R7.1 DeployingAADS
R7.1 DeployingAADS
Release 7.1
Issue 2
August 2017
© 2016-2017, Avaya Inc. USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED
All Rights Reserved. FROM AVAYA INC., ANY AVAYA AFFILIATE, OR AN AVAYA
CHANNEL PARTNER (AS APPLICABLE) UNDER A COMMERCIAL
Notice AGREEMENT WITH AVAYA OR AN AVAYA CHANNEL PARTNER.
While reasonable efforts have been made to ensure that the UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING,
information in this document is complete and accurate at the time of AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE
printing, Avaya assumes no liability for any errors. Avaya reserves WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN AVAYA
the right to make changes and corrections to the information in this AFFILIATE OR AN AVAYA CHANNEL PARTNER; AVAYA
document without the obligation to notify any person or organization RESERVES THE RIGHT TO TAKE LEGAL ACTION AGAINST YOU
of such changes. AND ANYONE ELSE USING OR SELLING THE SOFTWARE
WITHOUT A LICENSE. BY INSTALLING, DOWNLOADING OR
Documentation disclaimer USING THE SOFTWARE, OR AUTHORIZING OTHERS TO DO SO,
“Documentation” means information published in varying mediums YOU, ON BEHALF OF YOURSELF AND THE ENTITY FOR WHOM
which may include product information, operating instructions and YOU ARE INSTALLING, DOWNLOADING OR USING THE
performance specifications that are generally made available to users SOFTWARE (HEREINAFTER REFERRED TO
of products. Documentation does not include marketing materials. INTERCHANGEABLY AS “YOU” AND “END USER”), AGREE TO
Avaya shall not be responsible for any modifications, additions, or THESE TERMS AND CONDITIONS AND CREATE A BINDING
deletions to the original published version of Documentation unless CONTRACT BETWEEN YOU AND AVAYA INC. OR THE
such modifications, additions, or deletions were performed by or on APPLICABLE AVAYA AFFILIATE (“AVAYA”).
the express behalf of Avaya. End User agrees to indemnify and hold Avaya grants You a license within the scope of the license types
harmless Avaya, Avaya's agents, servants and employees against all described below, with the exception of Heritage Nortel Software, for
claims, lawsuits, demands and judgments arising out of, or in which the scope of the license is detailed below. Where the order
connection with, subsequent modifications, additions or deletions to documentation does not expressly identify a license type, the
this documentation, to the extent made by End User. applicable license will be a Designated System License as set forth
Link disclaimer below in the Designated System(s) License (DS) section as
applicable. The applicable number of licenses and units of capacity
Avaya is not responsible for the contents or reliability of any linked for which the license is granted will be one (1), unless a different
websites referenced within this site or Documentation provided by number of licenses or units of capacity is specified in the
Avaya. Avaya is not responsible for the accuracy of any information, documentation or other materials available to You. “Software” means
statement or content provided on these sites and does not computer programs in object code, provided by Avaya or an Avaya
necessarily endorse the products, services, or information described Channel Partner, whether as stand-alone products, pre-installed on
or offered within them. Avaya does not guarantee that these links will hardware products, and any upgrades, updates, patches, bug fixes,
work all the time and has no control over the availability of the linked or modified versions thereto. “Designated Processor” means a single
pages. stand-alone computing device. “Server” means a set of Designated
Processors that hosts (physically or virtually) a software application
Warranty
to be accessed by multiple users. “Instance” means a single copy of
Avaya provides a limited warranty on Avaya hardware and software. the Software executing at a particular time: (i) on one physical
Refer to your sales agreement to establish the terms of the limited machine; or (ii) on one deployed software virtual machine (“VM”) or
warranty. In addition, Avaya’s standard warranty language, as well as similar deployment.
information regarding support for this product while under warranty is
License types
available to Avaya customers and other parties through the Avaya
Support website: https://support.avaya.com/helpcenter/ Designated System(s) License (DS). End User may install and use
getGenericDetails?detailId=C20091120112456651010 under the link each copy or an Instance of the Software only: 1) on a number of
“Warranty & Product Lifecycle” or such successor site as designated Designated Processors up to the number indicated in the order; or 2)
by Avaya. Please note that if You acquired the product(s) from an up to the number of Instances of the Software as indicated in the
authorized Avaya Channel Partner outside of the United States and order, Documentation, or as authorized by Avaya in writing. Avaya
Canada, the warranty is provided to You by said Avaya Channel may require the Designated Processor(s) to be identified in the order
Partner and not by Avaya. by type, serial number, feature key, Instance, location or other
Hosted Service specific designation, or to be provided by End User to Avaya through
electronic means established by Avaya specifically for this purpose.
THE FOLLOWING APPLIES ONLY IF YOU PURCHASE AN AVAYA
HOSTED SERVICE SUBSCRIPTION FROM AVAYA OR AN AVAYA Named User License (NU). You may: (i) install and use each copy or
CHANNEL PARTNER (AS APPLICABLE), THE TERMS OF USE Instance of the Software on a single Designated Processor or Server
FOR HOSTED SERVICES ARE AVAILABLE ON THE AVAYA per authorized Named User (defined below); or (ii) install and use
WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO UNDER each copy or Instance of the Software on a Server so long as only
THE LINK “Avaya Terms of Use for Hosted Services” OR SUCH authorized Named Users access and use the Software. “Named
SUCCESSOR SITE AS DESIGNATED BY AVAYA, AND ARE User”, means a user or device that has been expressly authorized by
APPLICABLE TO ANYONE WHO ACCESSES OR USES THE Avaya to access and use the Software. At Avaya’s sole discretion, a
“Named User” may be, without limitation, designated by name,
HOSTED SERVICE. BY ACCESSING OR USING THE HOSTED
corporate function (e.g., webmaster or helpdesk), an e-mail or voice
SERVICE, OR AUTHORIZING OTHERS TO DO SO, YOU, ON
mail account in the name of a person or corporate function, or a
BEHALF OF YOURSELF AND THE ENTITY FOR WHOM YOU ARE
directory entry in the administrative database utilized by the Software
DOING SO (HEREINAFTER REFERRED TO INTERCHANGEABLY
that permits one user to interface with the Software.
AS “YOU” AND “END USER”), AGREE TO THE TERMS OF USE. IF
YOU ARE ACCEPTING THE TERMS OF USE ON BEHALF A Shrinkwrap License (SR). You may install and use the Software in
COMPANY OR OTHER LEGAL ENTITY, YOU REPRESENT THAT accordance with the terms and conditions of the applicable license
YOU HAVE THE AUTHORITY TO BIND SUCH ENTITY TO THESE agreements, such as “shrinkwrap” or “clickthrough” license
TERMS OF USE. IF YOU DO NOT HAVE SUCH AUTHORITY, OR IF accompanying or applicable to the Software (“Shrinkwrap License”).
YOU DO NOT WISH TO ACCEPT THESE TERMS OF USE, YOU
MUST NOT ACCESS OR USE THE HOSTED SERVICE OR Copyright
AUTHORIZE ANYONE TO ACCESS OR USE THE HOSTED Except where expressly stated otherwise, no use should be made of
SERVICE. materials on this site, the Documentation, Software, Hosted Service,
Licenses or hardware provided by Avaya. All content on this site, the
documentation, Hosted Service, and the product provided by Avaya
THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA including the selection, arrangement and design of the content is
WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO, owned either by Avaya or its licensors and is protected by copyright
UNDER THE LINK “AVAYA SOFTWARE LICENSE TERMS (Avaya and other intellectual property laws including the sui generis rights
Products)” OR SUCH SUCCESSOR SITE AS DESIGNATED BY relating to the protection of databases. You may not modify, copy,
AVAYA, ARE APPLICABLE TO ANYONE WHO DOWNLOADS, reproduce, republish, upload, post, transmit or distribute in any way
any content, in whole or in part, including any code and software BY A CONSUMER ENGAGED IN A PERSONAL ACTIVITY AND/OR
unless expressly authorized by Avaya. Unauthorized reproduction, WAS OBTAINED FROM A VIDEO PROVIDER LICENSED TO
transmission, dissemination, storage, and or use without the express PROVIDE AVC VIDEO. NO LICENSE IS GRANTED OR SHALL BE
written consent of Avaya can be a criminal, as well as a civil offense IMPLIED FOR ANY OTHER USE. ADDITIONAL INFORMATION
under the applicable law. FOR H.264 (AVC) AND H.265 (HEVC) CODECS MAY BE
OBTAINED FROM MPEG LA, L.L.C. SEE HTTP://
Virtualization WWW.MPEGLA.COM.
The following applies if the product is deployed on a virtual machine.
Compliance with Laws
Each product has its own ordering code and license types. Note,
unless otherwise stated, that each Instance of a product must be You acknowledge and agree that it is Your responsibility for
separately licensed and ordered. For example, if the end user complying with any applicable laws and regulations, including, but not
customer or Avaya Channel Partner would like to install two limited to laws and regulations related to call recording, data privacy,
Instances of the same type of products, then two products of that intellectual property, trade secret, fraud, and music performance
type must be ordered. rights, in the country or territory where the Avaya product is used.
