[Index]
The Users list view (default menu User Management > Users) displays users at or below the current hierarchy node. Users can be created in the system in various ways, depending on your setup:
User creation can also vary across different hierarchies in the system.
Note the following user details:
Sync Source | The source application of user data, for example: LOCAL indicates that the user has been manually created in Automate and has not been synced from LDAP or from Cisco Unified Communications Manager (CUCM). CUCM indicates that the user exists on both Automate and CUCM, and is not synced from LDAP. The user may have been created first on Automate (top-down) or created on CUCM and synced into Automate (bottom-up). |
Sync Type | Identifies the user that was synced from a device as indicated by Sync Source according to a type. The setting is read-only and assists in for example distinguishing LDAP sync users (bottom-up CUCM-LDAP or or top-down LDAP). Example values:
|
User Type | Administrators (Admin) who are users accessing the system in order to perform administrative activities End users (End User) that will be set up with services in the system. Users with multiple roles (End User + Admin) [1] |
Auth Method | See: User Authentication Methods [2] |
License Audit Status [3] | From release_21.4-PB5 onwards, the results of the last license counting process can be viewed as a License Audit Status field or when viewing a specific user. When viewing a specific user, the linked services details will indicate the services the user is consuming for further details. The license status field will indicate if the user is:
|
[1] | User Type: see: Create a User. |
[2] | Auth Method: see: User Authentication Methods. |
[3] | This column will only show after the first run of the license-audit-service. See the Licensing and Subscriber Data Export Guide. |
Overview
If you're adding a multi-role admin user, the user must first reside at site level and then be assigned a self-service Role by a system administrator, and a selected Authorized Admin Hierarchy instance that has an administrator role.
If needed, this step should also be carried out manually in the case of synced in users or users moved to a site.
Note that enabling the system setting Additional Role Access Profile Validation will restrict Authorized Admin Hierarchy roles to those with linked access profiles that are in the subset of the administrator's own access profile.
If the role is set to an administrator role and an Authorized Admin Hierarchy instance is also specified for the user, the role on Authorized Admin Hierarchy takes precedence. This is NOT a recommended configuration.
Related Topics
Additional Role Access Profile Validation in the Advanced Configuration Guide.
Manually Add an Admin User
This procedure manually adds an admin user in Automate.
Log in at the hierarchy node where you want to create the admin user.
Go to (default menu) User Management > Users to open the Users page.
Click Add.
Fill out details for the admin user on tabs or panels of the Users Page.
Note
You'll need to fill out at least the mandatory field values. Note that the read-only User Type field can have the following values:
Click Save to add the new admin user.
You can view transaction progress and details in the Transaction Logs (when adding, updating, or deleting a user).
Important
Users are typically added or updated on Automate from the sync source, such as LDAP, CUCM, or CUC. See User Sync Source for more details.
Sync source precedence may override user input. When updating a user on Automate and the following conditions exist, field values are updated from the sync source and not from data input to Automate (in this case, the fields are read-only in the Admin Portal):
Related Topics
Transaction Logging and Audit in the Core Feature Guide
This page allows you to view, add, and update a user.
You can select the following tabs on this page:
User Details
Fields | Description |
---|---|
User Name* | Sign-in username. This field is mandatory. |
Role* | Choose the user's role. This field is mandatory. The list of created roles to choose from include those with the current hierarchy in the Hierarchies Allowed list. [1] |
Entitlement Profile | Choose the entitlement profile that specifies which devices and services the user is entitled to. |
Language | Choose the user's language. Note: If no language is selected, the language is inherited from the nearest hierarchy node (at or above the user) that has a default language configured. If no default language is configured anywhere in the hierarchy at or above the user, the user's language is English. Note: If a language is manually set for a user, that language remains unchanged even if the user is moved to a new place in the hierarchy. However, if the language is inherited, then the user's language changes when the user is moved to a hierarchy node that has a different default language. |
Exclude from Directory | If this check box is selected, the user will not appear in the corporate directory accessed via Automate Phone Services - [2] |
Sync Source | Identifies the application from which the user (and user data) was synced, i.e. LOCAL (Automate), CUCM or MS-LDAP. This field is read only. |
User Type | Read-only. Determined by the role interface. ("Admin", "End User" or "End User + Admin") - [3] |
Auth Method | Identifies the authentication method for the user - [4] This section is applicable to End Users only. |
LDAP Server and Username | Only editable when Auth Method is LDAP |
LDAP Username | Only editable when Auth Method is LDAP |
SSO Identity Provider | Only editable when Auth Method is SSO |
SSO Username | Only editable when Auth Method is SSO. Defaults to Automate username. |
Authorized Admin Hierarchy | Selected for users with multiple user roles to enable administrative capabilities for end users. [7] |
[1] | See Role Management |
[2] | See Phone Services Feature Setup |
[3] | See Authorized Admin Hierarchies and Roles under Role Based Access |
[4] | See User Authentication Methods |
[5] | See View and Update LDAP Authentication Users |
[6] | See Single Sign On (SSO) Overview |
[7] | See Authorized Admin Hierarchies and Roles |
Account Information
This tab/panel allows the administrator to manage user account information, including:
Contact Information
This tab/panel is relevant only to end users.
