And
App
Day
End
ID
Ids
Not
Or
SID
To
TTL
UID
Url
Expand Minimize

ConnectingSID

Last modified: October 13, 2012

Applies to: Exchange Online | Exchange Server 2007 | Exchange Server 2010 | Exchange Server 2013 | Office 365

The ConnectingSID element represents an account to impersonate when you are using the ExchangeImpersonation SOAP header.

ExchangeImpersonation
  ConnectingSID

<ConnectingSID>
   <PrincipalName/>
</ConnectingSID>

<ConnectingSID>
   <SID/>
</ConnectingSID>

<ConnectingSID>
   <PrimarySmtpAddress/>
</ConnectingSID>

<ConnectingSID>
   <SmtpAddress/>
</ConnectingSID>

ConnectingSIDType

The following sections describe attributes, child elements, and parent elements.

Attributes

None.

Child elements

Element

Description

PrincipalName

Represents the user principal name (UPN) of the account to use for impersonation. This should be the UPN for the domain where the user account exists.

SID

Represents the security descriptor definition language (SDDL) form of the security identifier (SID) for the account to use for impersonation.

PrimarySmtpAddress

Represents the primary Simple Mail Transfer Protocol (SMTP) address of the account to use for Exchange impersonation. If the primary SMTP address is supplied, it will cost an extra Active Directory directory service lookup in order to obtain the SID of the user. We recommend that you use the SID or UPN if they are available.

SmtpAddress

Represents the Simple Mail Transfer Protocol (SMTP) address of the account to use for Exchange Impersonation. If the SMTP address is supplied, it will cost an extra Active Directory lookup in order to obtain the SID of the user. We recommend that you use the SID or UPN if they are available.

Parent elements

Element

Description

ExchangeImpersonation

Used in the SOAP header of a request. When this element is present, the caller is trying to impersonate the account that is contained within the ExchangeImpersonation element.

The following is the XPath expression to this element:

/ExchangeImpersonation

The calling account must have the ms-exch-impersonation right on the Client Access server and the ms-exch-MayImpersonate right on either the mailbox database that contains the mailbox to impersonate or the Active Directory user or contact object.

The schema that describes this element is located in the EWS virtual directory of the computer that is running MicrosoftExchange Server 2007 that has the Client Access server role installed.

Namespace

http://schemas.microsoft.com/exchange/services/2006/types

Schema name

Types schema

Validation file

Types.xsd

Can be empty

False

Show:
© 2014 Microsoft