Installation and Administration Guide for Cisco Unified Mobility Advantage, Release 7.0
Configuring Cisco Unified Presence for Use With Cisco Unified Mobility Advantage
Downloads: This chapterpdf (PDF - 103.0KB) The complete bookPDF (PDF - 4.1MB) | Feedback

Configuring Cisco Unified Presence for Use With Cisco Unified Mobility Advantage

Table Of Contents

Configuring Cisco Unified Presence for Use With Cisco Unified Mobility Advantage

Presence and Cisco Unified Mobile Communicator

Configuring Essential Settings for Presence Integration

How To Configure Server Security for Cisco Unified Presence

Configuring Server Security for Cisco Unified Presence

Downloading Certificates from Cisco Unified Presence

Configuring the TLS Context on Cisco Unified Presence

Configuring Additional Settings for Presence Integration


Configuring Cisco Unified Presence for Use With Cisco Unified Mobility Advantage


Revised Date: April 17, 2009

If you will integrate Cisco Unified Presence with Cisco Unified Mobility Advantage to allow users to exchange availability status, perform the procedures in this chapter.

For limitations related to presence integration, see the Release Notes for Cisco Unified Mobility Advantage Release 7.0(1) and 7.0(2) at http://www.cisco.com/en/US/products/ps7270/prod_release_notes_list.html.

Presence and Cisco Unified Mobile Communicator

Configuring Essential Settings for Presence Integration

How To Configure Server Security for Cisco Unified Presence

Configuring Additional Settings for Presence Integration

Presence and Cisco Unified Mobile Communicator

The Cisco Unified Presence server manages availability status for Cisco Unified Mobile Communicator and other clients that support presence. Users can set their status on any supported client and it will display on all supported clients.

Exchange of presence with federated contacts is not supported.

Contacts added from the corporate directory on any client appear in the contact list on all supported clients. Personal contacts are specific to each client.

Text messaging from Cisco Unified Mobile Communicator is supported only with other Cisco Unified Mobile Communicator clients.

Configuring Essential Settings for Presence Integration

Create an Application User account in order to allow Cisco Unified Mobility Advantage to access Cisco Unified Presence to obtain presence information for users.

Restrictions

The Proxy domain of the Cisco Unified Presence server should be the same as the domain of the Cisco Unified Mobility Advantage server.

All users on the Cisco Unified Mobility Advantage server must be configured on a single Cisco Unified Presence server. However, those users can see the presence of users on other Cisco Unified Presence servers in the same cluster.

Before You Begin

Make sure that you have configured Cisco Unified Presence to support all of the functionality that is not specific to Cisco Unified Mobile Communicator but that users will also use in Cisco Unified Mobile Communicator. For example, if availability status will be drawn from the Exchange calendar of each user, follow the instructions in the Integration Note for Configuring Cisco Unified Presence Release 7.0 with Microsoft Exchange.

Your Cisco Unified Presence deployment and all users must already be configured and functioning properly.

For complete information about configuring Cisco Unified Presence, see the documentation for that product, at http://cisco.com/en/US/products/ps6837/tsd_products_support_series_home.html.

Procedure


Step 1 Sign in to the Cisco Unified Presence Administration Admin Portal.

Step 2 Select User Management > Application User.

Step 3 Select Add New.

Step 4 Enter the Application User Information in the appropriate fields.

This must be a unique account assigned for exclusive use by a single Cisco Unified Mobility Advantage server.

Step 5 Select Standard Presence Group for the Presence Group.

Step 6 Add the group Admin-CUMA in the Groups field under Permissions Information.

Step 7 Select Save.

Step 8 Select System > Security > Incoming ACL to set the Access Control List.

Step 9 Select Add New.

Step 10 Enter a description.

Step 11 Enter the IP address of the Cisco Unified Mobility Advantage server in the Address Pattern field.

Step 12 Select Save.


What To Do Next

If you have a backup Cisco Unified Presence server that you will specify in Cisco Unified Mobility Advantage, configure an identical Application User account on that server.

If you will use a secure connection between Cisco Unified Mobility Advantage and Cisco Unified Presence, you will need to configure security on both servers. See How To Configure Server Security for Cisco Unified Presence.

If you will integrate with Cisco MeetingPlace or Cisco MeetingPlace Express, make sure that you have enabled Outlook integration in Cisco Unified Presence. See the documentation for Cisco Unified Presence, for example the Integration Note for Configuring Cisco Unified Presence Release 7.0 with Microsoft Exchange at http://www.cisco.com/en/US/docs/voice_ip_comm/cups/7_0/english/integration_notes/ExchInt.html.

How To Configure Server Security for Cisco Unified Presence

Secure connections between internal servers are not required by default for Cisco Unified Mobility Advantage to operate. However, your corporate security policies may require them.

We suggest that you verify that presence features function properly before you introduce server security to your configuration. This approach will simplify troubleshooting should it be necessary.