Third Party Components Preventing Toll Fraud
“Third Party Components” mean certain software programs or “Toll Fraud” is the unauthorized use of your telecommunications
portions thereof included in the Software or Hosted Service may system by an unauthorized party (for example, a person who is not a
contain software (including open source software) distributed under corporate employee, agent, subcontractor, or is not working on your
third party agreements (“Third Party Components”), which contain company's behalf). Be aware that there can be a risk of Toll Fraud
terms regarding the rights to use certain portions of the Software associated with your system and that, if Toll Fraud occurs, it can
(“Third Party Terms”). As required, information regarding distributed result in substantial additional charges for your telecommunications
Linux OS source code (for those products that have distributed Linux services.
OS source code) and identifying the copyright holders of the Third
Party Components and the Third Party Terms that apply is available Avaya Toll Fraud intervention
in the products, Documentation or on Avaya’s website at: https:// If You suspect that You are being victimized by Toll Fraud and You
support.avaya.com/Copyright or such successor site as designated need technical assistance or support, call Technical Service Center
by Avaya. The open source software license terms provided as Third Toll Fraud Intervention Hotline at +1-800-643-2353 for the United
Party Terms are consistent with the license rights granted in these States and Canada. For additional support telephone numbers, see
Software License Terms, and may contain additional rights benefiting the Avaya Support website: https://support.avaya.com or such
You, such as modification and distribution of the open source successor site as designated by Avaya.
software. The Third Party Terms shall take precedence over these
Software License Terms, solely with respect to the applicable Third Security Vulnerabilities
Party Components to the extent that these Software License Terms Information about Avaya’s security support policies can be found in
impose greater restrictions on You than the applicable Third Party the Security Policies and Support section of https://
Terms. support.avaya.com/security.
The following applies only if the H.264 (AVC) codec is distributed with Suspected Avaya product security vulnerabilities are handled per the
the product. THIS PRODUCT IS LICENSED UNDER THE AVC Avaya Product Security Support Flow (https://
PATENT PORTFOLIO LICENSE FOR THE PERSONAL USE OF A support.avaya.com/css/P8/documents/100161515).
CONSUMER OR OTHER USES IN WHICH IT DOES NOT RECEIVE
REMUNERATION TO (i) ENCODE VIDEO IN COMPLIANCE WITH Downloading Documentation
THE AVC STANDARD (“AVC VIDEO”) AND/OR (ii) DECODE AVC For the most current versions of Documentation, see the Avaya
VIDEO THAT WAS ENCODED BY A CONSUMER ENGAGED IN A Support website: https://support.avaya.com, or such successor site
PERSONAL ACTIVITY AND/OR WAS OBTAINED FROM A VIDEO as designated by Avaya.
PROVIDER LICENSED TO PROVIDE AVC VIDEO. NO LICENSE IS
GRANTED OR SHALL BE IMPLIED FOR ANY OTHER USE. Contact Avaya Support
ADDITIONAL INFORMATION MAY BE OBTAINED FROM MPEG LA, See the Avaya Support website: https://support.avaya.com for
L.L.C. SEE HTTP://WWW.MPEGLA.COM. product or Hosted Service notices and articles, or to report a problem
Service Provider with your Avaya product or Hosted Service. For a list of support
telephone numbers and contact addresses, go to the Avaya Support
THE FOLLOWING APPLIES TO AVAYA CHANNEL PARTNER’S website: https://support.avaya.com (or such successor site as
HOSTING OF AVAYA PRODUCTS OR SERVICES. THE PRODUCT designated by Avaya), scroll to the bottom of the page, and select
OR HOSTED SERVICE MAY USE THIRD PARTY COMPONENTS Contact Avaya Support.
SUBJECT TO THIRD PARTY TERMS AND REQUIRE A SERVICE
PROVIDER TO BE INDEPENDENTLY LICENSED DIRECTLY FROM Trademarks
THE THIRD PARTY SUPPLIER. AN AVAYA CHANNEL PARTNER’S The trademarks, logos and service marks (“Marks”) displayed in this
HOSTING OF AVAYA PRODUCTS MUST BE AUTHORIZED IN site, the Documentation, Hosted Service(s), and product(s) provided
WRITING BY AVAYA AND IF THOSE HOSTED PRODUCTS USE by Avaya are the registered or unregistered Marks of Avaya, its
OR EMBED CERTAIN THIRD PARTY SOFTWARE, INCLUDING affiliates, its licensors, its suppliers, or other third parties. Users are
BUT NOT LIMITED TO MICROSOFT SOFTWARE OR CODECS, not permitted to use such Marks without prior written consent from
THE AVAYA CHANNEL PARTNER IS REQUIRED TO Avaya or such third party which may own the Mark. Nothing
INDEPENDENTLY OBTAIN ANY APPLICABLE LICENSE contained in this site, the Documentation, Hosted Service(s) and
AGREEMENTS, AT THE AVAYA CHANNEL PARTNER’S EXPENSE, product(s) should be construed as granting, by implication, estoppel,
DIRECTLY FROM THE APPLICABLE THIRD PARTY SUPPLIER. or otherwise, any license or right in and to the Marks without the
WITH RESPECT TO CODECS, IF THE AVAYA CHANNEL express written permission of Avaya or the applicable third party.
PARTNER IS HOSTING ANY PRODUCTS THAT USE OR EMBED Avaya is a registered trademark of Avaya Inc.
THE G.729 CODEC, H.264 CODEC, OR H.265 CODEC, THE
AVAYA CHANNEL PARTNER ACKNOWLEDGES AND AGREES All non-Avaya trademarks are the property of their respective owners.
THE AVAYA CHANNEL PARTNER IS RESPONSIBLE FOR ANY Linux® is the registered trademark of Linus Torvalds in the U.S. and
AND ALL RELATED FEES AND/OR ROYALTIES. THE G.729 other countries.
CODEC IS LICENSED BY SIPRO LAB TELECOM INC. SEE
WWW.SIPRO.COM/CONTACT.HTML. THE H.264 (AVC) CODEC IS
LICENSED UNDER THE AVC PATENT PORTFOLIO LICENSE FOR
THE PERSONAL USE OF A CONSUMER OR OTHER USES IN
WHICH IT DOES NOT RECEIVE REMUNERATION TO: (I) ENCODE
VIDEO IN COMPLIANCE WITH THE AVC STANDARD (“AVC
VIDEO”) AND/OR (II) DECODE AVC VIDEO THAT WAS ENCODED
Contents
Chapter 1: Introduction............................................................................................................ 8
Purpose.................................................................................................................................. 8
Prerequisites........................................................................................................................... 8
Change history........................................................................................................................ 9
®
Chapter 2: Avaya Aura Device Services overview............................................................. 10
Architecture topology............................................................................................................. 11
Cluster topology.................................................................................................................... 12
Solution components............................................................................................................. 13
Chapter 3: Planning and configuration................................................................................. 15
Planning............................................................................................................................... 15
Planning checklist............................................................................................................ 15
Latest software updates and patch information.................................................................. 16
Data required for installation............................................................................................. 17
Downloading software from PLDS.................................................................................... 19
Server hardware and resources for VMware...................................................................... 20
VMware software requirements........................................................................................ 20
AADS virtual machine resource requirements.................................................................... 20
Supported browsers........................................................................................................ 21
Supported servers........................................................................................................... 21
Configuration tools and utilities......................................................................................... 21
Virtual disk volume specifications for partitioning versions 1.0 and 2.0................................. 21
System layer commands.................................................................................................. 23
Preconfiguration steps........................................................................................................... 29
Pre-deployment checklist................................................................................................. 29
Configuring SSH terminal keepalive timer.......................................................................... 30
Adding data center.......................................................................................................... 30
Assigning Session Manager to a data center..................................................................... 31
Enabling data storage clustering....................................................................................... 32
Verify whether Cassandra service started in Session Manager............................................ 32
Setting up the DNS server................................................................................................ 33
Updating DNS addresses and search domains.................................................................. 37
Updating NTP addresses................................................................................................. 38
Licensing.............................................................................................................................. 38
®
Avaya Aura Device Services licensing requirements......................................................... 38
Adding a license file to System Manager........................................................................... 39
Chapter 4: Deploying Avaya Aura Device Services OVA.................................................... 40
Deployment methods............................................................................................................. 40
®
Avaya Aura Device Services installation checklist................................................................... 40
Installation on VMware checklist............................................................................................. 41
®
Deploying Avaya Aura Device Services OVA on VMware using vCenter vSphere client............. 42
VM Deployment Configuration Parameters and Network Parameters field descriptions......... 44
®
Deploying Avaya Aura Device Services OVA on vSphere connected directly to the host............ 45
®
Deploying the Avaya Aura Device Services OVA through Solution Deployment Manager from
System Manager................................................................................................................... 46
VM Management field descriptions................................................................................... 48
®
Configuring virtual IP address for Avaya Aura Device Services cluster configuration................. 53
®
Avaya Aura Device Services post-installation checklist........................................................... 54
Chapter 5: Post deployment configuration.......................................................................... 56
®
Adding an Avaya Aura Device Services instance to System Manager...................................... 56
®
Pairing Session Manager with an Avaya Aura Device Services node....................................... 58
®
Effect of Session Manager on Avaya Aura Device Services..................................................... 59
®
Logging on to the Avaya Aura Device Services console on VMware......................................... 59
®
Avaya Aura Device Services installation checklist................................................................... 60
®
Configuring an Avaya Aura Device Services seed node in a cluster......................................... 61
