SAML SSO Deployment Guide for Cisco Unified Communications Applications, Release 12.5(1)

First Published: 2019-01-23

Last Modified: 2021-11-22

Americas Headquarters

Cisco Systems, Inc.

170 West Tasman Drive

San Jose, CA 95134-1706

USA

http://www.cisco.com

Tel: 408 526-4000

800 553-NETS (6387)

Fax: 408 527-0883

Preface

This document provides information on how to enable the Security Assertion Markup Language Single Sign-On (SAML SSO) solution, which allows administrators to access a defined set of Cisco collaboration applications seamlessly after signing into one of those applications. This document describes the various applications that can be used with the SAML-based SSO solution as well as the supported Identity Providers (IdPs) that provide the user authentication for the solution. This document provides links to product documentation for configuration of specific collaboration applications.

Audience

This document is intended for system administrators who are familiar with the SAML-based SSO solution for the various Cisco Unified Communications applications and supported IdPs. This guide also requires knowledge of Network Time Protocol (NTP) and Domain Name System (DNS) server settings.

Organization

Chapters Description
SAML-Based SSO Solution Provides an overview of how the SAML-based SSO solution works and contains information about general topics, and components that are related to the configuration and operation of SAML SSO feature. It also details the basic configuration flow and system requirements.
SAML SSO Requirements for Identity Providers Contains information on the requirements that Identity Providers must meet to support a SAML SSO solution with Cisco Collaboration applications.
SAML SSO Configuration Contains procedures that describe how to configure SAML SSO for Cisco Collaboration applications.
End User SSO Contains information about end user SSO.

Conventions

This document uses the following conventions:

Convention Description
boldface font Commands and keywords are in boldface.
italic font Arguments for which you supply values are in italics.
string A non-quoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks.
screen font Terminal sessions and information the system displays are in screen font.
boldface screen font Information you must enter is in boldface screen font.
italic screen font Arguments for which you supply values are in italic screen font.
< > Nonprinting characters, such as passwords, are in angle brackets.

Notes use the following conventions:

Additional Information

For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What'sNew in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

Subscribe to the What'sNew in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.

Cisco Product Security Overview

This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately.

Further information regarding U.S. export regulations may be found at http://www.access.gpo.gov/bis/ear/ear_data.html

Chapter 1: SAML-Based SSO Solution

About SAML SSO Solution

Important When deploying Cisco Jabber with Cisco Webex meeting server, Unified Communications Manager and the Webex meeting server must be in the same domain.

SAML is an XML-based open standard data format that enables administrators to access a defined set of Cisco collaboration applications seamlessly after signing into one of those applications. SAML describes the exchange of security related information between trusted business partners. It is an authentication protocol used by service providers (for example, Unified Communications Manager) to authenticate a user. SAML enables exchange of security authentication information between an Identity Provider (IdP) and a service provider.

SAML SSO uses the SAML 2.0 protocol to offer cross-domain and cross-product single sign-on for Cisco collaboration solutions. SAML 2.0 enables SSO across Cisco applications and enables federation between Cisco applications and an IdP. SAML 2.0 allows Cisco administrative users to access secure web domains to exchange user authentication and authorization data, between an IdP and a Service Provider while maintaining high security levels. The feature provides secure mechanisms to use common credentials and relevant information across various applications.

The authorization for SAML SSO Admin access is based on Role-Based Access Control (RBAC) configured locally on Cisco collaboration applications.

Single Sign on Single Service Provider Agreement

SAML SSO establishes a Circle of Trust (CoT) by exchanging metadata and certificates as part of the provisioning process between the IdP and the Service Provider. The Service Provider trusts the IdP's user information to provide access to the various services or applications.

Important Service providers are no longer involved in authentication. SAML 2.0 delegates authentication away from the service providers and to the IdPs.

The client authenticates against the IdP, and the IdP grants an Assertion to the client. The client presents the Assertion to the Service Provider. Since there is a CoT established, the Service Provider trusts the Assertion and grants access to the client.

Single sign-on allows you to access multiple Cisco collaboration applications after logging on to one of them. In the releases earlier than Unified Communications Manager Release 11.5, when administrators enabled SSO, each cluster node generated its own service provider metadata (SP metadata) file with a URL and a certificate. Each generated file had to be uploaded separately on Identity Provider (IDP) server. As the IDP server considered each IDP and SAML exchange as a separate agreement, the number of agreements that were created was equivalent to the number of nodes in the cluster.

