Moves the login to ADFS, you put in the user / pass there now instead of
the admin page. it's not sending the credentials for some reason.
Scott
On Tue, May 16, 2017 at 1:32 PM, Nimloth wrote:
> Yes, we have it working.
> What issue you have?
> W dniu 16.05.2017, o 22:20,
Yes, we have it working.
What issue you have?
W dniu 16.05.2017, 22:20, o 22:20, użytkownik Scott Voll
napisał:
>Anyone have SSO working with UCCx 11.5su1?
>
>Have had a TAC case open for a while and can't get it fixed. Just
>wondering if anyone else has it working? CM
I don't think you can upload a cert unless there is an active CSR for it.
Sent from my iPhone
> On May 16, 2017, at 2:12 PM, Brian Meade wrote:
>
> You can re-install the same certs. Just make sure to do the trusts, Root then
> Intermediate then do the server cert and
Going to try one this week.
Sent from my iPhone
> On May 16, 2017, at 2:19 PM, Scott Voll wrote:
>
> Anyone have SSO working with UCCx 11.5su1?
>
> Have had a TAC case open for a while and can't get it fixed. Just wondering
> if anyone else has it working? CM / UC /
Hi
Please unsubscribe me from this group.
Regards,
___
cisco-voip mailing list
cisco-voip@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-voip
Maybe this?
run sql select servername,subjectname,issuername from certificate
On Tue, May 16, 2017 at 4:12 PM, Brian Meade wrote:
> You can re-install the same certs. Just make sure to do the trusts, Root
> then Intermediate then do the server cert and restart services.
>
Anyone have SSO working with UCCx 11.5su1?
Have had a TAC case open for a while and can't get it fixed. Just
wondering if anyone else has it working? CM / UC / CUPS etc went fine.
Just seeing if anyone has it working.
Thanks
scott
___
cisco-voip
You can re-install the same certs. Just make sure to do the trusts, Root
then Intermediate then do the server cert and restart services.
Unfortunately, I don't think it shows the root certs anywhere. Maybe in
the certinfo table?
On Tue, May 16, 2017 at 4:05 PM, Gary Parker
> On 16 May 2017, at 20:42, Brian Meade wrote:
>
> Did you make sure to upload those certs in the right order so CUCM was able
> to chain them?
I’ve a feeling that may be the issue. Certs where installed towards the end of
a very long weekend upgrading the cluster and I was
Did you make sure to upload those certs in the right order so CUCM was able
to chain them?
On Tue, May 16, 2017 at 3:32 PM, Gary Parker wrote:
>
> > On 16 May 2017, at 19:27, Charles Goldsmith
> wrote:
> >
> > In addition to what Nate stated, the
> On 16 May 2017, at 19:27, Charles Goldsmith wrote:
>
> In addition to what Nate stated, the CCMCIP profile needs to be FQDN as well.
>
> On Tue, May 16, 2017 at 1:21 PM, NateCCIE wrote:
> Are you using cuplogin or cisco-uds for discovery now? If
In addition to what Nate stated, the CCMCIP profile needs to be FQDN as
well.
On Tue, May 16, 2017 at 1:21 PM, NateCCIE wrote:
> Are you using cuplogin or cisco-uds for discovery now? If your UC
> services or system/server is not fqdn and is IP address then the client
>
Are you using cuplogin or cisco-uds for discovery now? If your UC services or
system/server is not fqdn and is IP address then the client will complains
about the cert unless the ip is listed as a SAN. If cup login make sure your
tftp server is fqdn over in IM
Sent from my iPhone
> On May
Do you see the full chain in just a web browser? My experience has shown
it will show the full chain as long as you upload Root then Intermediate as
a trust then server cert so it can find the full chain. Older versions had
you manually specify the root cert when uploading but now this is
14 matches
Mail list logo