Setting Up the Server

Similar documents
CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page.

SAML-Based SSO Configuration

Unified Communications Manager Version 10.5 SAML SSO Configuration Example

SAML-Based SSO Configuration

SAML-Based SSO Solution

Unity Connection Version 10.5 SAML SSO Configuration Example

Manage SAML Single Sign-On

SAML-Based SSO Solution

Cisco Prime Collaboration Assurance Guide - Standard, 10.5

Cisco Prime Collaboration Assurance Guide - Standard, 10.6

SAML SSO Deployment Guide for Cisco Unified Communications Applications, Release 12.0(1)

Introduction to Provisioning

Quick Start Guide for SAML SSO Access

Quick Start Guide for SAML SSO Access

Troubleshooting Single Sign-On

Troubleshooting Single Sign-On

LDAP Directory Integration

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

Installing and Configuring vcloud Connector

LDAP Directory Integration

Configuration Guide - Single-Sign On for OneDesk

Cisco Unified Serviceability

Managing GSS Devices from the GUI

System Administration

Troubleshooting Web Inbox

CHAPTER. Introduction

Overview of Cisco Prime Collaboration Assurance

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

Cisco CTL Client Setup

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29

AirWatch Mobile Device Management

This chapter describes the tasks that you perform after installing Prime Cable Provisioning.

Push Notifications (On-Premises Deployments)

Configuration Tab. Cisco WebEx Messenger Administration Guide 1

AppController :21:56 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Five9 Plus Adapter for Agent Desktop Toolkit

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

TACACs+, RADIUS, LDAP, RSA, and SAML

VMware AirWatch Integration with RSA PKI Guide

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Configuring the SMA 500v Virtual Appliance

Using SSL to Secure Client/Server Connections

Oracle Access Manager Configuration Guide

Using vrealize Operations Tenant App as a Service Provider

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Provisioning Dashboards and Reports

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager

Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

SAML SSO Okta Identity Provider 2

VMware Identity Manager Administration

Installation of Cisco Business Edition 6000H/M

Unified CCX Administration Web Interface

Setting Up Resources in VMware Identity Manager

Configure System Parameters

Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

Setup. About Window. About

Services. Service descriptions. Cisco HCS services

Installing and Configuring vcloud Connector

Cloud Secure Integration with ADFS. Deployment Guide

Monitor System Status

Introduction to application management

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

Set Up Certificate Validation

Configuring Cisco TelePresence Manager

Box Connector. Version 2.0. User Guide

VMware AirWatch Certificate Authentication for EAS with ADCS

The Cisco HCM-F Administrative Interface

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS)

Cisco Unified Communications Domain Manager manual configuration

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server

QUICK START GUIDE Cisco Unified Service Statistics Manager, 9.0

Installing Cisco CMX in a VMware Virtual Machine

Configuring Cisco Unified Presence for Integration with Microsoft Exchange Server

This section includes troubleshooting topics about single sign-on (SSO) issues.

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)

Configuring the Cisco APIC-EM Settings

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

Cisco CTL Client setup

VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP

Managing Certificates

Installation. Power on and initial setup. Before You Begin. Procedure

Add OKTA as an Identity Provider in EAA

Installing and Configuring vcenter Support Assistant

Best Practices for Security Certificates w/ Connect

Integrating with Prime Service Catalog

Workspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810

Users. LDAP Synchronization Overview

Troubleshooting Cisco Personal Communications Assistant (PCA)

Troubleshooting the Cisco Personal Communications Assistant (PCA) in Cisco Unity Connection 8.x

Introduction to Change and Configuration Management

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Integrate Microsoft Office Communicator and Microsoft Lync Clients for Cisco UC

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support...

