Error 5016 Exchange Free Busy
Issue:
Error 5016 exchange free busy, Can't see free busy of other calendars
Background:
- First Reason: Certificate is not assigned appropriately to the Exchange services such smtp/IIS.
- Second Reason could be the Federated Trust between on-Premise and Exchange Online.
To use this feature several things will need to be configured:
- trust with the Microsoft Federation Gateway.
- organizational relationship must be configured.
- autodiscover and EWS must allow WS Security authentication.
The proxy needs to allow unauthenticated traffic to the following url’s:
- /EWS/exchange.asmx/WSSecurity.
- /autodiscover/autodiscover.svc/WSSecurity.
- /autodiscover/autodiscover.svc.
So we need to :
- verify if autodiscover allows WS Security for authentication
- verify the external EWS url
- verify if Exchange Web Services will allow WS Security for authentication
Solution:
Solution 1: Verify Certificate
Import the certificate
Import-ExchangeCertificate -Path C:\CertificateFile.crt
Enable-ExchangeCertificate -Thumbprint paste_thumbprint_here -Services "SMTP, IMAP, IIS"
Solution 2: Verify AutodiscoverVirtualDirectory
Get-AutodiscoverVirtualDirectory|select server, WSSecurityAuthentication
Verify if the value of the column WSSecurityAuthentication is set to true
Get-AutodiscoverVirtualDirectory|Set-AutodiscoverVirtualDirectory -WSSecurityAuthentication:$true
Using this cmdlet the authentication method will be configured but to offer this authentication type you will need to perform an IISReset. Additional you can verify if the svc-integrated handler is attached to the autodiscover virtual directory:
[
](https://johanveldhuis.nl/wp-content/uploads/2013/10/IIS.png)
Solution 3:Verify the Exchange Web Services
this can be done by using the Get-WebServicesVirtualDirectory cmdlet:
Get-WebServicesVirtualDirectory|select server, ExternalUrl, WSSecurityAuthenticationcmdle
WSSecurityAuthentication needs to be set to tru
In case that WSSecurity is not true enabled it by using the following cmdlet:
Get-WebServicesVirtualDirectory|Set-WebServicesVirtualDirectory -WSSecurityAuthentication:$true
If no external url is configured you will need to configure one
To verify if the certificate contains the correct names we will use Powershell again:
Get-ExchangeCertificate|? {$_.Services -like “*IIS*”}|select Subject, CertificateDomains|FL
Verify if the CertificateDomains contain the FQDN you are planning to use for EWS, for examplemail.domain.com of ews.domain.com. If this name is not on the certificate you will need to renew your certificate.
Get-WebServicerVirtualDirectory|Set-WebServicesVirtualDirectory -Externalurl “https://ews.domain.com/EWS/exchange.asmx”
Solution 4: verify the Federation Trust
This can be done by starting with Test-FederationTrustCertificate which will verify if the certificate used for the trust is correct and is installed on all CAS
Test-FederationTrustCertificate
Test-FederationTrust cmdlet to verify if the Federation Trust really works
Test-FederationTrust
Test-FederationTrust -UserIdentity user@domain.com
I also imported all the federation certificate in the new exchange server after exporting it from the old server
Solution 5: verify the Organization Relationship
not all domains are listed here it can cause strange issues such as it works for domain.
Make sure you add your domain.com to the organizational sharing domains
Get-OrganizationRelationShip, retrieves the current configuration
GetFederationInformation, will send an autodiscover request to the other organization to retrieve the configuration
The following parameters are important in this case:
DomainNames
TargetApplicationUri
TargetAutoDiscoverEpr
Solution 6: OU
Makesure that the users is in the OU that is synced with o365
Solution 7: Autodiscover
Check that the autodiscover URL (autodiscover.muatazawad.com/Autodiscover/Autodiscover.xml ) is accessible internally and externally. If it is not accessible, check the authentication and change the authentication for the autodiscover in IIS if it is needed.
-WindowsAuthentication $false
-BasicAuthentication $false
-DigestAuthentication $true
Solution 8: Run the Hybrid Configuration Wizard
Run the latest version of HCW on Exchange 2013.
Solution 8: Set-IntraOrganizationConnector
Set-IntraOrganizationConnector "MainCloudConnector" -Enabled $false
Reference:
How to troubleshoot free/busy issues in a hybrid deployment of on-premises Exchange Server and Exchange Online in o365
From <https://support.microsoft.com/en-us/kb/2555008>