Chapter 10 Setting Up Authentication for the Cisco Unity Administrator

Determining the Authentication Method to Use for the Cisco Unity Administrator

5.If Windows can confirm the identity of the Windows domain user, then IIS sends the user and domain name to Cisco Unity, and the process continues with Step 6.

If Windows cannot validate the identity of the Windows domain user (as would be the case if the subscriber logged on to an untrusted domain), Internet Explorer prompts the subscriber for a user name and password. Once again, the credentials are not sent across the network; instead, Internet Explorer sends IIS an encrypted message regarding the Windows domain account based on the credentials that were entered in the dialog box. If Windows still cannot authenticate the user, Internet Explorer displays a message indicating that access to the website is denied because the domain account is unknown.

6.Cisco Unity checks to see that there is a subscriber account associated with the Windows domain account used to authenticate the subscriber and that the subscriber account has COS rights to access the Cisco Unity Administrator.

7.If a subscriber account exists and it has the proper COS rights, Cisco Unity presents the first page of the Cisco Unity Administrator website, which is displayed in the browser.

If the subscriber account does not exist or does not have the proper COS rights, Cisco Unity presents a web page that indicates that the subscriber does not have permission to view the Cisco Unity Administrator website.

How Anonymous Authentication Works with the Cisco Unity Administrator

When IIS is configured so that the Cisco Unity Administrator uses Anonymous authentication, Cisco Unity authenticates the credentials that subscribers enter on the Cisco Unity Log On page.

1.A Cisco Unity subscriber starts Internet Explorer and attempts to browse to the Cisco Unity Administrator website.

2.Internet Explorer tries to get the home page for the Cisco Unity Administrator from IIS.

3.IIS allows access to Cisco Unity based on the privileges for the IUSR_[computer name] account. (This is the anonymous account that IIS uses for Anonymous authentication by default.)

4.Cisco Unity presents the Cisco Unity Log On page, which is displayed in the browser.

5.By default, the Log On page prompts subscribers to enter the Domino credentials, as shown in Table 10-3. However, subscribers can click the Log On Using Windows Authentication link provided on the Log On page to browse to another Log On page, as shown in Table 10-4, on which they can enter their Windows domain account credentials.

Table 10-3

Cisco Unity Log On Page for Domino Credentials

 

 

 

Field Name

 

Description

 

 

 

Full Name

 

Subscribers must enter the full Lotus Notes user name that is associated with their Cisco Unity

 

 

subscriber account.

 

 

The full name consists of the user name, any organizational units that the Domino Person document

 

 

resides in, and the IBM Domino certifier domain. (For example, subscribers can enter Terry

 

 

Campbell/Sales/Cisco.)

 

 

 

Password

 

Subscribers must enter the Internet password for their Domino user account.

 

 

 

 

Installation Guide for Cisco Unity Release 5.x with IBM Lotus Domino (Without Failover)

10-4

OL-13599-01

Page 98
Image 98
Cisco Systems OL-13599-01 manual Field Name Description, 10-4

OL-13599-01 specifications

Cisco Systems OL-13599-01 is an integral part of Cisco's portfolio of networking equipment, designed to enhance the efficiency and performance of various networking environments. This model is particularly notable for its robust features, cutting-edge technologies, and adaptable characteristics, making it suitable for enterprise-level applications.

Main features of Cisco OL-13599-01 include advanced routing capabilities that facilitate seamless data transmission across complex networks. It supports a range of protocols, ensuring compatibility and interoperability with various networking devices. The system is optimized for high throughput, enabling the handling of multiple concurrent connections without compromising performance. Additionally, it offers enhanced security measures, including integrated firewalls, intrusion prevention systems, and advanced encryption standards, which protect sensitive data and safeguard against unauthorized access.

Technologically, OL-13599-01 is built on Cisco's state-of-the-art architecture, allowing for virtualization and automation. This means users can efficiently manage their network resources, deploy applications swiftly, and even automate routine maintenance tasks. The system supports Software-Defined Networking (SDN), which promotes greater flexibility in network management by enabling centralized control over traffic flows and configurations. This technology reduces operational complexity and fosters a more agile networking environment.

Another characteristic of Cisco OL-13599-01 is its scalability. As organizations grow, their networking needs evolve, and OL-13599-01 can easily scale to accommodate increased demands. It supports modular components that allow for easy upgrades and expansions, ensuring the system remains relevant and effective over time. Furthermore, the device is designed for energy efficiency, which not only contributes to sustainability efforts but also reduces operational costs.

In conclusion, Cisco Systems OL-13599-01 stands out as a powerful networking solution that combines robust features, advanced technologies, and versatile characteristics. Its ability to handle high traffic, support various protocols, and provide strong security measures makes it a favored choice among enterprises aiming to enhance their networking infrastructure. With its focus on scalability and efficiency, OL-13599-01 is crafted to meet the dynamic demands of modern businesses, ensuring they remain competitive and resilient in an ever-evolving digital landscape.