Cisco Expressway Cluster Creation and Maintenance

Single Sign-On for PCF. User's Guide

VAM. ADFS 2FA Value-Added Module (VAM) Deployment Guide

Transcription:

Managing Licenses, page 1 Cross-launch from Prime Collaboration Provisioning, page 5 Integrating Prime Collaboration Servers, page 6 Single Sign-On for Prime Collaboration, page 7 Changing the SSL Port, page 10 Configuring Provisioning to Use LDAP and ACS Servers, page 10 Configuring Prime Collaboration Provisioning Server Time Zone, page 12 Managing Licenses To use Prime Collaboration Provisioning, you must have the Provisioning Image license and one or more scale licenses. The image license must be present or the product will remain in the evaluation mode. Scale licenses add to the number of phones you can provision. The License Status Information page (go to Administration > System Configuration > License Management, click the Provisioning License Status Icon on the right) displays Feature name, Available count, Used count and Expiry. In Prime Collaboration Provisioning Standard, the delegation, workflow, template, and nbi features are listed under unavailable features. When you purchase a license for Prime Collaboration Provisioning, these features will appear in the valid features list. If you have a distributed installation, when the network connection between the two servers is lost and then reestablished or when only the Provisioning database (the PostgreSQL database) server is restarted, you will not be able to log into the Provisioning server, and sometimes a license error appears on the Licensing Status Information page. The error message states that all features are unavailable. When this occurs, restart the Provisioning services on the Application server. You can purchase Provisioning image license and one or more scale licenses to cover the number of phone MAC addresses to be managed. Scale licenses are additive, up to 150,000 per one Provisioning instance. The image license must be present or the product will remain in evaluation mode. 1

Licensing Process The optional Provisioning NBI requires the purchase of a separate license (Provisioning API license). Prime Collaboration Provisioning checks for the presence of the license before enabling the Provisioning NBI. The Application Programmable Interface (API) for Provisioning is called the Cisco Prime Collaboration Provisioning Northbound Interface (Provisioning NBI). It is a set of web service, SOAP-based requests covering the majority of Provisioning s provisioning functionality. For detailed information see the Provisioning NBI document. To use the Provisioning NBI, you must purchase an additional feature license. Purchasing a base (phone limit) Provisioning license does not enable you to use the Provisioning NBI. If more than one image license file is found in the license directory, Prime Collaboration Provisioning will pick and use the latest image license file (based on the file date). When a license file is added through License Management page, Prime Collaboration Provisioning will validate the license file and will display proper validation message if an error is encountered. Adding the license file may fail in the following scenarios: Incorrect license file (Assurance license added for Provisioning application) Incorrect MAC address Incorrect version of license License file corrupted or modified License count mismatch You can view the manually uploaded license files in the License Management page. Licensing Process The following process applies to new installations (and upgrades), scale licenses, and the Provisioning API license. Procedure Step 1 Step 2 Step 3 Obtain a Product Authorization Key (PAK) The PAK is used to register Prime Collaboration Provisioning on Cisco.com, and it contains resource limitations. For each incremental license that you purchase, you will receive a PAK, and you must use that PAK to obtain a license file. Obtain a license file A license file is sent to you after you register the PAK on Cisco.com. Import the license file to Prime Collaboration Provisioning from the License Management page. If Prime Collaboration Provisioning is already installed and you are upgrading your license file, you must register the license file with Prime Collaboration Provisioning. 2

Switching Between the Standard and modes in Prime Collaboration Adding a License File to Prime Collaboration Provisioning To add a license file to Prime Collaboration Provisioning standalone or converged application: To add a license file to Prime Collaboration Provisioning standalone: Procedure Step 1 Step 2 Step 3 Go to License Management page. In the converged mode, choose Administration > License Management. In the standalone Prime Collaboration Provisioning application, chooseadministration > System Configuration > License Management. In the License Management page, click Add. If you are updating from the Cisco Prime Collaboration Provisioning Standard mode to the Cisco Prime Collaboration Provisioning licensed mode, you must add the new license files and later delete all the old license files (see Upload Time column) listed in the License Management page using the Delete option. In the Add License File window, upload the license file and click OK. The newly added license file information appears in the License Status pane. If you purchased more than one license, repeat Step 2 and Step 3to install each additional license. To delete a license file, in the License Management page, select the license file and then click Delete. Switching Between the Standard and modes in Prime Collaboration Prime Collaboration provides you the facility to switch from the Standard mode to the mode in both Prime Collaboration Assurance and Prime Collaboration Provisioning. The following tables capture the different scenarios of switching: 3