Defines contact information for the user, such as employee number, employee type, country, state, state, street, department, manager, Fax number, directory URL, Jabber ID, telephone number, mobile, and IP phone.
Hybrid Status
This tab/panel is relevant only to end users and is available if the Global Setting Enable Cisco / Microsoft Hybrid is enabled on the Enabled Services - see Global Settings.
For details on the Hybrid Status tab and managing hybrid users, see: Cisco-Microsoft Hybrid Subscribers.
Provisioning Status
Provides a read-only view of the user's provisioning status, including multi-vendor provisioning if applicable.
Assigned Lines
This tab/panel is relevant only for hybrid multi vendor scenarios. The fields are blank by default.
The fields on this tab are used to capture line details for users set up with an integrated service between two vendors (for example, Cisco and Microsoft).
Provisioning Status
This tab/panel is relevant only to end users.
Provides a view showing the composition of the user, this typically includes:
Select the Provisioned check box to view additional CUCM's if applicable.
If the user is added to an LDAP server (see the LDAP section below), then the provisioning status will also show the server here next to the LDAP label.
Services
This tab/panel is relevant only to end users, and provides direct links to the associated user apps, including: CUCM User, CUC User Voicemails, Webex App user, Pexip, UCCX Agent, MS 365 user, MS Teams user, and MS Exchange user. For example, clicking on the link for MS Exchange user opens the user's User Mailboxes settings page.
Custom
This tab/panel is relevant only to end users. User defined customized strings and booleans.
LDAP
If a secure Microsoft Active Directory LDAP server (port 636) is configured higher in the user hierarchy and the server has Enable Write Operations checked, user details can be managed on the server if it is selected from the LDAP Server drop down list. Only secure LDAP servers are listed. If no suitable servers have been set up, then the tab will not display any fields.
If no such Microsoft Active Directory LDAP server is configured and enabled, the tab will show a message to indicate this.
For setup server details, see: Set up an LDAP Server. If the Microsoft Active Directory LDAP server is configured and the user already exists on this server, the tab will show a message to indicate this.
The Description field will display in the Microsoft Active Directory Users and Computers interface.
The User Account Control dropdown supports the following UserAccountControl values (associated with codes):
Important
When the LDAP user is added, the User Details tab/panel will show the Sync Source and Sync Type of the user as LDAP.
For details on updating and deleting the user on the LDAP server, see: Update a User.
Note
This procedure adds an admin (administrator) user, using VOSS Automate.
Important
If the user is to be a multi-role admin user, the user should first reside at site level and then be assigned a self-service Role by the administrator, as well as a selected Authorized Admin Hierarchy instance that has an administrator role.
If needed, this step should also be carried out manually in the case of synced in users or users moved to a site.
Note that enabling the system setting Additional Role Access Profile Validation will restrict Authorized Admin Hierarchy roles to those with linked access profiles that are in the subset of the administrator's own access profile. See:
Additional Role Access Profile Validation in the Advanced Configuration Guide.
If the role is set to an administrator role and an Authorized Admin Hierarchy instance is also specified for the user, the role on Authorized Admin Hierarchy takes precedence. This is not a recommended configuration.
