Security Settings

System Security

 

 

Table 3-5

Fields on the Security Settings page (continued)

 

 

 

Field

 

Description

 

 

 

Allow basic

 

Normally, if calendaring is enabled, the Polycom DMA

authentication to

system authenticates itself with the Exchange server

Exchange server

using NTLM authentication.

 

 

If this option is selected, the Polycom DMA system still

 

 

attempts to use NTLM first. But if that fails or isn’t

 

 

enabled on the Exchange server, then the DMA system

 

 

falls back to HTTP Basic authentication (user name and

 

 

password).

 

 

We recommend using NTLM authentication rather than

 

 

enabling this option.

 

 

In order for either NTLM or HTTP Basic authentication

 

 

to work, they must be enabled on the Exchange server.

 

 

Skip certificate

Normally, when the Polycom DMA system connects to a

validation for server

server, it validates that server’s certificate.

connecting

 

This option configures the system to accept any

 

 

certificate presented to it without validating it.

 

 

We recommend using valid certificates for all servers

 

 

that the system may need to contact rather than

 

 

enabling this option. Depending on system

 

 

configuration, this may include:

 

 

MCUs

 

 

Active Directory

 

 

Exchange

 

 

RealPresence Resource Manager or CMA system

 

 

Other DMA systems

 

 

Skip certificate

Normally, during encrypted call signaling (SIP over

validation for encrypted

TLS), the Polycom DMA system requires the remote

signaling

 

party (endpoint or MCU) to present a valid certificate.

 

 

This is known as mTLS or two-way TLS.

 

 

This option configures the system to accept any

 

 

certificate (or none).

 

 

We recommend installing valid certificates on your

 

 

endpoints and MCUs rather than enabling this option.

 

 

 

Polycom, Inc.

51

Page 63
Image 63
Polycom 3725-76302-001LI manual Field Description