Switching Between the Standard and modes in Prime Collaboration Table 1: Switching from the Standard Mode to the Mode in Prime Collaboration Assurance Installation Modes Prime Collaboration Assurance Standard to Evaluation Yes. (Click the Upgrade icon at the top right corner of the User Interface and click Start Evaluation.) Standard to (Purchase license) Yes. (Click the Upgrade icon at the top right corner of the User Interface and click Add Licenses. In the License Management page, click Add and upload the license file for the advanced mode.) Evaluation to (Purchase license) Yes. (Click the Upgrade icon at the top right corner of the User Interface and click Add Licenses. In the License Management page, click Add and upload the license file for the advanced mode.) Evaluation to Standard Yes. After the evaluation expiry, you are prompted with a message to either downgrade to the standard mode or to purchase a license file for advanced mode. If you choose to downgrade, the Cluster for Standard Mode dialog box pops-up. Select a cluster from the Unified Communications Manager drop-down, device type from the Cisco Unity Connection drop-down list and click Select. Table 2: Switching from the Standard Mode to the Mode in Prime Collaboration Provisioning Installation Modes Prime Collaboration Provisioning Standard to Evaluation Not Applicable Standard to (Purchase license) Yes. (Click the Upgrade icon at the top right corner of the User Interface and click Add Licenses. In the License Management page, click Add and upload the license file for the advanced mode.) Evaluation to (Purchase license) Yes. (Click the Upgrade icon at the top right corner of the User Interface and click Add licenses. In the License Management page, click Add and upload the license file for the advanced mode.) Evaluation to Standard Not Applicable 4

Cross-launch from Prime Collaboration Provisioning In the converged mode, you have the provision to switch over from the standard to advanced mode. You can either upgrade: One application only You can switch from the standard to advanced mode in Prime Collaboration Assurance only and continue to access the Prime Collaboration Provisioning in the same (installed) mode. Both the applications You can switch from the standard or advanced evaluation mode to the advanced (purchase licensed) in both Prime Collaboration Assurance and Prime Collaboration Provisioning. Cross-launch from Prime Collaboration Provisioning With Prime Collaboration 10.0 and above, you can access the Cisco Unified Communication functionality through Prime Collaboration Provisioning, using the cross-launch feature of Prime Collaboration Provisioning. Any user with admin privilege can cross-launch from Prime Collaboration Provisioning to use Cisco Unified Communication products. The main intent of providing cross-launch is to enable a smooth, continuous workflow if an admin in Prime Collaboration Provisioning wants to update a user configuration on the product UI of the configured devices such as Cisco Unified Communications Manager, Unity Connection, or IM and Presence Services. As an admin user, you can use cross-launch for the following purposes, from Prime Collaboration Provisioning: Cross-launching Devices from Infrastructure Configuration Cross-launching Serviceability from Infrastructure Setup. See Adding Devices. Cross-launching Related Links in CUCM from User Provisioning. See Adding Users. Cross launching is available for users with admin privileges only and is supported for Cisco Unified Communications Manager, Unity Connection and Presence Services from 10.0 version onwards. If you add older version (earlier than 10.0) of these devices in Prime Collaboration Provisioning, you will view native launch links only, as an admin. However, Presence Services, with versions earlier than 10.0, are not listed in the Infrastructure Configuration view as native links were not supported in earlier versions of Prime Collaboration. Enabling Single Sign-On (SSO) for Cross-launch is not mandatory. If you have not enabled SSO for cross-launch, you must specify the login credentials when you cross launch a processor (Cisco Unified Communications Manager, Unity Connection, or Presence Services) for the first time by continuing when you are prompted to add the website in the trusted security certificate list. However, you need not login on successive attempts to cross launch the processor as long as the session is in progress and running. To enable SSO, see Single Sign-On for Prime Collaboration. Depending on browser settings, the cross-launch may open in new browser tab or a new window. Refer to the browser compatibility in the product documentation of the specific application. 5

