Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions How TSAPI works with SDB Yanli.

Slides:



Advertisements
Similar presentations
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Advertisements

1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
System and Network Security Practices COEN 351 E-Commerce Security.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
1 Chapter 1 Introduction to Windows Server Two main goals for Net Admin Make network resources available to users Files, folders, printers, etc.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Understanding Active Directory
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
Avaya Contact Center Control Manager. © 2010 Avaya Inc. All rights reserved. What if you could… 1 Requires purchase of additional connectors  Enable.
© 2008 OSIsoft, Inc. | Company Confidential Windows Integrated Security for the PI Server Hans-Herbert Gimmler Rulik Perla.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Copyright © 2007, SAS Institute Inc. All rights reserved. SAS Activity-Based Management Survey Kit (ASK): User Management & Security.
Implementing Dynamic Host Configuration Protocol
Remote Desktop Services Remote Desktop Connection Remote Desktop Protocol Remote Assistance Remote Server Administration T0ols.
Today’s Objectives Chapters 10 and 11 Security in SQL Server –Manage server logins and database users. –Manage server-level, database-level, and application.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Confidential Configuring Attendant Console.
9 Copyright © 2005, Oracle. All rights reserved. Administering User Security.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
10.1 Silberschatz, Galvin and Gagne ©2005 Operating System Principles 10.4 File System Mounting A file system must be mounted before it can be accessed.
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
Chapter Two Clients and Servers: Who’s the Boss?.
ArcGIS Server for Administrators
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Overview Managing a DHCP Database Monitoring DHCP
A Brief Documentation.  Provides basic information about connection, server, and client.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Lecture 5: User Accounts & Directory Service Instructor: Dr. Najla Al-Nabhan
Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. PUBLIC PUBLIC CO900G L03 - Design, Implement, and Manage FactoryTalk Security.
Chapter 10: Rights, User, and Group Administration.
Controlling User Access Fresher Learning Program January, 2012.
3 Copyright © 2004, Oracle. All rights reserved. Controlling Access to the Oracle Listener.
2. SQL Security Objectives –Learn SQL Server 2000 components Contents –Understanding the Authentication Process –Understanding the Authorization Process.
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Copyright © 2006, Infinite Campus, Inc. All rights reserved. User Security Administration.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
03 | Manage Team Foundation Server Steven Borg | Co-founder & Strategist, Northwest Cadence Anthony Borton | ALM Consultant, Enhance ALM.
Chapter 13Introduction to Oracle9i: SQL1 Chapter 13 User Creation and Management.
8 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. BI Publisher Server: Administration and Security.
1 Objectives Discuss the basics of Dynamic Host Configuration Protocol (DHCP) Describe the components and processes of DHCP Install DHCP in a Windows Server.
Oracle 11g: SQL Chapter 7 User Creation and Management.
Module 6: Administering Reporting Services. Overview Server Administration Performance and Reliability Monitoring Database Administration Security Administration.
Chapter 6 Server Management: Domains Workgroup Domain Trust Relationship Examples.
© 2005 Avaya Inc. All rights reserved. Avaya – Proprietary & Confidential. For Internal Use Only. CTI Adapter for Salesforce.com Overview Emerging Products.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Information Security Professionals
Configuring and Troubleshooting DHCP
Consulting Services JobScheduler Architecture Decision Template
Active Directory Administration
Common Security Mistakes
To Join the Teleconference
Valid Avaya 7130X Exam Study Guide - Avaya 7130X Questions Answers Realexamdumps.com
IIS.
Figure 6-9: Managing Users and Groups
Administering Your Network
X-Road as a Platform to Exchange MyData
PT2520 Unit 8: Database Security I
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions How TSAPI works with SDB Yanli

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 2 3 classes of Users on AE Services: AE Services Management Console Administrators This is used to manage the AES service, the administrator is authenticated against the Linux platform or Enterprise Directory (Active Directory, Domino, OpenLDAP, etc…) using the LDAP or LDAP-S (Secure LDAP) protocol User Management Administrators----provided via OAM This is used to manage all AE Services users (add, change or delete users). Client Application Users This is used to authenticated the applications which using TSAPI, JTAPI, DMCC and Telephony Web Service applications.

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 3 AE Service Management Console Administrator Accounts The appropriate role names are System Administrator, Security Administrator, Auditor, Maintenance, and Backup Restore. RoleLinux Group System_AdministratorSusers Security_AdministratorSecurityadmin Administrative role for User ManagementNot associated with Linux( the local LDAP data store). Auditorusers Backup_RestoreBackuprestore Avaya_MaintenanceAvayamaint

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 4 User Management Administrator Accounts User Management Administrators are authenticated against a Local LDAP store on the AE Server. 2 defaut accounts: craft and avaya A User Administrator must have the userservice.useradmin role set.