Note
Fill out at least the mandatory details on the form. Note that the read-only User Type field can have the values:
To manually create an Admin user:
Important
Users are typically added or updated on VOSS Automate from the sync source, such as LDAP, CUCM, or CUC. See User Sync Source for more details.
Sync source precedence may override user input. When updating a user on VOSS Automate and the following conditions exist, field values are updated from the sync source and not from data input to VOSS Automate (in this case, the fields are read-only in the Admin Portal):
Related Topics
This page allows you to view, add, and update a user.
You can select the following tabs on this page:
User Details Tab
Fields | Description |
---|---|
User Name* | Sign-in username. This field is mandatory. |
Role* | Choose the user's role. This field is mandatory. |
Entitlement Profile | Choose the entitlement profile that specifies which devices and services the user is entitled to. |
Language | Choose the user's language. Note: If no language is selected, the language is inherited from the nearest hierarchy node (at or above the user) that has a default language configured. If no default language is configured anywhere in the hierarchy at or above the user, the user's language is English. Note: If a language is manually set for a user, that language remains unchanged even if the user is moved to a new place in the hierarchy. However, if the language is inherited, then the user's language changes when the user is moved to a hierarchy node that has a different default language. |
Exclude from Directory | If this check box is selected, the user will not appear in the corporate directory accessed via VOSS Automate Phone Services - [1] |
Sync Source | Identifies the application from which the user (and user data) was synced, i.e. LOCAL (VOSS Automate), CUCM or MS-LDAP. This field is read only. |
User Type | Read-only. Determined by the role interface. ("Admin", "End User" or "End User + Admin") - [2] |
Auth Method | Identifies the authentication method for the user - [3] This section is applicable to End Users only. |
LDAP Server and Username | Only editable when Auth Method is LDAP |
LDAP Username | Only editable when Auth Method is LDAP |
SSO Identity Provider | Only editable when Auth Method is SSO |
SSO Username | Only editable when Auth Method is SSO. Defaults to VOSS Automate username. |
Authorized Admin Hierarchy | Selected for users with multiple user roles to enable administrative capabilities for end users. [6] |
[1] | See Phone Services Feature Setup |
[2] | See Authorized Admin Hierarchies and Roles under Role Based Access |
[3] | See User Authentication Methods |
[4] | See View and Update LDAP Authentication Users |
[5] | See Single Sign On (SSO) Overview |
[6] | See Authorized Admin Hierarchies and Roles |
Account Information Tab
This tab allows the administrator to manage user account information, including:
Contact Information Tab
This tab is relevant only to end users.
Defines contact information for the user, such as employee number, employee type, country, state, state, street, department, manager, Fax number, directory URL, Jabber ID, telephone number, mobile, and IP phone.
Hybrid Status Tab
This tab is relevant only to end users and is available if the Global Setting Enable Cisco / Microsoft Hybrid is enabled on the Enabled Services - see Global Settings.
For details on the Hybrid Status tab and managing hybrid users, see: Cisco-Microsoft Hybrid Subscribers.
Provisioning Status
Provides a read-only view of the user's provisioning status, including multi-vendor provisioning if applicable.
Assigned Lines Tab
This tab is relevant only for hybrid multi vendor scenarios. The fields are blank by default.
The fields on this tab are used to capture line details for users set up with an integrated service between two vendors (for example, Cisco and Microsoft).
Provisioning Status Tab
This tab is relevant only to end users.
Provides a view showing the composition of the user, this typically includes:
Select the Provisioned check box to view additional CUCM's if applicable.
If the user is added to an LDAP server (see the LDAP section below), then the provisioning status will also show the server here next to the LDAP label.
Services Tab
This tab is relevant only to end users, and provides direct links to the associated user apps, including: CUCM User, CUC User Voicemails, Webex App user, Pexip, UCCX Agent, MS 365 user, MS Teams user, and MS Exchange user. For example, clicking on the link for MS Exchange user opens the user's User Mailboxes settings page.
Custom Tab
This tab is relevant only to end users. User defined customized strings and booleans.
LDAP Tab
If a secure Microsoft Active Directory LDAP server (port 636) is configured higher in the user hierarchy and the server has Enable Write Operations checked, user details can be managed on the server if it is selected from the LDAP Server drop down list. Only secure LDAP servers are listed. If no suitable servers have been set up, then the tab will not display any fields.
