The resilient telephony platform (RTP) of the Telephony Control server implements its own user management. Creation, modification, and deletion of users, password handling, handling of privileges, and so forth, are completely managed by the management function application programming interface (API). This API also controls the user access to the management functionality (user identification and authorization).
The user management provides the following features:
Creating, installing, deleting, extending, and modifying of roles.
Creating, installing, deleting, and modifying of users.
Getting information on users and roles.
Getting information about the currently active user sessions.
Getting information about the currently active management functions for a given user session.
An option to allow the RTP to use OS authentication of user login. This eliminates the need for a separate RTP user account and login. The RTP still needs to provision users' RTP permissions for RTP CLI level permissions.
Linux user account management using pluggable authentication module (PAM) modules for administrable password complexity, aging, reuse, and disable/lockout rules.
The CLI requires a user profile for all users who access the Lotus Sametime Unified Telephony. A user with administrator privileges creates the user profiles.
The elements and privileges of a user profile depend on the platform. Table 12 lists the user profile elements.
Table 1. CLI User Profile Elements
|User Name||A minimum length of 1 character. Maximum length of 36 characters.|
|Password||A minimum length of 8 characters. Maximum length of 36 characters.|
|Privileg||Determines the access a user is granted. The privileges are:|
stdop — Read only access.
maxcust — Read/write access. This is the maximum authorization level for clients.
maxint — Read/write access. This is the maximum authorization level for RTP integrators.
super — This is for Lotus Sametime Unified Telephony internal use only.
User Privileges and RolesParent topic: TLS (Transport Layer Security) Support
The user names, roles and privileges described in this section depict those that might by used by a typical customer. Since these attributes are configurable by CLI user management, different user names, roles and privileges may be assigned, as appropriate, for enterprise customers.
The privileges as well as the executable functions actually are organized in one common tree structure. Each of the nodes in the tree contains information about a particular privilege, such as EVENT READ ONLY or CUSTOMER CONFIGURATION PARAMETERS MODIFY.
Concurrent User Access
The handling of concurrent user access is described here.
Remote Access to CLI and FTP
Important topics of remote access to CLI and FTP are described here.