To improve the user experience and to reduce the total cost of the solution for large deployments, this release is enhanced. Now, it supports a single SAML agreement for a Unified Communications Manager cluster (Unified Communications Manager and Instant Messaging and Presence (IM and Presence)).

SAML-Based SSO Features

Enabling SAML SSO results in several advantages:

Basic Elements of a SAML SSO Solution

Note: All in-scope services requiring authentication use SAML 2.0 as the SSO mechanism.

See the following figure for the identity framework of a SAML SSO solution.

Identity Framework

Cisco Unified Communications Applications that Support SAML SSO

Chapter 2: SAML SSO Requirements for Identity Providers

Requirements for Identity Providers

This section provides an outline of the requirements that Identity Providers must meet in order to deploy SAML SSO services for Cisco Collaboration applications.

Identity Providers must adhere to the following guidelines:

When configuring SAML SSO, make sure to deploy the following in your Cisco Collaboration Deployment:

SAML Agreement Types

Cisco Unified Communications Manager supports two types of SAML metadata agreements:

Cluster Wide Mode
Per Node Mode

The following image illustrates the contents of a metadata zip file that was generated on Cisco Unified Communications Manager using a per node agreement. In this example, the IM and Presence Service is deployed using a Standard Deployment (non-centralized) so the zip file contains separate metadata xml files for each Unified Communications Manager and IM and Presence Service cluster node.

UC Metadata File Downloaded from Cisco Unified Communications Manger

Note If you have a Centralized Deployment for the IM and Presence Service, your IM and Presence deployment is in a separate cluster from your telephony cluster. With Cluster Wide agreements, you must generate metadata separately for your telephony cluster, and for your IM and Presence cluster.

Metadata Exchange

As a part of the process for setting up SAML SSO, you must exchange metadata files between your UC deployment and the Identity Provider.

SAML Metadata Exchange

Following is an example of a UC metadata file that was generated from the Service Provider (Cisco Unified Communications Manager).

Metadata File from Service Provider (Cisco Unified Communications Manager)

Following is an example of a metadata file that was generated from an Identity Provider. In this example, the metadata file was generated from the PingFederate Identity Provider.

Metadata File from Identity Provider (PingFederate)

SAML Assertions

Following is an example of the SAML Assertion that is sent from the Identity Provider to Cisco Unified Communications Manager:

SAML Assertion Example

SAML OAuth Authentication Flow

Following is an example of the authentication flow for an OAuth authentication request with the Identity Provider.

OAuth Authentication Flow

Chapter 3: SAML SSO Configuration

SAML-Based SSO Prerequisites

The following system setup is required for SAML-Based SSO configuration:

NTP Setup

In SAML SSO, Network Time Protocol (NTP) enables clock synchronization between the Unified Communications applications and IdP. SAML is a time sensitive protocol and the IdP determines the time-based validity of a SAML assertion. If the IdP and the Unified Communications applications clocks are not synchronized, the assertion becomes invalid and stops the SAML SSO feature. The maximum allowed time difference between the IdP and the Unified Communications applications is 3 seconds.

Note For SAML SSO to work, you must install the correct NTP setup and make sure that the time difference between the IdP and the Unified Communications applications does not exceed 3 seconds.

DNS Setup

Domain Name System (DNS) enables the mapping of host names and network services to IP addresses within a network or networks. DNS server(s) deployed within a network provide a database that maps network services to hostnames and, in turn, hostnames to IP addresses. Devices on the network can query the DNS server and receive IP addresses for other devices in the network, thereby facilitating communication between network devices.

Directory Setup

Unified Communications applications can use DNS to resolve fully qualified domain names to IP addresses. The service providers and the IdP must be resolvable by the browser. For example, when the administrator enters the service provider hostname (http://www.cucm.com/ccmadmin) in the browser, the browser must resolve the hostname. When the service provider redirects the browser to IdP (http://www.idp.com/saml) for SAML SSO, the browser must also resolve the IdP hostname. Moreover, when the IdP redirects back to the service provider ACS URL, the browser must resolve that as well.