Integrating Prime Collaboration Servers Integrating Prime Collaboration Servers You can leverage capabilities of both Prime Collaboration Assurance and Prime Collaboration Provisioning systems if you choose to integrate Prime Collaboration Assurance and Prime Collaboration Provisioning applications in order to monitor voice endpoints, video endpoints, and provision the Unified Communications Systems. Attaching Prime Collaboration Provisioning To integrate the servers: Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 On the Prime Collaboration Assurance server, go to Administration > System Setup > Assurance Setup > Cisco Prime 360 Integration. Under Prime Collaboration Provisioning Server Setup, specify the IP address of the Prime Collaboration Provisioning application server that you want to attach to. See Required Ports for Prime Collaboration for details on the ports used for data transfer. Test the connectivity of the Prime Collaboration Provisioning server. Click Attach. After you attach the Prime Collaboration Provisioning application to Prime Collaboration Assurance, you must refresh the UI to view the Design and Deploy tabs on the UI. Click Test Provisioning Certificate on the Getting Started page to test the SSL certificate for Prime Collaboration Provisioning server, if you have selected the HTTPS protocol. On Windows Internet Explorer: When you launch the converged application, the following message appears "Do you want to view only the web page content that was delivered securely". If you select "No", from the pop-up dialog box, the appropriate data is displayed on all of the Prime Collaboration Provisioning pages. If you select "Yes" from the pop-up dialog box, data is not displayed on all of the Prime Collaboration Provisioning pages. However, with Microsoft IE 9.0 and 10.0,the security warning is not displayed and the appropriate data is displayed on all of the Prime Collaboration Provisioning pages. On Internet Explorer 10.0 and Internet Explorer 11.0 When Prime Collaboration UI is launched in converged mode, you may not be able to launch Provisioning UI even after clicking Test Provisioning Certificate. An error message, Content Blocked due to Invalid Security Certificate is displayed. To overcome this issue, perform the following task: 1 In the Address bar, click Certificate Error > View certificates. 2 In the Certificate dialog box, click Install Certificate followed bynext. 3 Select Place All Certificates option and browse for the Certificate Store 6

Single Sign-On for Prime Collaboration 4 Check Show Physical Stores check box. 5 Select Trusted Root Certificate Authorities Local Computer option. 6 Click OK and Finish. 7 Repeat Step 2 to Step 4. 8 Select Trusted Publishers Local Computer option and click Finish. 9 Restart the Internet Explorer to avoid certification error. On Mozilla Firefox: For the mixed contents to be displayed on the server, click the Shield icon in the address bar and select Disable Protection on This Page from the Keep Blocking drop-down. After Integration: The Prime Collaboration Provisioning UI is converged with Prime Collaboration Assurance, and the Provisioning IP address is redirected to Prime Collaboration Assurance application even though you log in to Prime Collaboration Provisioning application. After you detach Prime Collaboration Provisioning from Prime Collaboration Assurance, the user roles that were applicable for Prime Collaboration Provisioning and Prime Collaboration Assurance in the converged mode also apply for the standalone applications. If you want to restart or shut down the Prime Collaboration Provisioning application, ensure you detach it from Prime Collaboration Assurance. You can then converge it after the restart process. Single Sign-On for Prime Collaboration Prime Collaboration provides users with admin privileges to enable Single Sign-On (SSO) in Prime Collaboration Assurance and Prime Collaboration Provisioning using Security Assertion Markup Language (SAML). Prime Collaboration does not support multiserver SAN certificates and end user SAML SSO. You can enable SSO in Prime Collaboration Provisioning to cross-launch the following UC applications: Cisco Unified Communications Manager Cisco Unity Connection Cisco Unified Presence To cross-launch the UC applications without the need for login credentials, ensure that SSO for those applications are configured on the same IdP server as that of Prime Collaboration. Ensure that the following prerequisites are met before you enable SSO: Prime Collaboration Provisioning is configured to use Secure Socket Layer (SSL). SSL needs to be enabled before you enable SSO for Provisioning. For the steps to enable SSL in Prime Collaboration Provisioning, see section "Enabling SSL for Prime Collaboration Provisioning" in the Cisco Prime Collaboration Provisioning Guide. 7

