Is there any reason not to just associate all phones with some application users. For example the rmjtapi user for IPCC and the ACDeviceAuthenticationUser for Attendant Console. Is there a limit on the number of devices an application user can control?
The rmjtapi user allows IPCCX to monitor the states of the phones that are associated with it. Usually these are agent phones, hence if you do not need to monitor a phone then I guess there will not be any need to associate the phone this user.
Likewise the ACDeviceAuthenticationUser Application User is used for Device Security
If you want to enable device security for the Cisco Unified Communications Manager Attendant Console, for example, you want to use a subset of phones instead of all phones that the super provider feature supports, you must configure an application user, ACDeviceAuthenticationUser, as well as associate the attendant phones with this application user.
Hope this helps
Please rate all useful posts
"The essence of christianity is not the enthronement but the obliteration of self --William Barclay"
Thanks for the info however that wasn't quite what I was looking for. We change the phones that are used by IPCC and Attendant console so frequently that it has become a management problem to keep removing and adding the associated phones. So I am wondering if there is a down side to just associating all phones that are on our system to these users?
SIP traces provide key information in troubleshooting SIP Trunks, SIP
endpoints and other SIP related issues. Even though these traces are in
clear text, these texts can be gibberish unless you understand fully
what they mean. This document attempts to br...
Please find the attached HTML document, download and open it on your PC.
This provides an easy to use form where you simply answer a few
questions and it will render the proper jabber-config.xml file for you
to copy/paste. There is built in logic to verif...
CUCM Database Replication is an area in which Cisco customers and
partners have asked for more in-depth training in being able to properly
assess a replication problem and potentially resolve an issue without
involving TAC. This document discusses the bas...