Chapter 10 Setting Up Authentication for the Cisco Unity Administrator

Determining the Authentication Method to Use for the Cisco Unity Administrator

Table 10-4

Cisco Unity Log On Page for Windows Credentials

 

 

 

Field Name

 

Description

 

 

 

User Name

 

Subscribers must enter the alias for the Windows domain account that is associated with their

 

 

Cisco Unity subscriber account. (For example, they can enter tcampbell or they can enter the full path,

 

 

tcampbell@<domain name>.)

 

 

If subscribers enter the full path for their alias, they do not need to complete the Domain field.

 

 

 

Password

 

Subscribers must enter the password for their Windows domain account.

 

 

 

Domain

 

Subscribers must enter the name of the domain in which their Windows domain account resides, unless

 

 

they entered a full path for their alias in the User Name field. If that is the case, subscribers can leave

 

 

the field blank.

 

 

 

6.Internet Explorer sends the credentials—in clear text—to Cisco Unity. (To solve this security problem, set up Cisco Unity to use SSL.)

7.When the subscriber has entered Domino credentials on the Log On page, Cisco Unity searches the Domino Address Book for a Person document associated with the user name that the subscriber entered on the Log On page. Once the user name is found, Cisco Unity retrieves the encrypted password from the Person document and compares it with the password that the subscriber entered on the Log On page. The process continues with Step 9.

(Note that by default, the connection between the Cisco Unity server and the Domino server is not encrypted. Refer to the Domino documentation for details on encrypting network data on a server port. It is also a good idea to discuss potential performance issues with the Domino administrator for the organization before enabling encryption on the Domino server.)

8.When the subscriber has entered Windows credentials on the Log On page, Cisco Unity requests authentication of the credentials from Windows. The process continues with Step 10.

9.If Cisco Unity can authenticate the Domino credentials, Cisco Unity confirms that there is a subscriber account associated with the Domino Person document used to authenticate the subscriber, and that the subscriber account has the proper COS rights. The process continues with Step 11.

If the credentials cannot be authenticated, Cisco Unity presents a web page that indicates that the subscriber does not have permission to view the Cisco Unity Administrator website.

10.If Cisco Unity can authenticate the Windows credentials, Cisco Unity then confirms that there is a subscriber account associated with the Windows domain account used to authenticate the subscriber and that the subscriber account has COS rights to access the Cisco Unity Administrator. The process continues with Step 11.

If the credentials cannot be authenticated, Cisco Unity presents a web page that indicates that the subscriber does not have permission to view the Cisco Unity Administrator website.

11.If the subscriber account exists and it has the proper COS rights, Cisco Unity presents the first page of the Cisco Unity Administrator website, which is displayed in the browser.

If the subscriber account does not exist or does not have the proper COS rights, Cisco Unity presents a web page, which indicates that the subscriber does not have permission to view the Cisco Unity Administrator website.

 

 

Installation Guide for Cisco Unity Release 5.x with IBM Lotus Domino (Without Failover)

 

 

 

 

 

 

OL-13599-01

 

 

10-5

 

 

 

 

 

Page 99
Image 99
Cisco Systems OL-13599-01 manual 10-5

OL-13599-01 specifications

Cisco Systems OL-13599-01 is an integral part of Cisco's portfolio of networking equipment, designed to enhance the efficiency and performance of various networking environments. This model is particularly notable for its robust features, cutting-edge technologies, and adaptable characteristics, making it suitable for enterprise-level applications.

Main features of Cisco OL-13599-01 include advanced routing capabilities that facilitate seamless data transmission across complex networks. It supports a range of protocols, ensuring compatibility and interoperability with various networking devices. The system is optimized for high throughput, enabling the handling of multiple concurrent connections without compromising performance. Additionally, it offers enhanced security measures, including integrated firewalls, intrusion prevention systems, and advanced encryption standards, which protect sensitive data and safeguard against unauthorized access.

Technologically, OL-13599-01 is built on Cisco's state-of-the-art architecture, allowing for virtualization and automation. This means users can efficiently manage their network resources, deploy applications swiftly, and even automate routine maintenance tasks. The system supports Software-Defined Networking (SDN), which promotes greater flexibility in network management by enabling centralized control over traffic flows and configurations. This technology reduces operational complexity and fosters a more agile networking environment.

Another characteristic of Cisco OL-13599-01 is its scalability. As organizations grow, their networking needs evolve, and OL-13599-01 can easily scale to accommodate increased demands. It supports modular components that allow for easy upgrades and expansions, ensuring the system remains relevant and effective over time. Furthermore, the device is designed for energy efficiency, which not only contributes to sustainability efforts but also reduces operational costs.

In conclusion, Cisco Systems OL-13599-01 stands out as a powerful networking solution that combines robust features, advanced technologies, and versatile characteristics. Its ability to handle high traffic, support various protocols, and provide strong security measures makes it a favored choice among enterprises aiming to enhance their networking infrastructure. With its focus on scalability and efficiency, OL-13599-01 is crafted to meet the dynamic demands of modern businesses, ensuring they remain competitive and resilient in an ever-evolving digital landscape.