LDAP directory synchronization is a prerequisite and a mandatory step to enable SAML SSO across various Unified Communications applications. Synchronization of Unified Communications applications with an LDAP directory allows the administrator to provision users easily by mapping Unified Communications applications data fields to directory attributes.

Note To enable SAML SSO, the LDAP server must be trusted by the IdP server and supported by Unified Communications applications.

For more information, see the "Directory Integration and Identity Management" chapter of the Cisco Collaboration System Solution Reference Network Designs at: https://www.cisco.com/c/en/us/support/unified-communications/unified-communications-system/products-implementation-design-guides-list.html

Certificate Management and Validation

Important Cisco strongly recommends that server certificates are signed for SAML SSO and that multiserver certificates are used where product support is available.

In SAML SSO, each entity participating in the SAML message exchange, including the user's web browser, must establish a seamless secure HTTPS connections to the required entities. Cisco strongly recommends that signed certificates issued by a trusted Certificate Authority be configured on each UC product participating in the SAML SSO deployment.

Unified Communications applications use certificate validation to establish secure connections with servers. Certificates are used between end points to build a trust/authentication and encryption of data. This confirms that the endpoints communicate with the intended device and have the option to encrypt the data between the two endpoints.

When attempting to establish secure connections, servers present Unified Communications clients with certificates. If the client cannot validate a certificate, it prompts the user to confirm if they want to accept the certificate.

Certificates Signed by a Certificate Authority

Cisco recommends using server certificates that are signed by one of the following types of Certificate Authority (CA):

The signing process varies for each product and can vary between server versions. It is beyond the scope of this document to provide detailed steps for every version of each server. Refer the appropriate server documentation for detailed instructions on how to get certificates signed by a CA.

However, the following steps provide a high-level overview of the procedure:

Procedure

  1. Generate a Certificate Signing Request (CSR) on each product that can present a certificate to the client.
  2. Submit each CSR to the CA.
  3. Upload the certificates that the CA issues to each server.

Every server certificate should have an associated root certificate present in the trust store on client computers. Cisco UC applications validate the certificates that servers present against the root certificates in the trust store.

If you get server certificates signed by a public CA, the public CA should already have a root certificate present in the trust store on the client computer. In this case, you do not need to import root certificates on the client computers.

You should import root certificates if the certificates are signed by a CA that does not already exist in the trust store, such as a private CA.

In SAML SSO, the IdP and service providers must have CA signed certificates with the correct domains in the CN or SAN. If the correct CA certificates are not validated, the browser issues a pop up warning.

For example, when the administrator points the browser to https://www.cucm.com/ccmadmin; the Unified Communications Manager portal presents a CA certificate to the browser. When the browser is redirected to https://www.idp.com/saml, the IdP presents a CA certificate. The browser will check that the certificate presented by the servers contains CN or SAN fields for that domain, and that the certificate is signed by a trusted CA.

Alternatively, if the customer has their own private CA, then that CA must be installed as a root trust anchor on the computers that the administrator is launching their browser from.

Configure Multiserver SAN Certificates

Each Cisco product has its own process for generating multiserver SAN certificates. For information about the Cisco products that support multiserver SAN certificates see the relevant guide.

Related Topics

Deploy Certificate Issuer for Microsoft Edge Interoperability

An interoperability issue exists within SAML SSO deployments where the Microsoft Edge Browser is deployed. If the Edge Browser is deployed on an SSO-enabled machine, the Edge browser does not recognize the certificate issuer of the Unified Communications Manager certificate and does not provide access.

Use this procedure to fix this issue via the Group Policy Object (GPO) and Active Directory whereby you can push the certificate issuer of the Unified Communications Manager certificate to the Trusted Root Certification of local machines that use the Edge browser.

Note The "certificate issuer" depends on how your certificates are set up. For example, for third-party CA certificates, You may need to push the CA certificate only if the CA itself signs the Unified Communications Manager certificate. However, if an intermediate CA signs the Unified Communications Manager certificate, you may need to push the complete certificate chain, which will include the root certificate, intermediate certificate, and any leaf certificates.