This procedure set describes one option for configuring server security, using self-signed certificates.

Configuring Server Security for Cisco Unified Presence

Downloading Certificates from Cisco Unified Presence

Configuring the TLS Context on Cisco Unified Presence

Configuring Server Security for Cisco Unified Presence

You must perform some of these steps after you install Cisco Unified Mobility Advantage.

Procedure

 
Do This
For Instructions, See

Step 1 

In Cisco Unified Mobility Advantage, create a Security Context that specifies Trusted Certificates for the Trust Policy.

You can use this Security Context for all enterprise servers that have the same security requirements.

If you will follow the instructions for the Configuration Wizard you can use the cuma Security Context.

Creating Security Contexts, page 9-7.

Step 2 

In the Enterprise Adapter for Cisco Unified Presence, select TLS as the Transport Type, then specify the Security Context that you created in an earlier step in this table.

Viewing and Changing Enterprise Adapter Settings, page 10-4.

About Cisco Unified Presence Enterprise Adapter Settings, page A-10

Step 3 

In Cisco Unified Presence, require secure communications.

Configuring the TLS Context on Cisco Unified Presence

Step 4 

Generate a self-signed certificate from Cisco Unified Mobility Advantage.

Downloading Self-Signed Certificates from Cisco Unified Mobility Advantage, page 9-11.

Step 5 

Import this certificate to the trust store of the Cisco Unified Presence server.

Importing Certificates into Cisco Unified Operating System Servers, page 3-16.

Step 6 

Generate a certificate from Cisco Unified Presence.

Downloading Certificates from Cisco Unified Presence

Step 7 

Import this certificate to the trust store of Cisco Unified Mobility Advantage.

Importing Self-Signed Certificates from Trusted Servers, page 9-10

Downloading Certificates from Cisco Unified Presence

Perform this procedure only if your IT security policies require Cisco Unified Mobility Advantage to require a self-signed certificate from Cisco Unified Presence. This procedure generates the required certificates.

Procedure


Step 1 Sign in to Cisco Unified Operating System Administration on the Cisco Unified Presence server.

Step 2 Select Security > Certificate Management.

Step 3 Select Find to display the list of certificates.

Step 4 Select sipproxy.pem.

Step 5 Select Download and save the file to your local computer.

Step 6 Return to the list of certificates,

Step 7 Select tomcat.pem.

Step 8 Select Download and save the file to your local computer.

Step 9 Return to the list of certificates,

Step 10 Select PresenceEngine.pem.

Step 11 Select Download and save the file to your local computer.


What To Do Next

Perform remaining required steps in How To Configure Server Security for Cisco Unified Presence.

Configuring the TLS Context on Cisco Unified Presence

Perform this procedure only if your IT security policies require the Cisco Unified Presence server to require a self-signed certificate from Cisco Unified Mobility Advantage.

Before You Begin

Upload the certificate from Cisco Unified Mobility Advantage to the Cisco Unified Presence server. See Importing Certificates into Cisco Unified Operating System Servers, page 3-16.

Procedure


Step 1 Sign in to Cisco Unified Presence Administration.

Step 2 Select System > Security > TLS Context Configuration.

Step 3 Select Find.

Step 4 Select Default_Cisco_UPS_SIP_Proxy_Peer_Auth_TLS_Context.

Step 5 Select the Cisco Unified Mobility Advantage certificate in the list of available TLS peer subjects.

Step 6 Move this TLS peer subject to Selected TLS Peer Subjects.

Step 7 Select Save.

Step 8 Select Cisco Unified Presence Serviceability > Tools > Service Activation.

Step 9 Restart the Cisco Unified Presence SIP Proxy service.


What To Do Next

Perform remaining required steps in How To Configure Server Security for Cisco Unified Presence.

Configuring Additional Settings for Presence Integration

Procedures

 
To
Do This

Step 1 

Configure an enterprise adapter for Cisco Unified Presence

For new installations:

You will configure this adapter while running the Configuration Wizard. See Configuring the Connection to Cisco Unified Presence, page 7-19.

For upgrades from Release 3.x or for existing deployments:

See Chapter 10, "Configuring Connections to Enterprise Servers from Cisco Unified Mobility Advantage" and About Cisco Unified Presence Enterprise Adapter Settings, page A-10.

Step 2 

Enable the presence feature in Cisco Unified Mobility Advantage

For new installations:

You will configure this while running the Configuration Wizard.

For upgrades from Release 3.x or for existing deployments:

See Enabling Exchange of Presence, page 12-5.

Step 3 

Create a presence account for each user in Cisco Unified Communications Manager

See Configuring a Presence Account for Each User in Cisco Unified Communications Manager, page 3-24

Step 4 

Allow presence display to reflect user meeting schedules

See Obtaining Calendar Information for Meeting Notifications and Presence Integration, page 12-6. Pay special attention to the Before You Begin section.

Related Topics

How to Solve Problems with Availability Status (Presence), page 19-14