In this section, add two OWA PERMIT policies for both Mega_Group and IT_Group to access the OWA service using Secure Web (HTTPS).
This procedure creates a policy for the Secure Mobile Access Local Group, Mega_Group, and results in OWA access for members of the Active Directory group, Mega Group.
To access the Exchange server, adding a PERMIT policy to the 10.200.1.10/exchange
URL Object itself is not enough. Another URL Object policy is needed that permits access to 10.200.1.10/exchweb
, because some OWA Web contents are located in the exchweb directory.
Repeat this procedure for IT_Group to provide OWA access for members of the Active Directory group, IT Group.
In this configuration, members of IT_Group and Mega_Group are denied access to the https://owa-server/public
folder, because these groups have access only to the /exchange and /exchweb subfolders.
The OWA policies are applied to Exchange server URL Objects rather than server IP addresses because OWA is a Web service.
In the Add User Policy window, select URL Object in the Apply Policy To drop-down menu.
10.200.1.10/exchange
.In the Add User Policy window, select URL Object in the Apply Policy To drop-down menu.
10.200.1.10/exchweb
. We are finished with the policies for Mega_Group. Repeat this procedure for IT_Group to provide OWA access for members of the Active Directory group, IT Group.