Initial Installation Configuration field descriptions................................................................ 64
®
Configuring an Avaya Aura Device Services node in a cluster................................................. 67
Running the post installation script.......................................................................................... 70
Checking for DRS synchronization.......................................................................................... 71
Importing a trusted LDAP certificate........................................................................................ 72
®
Configuring virtual IP address for Avaya Aura Device Services cluster configuration................. 73
®
Logging in to the Avaya Aura Device Services web interface................................................... 74
Chapter 6: Configuration........................................................................................................ 76
Saving existing LDAP settings................................................................................................ 76
Configuration........................................................................................................................ 76
®
Configuring Avaya Aura Device Services using the configuration utility............................... 77
®
Configuring the Avaya Aura Device Services server firewall.............................................. 93
®
Avaya Aura Device Services certificate configuration........................................................ 93
LDAP settings configuration........................................................................................... 100
Importing a trusted LDAP certificate................................................................................ 117
®
Avaya Aura Device Services remote access configuration............................................... 118
Cluster node configuration................................................................................................... 128
®
Avaya Aura Device Services cluster installation.............................................................. 128
Enabling PPM rate limiting for Session Manager.................................................................... 134
®
Setting up TLS link for Avaya Scopia iView.......................................................................... 135
Enabling the Enhanced Access Security Gateway after OVA deployment................................ 136
Removing EASG................................................................................................................. 137
Checklist for reverse proxy configuration............................................................................... 138
Creating a Certificate Signing Request.................................................................................. 139
TLS Certificates screen field descriptions.............................................................................. 139
Creating a Certificate Signing Request (CSR) using OpenSSL................................................ 141
Creating an end entity.......................................................................................................... 141
Creating the certificate using a CSR..................................................................................... 142
®
Avaya Aura Device Services cluster backup and restore....................................................... 177
Chapter 10: Resources......................................................................................................... 178
Documentation.................................................................................................................... 178
Finding documents on the Avaya Support website........................................................... 178
Viewing Avaya Mentor videos............................................................................................... 179
Support.............................................................................................................................. 180
Appendix A: Examples of Microsoft Active Directory LDAP property files.................... 181
Appendix B: LDAP search results and referrals................................................................ 183
®
Changing the password of the Avaya Aura Device Services virtual machine on VMware
through SSH....................................................................................................................... 186
Appendix C: Virtualization................................................................................................... 187
Thin vs. thick deployments................................................................................................... 187
®
Increasing the disk size of the Avaya Aura Device Services virtual machine through
VMware........................................................................................................................ 187
®
Increasing CPU and Memory of the Avaya Aura Device Services virtual machine............. 189
Increasing the size of a virtual disk.................................................................................. 189
Increasing the size of a disk volume on a virtual machine................................................. 190
Increasing the virtual machine disk size in the Appliance Virtualization Platform (AVP)
environment.................................................................................................................. 192
Appendix D: Aliases............................................................................................................. 193
Purpose
This document describes the installation, configuration, initial administration, and basic maintenance
checklist and procedures of Avaya Aura® Device Services.
This document is intended for people who install and configure a verified Avaya Aura® Device
Services reference configuration at a customer site.
Prerequisites
Before deploying the product, ensure that you have the following knowledge, skills, and tools.
Knowledge
• System Manager
• Session Manager
• Presence Services
• Avaya Session Border Controller for Enterprise
• Solution Deployment Manager (SDM) and SDM client
• Cassandra database
• LDAP Server
• vSphere client
• Certificates
• Avaya Equinox™ clients
Skills
• To deploy Session Manager.
• To set up the enterprise LDAP directory.
• To administer the System Manager console.
Tools
For information about tools and utilities, see Configuration tools and utilities.
Change history
Issue Date Summary of changes
Issue 1 July 2017 • Introduced Disk Partitioning version 2.0.
• Added information on system layer commands.
• Added information on Upgrading existing test configurations.
Issue 2 August 2017 • Added a procedure for signing identity certificates using third party
Certificate Authority (CA) certificates.
• Added a procedure to create a Certificate Signing Request (CSR)
using OpenSSL.
• Added a procedure to increase virtual machine disk size.
Avaya Aura® Device Services provides a set of services to Avaya Equinox™ 3.0. Avaya Aura®
Device Services is co-resident with Session Manager and is delivered as separate OVA.
The following services are provided when using Avaya Aura® Device Services with Avaya Equinox™
3.0:
• Contact: To use the Contact service, a user must be a provisioned user on LDAP Server.
Using the contact service, you can:
- Manage the contact detail from any device.
- Add, update, and delete a contact.
- Perform an enterprise search of existing sources of contacts, such as, System Manager,
multiple LDAPs, single LDAP multiple domains, and local only.
Avaya Aura® Device Services supports directory search of up to 300 contacts. The number
of contacts displayed in search results for a client depends on the number of search results
that the client supports.
- Set and retrieve information, such as, preferred names, picture, and preferences. Using the
Picture service, you can create and override, delete, and update the picture of a user. This
also provides a centralized, firewall-friendly interface to include these picture urls in the
contact information or search results.
- Search and retrieve information about Avaya Scopia® users and terminals.
You can use Avaya Aura® Device Services to search for Avaya Scopia® users and terminals
only when iView’s address is configured on Avaya Aura® Device Services.
• Notification: The Notification service provides a common infrastructure that allows a client or
endpoint to subscribe to receive events from a number of service resources using a single
connection.
• Dynamic Configuration: The Dynamic Configuration service provides discovery of
configuration settings to UC Clients. You can customize these settings on a global, group,
individual, or platform basis. The Dynamic Configuration service uses the automatic
configuration feature of Avaya Equinox™ 3.0 to facilitate the configuration details to the UC
clients. This helps the user to avoid manual configuration of their client. To log in to the client,
the user needs to enter their credentials, such as, email address or Windows user id, along
with their enterprise credentials.
The Dynamic Configuration service is supported on the following Avaya Equinox™ 3.0 devices:
- Avaya Equinox™ for Android
- Avaya Equinox™ for iOS
- Avaya Equinox™ for Mac
- Avaya Equinox™ for Windows
• Web Deployment: The Web Deployment service publishes and deploys the UC client updates
to the devices of the end users. The Web Deployment service is supported on the following
devices of the Avaya Equinox™ 3.0:
- Avaya Equinox™ for Mac
- Avaya Equinox™ for Windows
Architecture topology
Avaya Aura® Device Services and Session Manager share the same Cassandra database.
To provide services to the Avaya UC clients in Release 3.0, Avaya Aura® Device Services services
are hosted in a separate Tomcat 8 container. Whereas the existing Session Manager services
including PPM are hosted in a JBOSS container. A common contacts schema is shared between
Avaya Aura® Device Services and PPM.
The DRS synchronization performs the synchronization between System Manager and the local
Avaya Aura® Device Services DRS replica.
The following diagram depicts the architecture of Avaya Aura® Device Services:
Avaya Aura® Device Services is aligned with Session Manager, Appliance Virtualization Platform,
and VMware Virtualized Environment offers. The VMware license embedded in Appliance
Virtualization Platform does not support vCenter.
Cluster topology
When the Enable Data Storage Cluster flag is checked, all the Session Manager instances become
members of a Cassandra cluster. Each Session Manager instance in the cluster can also be
configured as part of a data center.
Solution components
Components Description
®
Avaya Aura core • System Manager
• Session Manager
• Communication Manager
• Presence Services
• WebLM
Enterprise Directory The Enterprise LDAP server.
Avaya-provided server Appliance Virtualization Platform
Endpoints • Avaya Equinox™ for Android Release 3.0
• Avaya Equinox™ for iOS Release 3.0
• Avaya Equinox™ for Mac Release 3.0
• Avaya Equinox™ for Windows Release 3.0
Planning
Planning checklist
This chapter describes the planning and pre-configuration that you must perform before installing
the Avaya Aura® Device Services server.
Warning:
When you deploy Avaya Aura® Device Services, avoid copying and pasting commands directly
from this document. This can introduce unwanted characters and errors. Double-check all inputs
you copy or type them manually.
Ensure you follow the steps in sequence before deploying the Avaya Aura® Device Services OVA.
# Task Reference
1 Identify the hypervisor and verify that See AADS virtual machine resource
the capacity meets the OVA requirements on page 20.
requirements.
2 Plan the staging and verification See AADS virtual machine resource
activities and assign the resources. requirements on page 20.
3 Purchase the required licenses. Go to the Avaya Product Licensing and
Delivery System at https://plds.avaya.com/.
Register for PLDS and do the
following:
• Obtain the license file.
• Activate license entitlements in
PLDS.
4 Download the required Avaya Aura® See Downloading software from PLDS on
Device Services OVA. page 19.
See Configuration tools and utilities on
page 21.
5 Verify the md5sum of the ova file
matches with the md5sum on PLDS.