Before you begin

Membership in the local Administrators group, or equivalent, of the local machine is the minimum required to complete this procedure

Procedure

  1. In Active Directory, Open Group Policy Management Console.
  2. Find an existing GPO or create a new GPO to contain the certificate settings. The GPO must be associated with the domain, site, or organizational unit whose users you want affected by the policy.
  3. Right-click the GPO, and select Edit.
  4. The Group Policy Management Editor opens, and displays the current contents of the policy object. In the navigation pane, open Computer Configuration > Windows Settings > Security Settings > Public Key Policies > Trusted Publishers.
  5. Click the Action menu, and click Import.
  6. Follow the instructions in the Certificate Import Wizard to find and import the certificate.
  7. If the certificate is self-signed, and cannot be traced back to a certificate that is in the Trusted Root Certification Authorities certificate store, then you must also copy the certificate to that store. In the navigation pane, click Trusted Root Certification Authorities, and then repeat steps 5 and 6 to install a copy of the certificate to that store.

Note For additional information on Managing Trusted Root Certificates in Active Directory, see https://technet.microsoft.com/en-us/library/cc754841(v=ws.11).aspx.

SAML SSO Configuration Task Flow

Complete these tasks to configure SAML SSO in your Cisco Collaboration environment. This process includes procedures for the following applications:

Procedure

Step Command or Action Purpose
Step 1 Initiate SSO Configuration on Collaboration Applications, on page 23 In your Cisco Collaboration environment, initiate the SSO configuration and export UC metadata.
Step 2 Configure SAML SSO on Identity Provider, on page 26 On your Identity Provider:
  • Upload the UC metadata
  • Configure SAML SSO agreements
  • Export an IdP metadata file
Step 3 Enable SAML SSO for Cisco Collaboration Applications, on page 26 Import IdP metadata into your Cisco Collaboration environment and complete the configuration.

Initiate SSO Configuration on Collaboration Applications

In your Cisco Collaboration environment, begin the SAML SSO configuration and export UC metadata for upload into your Identity Provider. Depending on the applications for which you are configuring SAML SSO, and the options chosen, you may have multiple download files.

Before you begin

Make sure that you plan beforehand what type of SAML SSO agreement you want (cluster wide or per node), along with the certificate type.

Procedure

  1. On Cisco Unified Communications Manager, export a UC metadata file:
    • From Cisco Unified CM Administration, choose System > SAML Single Sign On.
    • Select an SSO Mode option: Cluster wide or Per Node.
    • Select a Certificate option: System generated self-signed certificate or a Cisco Tomcat certificate.
    • Click Export All Metadata and save the metadata file to a secure location.
    With cluster wide agreements, you will receive a single metadata file. With per node agreements, the zip file download contains a separate XML files for each cluster node. If you have IM and Presence Service deployed in a Standard deployment,
  2. IM and Presence Service—If you have a Centralized Deployment for the IM and Presence Service, repeat step 1 on the standalone Unified CM publisher node that is a part of your IM and Presence central cluster.
    Note With IM and Presence Service Standard Deployments you can skip this task because the the metadata file that you downloaded from Unified Communications Manager in the previous step includes metadata for the IM and Presence Service cluster.
  3. On Cisco Unity Connection, export a metadata file:
    • From Cisco Unity Connection Administration, choose System Settings > SAML Single Sign On.
    • Select the SSO Mode option: Cluster wide or Per node.
    • Click Export All Metadata.
  4. On Cisco Expressway-C, export a metadata file:
    • On the Expressway-C primary peer, go to Configuration > Unified Communications > Configuration
    • In the MRA Access Control section, choose either of the following options for the Authentication path:
      • SAML SSO authentication
      • SAML SSO and UCM/LDAP—Allows either method.
    • Choose a SAML Metadata option: Cluster or Peer
      • Cluster-Single metadata file for cluster
      • Peer-Separate metadata files per node.
    • Click Export SAML data.
    • For Cluster agreements, click Generate Certificate and then Download the certificate.
    • For Peer agreements, Download All.
    • Save in a secure location.

At the completion of this procedure, you will have metadata files for each of your Collaboration applications. The number of metadata files depends on your configuration and deployment type.

Metadata Download Example

Refer to the following for an example of the number of file downloads you can expect from your Cisco Collaboration deployment. Assume that you are configuring SSO for the following applications:

The following table provides a breakdown of the total download files that you can expect depending on whether you are uisng cluster-wide agreements, and whether the IM and Presence Service is in a Standard Deployment or Centralized Deployment.

