Security Settings System Security
Polycom, Inc. 51
Allow basic
authentication to
Exchange server
Normally, if calendaring is enabled, the Polycom DMA
system authenticates itself with the Exchange server
using NTLM authentication.
If this option is selected, the Polycom DMA system still
attempts to use NTLM first. But if that fails or isn’t
enabled on the Exchange server, then the DMA system
falls back to HTTP Basic authentication (user name and
password).
We recommend using NTLM authentication rather than
enabling this option.
In order for either NTLM or HTTP Basic authentication
to work, they must be enabled on the Exchange server.
Skip certificate
validation for server
connecting
Normally, when the Polycom DMA system connects to a
server, it validates that server’s certificate.
This option configures the system to accept any
certificate presented to it without validating it.
We recommend using valid certificates for all servers
that the system may need to contact rather than
enabling this option. Depending on system
configuration, this may include:
MCUs
Active Directory
Exchange
RealPresence Resource Manager or CMA system
Other DMA systems
Skip certificate
validation for encrypted
signaling
Normally, during encrypted call signaling (SIP over
TLS), the Polycom DMA system requires the remote
party (endpoint or MCU) to present a valid certificate.
This is known as mTLS or two-way TLS.
This option configures the system to accept any
certificate (or none).
We recommend installing valid certificates on your
endpoints and MCUs rather than enabling this option.
Table 3-5 Fields on the Security Settings page (continued)
Field Description