This article describes two scenarios that occur when the Microsoft Lync client can't establish a trust relationship with resources that require a secure TLS connection.
When a user tries to sign in to Microsoft Lync in a Lync Server 2013 environment for the first time, she receives the following message in a dialog box:
Lync is attempting to connect to:
<Fully qualified domain name (FQDN) of a server>
Lync cannot verify that the server is trusted for your sign-in address. Connect anyway?
For example, the following trust model dialog box is displayed:
The Lync – Sign In dialog box that's shown in the screen shot in Scenario 1 displays the fully qualified domain name (FQDN) of the organization’s Exchange Client Access server (CAS) interface. This interface is used by the Lync client to access user mailbox information through Exchange Web Services (EWS). This behavior occurs if the Lync user’s SIP URI contains a domain suffix that does not match the domain suffix of the Exchange CAS interface. If the user chooses not to trust the connection to the Exchange CAS interface, the Lync client will not have access to the Exchange mailbox services that are provisioned by EWS.
To verify this behavior, follow these steps:
- Make sure that the Lync client is signed in to on the Windows client’s desktop.
- Hold down the CTRL key and right-click the Lync icon in the Windows client’s notification area.
- In the shortcut menu, click Configuration Information.
- Locate the "EWS Information" line.
- If this line contains "EWS not fully initialized," you are experiencing the Scenario 2 behavior.
- Subject Name
- Common Name
- Not Configured (Default)/Disabled
Through this setting, the following domains are trusted by default:
This setting specifies the list of domains to be trusted—for example: contoso.com, contoso.co.in.
For more information about the Lync 2013 Trusted Domain List (TrustModelData) Group Policy setting, see Configuring client bootstrapping policies.
For more information about the Lync 2013.admx (ADMX) and .adml (ADML) Administrative Templates, see Office 2013 Administrative Template files (ADMX/ADML) and Office Customization tool.
The Lync 2013 desktop client uses the new automatic discovery mechanism to locate the internal or external Lync Web Service, depending on the network location of the user.
The following process occurs when the Lync 2013 desktop client tries to locate the Lync Web Service:
- The Lync 2013 desktop client sends a pair of HTTP and HTTPS requests to locate the Lync Autodiscover Service. The HTTP and HTTPS requests consist of a default set of internal or external host name values and the SIP domain name of the user.
For example, the Lync 2013 desktop client sends the following requests:
http://LyncdiscoverInternal.contoso.com and https://LyncdiscoverInternal.contoso.comNote "LyncdiscoverInternal.contoso.com" is resolved to the FQDN or IP address of the Internal Lync Web Service.
http://Lyncdiscover.contoso.com and https://Lyncdiscover.contoso.comNote "Lyncdiscover.contoso.com" is resolved to the FQDN or IP address of the external interface of the Reverse Proxy.
- The Lync 2013 desktop client receives a response that contains the secure internal and external URLs of the Autodiscover Service from Web Services.
- The Lync 2013 desktop client tries to contact the Autodiscover Service by using an HTTPS connection. If the SIP domain name of the user does not match the domain name in the Subject Name or Common Name property on the certificate that is assigned to Lync Web Service, the Trust Model dialog box is displayed.
The Lync client makes https requests to the Exchange CAS interface as part of its post-sign-in process. These requests include access to the Exchange Autodiscover service through URLs that include the FQDN of the Exchange CAS interface. For example:
Article ID: 2833618 - Last Review: Abr 20, 2017 - Revision: 20