Share via


Step 1. Evaluate Your Organization's Requirements for External User Access (2007 R2 Beta)

[This is preliminary documentation and is subject to change. Blank topics are included as placeholders.]

Deploying Edge Servers on your network enables your organization’s users to benefit from Office Communications Server features while working outside your firewalls (and without any need for a virtual private network (VPN) connection), and it also enables users from other organizations to collaborate with your internal users.

Benefits of Deploying Edge Servers

Including Edge Servers in your deployment provides the following benefits:

  • Secure access for your organization’s remote users Your organization’s users can use Office Communications Server features—including secure instant messaging (IM), presence, conferencing, and audio/video features—even while they are working outside of your organization’s firewalls.
  • Federation with other organizations You can establish a federation with another organization that runs Office Communications Server; thereafter, users of the federated organization who have been validated by Office Communications Server in that organization are recognized by your deployment as well.
  • External user conference participation External users—even those who are not part of your organization or a federated organization (anonymous users)—can be invited to join your organization’s conferences. If the conference includes audio and video, these media can be shared with the anonymous user as well.
  • Public IM connectivity Your organization’s users can use IM to communicate with users of instant messaging services provided by the MSN network of Internet services, Yahoo!®, and AOL®. (Public IM connectivity requires a separate license.)
  • Desktop sharing with external users Your users can use the Desktop Sharing feature to transmit a view of their desktop while collaborating with external users. For more information about Desktop Sharing, see New Desktop Sharing Feature.

See Also

Concepts

Step 2. Determine the Components Required for External User Access