Kerberos ticket to be updated with the new group membership. Without this process, they will not be able to use the new rights that they are granted.


For users who are given any level of administrative rights within Lync Server 2013, carefully consider which tasks they need to perform and then assign them to the roles with the least privilege and scope necessary to perform the tasks.

For administrators interested in what rights are available to each of the predefined groups, Microsoft has published a fairly exhaustive list at the following URL: http://technet.microsoft.com/en-us/library/gg425917(v=ocs.15).aspx.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset