The importance of EWS Impersonation while using an application account.

Developers of applications which require access to user mailboxes often struggle with the choice between the Impersonation and Delegation access methods. While both provide programmatic rights to mailbox objects, they are designed to meet rather different needs, and for situations where a single account needs to access multiple mailboxes, Impersonation is the better choice. This…

5

CDOSYS breaks after removing Outlook Express.

Yep, that will do it.  There is a relationship between CDOSYS and Outlook Express.  So, you should not remove Outlook Express if you ever expect to use CDOSYS or have anything which uses CDOSYS work properly.  Some people get very ambitious about security and start ripping-out software which they don’t think is needed – however,…

1

Exchange Protocol Documentation

Microsoft released preliminary protocol documentation for Exchange 2007 (as well as Microsoft Office 2007 and SharePoint Server) as part of Microsoft’s Interoperability Principles. The Exchange protocols are now publicly available on the Open Protocol Specifications section of MSDN in preliminary form for developers to review and provide feedback.  You can read more about the announcement…

0

Exchange Protocol Documentation

Microsoft released preliminary protocol documentation for Exchange 2007 (as well as Microsoft Office 2007 and SharePoint Server) as part of Microsoft’s Interoperability Principles. The Exchange protocols are now publicly available on the Open Protocol Specifications section of MSDN in preliminary form for developers to review and provide feedback.  You can read more about the announcement…

0

How to work with Item and Folder Permissions using WebDAV?

Permissions to folders and items can be read and changed via WebDAV using an XML descriptor.  It’s also possible to use other APIs such as ADO update security settings.   An XML descriptor is an XML document in a string which describes security permissions to an item or folder.  A PROPFIND is used to read security…

1

Want to get creator, lastmodifier, and other security info for an item in an event sink?

Want to get creator, lastmodifier, and other security info for an item in an event sink? You can extract a considerable amount of security information using the http://schemas.microsoft.com/exchange/security/ namespace. The information returned is in XML, so individual elements need to be extracted from the XML.  The following vb function  is an example that shows how…

0