# Task Reference
6 Gather and keep configuration data See Avaya Aura® Device Services
ready. Questionnaire and Data required for
installation on page 17.
7 It is recommended that you deploy
Avaya Aura® Device Services on the
same subnet as the Session
Manager management subnet.
8 If you use Nginx as an external load
balancer, ensure the following:
• The network latency between
Avaya Aura® Device Services and
the associated Session Manager
must be less than 5 ms.
• The Avaya Aura® Device Services
servers, load balancers, and virtual
IP should be in the same subnet.
9 Avaya Aura® Device Services For single node installations, see Deploying
supports single node and cluster AADS OVA on page 45 and Post
node installations. deployment configuration on page 56.
If you choose to install a standalone For cluster node installations, in addition to
Avaya Aura® Device Services at Deploying AADS OVA on page 45 and Post
present, but in future decide to move deployment configuration on page 56, see
to a cluster that uses a virtual IP, the Cluster node configuration on page 128.
original standalone node needs to be
reconfigured with the original virtual
IP as the front end FQDN.
Accordingly, the new FQDN addition
for Avaya Aura® Device Services
must be notified to your clients.
To avoid this scenario, you can plan
in advance and add a virtual IP for
the front end FQDN of the standalone
node. This would make the transition
from a standalone node to a cluster
easier in the future.
After deploying or upgrading a product or solution, use the instructions in the release notes, PSNs,
or PCNs to install any required software updates or patches.
For third-party products used with an Avaya product or solution, see the latest release notes for the
third-party products to determine if you need to download and install any updates or patches.
Note:
The first link, Click to download your file now, uses the Download Manager to
download the file. The Download Manager provides features to manage the download
(stop, resume, auto checksum). The click here link uses your standard browser
download and does not provide the download integrity features.
13. If you use Internet Explorer and get an error message, click the install ActiveX message at
the top of the page and continue with the download.
14. Select a location where you want to save the file and click Save.
15. If you used the Download Manager, click Details to view the download progress.
For capacity supported for Session Manager, see Avaya Aura® Session Manager Overview and
Specification.
Supported browsers
You can access the Avaya Aura® Device Services web interface on the following browsers:
• Internet Explorer 9.0 and later
• Mozilla Firefox 39.0 and later
Supported servers
You can deploy the Avaya Aura® Device Services OVA on the following servers:
• HP ProLiant DL360 G7
• Dell™ PowerEdge™ R610
• HP ProLiant DL360p G8
• Dell™ PowerEdge™ R620
• HP ProLiant DL360 G9
• Dell™ PowerEdge™ R630
partitioning version 1.0. When you deploy a new OVA for this release, the system is on partitioning
version 2.0.
Disk partitioning must be extended based on the number of users on the system. The following table
shows the file system layout for systems on partitioning versions 1.0 and 2.0.
Partitioning version 1.0
Disk Volume Volume Size (GiB)
Disk 1 Disk 2 Disk 3
/boot1 0.2
swap 2 8.0
/3 41.8
/home4 4.0
/opt/Avaya5 21.0
/media/data6 20.0
Total for disk 50.0 25.0 20.0
Total disk size 95.0
-h, --help
Command syntax (this help)
-hh, --hhelp
Verbose help
Available commands:
Command syntax
sys <command> -h
[admin@server4889aads ~]$
The "sys" command line alias facilitates access to the following commands
related to the system layer of UCApp appliances. To obtain help with
each of these commands, use the "-h" (or "--help") argument for help
with command line syntax, and "-hh" (or "--hhelp") for verbose help.
secconfig
Manages security-related settings.
versions
volmgt
Queries the sizes of existing disk volumes and extends their sizes.
[admin@server4889aads ~]$
Any arguments provided after the name of the system layer command are passed through to that
command.
Related links
sys secconfig command on page 24
sys versions command on page 24
sys volmgt command on page 25
--help, -h
Prints terse help (command line syntax).
--hhelp, -hh
Prints verbose help (this help).
[admin@server4950aads ~]$
Related links
System layer commands on page 23
[admin@server4889aads ~]$
Related links
System layer commands on page 23
Syntax:
--help, -h
--hhelp, -hh
--version, -v
--status, -st
--summary, -s
--monitor [tail|less], -m [tail|less]
--logs, -l
--scan
--extend <volume> [ <n>m | <n>g | <n>t --remaining ]
--extend --all
--reset
[admin@server4889aads ~]$
This script provides for the ability to extend the sizes of volumes on this
system. In order for a volume to be extended in size, the disk that hosts
the volume must first be increased in size using the tools that are used
to manage deployed virtual machines (VMware).
2) It will then extend the size of the Linux file system that is
located inside that volume to the new size of the LVM logical
volume.
Step (2) above may take several minutes to complete for larger volumes. If,
for some reason, this second operation is interrupted, it can be re-run
using the same command, but WITHOUT specifying the size argument. For example,
the following command is used to perform step (2) only for the application
log volume (/var/log/Avaya).
If in doubt as to whether or not all file systems have been fully extended in
their respective volumes, step (2) can be executed across all volumes using
a single command as follows:
Performing step (2) on a file system that is already fully extended in its
LVM volume is a null operation (does no harm).
- The extending of a volume cannot be undone. Make sure the correct volume
is being extended, and by the correct size. To confirm any extend
operation, the user is required to enter the response "confirm"
(case insensitive).
- Logical volumes on the system are referenced using their Linux file system
mount points, such as /var/log/Avaya and /media/data, with the exception
of the volume containing Linux swap, which has no mount point. The Linux
swap volume is referenced using "swap".
- Sizes are specified in base 2 units rather than base 10 (SI) units. For
example, 1g = 1 GiB = 1024 x 1024 x 1024 bytes.
- Due to file system overhead allocation by the Linux kernel, the size
of a file system will never exactly match the size as reported by
the LVM volume that contains that file system. To be certain that a file
system is fully extended to the size of the volume that contains it,
inspect the log file after issuing the extend operation as follows:
--help, -h
Terse help.
--hhelp, -hh
Verbose help (this help).
--version, -v
Prints the version of this script to stdout.
--status, -st
Prints the current status of this tool. Use this to determine
if there is a background operation in progress, or the results
of the last background operation.
--summary, -s
Prints a summary of disks, the LVM volumes contained on each disk,
and the file system contained in each LVM volume. Disk information
includes the size of the disk and the amount of free space
available for allocation to volumes on the disk. LVM volume
information includes the size of the LVM volume. File system
information includes the size of the Linux file system and the
current amount of space that is in use on that file system.
--monitor [tail|less]
-m [tail|less]
Browse the log file for the latest extend operation. Specify "tail"
to use the tail browser. Specify "less" to use the less
browser, which allows scrolling and searching through the log file.
If neither is specified, the browser defaults to the tail browser.
--logs
Generate a zip file in the current working directory that contains
all logs generated to date by this script.
--scan
Scan disks for newly available storage. Do this after increasing
the disk size of one of more disks. Once scanned, the newly
available space appears in the "Free" column in the "--summary"
output, and is now available for allocation to volumes on that disk.
For more information, see the examples at the top of this help.
Example invocations:
--reset
[admin@server4889aads ~]$
The following example shows a summary of the information provided by this command for a version
2.0 partitioned system:
[admin@server4950aads ~]$ sys volmgt -s
Related links
System layer commands on page 23
Preconfiguration steps
Pre-deployment checklist
Use this checklist to prepare your system before deploying the Avaya Aura® Device Services ova
file.
No. Task Description Notes
Name Description
New Creates a new Data Center. Assigns Core Session Managers to any Data
Center.
Edit Modifies a Data Center name, description, or modifies assignment of Core
Session Manager to any Data Center.
Delete Deletes a data center if the data center is not assigned to a core Session
Manager server.
View Displays the read only view of Data Center.
Related links
Adding data center on page 30
4. To assign Session Manager to data center, under the SMs unassigned or assigned to
other Data Center section, from the Data Center drop-down list, select the data center
name.
• If you select the same data center name for Session Manager, the system refreshes the
page and displays the assigned data center under the SMs in Data Center section.
• If you select the other data center name for Session Manager, the system displays the
assigned data center under the SMs unassigned or assigned to other Data Center
section.
5. Click Commit.
The system displays the Confirm Data Center assignments page.
6. Verify the data center and SM assignment.
7. Click Confirm.
• Go to Session Manager > System Status > User Data Storage and check whether the
Cluster Status column shows that SM is part of a cluster.
3. If the service is not up, log in to the Session Manager CLI and type start —s cassandra
to start the Cassandra service.
_avaya-ep-config._tcp.example.com
East._avaya-ep-config._tcp.example.com
Tip:
In the left pane of Microsoft DNS Manager, you must create the PTR, SRV, and TXT
records at the _avaya-ep-config level. If the _avaya-ep-config level does not exist, you
must manually create the same. Right-click _avaya-ep-config and then select Other
New Records, select the resource record type, and then click Create Record.
2. Create an SRV record linking the descriptive name of your settings file to the web server
where the file resides.
If the URL to the settings file is https://server.example.com/East_settings.txt,
then the server name is server.example.com.
An SRV record also includes the following information:
• SRV time-to-live period in seconds during which the client or intermediate servers might
cache the retrieved record.