Agreement Type Total Files Downloaded when IM and Presence is in Standard Deployment Total Files Downloaded when IM and Presence is in Centralized Deployment*
Cluster wide Three metadata XML files representing following clusters:
  • Unfiied Communications Manager and IM and Presence Service cluster
  • Unity Connection cluster
  • Expressway-C cluster
Four metadata XML files representing following clusters:
  • Unfiied Communications Manager cluster
  • IM and Presence Service cluster
  • Unity Connection cluster
  • Expressway-C cluster
Per node Three zip files containing 13 metadata XML files:
  • One zip file with eight XML files for Unified CM and IM and Presence nodes
  • One zip file with two XML files for Unity Connection nodes
  • One zip file with three XML files for Expressway-C nodes
Four zip files containing 14 metadata XML files:
  • One zip file with five XML files for Unified CM nodes
  • One zip file with three XML files for IM and Presence nodes and an extra XML file for the standalone Unified CM publisher node that is in the IM and Presence central cluster
  • One zip file with two XML files for Unity Connection nodes
  • One zip file with three XML files for Expressway-C nodes

Configure SAML SSO on Identity Provider

On the Identity Provider, you need to:

Cisco provides the following Idp-specific configuration examples as a guide for you to use:

Note The above links are examples only. Refer to your IdP documentation for official documentation.

Enable SAML SSO for Cisco Collaboration Applications

Before you begin

Import the Identity Provider metadata into your Cisco Collaboration applications and complete the SAML SSO configuration.

Procedure

  1. On Cisco Unified Communications Manager, complete the SSO configuration:
    1. Restart the Cisco Tomcat server before enabling SAML SSO.
    2. From Cisco Unified CM Administration, choose System > SAML Single Sign On.
    3. Click Enable SAML SSO.
    4. Click Continue and follow the prompts.
    5. Cluster wide agreements only. Click Test for Multi-server tomcat certificates.
    6. Click Next
    7. Browse to select your IdP metadata file. After you have opened the file, click Import IdP Metadata.
    8. Click Next.
    9. Select an LDAP-synchronized whom has Standard CCM Super User permissions and Run SSO test.
    10. Sign in with the user's credentials.
    11. Click Finish to complete the SAML SSO setup.
    12. Restart the Cisco Tomcat server.
    13. Per node agreements only. Repeat this process on each Unified Communications Manager node.
  2. IM and Presence Service—If you have a Centralized Deployment of the IM and Presence Service, repeat the previous step on the standalone Unified CM publisher node that is a part of the IM and Presence central cluster.
  3. On Cisco Unity Connection, complete the SAML SSO configuration:
    1. Restart the Cisco Tomcat server before enabling SAML SSO.
    2. In Cisco Unity Connection Administration, go to System Settings > SAML Single Sign On.
    3. Click Enable SAML Single Sign On.
    4. Click Continue and follow the prompts
    5. Import the IdP metadata file into Cisco Unity Connection.
    6. Test the SSO Connection.
    7. Restart the Cisco Tomcat server.
    8. Per node agreements only. Repeat this process for each cluster node.
  4. On the Expressway-C primary peer, complete the SAML SSO configuration:
    1. Go to Configuration > Unified Communications > Identity providers.
    2. Click Import new IdP from SAML.
    3. Use Import SAML file control to locate the IdP metadata file.
    4. Set the Digest to the required SHA hash algorithm.
    5. Click Upload.
      Note You can change the signing algorithm after you have imported the metadata, by going to Configuration > Unified Communications > Identity Providers (IdP) locating your IdP row then, in the Actions column, clicking Configure Digest).
    6. Verify that the IdP appears in the list of Identity Providers.
    7. Click Associate Domains in the IdP row.
    8. Check the domains that you want to assign to this Identity Provider.
    9. Click Save.
      Note If you are deploying Cisco Expressway with Active Directory Federation Services (ADFS) for SAML SSO, refer to Additional Expressway Configuration for ADFS, on page 28 for additional Expressway settings.