If no such Microsoft Active Directory LDAP server is configured and enabled, the tab will show a message to indicate this.
For setup server details, see: Set up an LDAP Server. If the Microsoft Active Directory LDAP server is configured and the user already exists on this server, the tab will show a message to indicate this.
The User Account Control dropdown supports the following values: Normal Account, Enabled, Password Not Required and Enabled, Password Doesn't Expire.
Important
When the LDAP user is added, the User Details tab will show the Sync Source and Sync Type of the user as LDAP.
For details on updating and deleting the user on the LDAP server, see: Update a User.
Note
Users are typically added or updated on Automate from the sync source, for example, LDAP, CUCM, or CUC. See User Sync Source.
Important
Sync source precedence may override user input. If you update a user on Automate that ...
Only the mapped fields are updated from the sync source. Data in these fields is updated from the sync source and not the user input added in Automate. These fields are typically read-only in Automate Admin Portal.
For user authentication method (Auth Method) changes when updating, see Authentication Method Setting Rules.
Manage Users - Sync Source Scenarios
See also User Field Mapping
Updating an admin user that has become a subscriber creates a sync with the application highest on the User Sync Source precedence, and according to the field mapping for that source. The sync occurs once you click Save.
Admin User Password Update
If the Admin user password is updated, user passwords on CUCM, CUC, and Webex are also updated if these have been provisioned for the user.
Note
Since different UC apps can have different password strictness rules, the update transaction will only succeed if the strictness rules of all the UC apps have been met. Otherwise, the update transaction will roll back.
Administrators should therefore choose a password that meets the requirements of all the UC apps.
User added as Microsoft Active Directory LDAP User
If a user was added as a Microsoft Active Directory LDAP user (see: Create a User), then:
The Users Page toolbar provides these additional actions for managing a user:
Align Hierarchy to Sync Source
For example, if the user's sync source is 'CUCM', and the data/User is at Customer level and the CUCM user is at site level, then the data/User instance will be moved from Customer level to the CUCM's hierarchy, that is, to the site level.
Align Hierarchy to User
All other related instances of the user (e.g. CUCM, device/cucm/User, device/cuc/user, etc.) will be moved to the hierarchy of the data/User instance.
Delete From Ldap
Relevant only for Microsoft Active Directory LDAP server.
The delete transaction succeeds only for users on Microsoft Active Directory LDAP servers on port 636, where the Enable Write Operations setting is checked. Thus, if Write operations are enabled on the associated LDAP server and the LDAP server is a secured Active Directory LDAP server, the LDAP user (device/ldap/user) is removed, and the VOSS user (data/User) is updated, that is, the sync type/source is set to LOCAL to reflect LDAP removal.
See also, Create a User
If there is an associated CUCM user, the CUCM user and the VOSS user are updated. In this case:
Push To Ldap
Creates an LDAP user (if the LDAP user does not exist).
Requires availability of an LDAP server that allows write back and is configured as a secure Microsoft Active Directory server. This server must be on port 636, with Enable Write Operations checked.
Used when adding user details on the LDAP form tab for the first time and first adding the LDAP user - see: Create a User. Thereafter, clicking the Save button also updates the LDAP user details on the LDAP server. However, if any user details have been updated for the LDAP server, this Push To Ldap menu option will also save these.
On the Users list view (default menu, User Management > Users), click on a non-LDAP user you wish to push to LDAP. On the LDAP tab/panel, choose the LDAP server, fill out a description and password, and click Action > Push to LDAP. The LDAP user is created on the selected LDAP server.
This menu option can't be used for Automate LDAP-synced users (in which case a system message on the LDAP tab displays Push to LDAP is not allowed).
See Create a User
This procedures adds administrators for intermediate nodes, and adds or edits local administrators or operators.
Note
Default local VOSS Automate administrators are created when provider, reseller, customer, and site hierarchy nodes are established.
An administrator for a particular hierarchy level can create or modify the administrators and operators at that hierarchy level and any level below. For example, a Customer XYZ administrator can create other Customer XYZ administrators and site administrators for Customer XYZ.