The following is an example of an SRV record: East._avaya-ep-
config._tcp.example.com. 300 IN SRV 0 0 443 server.example.com.
In this example:
• 300 is the time-to-live period
• The first zero is the priority, the second zero is the weight, and 443 is the port number.
In case of Microsoft DNS Manager, the following is an example of a SRV record:
East Properties
_tcp.example.com
East
443
server.example.com
3. Create a TXT record linking the descriptive name of your settings file to the remaining URL
information.
TXT records are provisioned differently depending on the DNS server. However, all TXT
records must have the following parameters:
• txtvers: The text version of the TXT record. This value indicates the structure version of
the record. You must always set the value to 1.
• path: The path to the settings file. An example value is path=/East_settings.txt.
• proto: The web server access scheme. This value is usually http or https.
The following is an example of a TXT record: East._avaya-ep-
config._tcp.example.com. 300 IN TXT "txtvers=1" "proto=https"
"path=/East_settings.txt"
In this example, 300 is the time-to-live period.
In case of Microsoft DNS Manager, the following is an example of a TXT record:
East Properties
East
East._avaya-ep-config._tcp.example.com
txtvers=1
proto=https
path=/East_settings.txt
3. To edit the local file with the new information, type vi ./resolv.conf.
4. Update the search domain and IP addresses as required.
Search domains are space delimited, on a single line as per the following format: search
domain-name domain-name domain-name....
You can add one DNS name server on each line, as per the following format: nameserver
ipv4–address.
5. To verify the changes, type diff ./resolv.conf.orig ./resolv.conf.
Licensing
Avaya Aura® Device Services periodically checks WebLM to determine whether the required license
is available. If an appropriate license is not present, the Avaya Aura® Device Services administration
GUI displays a license error mode.
In clusters, all Avaya Aura® Device Services nodes are assigned licenses if available. If a node in
the cluster becomes unavailable, WebLM frees the license for that node after 10 minutes. When the
node becomes available again, WebLM again assigns a license to the node if licenses are available.
You can upload license files through System Manager.
Deployment methods
You can deploy Avaya Aura® Device Services ova by using any of the following methods:
• Option 1: VMware vSphere using Vcenter on page 42
• Option 2: VMware vSphere that is connected directly to the host (without vCenter) on page 45
• Option 3: Solution Deployment Manager from System Manager on page 46
• Option 4: Solution Deployment Manager client on page 46
Virtual IP Configuration:
Enables virtual IP, and
sets virtual IP Master/
backup node.
Important:
One Virtual IP can
support up to three
nodes. If you
foresee that the
cluster will expand
to more than three
nodes, use an
external load
balancer.
6 Advanced Configuration Defaults values
(optional) selected when not
opted.
7 Add a certificate to the Imports certificates
TrustStore other than the available
default System
Manager certificates
3. In the Deploy OVF Template window, do one of the following to deploy the Avaya Aura®
Device Services OVF package (AADS.7.1.0.0.ova):
• Click Browse and provide the Avaya Aura® Device Services OVA file location.
• If the OVA file is on an http server, type the URL in the Deploy from a file or URL field.
The system deploys the Avaya Aura® Device Services OVF package (AADS.7.1.0.0.ova).
4. Click Next.
5. In the OVF Template Details window, verify the details of the Avaya Aura® Device Services
OVA template and click Next.
The system displays the End User License Agreement window.
6. Read the license agreement and click Accept.
7. Click Next.
The system displays the Name and Location window.
8. In the Name field, type the name of the new virtual machine.
9. Click Next.
The system displays the Deployment Configuration window.
10. In the Configuration field, click an Avaya Aura® Device Services profile that matches your
requirement, and click Next.
11. In the Disk Format window, ensure that the correct Datastore location and Available space
is displayed. Accept the default disk format to store the virtual machine and virtual disks for
the Avaya Aura® Device Services OVA, and click Next.
12. In the Network Mapping window, ensure that the correct network available for that virtual
machine is selected, and click Next.
If you see more than one network interface during deployment, disable the second interface.
One interface is sufficient for configuring Avaya Aura® Device Services. Connect the first
Network Interface to vSwitch. The vSwitch maps the network interface of with Avaya Aura®
Device Services the real physical interface of the server.
Note:
Although the Out of Band Management option is displayed, it is not supported in the
current release.
13. Specify the Management Network Settings and Account login Details fields.
For information about the field descriptions, see VM Deployment Configuration Parameters
and Network Parameters field descriptions on page 44.
Ensure that you deploy Avaya Aura® Device Services on the same subnet as the Session
Manager to which the Avaya Aura® Device Services instance is associated.
14. Click Next.
The system displays the Ready to Complete window.
15. (Optional) Click the Power on after deployment check box to start the Avaya Aura® Device
Services automatically after deployment.
16. Verify the deployment settings and click Finish.
The system displays the progress of the tasks in the Deploying AADS window.
Related links
Configuring an Avaya Aura Device Services seed node in a cluster on page 61
AADS virtual machine resource requirements on page 20
Thin vs. thick deployments on page 187
VM Deployment Configuration Parameters and Network Parameters field descriptions on page 44
Related links
Configuring an Avaya Aura Device Services seed node in a cluster on page 61
Initial Installation Configuration field descriptions on page 64
Configuring Avaya Aura Device Services using the configuration utility on page 77
Front-end host, System Manager, and certificate configuration on page 78
LDAP configuration on page 81
Clustering configuration on page 90
Advanced configuration on page 91
AADS virtual machine resource requirements on page 20
Thin vs. thick deployments on page 187
• Add a location.
• Add Appliance Virtualization Platform or an ESXi host to the location.
• Download the required OVA file to System Manager.
Procedure
1. On the System Manager web console, click Services > Solution Deployment Manager,
and then click VM Management.
2. In VM Management Tree, select a host.
3. On the Virtual Machines tab, in the VMs for Selected Location <location name> section, click
New.
The system displays the VM Deployment section.
4. In the Select Location and Host section, do the following:
a. In Select Location, select a location.
b. In Select Host, select a host.
The system displays the host name in the Host FQDN field.
5. In Data Store, select a data store, if not displayed upon host selection.
The page displays the capacity details.
6. Click Next.
7. In the Deploy OVA section, do the following:
a. In Select Software Library, select the local or remote library where the OVA file is
available.
b. In Select OVAs, select the OVA file that you want to deploy.
c. In Flexi Footprint, select the footprint size that the application supports.
8. Click Next.
9. In the Properties page, specify the following: management network settings, public network
settings, and Admin user details.
Although the system displays the Out of Band Management option, it is not supported in the
current release.
10. Click Deploy.
11. Click Accept the license terms.
In the Hosts for Selected Location <location name> section, the system displays the
deployment status in the Current Action Status column.
The system displays the virtual machine on the VMs for Selected Location <location name>
page.
12. To view details, click Status Details.
Button Description
New Displays the New Location section where you can provide the details of the
location that you want to add.
Edit Displays the Edit Location section where you can change the details of an
existing location.
Delete Deletes the locations that you select.
The system moves the hosts associated with the deleted locations to
unknown location.
Hosts
Name Description
Host Name The name of the host.
Host IP The IP address of the host.
Host FQDN FQDN of the host.
IPv6 The IPv6 address of the host.
If the IP address of the ESXi host is an IPv4 address, the column does not
display any value.
vCenter FQDN The FQDN of vCentre.
Current Action The operation that is currently being performed on the host.
Last Action The last completed operation on the host.
License Status The status of the license.
Host Version The host version.
Offer Type The host type. The options are:
• AVP: Appliance Virtualization Platform host
• Customer VE: customer-provided VMware ESXi host
SSH Status The SSH service status. The values are enabled and disabled.
Host Certificate The certificate status of the Appliance Virtualization Platform host. The
values are:
• : The certificate is added in Solution Deployment Manager and correct.
Name Description
• : The certificate is not accepted or invalid.
You can click View for details of the certificate status.
vCenter Certificate The certificate status of the ESXi host. The values are:
• : The certificate is correct.
The system enables all the options in More Actions that apply to
VMware ESXi host.
• : The certificate is not accepted or invalid.
You can click View for details of the certificate status.
Note:
Depending on the Appliance Virtualization Platform host and vCenter certificate status, the
system enables the options in More Actions.
Button Description
Auto Refresh The option to automatically refresh the page with the
latest changes. For example, the page updates:
• The VM state when a virtual machine changes
• The license status or certificate status of host when
host changes
The system refreshes the data every minute.
Add Displays the New Host section where you can
provide the details of the host that you want to add.
Edit Displays the Host Information section where you can
change the details of an existing host.
Remove Removes the hosts that you select only from the
Solution Deployment Manager client.
The system moves the hosts associated with the
deleted locations to unknown location.
Change Network Params > Change Host IP Displays the Host Network/IP Settings section where
Settings you can change the host IP settings for the
Appliance Virtualization Platform host.
Change Network Params > Change Network Displays the Host Network Setting section where you
Settings can change the network settings for the Appliance
Virtualization Platform host.
Refresh Refreshes the status of the hosts.