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 5 Client Application User Accounts(Usage of the Security Database) The AE Services TSAPI, JTAPI, Telephony Web Service and DMCC each authenticate a connecting client application and authorize the control of devices by the client application. For a CTI user which is associated with the client application: - Authenticated by LDAP -Authorized by SDB

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 6 User Management Administration AE Services users are authenticated by AE Services User Management (as opposed to Linux). User Management is the default user database that AE Services uses for user authentication (validating a user’s identity).

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 7 LDAP 2 methods to reach the user list: 1. Execute the command below to check the user list: ldapsearch -x -D "cn=Manager,dc=avaya,dc=com" –W Where the password is passw0rd 2. AE Services Management Console->User Management ->User Admin->List All Users

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 8 What’s SDB The Application Enablement Services (AE Services) Security Database (SDB) provides the ability to control a user’s access privileges. The SDB stores information about Computer Telephony (CT) users and the devices they control. The DMCC service, the TSAPI service, and Telephony Web Services use this information for permission checking.

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 9 SDB control Enabling the Security Database-TSAPI, JTAPI and Telephony Web Service Enable SDB for DMCC Service

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 10 Access Rights Options

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 11 Security Database objects Tlinks : TSAPI links (Tlinks) are service identifiers (names) dynamically created by the TSAPI service. Tlink groups : A Tlink group is a name you assign to one or more Tlinks. Devices : A device can be a telephone, a fax machine, a modem, an ACD, a VDN, or an agent ID that CM controls. Device groups : A device group refers to the name of a group and the devices that make up the group. Worktops : A worktop refers to a collection of devices. CTI Users : A CTI user is a person (or an application) administered as a CT user in the AE Services User Management database who logs in and uses the TSAPI service. Some additional TSAPI tests about these concepts in Slide 17 to 21

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 12 Security Database objects Relationship ① A CTI User can control a Device Group. ② A Device Group is composed of one or more devices. ③ A CTI User can control a Device via a Tlink which belongs to a Tlink Group. ④ A Tlink Group is composed of one or more Tlinks. ⑤ A device should be given a tlink group over which the requests from clients can be accepted.

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 13 SDB control test

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 14 SDB control for TSAPI enabled

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 15 SDB control for TSAPI disabled

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 16 SDB control for TSAPI ---- Tlinks, Tlike Group, Device and Device group

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 17 SDB control for TSAPI ---- Tlinks, Tlike Group, Device and Device group

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 18 SDB control for TSAPI ---- Tlinks, Tlike Group, Device and Device group

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 19 SDB control for TSAPI ---- Tlinks, Tlike Group, Device and Device group

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 20 SDB control for TSAPI ---- Tlinks, Tlike Group, Device and Device group Summarize When you associate a device with a Tlink group, a user can issue call control requests only for the device on a Tlink in the Tlink group.

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 21 SDB control for DMCC disabled

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 22 SDB control for DMCC enabled

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 23 DMCC applications and SDB authorization These enhancements allow a DMCC application to do the following: Get a list of the devices that are associated with a session Transfer devices from one session to another session Share the control of a devices among multiple sessions Some additional DMCC tests about these contents in Slide 24 to 33

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 24 Some other SDB control tests for DMCC Get a list of the devices that are associated with a session STEP1 :

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 25 Some other SDB control tests for DMCC Get a list of the devices that are associated with a session STEP2 :

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 26 Some other SDB control tests for DMCC Get a list of the devices that are associated with a session STEP3 : Output: 4721:switch: :0 2034:switch: :0

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 27 Some other SDB control tests for DMCC Transfer devices from one session to another session STEP1:

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 28 Some other SDB control tests for DMCC Transfer devices from one session to another session STEP2:

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 29 Some other SDB control tests for DMCC Transfer devices from one session to another session STEP3: Result:

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 30 Some other SDB control tests for DMCC Share the control of a devices among multiple sessions STEP1:

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 31 Some other SDB control tests for DMCC Share the control of a devices among multiple sessions STEP2:

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 32 Some other SDB control tests for DMCC Share the control of a devices among multiple sessions STEP3:

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 33 Some other SDB control tests for DMCC Share the control of a devices among multiple sessions Result:

Copyright© 2003 Avaya Inc. All rights reserved Avaya – Proprietary Use pursuant to Company instructions 34 END Thank you!