Field | Description |
---|---|
Username | Sign-in username. This field is mandatory. |
Email Address | User email address. |
Role | Choose the administrator's role. This field is mandatory.
|
Password | Set the password. This field is mandatory. |
Language | Choose the administrator's language. Note: If no language is chosen, the language is inherited from the nearest hierarchy node (at or above the administrator) that has a default language configured. If no default language is configured anywhere in the hierarchy at or above the administrator, the administrator's language is English. |
Sync Source | This is set LOCAL when the administrator is created on VOSS Automate. |
User Type | Cannot be edited - determined by the Role interface (administration / selfservice). |
All users that use LDAP for authentication are displayed on the Users form (default menu User Management > Users). This list includes users that use LDAP for authentication only, and users that have been synced from LDAP.
Note
To view LDAP Authentication Users only, filter the list to display LDAP users.
Perform the following steps:
Field | Description |
---|---|
LDAP Server | The LDAP server being used for authentication. |
LDAP Username | Matches the value of the LDAP authentication attribute which is specified in the User Model Type field of the LDAP User Sync configuration. |
User relation
Title | Description | Details | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
User Details | Group Assigned by FDP |
|
|||||||||||||||||||||||||||||||||||||||||||||||
User Name * | User's Username. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
First Name | The User first name. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Last Name | The User last name. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Display Name | Display name of the user |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Title | Title. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Email Address | The User email address. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Password | The User password. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Role * | The role to which the user belongs. See: Role. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Entitlement Profile |
|
||||||||||||||||||||||||||||||||||||||||||||||||
Language | The preferred language for this user. Default: en-us |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Exclude from Directory | Exclude from Directory flag to control the Phone Services directory lookup. If set to true the User's phone number will not appear in the directory lookup. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Auth Method | The type of authentication that our user would be using. Typically this would be choices between a Standard VOSS 4 UC user, an LDAP user or an SSO user. Default: Local |
|
|||||||||||||||||||||||||||||||||||||||||||||||
LDAP Server | A reference to the LDAP server which this user must authenticate against. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
LDAP Username | The login attribute of the associated LDAP device model instance |
|
|||||||||||||||||||||||||||||||||||||||||||||||
SSO Identity Provider | The entity id of the SSO Identity Provider. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
SSO Username | The name identifier that is used for an SSO authenticated user. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Sync Source | Sync source of the user. Identifies where the user was synced from. This value will determine the master of the data. The data in the User model will be derived from the fields of the master application (E.G. CUCM, CUC, MS-LDAP). Default: LOCAL |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Sync Type | Sync type of the user. Identifies the user type that was synced from device as indicated by Sync Source information, e.g. CUCM-Local, CUCM-LDAP, LOCAL. Default: LOCAL |
|
|||||||||||||||||||||||||||||||||||||||||||||||
User Type | Indicate the user's login type. Default: Admin |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Authorized Admin Hierarchy | A reference an Authorized Admin Hierarchy instance that defines this user's administrative capabilities. This enables administrative capabilities for end users. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Account Information | Group Assigned by FDP |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Change Password on Next Login | Indicates if the user must be forced to change their password the next time that login. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Account Information | Additional account information for the given user. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Change Password on Next Login | Indicates if the user must be forced to change their password the next time that login. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Credential Policy | Specifies the policy with the rules used to govern this user's credentials. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Disabled | Indicates if the account has been disabled to prevent the user from logging in until an administrator enables the account again. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Reason for Disabled | A description of why the account is disabled. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Time Locked Due to Failed Login Attempts | The time when the user account was locked as result of the number of failed login attempts exceeding the permitted thresholds. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Time of Last Successful Login | The time the user last logged in successfully. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Locked | Indicates if the account has been locked to prevent the user from logging in. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Number of Failed Login Attempts Since Last Successful Login | The total number of failed login attempts since last successful login. Default: 0 |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Time of Last Password Change | The time when the password was last changed. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Time of Last Password Change By User | The time when the password was last changed by the user. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Credential Policy | Specifies the policy with the rules used to govern this user's credentials. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Disabled | Indicates if the account has been disabled to prevent the user from logging in until an administrator enables the account again. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Reason for Disabled | A description of why the account is disabled. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Time Locked Due to Failed Login Attempts | The time when the user account was locked as result of the number of failed login attempts exceeding the permitted thresholds. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Time of Last Successful Login | The time the user last logged in successfully. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Locked | Indicates if the account has been locked to prevent the user from logging in. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Number of Failed Login Attempts Since Last Successful Login | The total number of failed login attempts since last successful login. Default: 0 |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Time of Last Password Change | The time when the password was last changed. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Time of Last Password Change By User | The time when the password was last changed by the user. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