More Actions > AVP Update/Upgrade Displays the Update host page where you can
Management provide the Appliance Virtualization Platform patch
file for updating the Appliance Virtualization Platform
host.
Button Description
More Actions > Change Password Displays the Change Password section where you
can change the password for the Appliance
Virtualization Platform host.
More Actions > SSH > Enable SSH Enables SSH for the Appliance Virtualization
Platform host.
When SSH for the Appliance Virtualization Platform
host is enabled, the system displays SSH enabled
successfully.
More Actions > SSH > Disable SSH Disables SSH on the Appliance Virtualization
Platform host.
When SSH for Appliance Virtualization Platform is
disabled, the system displays Disabling SSH for
AVP host with <IP address> <FQDN>,
<username>.
More Actions > Syslog config > Push Displays the Push Syslog Configuration section
where you can push the syslog configuration on the
virtual machine host. Also Syslog is only for
Appliance Virtualization Platform. You can select
multiple Hosts and Push syslog configuration on
selected hosts.
More Actions > Syslog config > View Displays the View Syslog Configuration section
where you can view syslog profiles of selected the
Appliance Virtualization Platform host.
More Actions > Syslog config > Delete Displays the Delete Syslog Configuration section
where you can select and delete configured syslog
profiles.
More Actions > Lifecyle Actions > Host Restart Restarts the host and virtual machines that are
running on the Appliance Virtualization Platform host.
More Actions > Lifecyle Actions > Host Shuts down the host and virtual machines that are
Shutdown running on the Appliance Virtualization Platform host.
More Actions > AVP Cert. Management > Displays the Certificate dialog box where you can
Generate/Accept Certificate manage certificates for the host.
Depending on the host type, the options are:
• Generate Certificate: To generate certificate for
Appliance Virtualization Platform host only.
• Accept Certificate: To accept a valid certificate for
the host or vCenter.
• Decline Certificate: To decline the certificate for
Appliance Virtualization Platform host only. You
must regenerate the certificate and accept if you
decline a host certificate.
More Actions > AVP Cert. Management > Manage Displays the Load Certificate dialog box from where
Certificate you can view/generate certificates for Appliance
Button Description
Virtualization Platform hosts, and download them.
You can also upload and push third-party signed
certificates to the selected host.
More Actions > AVP Cert. Management > Generic Displays the Create/Edit CSR dialog box from where
CSR you create or edit the generic CSR data.
More Actions > Set Login Banner Displays the Message of the Day dialog box from
where you can push the login banner text to the
selected host.
Note:
This feature is only available in System
Manager Solution Deployment Manager.
Solution Deployment Manager Client does not
support Set Login Banner.
Virtual Machines
Name Description
VM Name The name of the virtual machine.
VM IP The IP address of the virtual machine.
VM FQDN FQDN of the virtual machine.
VM IPv6 The IPv6 address of the virtual machine, if any.
VM App Name The name of the application virtual machine . For
example, Session Manager.
VM App Version The version of the application virtual machine. For
example, 7.1.
VM State The state of the virtual machine. The states are
Started and Stopped.
Current Action Status The status of the current operation. The statuses
are:
• Deploying
• Starting
• Stopping
The Status Details link provides the details of the
operation in progress.
Last Action The last action performed on the virtual machine.
Host Name The hostname of the VMware host or Appliance
Virtualization Platform host on which the virtual
machine resides.
Trust Status The status of the connection between System
Manager and the virtual machine.
The status can be Success or Failed.
Name Description
When the connection between System Manager and
the virtual machine establishes, Trust Status
changes to Success.
Only when the trust status is Success, you can
perform other operations.
Data Store The data store name.
Button Description
New Displays the VM Deployment section where you can
provide the host and deploy an application.
Edit Displays the VM Deployment section where you can
change the details of a virtual machine.
Delete Turns off the virtual machines and deletes the
selected virtual machine from host and Solution
Deployment Manager Client.
Start Starts the selected virtual machines.
Stop Stops the selected virtual machines.
Show Selected Displays only the selected virtual machines.
More Actions > Restart Starts the selected virtual machines that were
stopped earlier.
More Actions > Refresh VM Updates the status of the virtual machines.
More Actions > Re-establish Connection Establishes the connection between System
Manager and the virtual machine.
When the connection between System Manager and
the virtual machine establishes, the Trust Status
changes to Success.
More Actions > Update Static Routing Displays the VM Update Static Routing section
where you can update the IP address of Utility
Services for static routing.
More Actions > Syslog config > Push Displays the Push Syslog Configuration section
where you can push the syslog configuration on the
selected virtual machine.
More Actions > Syslog config > View Displays the View Syslog Configuration section
where you can view all configured syslog profiles.
More Actions > Syslog config > Delete Displays the Delete Syslog Configuration section
where you can select and delete configured syslog
profiles.
Note:
When a contact is added to Associated Contact in System Manager, the contact will be
synchronized to the client. Any contact that is not added to Associated Contact will not be
synchronized. For information about adding a contact to Associated Contact, see Administering
Avaya Aura® System Manager.
Avaya Aura® Device Services services are available only after DRS and LDAP synchronization is
completed. The time required for synchronization varies based on the number of contacts
administered.
For information about installing patches and upgrades, see Avaya Aura® Device Services release
notes.
No. Task Description Notes
Important:
Before DRS
synchronization,
ensure that you
add the Avaya
Aura® Device
Services host
name and IP
address to the
etc hosts file of
System
Manager.
2 From the Avaya See Setting up user This is to ensure that
Aura® Device synchronization with the sync is successful.
Services LDAP Server after
administration GUI, deployment on
run the Force page 102.
LDAP Sync option
to sync LDAP.
3 Check status of Log in to Avaya Aura®
Avaya Aura® Device Device Services and
Services. check whether
Services status in the
right pane changes to
STARTED.
d. In the Version field, type the version of the Avaya Aura® Device Services server.
e. In the Location field, type the location name of the Avaya Aura® Device Services
server.
7. Go back to the General tab.
Important:
Access profiles of type GRCommunication and TrustManagement are available by
default.
8. Select the TrustManagement access profile, and click Edit.
9. In the Access Profile Details section, in the Name field, type a name for the access profile.
10. In the Access Profile Type field, click Trust Management .
11. In the Protocol field, click https.
12. In the Host field, type the FQDN or IP address of the Avaya Aura® Device Services server.
13. Leave the Container Type field blank.
14. Leave the other fields unchanged at default values.
15. Click Save.
To enable SSO login, you must add an access profile of type EMURL. Steps 13a to 13k
show how to add an access profile of type EMURL.
16. To add an EMURL access profile, on the General tab, in the Access Profile section, perform
the following:
a. Click New.
b. In the Application System Supported Protocol section, in the Protocol field, click URI.
c. In the Access Profile Details section, in the Name field, type a name for the access
profile.
d. In the Access Profile Type field, click EMURL.
e. In the Protocol field, click https.
f. In the Host field, type the Avaya Aura® Device Services server FQDN.
g. In the Port field, type 8445.
h. In the Path field, type /admin.
i. In the Order field, retain the default value.
j. In the Description field, type a description of the access profile.
k. Click Save.
17. Click Commit.
Next steps
Go to the System Manager home page and click Device Services in the Elements section.
The Device Services page displays the Avaya Aura® Device Services element you added. After
Avaya Aura® Device Services installation is complete, you can click the name of the Avaya Aura®
Device Services element to open the Avaya Aura® Device Services home page.
Important:
One Virtual IP can
support up to three
nodes. If you
foresee that the
cluster will expand
to more than three
nodes, use an
external load
balancer.
6 Advanced Configuration Defaults values
(optional) selected when not
opted.
7 Add a certificate to the Imports certificates
TrustStore other than the available
default System
Manager certificates
• Bind Credential
• UID Attribute ID
• Base Context DN
• Administrator Role
• Auditor Role
• User Role
• Services Administrator Role
• Services Maintenance & Support Role
• Integrated Windows Authentication Configuration
• testUser
If you select testUser and select Apply, this option is used to validate the following LDAP
settings:
- Verifies that the user is searchable with a given base DN and search filter
- Lists the group to which the user belongs-user, admin, or auditor
- Validates the values for Role Attribute ID and Role Name Attribute
- Verifies the Last Updated Time attribute, role filter syntax, and active users search filter
syntax
The configuration is not saved if any of these validations fail.
The testUser parameter is optional. If you do not specify a value in the testUser field, the
system skips validation and directly saves the configuration in the database.
The testUser should be a valid user on LDAP and in the given Base Context DN.
20. Select Advanced LDAP Parameters and press Enter.
21. In the Advanced LDAP Paramters screen, verify the default values for the parameters and
update if required.
22. Select Return to previous menu and press Enter.
23. In the LDAP Configuration screen, select Apply and press Enter.
24. In the LDAP Configuration screen, select Yes and press Enter.
25. In the Results of LDAP Parameter Configuration screen, select Continue and press Enter.
26. In the Main Menu screen, select Clustering Configuration and press Enter.
27. In the Clustering Configuration screen, select Virtual IP Configuration and press Enter.
28. In the Virtual IP Configuration screen, set values for the following parameters:
• Set Enable virtual IP to y.
• Set Virtual IP address to the virtual IP that you want to use.