Chapter 4: End User SAML SSO

End User SAML SSO Configuration

End user or federated SSO is a standard that allows products to meet customer compliance requirements, reduce the total cost of ownership, and improve end user experience. The foundation for this support in the collaboration products has been introduced in the 10.0 and 10.5 releases. This allows administrators to configure the infrastructure in preparation for end user clients such as Cisco Unity Connection and Cisco Jabber, which is rolling out support for users with release 10.5 in the second half of 2014.

Once an Administrator enables this feature for users it will allow users in a Cisco collaboration application to log in to supported applications with their corporate username and password. If the Cisco application is accessed by way of a browser the user can use the same corporate username and password to log in. If the user has already logged in to another corporate application in that same browser they should be able to access the application without having to provide a username and password. All of these features are available within the customer network or accessible by way of a VPN.

The supported products are:

Product Supports End User SAML SSO from Release... More Information
Cisco Unified Communications Manager 10.5 Click here
IM and Presence Service 10.5 Click here
Cisco Unity Connection 10.5 Click here
WebEx Meeting Center Cloud Click here
WebEx Connect and Messenger Cloud Click here
Cisco WebEx Meetings Server 1.5 and 2.0 Click here

The supported end user clients are:

Product Release More Information
WebEx IOS Available with all releases Click here
WebEx Android Available with all releases Click here
WebEx Connect Available with all releases Click here
WebEx Messenger Available with all releases Click here
Jabber for Windows 10.5 Available in the second half of 2014
Jabber IOS 10.5 Available in the second half of 2014
Jabber for Android 10.5 Available in the second half of 2014
Jabber for Mac 10.5 Available in the second half of 2014

Note

Models: Unified Communications Applications

File Info : application/pdf, 42 Pages, 8.15MB

PDF preview unavailable. Download the PDF instead.

cucm b saml-sso-deployment-guide-12 5

References

DITA Open Toolkit XEP 4.30.961; modified using iText 2.1.7 by 1T3XT

Related Documents

Preview Cisco Expressway Deployment Guide for Mobile and Remote Access
Comprehensive deployment guide for configuring Cisco Expressway for Mobile and Remote Access (MRA), enabling secure off-premises connectivity for Cisco Jabber clients and other endpoints. Covers setup, configuration, troubleshooting, and best practices for Cisco Unified Communications environments.
Preview Introduction to Cisco Business Edition 6000 and 7000 Appliances
This guide provides an introduction to the Cisco Business Edition 6000 and 7000 appliance models, detailing their features, installation requirements, and related documentation for setup and customization.
Preview Cisco Unified Communications Manager and IM and Presence Service Release 12.5(1)SU6 Release Notes
Official release notes for Cisco Unified Communications Manager and IM and Presence Service, Release 12.5(1)SU6. Covers new features, restrictions, caveats, supported versions, and important technical details for enterprise communication systems.
Preview Cisco Unified Communications Manager and IM and Presence Service Release 15SU1 Release Notes
Release notes detailing new features, restrictions, caveats, supported versions, and compatibility for Cisco Unified Communications Manager and IM and Presence Service Release 15SU1. Includes information on gateway and adapter support, interoperability, deprecations, and bug search.
Preview Business Edition 6000 and 7000 Software Load Summary
This document provides a summary of the software preloaded on the Business Edition 6000 and 7000 appliances, including new and changed information, types of factory-loaded software, and preloaded virtualization and application software.
Preview Cisco Unified Communications Manager 第 14 版和 SU 功能組態設定指南
本指南提供了 Cisco Unified Communications Manager 第 14 版和 SU 的功能組態設定的詳細說明,涵蓋了從基本配置到進階功能的廣泛主題,旨在幫助用戶高效部署和管理其統一通信環境。
Preview Cisco Unified JTAPI Developers Guide for Cisco Unified Communications Manager Release 10.5(2)
A comprehensive guide for developers using Cisco Unified JTAPI with Cisco Unified Communications Manager Release 10.5(2). This document covers installation, configuration, features, and best practices for integrating JTAPI into applications.
Preview Cisco Contact Center Enterprise Solutions Release 12.6(1) Release Notes
This document details new features, updates, important notes, deprecated items, and caveats for Cisco Contact Center Enterprise Solutions Release 12.6(1), covering products like Cisco Unified Contact Center Enterprise, Cisco Finesse, and more.