Single Sign-On for Prime Collaboration By default, SSL is enabled in Prime Collaboration Assurance application. At least one LDAP Administrative user exists in the system through LDAP synchronization in Prime Collaboration Provisioning and by manually creating an LDAP administrative user in Prime Collaboration Assurance. For information on how to provide administrative privileges to a user in Prime Collaboration Provisioning, see Managing Users chapter in the Cisco Prime Collaboration Provisioning Guide. An Identity Provider (IdP) server that enables you to use SSO to access many other applications from a single hosted application and a Service Provider. The Service Provider is a website that hosts the applications. Following are the supported third-party IdP servers: Open Access Manager (OpenAM) Ping Identity Active Directory Federation Services (ADFS) Oracle Identity Manager For the steps to setup an IdP server, see the SAML SSO Deployment Guide for Cisco Unified Communication Applications, Release 10.0(1). Download the Identity Provider metadata file from the IdP server and save it in your local system. To enable Single Sign-on: Procedure Step 1 Step 2 Step 3 Step 4 Choose Administration > Single Sign-on. Click Enable SSO. A warning message is displayed stating, Enabling SSO redirects you to the IdP server for authentication from the next login. To access the application, you will need to be authenticated successfully. Enable SSO is disabled if the above mentioned prerequisites are not met. Click Continue. Follow the steps provided in the SSO wizard to enable Single Sign-On. a) Locate the IdP metadata file from your local system and click Import IdP Metadata. b) Click Download Trust Metadata file. c) Launch the IdP server and import the downloaded Trust Metadata file. This is a manual step for Enabling SSO. You need to create a Circle of Trust (CoT) in the IdP server and log out before you proceed with the SSO testing. d) To run SSO Test Setup, select a username from the Valid Administrative Usernames drop-down. Using any other username to log in to the IdP server might lock the administrator account. e) Click Run SSO Test to test the connectivity among the IdP server, Prime Collaboration Applications, and Single Sign-On. If you are prompted with an error message, Unable to do Single Sign-On or Federation: 8

Single Sign-On for Prime Collaboration Manually log in to the IdP server using the end user credentials and check if the authentication is successful. Verify if the Trust Metadata file is successfully uploaded in the IdP server. Verify if the Prime Collaboration server and the IdP server are part of the same Circle of Trust. f) Click Finish. In the converged mode, Prime Collaboration uses the Provisioning setup to cross launch the Cisco Unified Communications Manager, Cisco Unity Connection, and Cisco Unified Presence applications. Troubleshooting and Logs for SSO When you are logged out of the Prime Collaboration server while enabling SSO, it is recommended that you close the browser and re-launch the Prime Collaboration application. Because, though your session expires in Prime Collaboration server, the IdP server session might still be active. You can find the log file (ssosp*.log) for Prime Collaboration Provisioning in the /opt/cupm/sep/logs directory and for Prime Collaboration Assurance in the /opt/emms/tomcat/webapps/emsam/log/sso directory. While enabling SSO, ensure that the hostname for Prime Collaboration is set and is part of DNS. When IdP server is down, you can: Use the recovery URL- https://<pcserver IP address or host name that is part of DNS>/ssosp/local/login. Disable Single Sign-On from CMD Utility. To disable SSO from CMD utility in Prime Collaboration applications: Log in to Prime Collaboration Provisioning server using SSH with port 22, for Prime Collaboration Assurance it is 26. Navigate to the /opt/cupm/sep/build/bin directory for Prime Collaboration Provisioning and /opt/emms/emsam/bin directory for Prime Collaboration Assurance. Add <Operation> and <Value> entries for cpcmconfigsso.sh file based on the table below: Operations can be.. 1-To get the Single Sign-On status 2-To get the recovery URL status 3-To set the Single Sign-On status 4-To set the recovery URL status Values can be.. Not applicable Not applicable False True or False You cannot enable SSO through CLI. Use the UI procedure to enable SSO. To disable SSO, run the following command: cpcmconfigsso.sh 3 false 9

Changing the SSL Port By default, the recovery URL is enabled. If you want to disable it for security reasons, set it as false. Changing the SSL Port To change the port used by Prime Collaboration Provisioning for SSL: Procedure Step 1 Step 2 In the Prime Collaboration Provisioning system, open the ssl.conf file located at /opt/cupm/httpd/conf. Change the port number in the following lines: Listen 443 VirtualHost_default_:443 ServerName www.example.com:443 RewriteRule ^/?(.*) https://%{server_name}:443/$1 [R,L] Step 3 Step 4 Step 5 Step 6 Step 7 After you change the port number, you must enter the new port number when you access Prime Collaboration Provisioning. Save the changes and close the file. Open the httpd.conf file located at /opt/cupm/httpd/conf. Change the port number in the following line: RewriteRule ^/?(.*) https://%{server_name}:443/$1 [R,L] Save the changes and close the file. Restart the Apache server by using the following commands: /opt/cupm/httpd/bin#./apachectl -k stop /opt/cupm/httpd/bin#./apachectl -k start -DSSL Configuring Provisioning to Use LDAP and ACS Servers You can configure Prime Collaboration Provisioning to use Access Control Server (ACS) or LDAP servers for authentication. ACS server is used to authenticate only, however, you can use LDAP server to read, write and synchronize. 10