Name
User ID (UID) of product user on seed node The user ID of a non-root Linux user who performs
the Avaya Aura® Device Services server installation.
Front-end host, System Manager and Certificate Configuration
Front-end FQDN Specifies the FQDN of Avaya Aura® Device Services
server. Clients must use this FQDN to gain access to
the services provided by Avaya Aura® Device
Services.
System Manager FQDN Specifies the FQDN of System Manager.
System Manager Version Specifies the version of System Manager.
System Manager HTTPS Port The HTTPS port to configure the Alarm Agent for the
current Avaya Aura® Device Services server.
The default value for this setting is 443.
System Manager Enrollment Password Specifies the enrollment password of System
Manager that external clients use to request a
certificate.
The enrollment password must match the password
provided during System Manager installation. This
password is set from the Security page of System
Manager from Certificates > Enrollment
Password. Contact the System Manager
administrator if you do not know the enrollment
password.
Use System Manager for certificates Specifies if the certificates are retrieved from System
Manager or from imported from files.
The options are:
• y: If you want to retrieve certificates from System
Manager.
• n: if you want to retrieve certificates from imported
files.
Local frontend host Specifies the local FQDN of the node.
Keystore password Specifies the password for the Java-based Avaya
Aura® Device Services certificates.
The minimum length for this password is 6
characters.
Override port for reverse proxy Specifies whether you use an external reverse proxy.
Enable this setting only if clients will not be
connecting directly to the Avaya Aura® Device
Services server, but rather using a proxy server as
part of a remote access solution that is configured to
receive connections on a port other than the default
port 8443.
Name
Select y (yes) to configure the port for the reverse
proxy server or n (no) to keep the default
configuration that remains disabled.
If you select y (yes), the menu displays a new setting
for the reverse proxy port: Front-end port for
reverse proxy.
Cassandra Encryption
Enable inter-node encryption for Cassandra Specifies if inter-node encryption for Cassandra
cluster node cluster node is enabled.
The options are:
• y: If you want to enable the inter-node encryption
for Cassandra cluster node
• n: If you don't want to enable the inter-node
encryption for Cassandra cluster node.
Session Manager Cassandra Configuration
Session Manager IP or FQDN Address [localhost] Specifies the management IP address or the FQDN
of Session Manager.
Session Manager Asset IP or FQDN Address Specifies the asset IP address or the FQDN of
Session Manager.
The system uses the Session Manager Asset IP
address for starting PPM SOAP API. The system
stores the Session Manager Asset IP address in the
cas-settings.properties file.
To view the Session Manager Asset IP address, see:
Viewing the Session Manager Asset IP address.
Advanced Configuration
Run the firewall configuration script Specifies if you want to run firewall configuration
scripts during the initial installation phase.
The options are:
• y: If you want to run the firewall configuration
scripts.
• n: if you don't want to run the firewall configuration
scripts.
The default value for this setting is y.
Clear database directories and files Specifies if the system removes the database
directories and files during the installation.
The options are:
• y: If you want to clear database directories and
files.
Name
• n: if you don't want to clear database directories
and files
The default value for this setting is y.
Remove log files from log directory Specifies if the system removes log files from the
directory during the install and uninstall phases.
The options are:
• y: If you want to clear the log files from the log
directory.
• n: If you do not want to clear the log files from the
log directory.
The default value for this setting is n.
Related links
AADS virtual machine resource requirements on page 20
Thin vs. thick deployments on page 187
VM Deployment Configuration Parameters and Network Parameters field descriptions on page 44
Note:
You must not resize the SSH console during the installation and configuration of Avaya
Aura® Device Services.
If you are on Avaya Aura® Device Services 7.0.1, you must go to cd /opt/Avaya/, and
type ./installAADS.sh. The app install command is not available in Avaya Aura®
Device Services 7.0.1.
3. At the password for admin prompt, type the password for the admin user.
4. In the Initial Installation Configuration screen, select Cluster Configuration and press
Enter.
5. In the Clustering screen, set the value of Initial cluster node field to n and select Return to
Main Menu.
6. In the Clustering screen, set the value of the Local node IP address field to the IP address
of the new Avaya Aura® Device Services node and press Enter.
7. In the Clustering screen, set the value of the Cluster seed node field to the IP address of
the seed node or the first cluster node, and press Enter.
8. In the Clustering screen, set the value of the User ID of product user on seed node field,
type the UID of the seed node, and click Enter.
9. In the Initial Installation Configuration screen, select Front-end host, System Manager and
Certificate Configuration and press Enter.
10. Select Return to Main Menu and press Enter.
11. In the Front-end host, System Manager and Certificate Configuration screen, set values for
the following parameters:
• Front-end FQDN
For a cluster, specify the FQDN of the virtual IP as the Front-end FQDN.
• System Manger FQDN
• System Manager version
• System Manager HTTPS port
• System Manager Enrollment Password
• Local Front-end host
• Keystore password
Ensure that the keystore password is at least 6 characters long.
Important:
The values that you specify on this screen must match the values provided for the
seed node.
12. Select Return to Main Menu and press Enter.
13. In the Initial Installation Configuration screen, select Session Manager Cassandra
Configuration and press Enter.
14. In the Session Manager Cassandra Configuration screen, set values for the following
parameters:
• Session Manager Management IP
• Session Manager Asset IP
15. Select Return to Main Menu and press Enter.
16. Select Continue and press Enter.
17. In the Configuration Summary screen, verify the values, select Accept and Continue and
press Enter.
The installer performs pre-install checks.
18. In the Results of configuration checks screen, select Continue and press Enter.
The system displays the End User License Agreement.
19. Select Accept and press Enter.
20. Select Accept and press Enter.
The system displays the progress of the tasks in the Running Installer Script window. The
system installs the required RPMs, downloads certificates from System Manager, creates
database schema, and performs the required initial configuration. After successful
installation, the system displays the Results of Installation Script screen.
21. Select Continue and press Enter.
22. In the Main Menu screen, select Clustering Configuration and press Enter.
23. In the Clustering Configuration screen, select Cluster Utilities and press Enter.
24. In the Clustering Configuration screen, select Configure SSH RSA Public/Private Keys
and press Enter.
The system displays a command line screen.
25. In the Add additional host to the list prompt, type y and press Enter.
26. In the Enter a new host identifier prompt, type the IP address of the seed node and press
Enter.
27. In the User prompt, type the admin user name for the seed node and press Enter.
28. If the system displays the SSH RSA Key exists. Replace with a new one prompt, type y
and press Enter.
29. In the Are you sure you want to continue connecting prompt, type y and press Enter.
30. At the password prompts, type the admin passwords for the servers for which the system
displays the IP addresses or FQDNs and press Enter.
31. At the SSH RSA configuration is complete prompt, press Enter to continue.
The system displays the Cluster Utilities screen.
32. Select Return to Main Menu and press Enter
33. In the Clustering Configuration screen, select Virtual IP Configuration and press Enter.
34. In the Virtual IP Configuration screen, set values for the following parameters:
• Set Enable virtual IP to y.
• Set Virtual IP address to the virtual IP that you want to use.
• Set Virtual IP interface to the required value.
• Set Virtual IP master node to n.
• Set Virtual IP router ID to the required value.
• Set Virtual IP authentication password to the password you set on the seed node.
35. Select Apply and press Enter.
36. In the Clustering Configuration screen, select Return to Main Menu and press Enter
37. In the Main Menu screen, select Add a Certificate to the TrustStore and press Enter.
This step is optional if you use a certificate different from the System Manager certificate.
38. Select Continue and press Enter.
The system displays a message for Avaya Aura® Device Services service restart.
39. Select Yes and press Enter.
40. In the Results of service AADS restart screen, select Continue and press Enter.
Avaya Aura® Device Services service installation is completed.
The post-installation script determines the status of the system after a fresh Avaya Aura® Device
Services installation or upgrade.
Procedure
1. Log in to the Avaya Aura® Device Services server.
2. Go to /opt/Avaya/DeviceServices/version/CAS/version/misc.
3. Type sudo ./clitool-acs.sh postInstallSystemVerification.
The command checks whether:
• Avaya Aura® Device Services services such as Nginx, Postgres, Cassandra, Tomcat,
RecoveryManager are up
• Avaya Aura® Device Services and Session Manager are associated
• 9042 SSL port is open for Cassandra queries
• Cassandra clustering is enabled
• LDAP sync is completed
4. Type sudo ./clitool-acs.sh postInstallSystemVerification -u user_ID -
p password -e email_address.
Here, user_ID is the Avaya Aura® Device Services user ID, password is the password, and
email_address is the user’s email address.
This command checks whether REST API services such as web deployment, resource
discovery, contact service, search directory, and auto-configuration are available. In addition,
it checks whether Avaya Aura® Device Services PPM connectivity is established.
Procedure
1. Open a compatible web browser.
2. Type the URL in one of the following formats:
• https://<IP_Address>:8445/admin/
• https://<FQDN>:8445/admin/
In the DNS add an entry to map IP address with the FQDN.
If the FQDN does not resolve through DNS, you must add the IP address and FQDN of
Avaya Aura® Device Services in the etc/hosts file of the system from where you are
accessing the Avaya Aura® Device Services web interface. The default path of the hosts file
on a Microsoft Windows system is C:\Windows\System32\drivers\etc.
