
Administering AUDIX for ELA
8.Press (F3) ENTER to save this information to the system database.
The cursor returns to the command line, and the system displays the message Command Successfully Completed.
9.Continue with the next procedure or enter exit to leave AUDIX Administration.
Defining Two ELA Trusted Servers
The ELA software runs as two separate trusted servers. For the ELA servers to communicate with the INTUITY AUDIX server, they must be defined to the INTUITY AUDIX system. The installation worksheets you received from your account representative will have the exact names for the ELA trusted servers. However, for the purposes of this document, the first ELA trusted server will be referred to as the administrative server and the second ELA trusted server as the delivery server.
A request from ELA to send a message to an AUDIX mailbox involves invoking an IMAPI session and locking the ELA mailbox. A server that uses IMAPI to access an AUDIX mailbox is known as a trusted server.
!
SECURITY ALERT:
The procedures in this section include setting a password the trusted server must use to access AUDIX. There is a secondary layer of security (in addition to a trusted server password) that you can administer. This additional layer of security involves setting a separate IMAPI password that the trusted server must use before the system will allow an IMAPI session to be invoked.
While administration of this additional password is optional, it is strongly recommended. See your INTUITY Messaging Solutions Release 4 Administration book.
Before You Begin
Before adding the ELA trusted server to the system, you will need the following information:
■Two unique 1- to
Additionally, the server names must comply with the guidelines for naming machines your INTUITY Messaging Solutions Release 4 Administration book for complete information on naming conventions).
28Issue 1 July 1997