We are in the process of adding a 2nd UCCX server to our cluster. I am following the guides and it asks for a "Cisco Unified CCX Administrator User ID*" and password. I would expect these to show up on the 1st node but the only users that show up under the admin configuration are those that are pulled from CCM. We are Active Directory intergrated, will i need to create an AD account for the administration? I don't want to use an account that the pwd will expire. Can someone give me some suggestions on what to do to go forward with the install?
use the same one you use to log in to IPCC now. If you're using you're personal account, go to:
Tools > User Manager
the select Administrator under Capability View. There you will see who is configured as an admin. Usually you'll see something like ipccadmin, crsadmin, or something like that. Use that account if you know the password.
My AD account is listed in the view for Administrator, can I use that? I am concerned that the pwd will expire and the cluster will be broken..is this the case or is no authentication after the initial setup.
Thanks for your response, the only accounts the are listed in the Administrator Capabilities are three personal administrators accounts. I looked @ the first node and all the services are either configured to run as Local System or CRSAdministrator. I am able to login into the appadmin with my credentials even after a password change so I would expect this to be able to be used for this portion of the setup. I am going to give it a shot and will let me you know the results.
You have reached the Cisco Logistics Support Center.. To Check Status of
your RMA, visit Product Returns & Replacements (RMA). Need help? Contact
us by Phone or Email. North Americas Phone: 1800 553 2447 Option 4
Email: firstname.lastname@example.org Europe Phone: +3...
The short answer is that you don't.... That isn't entirely true while at
the same time it kind of is, but for the most part you don't configure
the softkeys. You enable or disable them via TCL. Here is the long
answer. Be sure to read the whole thing or e...
Topology: IP Phone > Switches > Microsoft NPS setup to forward 802.1x
proxy to > ISE 2.1 patch 3 Authentication: EAP-TLS using Cisco MIC SANs
Phone Models 802.1X support? 802.1x flavor Addtl Comment EAP-MD5 EAP-TLS
Cisco 3905 Y Y N Cisco 6911 Y Y N Cisco ...