Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This article contains general explanations about where UCMA should be installed and how "Trusted Application"  works.

...

UCMA is a software component by Microsoft that we install on certain servers (typically Access Portal web server).
This component allows for developers and 3rd party apps to get access and take control over certain aspects of Microsoft's Enhanced Presence information, instant messaging, telephone and video calls, and audio/video conferencing.

This component together with the "CsTrustedApplciation" configurations allow us to perform manipulations and use the SfB/Lync environment in order to do the following:

  • Use Contact list information pulled from SfB environment to set certain Ethical wall policies that apply according to contact list memebers
  • Send IMs to users and admins from the local SfB environment in order to notify them about Ethical wall/DLP/etc. actions that were performed.
  • Escalate conference: wheמ a conversation  starts and we want to join it in a hidden way to make it a conference we will use UCMA.

 

This is an important part of our product and guidance about it's installation and configuration can be found in the installer guide, Ethical wall installation guide and DLP installation guide.

...

In order to view this what is already configured with this configuration the following commands can be used:

Get-CsTrustedApplicationPool

Get-CsTrustedApplication

Get-CsTrustedApplicationEndpoint

 

Each one of those commands present a different part of the Trusted Application configuration. Generally there are 4 types of Trusted Application configurations: Trusted Application Pool, Trusted Application , Trusted Application endpoint , Trusted Application computer.

...