License Audit Details | License Audit Information. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Last Checked | The last time the License Audit Details were updated. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
License Audit Status | The License Audit status of the user. Default: Unknown |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Services | Group Assigned by FDP |
|
|||||||||||||||||||||||||||||||||||||||||||||||
CUCM User | Link to CUCM User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
User Provisioning Status |
|
||||||||||||||||||||||||||||||||||||||||||||||||
CUCM User | Link to CUCM User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
CUC User | Link to CUC User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Webex App User | Link to Webex App User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Pexip | Link to Pexip User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
UCCX Agent | Link to UCCX Agent |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS 365 User | MS 365 User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS Teams User | MS Teams User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS Exchange User | MS Exchange User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
CUC User | Link to CUC User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Webex App User | Link to Webex App User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Pexip | Link to Pexip User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
UCCX Agent | Link to UCCX Agent |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS 365 User | MS 365 User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS Teams User | MS Teams User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS Exchange User | MS Exchange User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Provisioning Status | Group Assigned by FDP |
|
|||||||||||||||||||||||||||||||||||||||||||||||
VOSS User | Username field as a placeholder, this field is not used. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
User Provisioning Status |
|
||||||||||||||||||||||||||||||||||||||||||||||||
VOSS User | Username field as a placeholder, this field is not used. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
HCMF Server | HCMF server where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
CUCM Server | CUCM server where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
CUCM LDAP Directory | CUCM LDAP Directory. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
CUC Server | CUC server where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
LDAP Server | LDAP server where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Webex App Server | Webex App server where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Pexip Server | Pexip server where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
UCCX Server | UCCX server where the agent exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS 365 Tenant | MS 365 tenant where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS Teams Tenant | MS Teams tenant where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS Exchange Tenant | MS Exchange tenant where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
VOSS User Hierarchy | VOSS User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
HCMF User Hierarchy | HCMF User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
CUCM User Hierarchy | UUCM User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
CUC User Hierarchy | UUC User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
LDAP User Hierarchy | LDAP User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Webex App User Hierarchy | Webex App User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Pexip Conference Hierarchy | Pexip Conference Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
UCCX User Hierarchy | UCCX User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS 365 User Hierarchy | MS 365 User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS Teams User Hierarchy | MS Teams User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS Exchange User Hierarchy | MS Exchange User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
HCMF Server | HCMF server where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
CUCM Server | CUCM server where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
CUCM LDAP Directory | CUCM LDAP Directory. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
CUC Server | CUC server where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
LDAP Server | LDAP server where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Webex App Server | Webex App server where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Pexip Server | Pexip server where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
UCCX Server | UCCX server where the agent exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS 365 Tenant | MS 365 tenant where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS Teams Tenant | MS Teams tenant where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS Exchange Tenant | MS Exchange tenant where the user exists. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
VOSS User Hierarchy | VOSS User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
HCMF User Hierarchy | HCMF User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
CUCM User Hierarchy | UUCM User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
CUC User Hierarchy | UUC User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
LDAP User Hierarchy | LDAP User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Webex App User Hierarchy | Webex App User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Pexip Conference Hierarchy | Pexip Conference Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
UCCX User Hierarchy | UCCX User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS 365 User Hierarchy | MS 365 User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS Teams User Hierarchy | MS Teams User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
MS Exchange User Hierarchy | MS Exchange User Hierarchy |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Hybrid Status | Group Assigned by FDP |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Service Type |
|
||||||||||||||||||||||||||||||||||||||||||||||||
Enabled Extensions | Extensions to select primary details from. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Line |
|
||||||||||||||||||||||||||||||||||||||||||||||||
Line E164 |
|
||||||||||||||||||||||||||||||||||||||||||||||||
Class of Service |
|
||||||||||||||||||||||||||||||||||||||||||||||||
Update a Subscriber's Multi-Vendor Hybrid Status |
|
||||||||||||||||||||||||||||||||||||||||||||||||
User Provisioning Status |
|
||||||||||||||||||||||||||||||||||||||||||||||||
