Table of Contents

Configure access type

You'll need to configure your access type based on the type of permissions you require across your organisation.

Impersonation access

Impersonation works on a one-to-many basis. You’ll need to set up a dedicated service account on our behalf in Active Directory, and then give that account impersonation rights over all accounts it will need to access.

For example, if you have 5 branches and twenty five customer assistants whose calendars we need access to – our service account would need to be given Impersonation rights over those accounts within your Exchange server. We then create a staff member for each of them in the JRNI platform and link the two accounts using the email address to complete the integration.

Impersonation is administered by a system admin and cannot be changed by an individual mailbox owner. Access rights are actually set against the impersonator account (service account) and the rights granted are broad, covering the mailbox and calendar – although we only use access to the calendar.

Delegate access

The alternative to Exchange Impersonation is Delegate access. This is for each mailbox account to provide delegate access to the service account. Access rights are set on a one-to-one basis, and are administered by the mailbox owner, meaning rights can be granted or removed at any time by them.

One of the major advantages of using delegate access is that access rights are more granular, and you can pick and choose which folders or areas of the account we have access to.

How did we do?

Configure SSL certificate verification