In this final part of the article series, we will install the local configuration store, install Lync 2010 Server binaries and setup the certificate for Lync to work properly. Check out part one and two before following this article.
We went through the steps to prepare AD, prepare first std edition server, install topology builder and creating & publishing a topology in the previous articles. The next step is to install the local configuration store. Every Lync server have a local copy of the CMS and is known as the local store. Since the Std Edition server hosts the CMS, a separate instance of SQL is used (as it is on the same server) to configure the local store.
Launch deployment wizard and click on Install or Update Lync Server System.
Click on the Run button in step 1 – Install Local Configuration Store.
Select the first option to retrieve data directly from the CMS and click Next.
The wizard will go through the different steps to create an RTCLocal instance of SQL and fill it with data from the CMS. This will take a while, be patient! Click the Finish button once it is enabled.
You will now have a green tick box against step one.
Click the Run button on step 2 to install the full Lync 2010 Server binaries.
Click Next on the wizard window.
You may get the error message below. If so, check my article for steps to fix the issue. The server will need to be restarted and step 2 has to be run again.
If you were not presented with the error (or you have fixed it and ran step 2 again), click the Finish button when enabled.
Make sure you have a green tick against step 2. If you do have a tick, you now have a Lync 2010 Server .
Next step is to configure the certificate for Lync services. This is where the internal CA comes in handy. If you don’t have a Certificate Authority in your network, now is the time to set one up. Click the Run button against step 3.
Click on Request on the top right hand corner to request an internal cert for Lync.
Click Next on the certificate request wizard window.
Select the first option, to send request to a CA immediately and click Next.
Select your internal CA and click Next.
Leave the CA account window blank and click Next.
Leave the alternate certificate template blank and click Next.
Give a friendly name for the cert and click Next.
Fill in your organization details. These are optional though.
Geographical information is optional as well.
The urls for the cert will be automatically filled in depending upon the topology that you have configured. Verify it and click Next.
Check your sip domain and click Next.
Specify any additional urls that you need in the SAN certificate.
Click Next on the Certificate Request Summary window.
The Request-CsCertificate cmdlet will be run to request the certificate. Click Next when completed..
You will be able to assign the certificate straightaway. Make sure the check box is selected and click Finish.
Click Next on the certificate assignment wizard.
You will be given a summary of the certificate that will be applied. Verify it and click Next.
The wizard invokes the Set-CSCertificate cmdlet and assigns the certificate for Lync services. Click Finish when the task status is completed.
The certificate wizard will confirm that the cert has been successfully applied to Lync Server.
Click Close to exit the certificate wizard and you will have a green tick against step 3 in the deployment wizard.
The last step using the deployment wizard is to start all associated Lync services. Click the Run button against Step 4.
Click Finish once the wizard has completed starting all the services.
You will not have a green ticket against step 4. Click Exit to close the deployment wizard. Confirm that all services have started properly by using the services snap-in.
The only other step remaining is to create an SRV record for sipinternaltls pointing to the front end pool so that users can sign-in to the Lync client automatically (once you have enabled them). Check my article for the steps to setup the SRV record.
This concludes the article series. You now have a fully working Lync server
UC Architect, Blogger, Husband & Dad. I have been in IT for the last 14 years, with interests in Active Directory, Exchange, Office 365 & Windows Azure. I am active on Experts Exchange & TechNet forums and I am a technical author for SearchExchange.