Update a Subscriber's Multi-Vendor Hybrid Status |
|
||||||||||||||||||||||||||||||||||||||||||||||||
Microsoft Office 365 User Name | The username corresponding to the the Username in Microsoft Office 365. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Microsoft Teams User Name | The username corresponding to the the Username in Microsoft Teams. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
LDAP | Group Assigned by FDP |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Info | Information about User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Ad Ldap User |
|
||||||||||||||||||||||||||||||||||||||||||||||||
Info | Information about User |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Manage LDAP User | Flag to determine if users can be pushed or deleted from AD LDAP |
|
|||||||||||||||||||||||||||||||||||||||||||||||
LDAP write back enabled | Flag to determine if write back is enabled. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Sync Source | Flag to determine the user sync source. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
LDAP Server | LDAP server where the user is configured. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Description | Description |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Password | Password |
|
|||||||||||||||||||||||||||||||||||||||||||||||
User Account Control | Default: 512 |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Manage LDAP User | Flag to determine if users can be pushed or deleted from AD LDAP |
|
|||||||||||||||||||||||||||||||||||||||||||||||
LDAP write back enabled | Flag to determine if write back is enabled. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Sync Source | Flag to determine the user sync source. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
LDAP Server | LDAP server where the user is configured. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Description | Description |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Password | Password |
|
|||||||||||||||||||||||||||||||||||||||||||||||
User Account Control | Default: 512 |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Contact Information | Group Assigned by FDP |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Employee Number | Employee number of the user |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Employee Type | Employee type |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Country | Country name. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
State | Contains full names of state or province. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
City | Contains the name of a person's locality. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Building Name | Building name or number. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Street | Contains site information from a postal address. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Postal Code | Contains code used by a Postal Service to identify postal service zones. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Department | Department names and numbers. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Manager | Manager. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Directory URI | Alphanumeric Directory URI (e.g. SIP URI) |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Jabber ID | Jabber ID |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Physical Delivery Office Name | Physical Delivery Office Name. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Unverified Mail Box | Unverified Mail Box. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Home Phone | Contains strings that represent the user's home phone number(s). |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Telephone Number | Telephone Number. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Facsimile Telephone Number | Contains strings that represent the user's facsimile telephone Number(s). |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Mobile | Contains strings that represent the user's IP mobile number(s). |
|
|||||||||||||||||||||||||||||||||||||||||||||||
IP Phone | Contains strings that represent the user's IP phone number(s). |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Other Mailbox |
|
||||||||||||||||||||||||||||||||||||||||||||||||
Organizational Unit | The name of the person's organization unit. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Member Of | The user can be a member of a variety of groups. |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Object Class |
|
||||||||||||||||||||||||||||||||||||||||||||||||
Custom | Group Assigned by FDP |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom String 1 | Custom String |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom String 2 | Custom String |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom String 3 | Custom String |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom String 4 | Custom String |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom String 5 | Custom String |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom String 6 | Custom String |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom String 7 | Custom String |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom String 8 | Custom String |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom String 9 | Custom String |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom String 10 | Custom String |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom List of Strings 1 | Custom List of Strings |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom List of Strings 2 | Custom List of Strings |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom List of Strings 3 | Custom List of Strings |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom List of Strings 4 | Custom List of Strings |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom List of Strings 5 | Custom List of Strings |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom List of Strings 6 | Custom List of Strings |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom List of Strings 7 | Custom List of Strings |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom List of Strings 8 | Custom List of Strings |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom List of Strings 9 | Custom List of Strings |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom List of Strings 10 | Custom List of Strings |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom Boolean 1 | Custom Boolean |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom Boolean 2 | Custom Boolean |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom Boolean 3 | Custom Boolean |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom Boolean 4 | Custom Boolean |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom Boolean 5 | Custom Boolean |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom Boolean 6 | Custom Boolean |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom Boolean 7 | Custom Boolean |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom Boolean 8 | Custom Boolean |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom Boolean 9 | Custom Boolean |
|
|||||||||||||||||||||||||||||||||||||||||||||||
Custom Boolean 10 | Custom Boolean |
|