Enabling SSL for LDAP Server or Third-Party Certificate If you are adding an ACS server, you must add the Provisioning server as an ACS client (with TACACS). To enable SSL for LDAP Server, see Enabling SSL for LDAP Server or Third-Party Certificate, on page 11. Before deleting an ACS or LDAP server, ensure that it is not assigned to a Domain. ACS or LDAP servers are enabled on a per Domain basis. After adding an ACS or LDAP server, you must assign it to a Domain. All the users then, in a Domain, will be authenticated against that ACS or LDAP server. If an ACS or LDAP server is not associated to a Domain, all the users of that Domain are authenticated locally. globaladmin is always authenticated locally. When configuring Provisioning to use Cisco Secure Access Control Server, be aware of the following: When you click the Test Connection button, only the connectivity of the IP address is checked. The Shared Secret Key is used only for authentication. If you entered an incorrect Shared Secret Key, when you try to log into Provisioning, you will get an incorrect secret key error. Use the SSK that is generated while configuring ACS. Provisioning supports only ACS 4.2. Enabling SSL for LDAP Server or Third-Party Certificate Using Prime Collaboration Provisioning user interface, you can import Prime Collaboration Provisioning SSL certificate updates or LDAP server certificates. To do this: Before You Begin 1 To enable SSL for third-party certificate, you must import PEM format (zip file containing.key and.crt files) of the third party certificate. This format provides certificate and private key as two separate files, which is recommended for the Apache server. 2 To enable SSL for LDAP server, you must import the SSL certificate in.cer format of the certificate. Procedure Step 1 ChooseAdministration > System Maintenance > Updates. Step 2 Step 3 Step 4 Step 5 Click Add. Add SSL Certificate pop-up dialog box appears. Select a file and click Upload to import the SSL Certificate. Restart Prime Collaboration Provisioning. Go to the LDAP Server Configuration page and check the Use SSL check box. To delete an SSL certificate in Prime Collaboration Provisioning, click Delete. 11

Configuring Prime Collaboration Provisioning Server Time Zone Configuring Prime Collaboration Provisioning Server Time Zone To change the time zone setting in a converged sever, you must detach Provisioning from Assurance, and change the time zone settings. You can provide Coordinated Universal Time (UTC), also known as Greenwich Mean Time (GMT), updated with leap seconds. To change the time zone in the Provisioning server: Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Log into the Prime Collaboration Provisioning server with the account that you have created during installation. By default, it is the admin account. Enter the following command to see the list of supported time zones: cm/admin# show timezones Enter the following commands to set the time zone for the Prime Collaboration Provisioning server: cm/admin(config)# config t cm/admin(config)# clock timezone US/Pacific cm/admin(config)# exit Enter the following command to copy running-configuration to startup-configuration: cm/admin# write memory Login into Prime Collaboration Provisioning using root account. Navigate to cd /opt/cupm/sep. Update the following property in the dfc.properties file to update the offset: dfc.gui.utc_offset=<applicable offset for your geographic location> For example, if you are in IST time zone, you must enter: dfc.gui.utc_offset=+0530 Restart the services /etc/init.d/pmservers stop /etc/init.d/pmservers start After attaching the Provisioning server to Assurance, the Assurance time zone settings are displayed in the Assurance UI. However, the Provisioning UI will display Provisioning time zone. In Prime Collaboration Provisioning converged and standalone applications, you can also change the time zone by selecting the Time Zone icon from the top right corner of the Provisioning home page. In the Time Zone Settings (UTC Offset) page, enter the New UTC offset and Location details and click Apply. In Prime Collaboration converged application, the changes that you make using the Time Zone icon will be reflected only in the Provisioning UI (Assurance time zone will not be changed). In the Provisioning standalone server, you can also change the time zone by selecting the Time Zone icon from the top right corner of the Provisioning home page. In the Time Zone Settings (UTC Offset) page, enter the New UTC offset and Location details and click Apply. 12

Configuring Prime Collaboration Provisioning Server Time Zone The changes that you make to the time zone via UI will last only till you log out of the application. When you login back, only the server time zone will be displayed in the UI. To change the time zone permanently, update the server time zone followed by the above-mentioned steps. 13

Configuring Prime Collaboration Provisioning Server Time Zone 14