3. Press Enter.
If your browser does not have a valid security certificate, the system displays a warning with
instructions to load the security certificate.
4. (Optional) If you are certain your connection is secure, accept the server security certificate
to access the Logon screen.
5. On the Logon screen, do the following:
a. In the Username field, type the user name.
b. In the Password field, type the password.
To access the web-based administration portal, use an account with an administrator role
defined in the LDAP server configuration.
6. In the Password field, type the password.
7. Click Log on.
The system displays the Avaya Aura® Device Services home page.
Configuration
The following table summarizes the server configuration tasks that you must perform during or after
the installation of the Avaya Aura® Device Services server for each of the deployment models
presented.
Table 1: Summary of server configuration tasks
Related links
Configuring Avaya Aura Device Services using the configuration utility on page 77
Configuring the Avaya Aura Device Services server firewall on page 93
LDAP settings configuration on page 100
Importing a trusted LDAP certificate on page 72
Avaya Aura Device Services remote access configuration on page 118
Important:
Perform this step only if you run the configuration utility at a later time after the
installation.
During the installation, the configuration menu is displayed after you accept the EULA.
The script checks the current configuration of Avaya Aura® Device Services and opens the
configuration menu.
2. Provide the required configuration settings.
3. Select Continue and press Enter.
Next steps
The following settings are mandatory for an Avaya Aura® Device Services installation:
• Front-end host, System Manager and certificate configuration, if not configured during the initial
installation phase
• LDAP authentication parameters
• Cluster configuration, mandatory if you are deploying an Avaya Aura® Device Services cluster
• Leave the CORS Configuration and Serviceability Agent Configuration field unchanged.
To configure advanced settings, such as certificate warning period, security banner, or re-run the
firewall configuration script, select the Advanced Configuration menu option.
Important:
After you configure the mandatory settings, you must restart the Avaya Aura® Device Services
service:
sudo service AADSService start
If there are other settings that you must configure after restarting the Avaya Aura® Device
Services server, you can run the configuration utility as described in Step 1 and gain access to
the required configuration settings.
Note:
If this parameter is changed after the
installation, all of the nodes in a
Important:
In a clustered configuration, the
Local frontend host is different from
one node to the other and is also
different from the Front-end FQDN.
Keystore The keystore password for the MSS and KEYSTORE_PW
password Tomcat Avaya Aura® Device Services
certificates.
LDAP configuration
Warning:
Changing the LDAP configuration parameters, other than Bind DN and Bind Credential, once
they are configured, might invalidate the existing user data. For example, changing how user
roles are found can remove one or more roles from the existing user, which will block the user
from accessing the Avaya Aura® Device Services system. Also, changing the server URL must
only be done to switch the configuration to another replicated instance of the current LDAP
directory. In all the other cases, you must reinstall the Avaya Aura® Device Services system.
Table 3: LDAP configuration settings
Important:
Only configure these settings if you
need a Secure LDAP connection.
Directory Type The LDAP directory type of the enterprise. ldapType
The supported directory types are the
following:
• Microsoft Active Directory 2008 and
2012
• IBM Domino Server 7.0
• Novell e-directory 8.8
• OpenLDAP 2.4
• LDS 2008
• LDS 2012
URL for LDAP The URL for gaining access to the LDAP ldapUrl
server server. This is a mandatory setting.
The URL must have the following format:
<protocol>://<LDAP server FQDN or
IP address>:<port>
For example:
ldap://myserver.mycompany.com:3268
ldaps://myserver.mycompany.com:
3269
Note:
Even though the parameter name is
Bind DN, the format of its value is not
limited to the DN format. The format
can be any format that the LDAP
server can support for LDAP bind.
For example: for Active Directory,
you can use "domain\user",
"user@domain", as well as the actual
DN of the user object.
Bind Credential The password that the Avaya Aura® bindCredential
Device Services server requires for the
LDAP bind operation. This is a mandatory Important:
setting. If you configure the LDAP settings
using the properties file, you must
enter the Bind Credential manually
by running the configureAADS.sh
script.
Note:
The values of the roles are case-
sensitive when they are mapped to
the application roles. So they must
match exactly to the roles name
found for a user for the mapping of
the LDAP roles to the Avaya Aura®
Device Services application roles to
succeed.
Important:
To avoid situations when potential
loss of credentials could impact the
administration tasks, Avaya
recommends creating more than one
user account with administrator
privileges.
Auditor Role The list of LDAP roles that match the auditorRole
Avaya Aura® Device Services Auditor role.
For example:
If the Auditor role is configured as
AADSAuditor,AADSxyz, any user
whose list of roles contains the
AADSAuditor or AADSxyz role is
Note:
The values of the roles are case-
sensitive when they are mapped to
the application roles. So they must
match exactly to the roles name
found for a user for the mapping of
the LDAP roles to the Avaya Aura®
Device Services application roles to
succeed.
User Role The list of LDAP roles that match the usersRole
Avaya Aura® Device Services User role.
For example:
If the User role is configured as
AADSUser,AADSxyz, any user whose list
of roles contains the AADSUser or
AADSxyz role is mapped to the Avaya
Aura® Device Services USER role.
Note:
The values of the roles are case-
sensitive when they are mapped to
the application roles. So they must
match exactly to the roles name
found for a user for the mapping of
the LDAP roles to the Avaya Aura®
Device Services application roles to
succeed.
Services The list of LDAP roles that match the serviceAdminRole
Administrator Services Administrator role.
Role
For example:
If the User role is configured as
AADSUser,AADSxyz, any user whose list
of roles contains the AADSUser or
AADSxyz role is mapped to the Avaya
Aura® Device Services Services
Administrator role.
Note:
The values of the roles are case-
sensitive when they are mapped to
the application roles. So they must
match exactly to the roles name
found for a user for the mapping of
Note:
The values of the roles are case-
sensitive when they are mapped to
the application roles. So they must
match exactly to the roles name
found for a user for the mapping of
the LDAP roles to the Avaya Aura®
Device Services application roles to
succeed.
Advanced LDAP The menu that contains advanced LDAP
parameters parameters to configure depending on the
structure of the LDAP server.
Test User If you select testUser and select Apply, testUser
this option is used to validate the following
LDAP settings:
• Verifies that the user is searchable with
a given base DN and search filter
• Lists the group to which the user
belongs-user, admin, or auditor
• Validates the values for Role Attribute
ID and Role Name Attribute
• Verifies the Last Updated Time attribute,
role filter syntax, and active users
search filter syntax
The configuration is not saved if any of
these validations fail.
The testUser parameter is optional. If you
do not specify a value in the testUser
field, the system skips validation and
The following table contains the LDAP configuration settings accessible through the Advanced LDAP
attributes menu:
Note:
Configuring this parameter
improves the efficiency of the
user synchronization process
and reduces the traffic
between the Avaya Aura®
Device Services server and
the LDAP server during user
synchronization.
Load parameter defaults The script to load the default
values for the parameters.
Clustering configuration
The Cluster Configuration menu contains the tools and settings that you must use for configuring the
Avaya Aura® Device Services nodes in a clustered environment.
The Cluster Configuration menu contains the following submenus:
• Cluster Utilities
• Virtual IP Configuration
Cluster utilities
Table 5: Cluster Utilities
Virtual IP Configuration
The virtual IP address is necessary in a clustered environment, so that all the nodes in the cluster
can be accessed using the same IP address.
Table 6: Virtual IP settings
Advanced configuration
Table 7: Advanced configuration settings
Warning:
The firewall configuration script
replaces the current configuration of
the firewall on the server where you
are performing the installation, so
you must open any other ports
required for your server manually
after you run this script.
Long Poll The menu that contains the AVAYA_REQUEST_TIMEOUT
Timeout Recommended Long Poll Timeout
configuration option. Use this option for
setting the value to use in the Avaya-
Request-Timeout HTTP header for long-
poll requests.
Important:
The long poll timeout value can be
from 30 to 120. Lowering this value
results in increased traffic on the
server, but network configuration
may require that you set a lower
value.
If you do not configure this parameter, the
default database initialization setting is
used.
Configure Host IP The menu that contains the IP address SNMP_IP_ADDR
for SNMP for managing this server setting for
management configuring the IP address of the Network
Interface to use for SNMP.
Security Banner The menu for configuring security banner SECURITY_BANNER_PATH
File settings.
The Security Banner File setting must
contain the path to the security banner
file.
2. Select Advanced Configuration > OS Security Tools > Run the firewall configuration
script.
The firewall is configured automatically.
3. (Optional) Add the required ports to the firewall configuration.
For example, to allow port 7010 through the firewall, use the following command in a Linux
shell:
sudo iptables -I INPUT 6 -p tcp -m tcp --dport 7010 -j ACCEPT
For more information about firewall configuration, see “Firewall configuration” in the Red hat
customer portal.
Run the following command to ensure that the ports were added successfully:
For example:
sudo iptables --list
sudo service iptables status
Related links
Configuration on page 76
• ldap
• psng
Example
The following is an example output of the command:
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 4043459183551203610 (0x381d40b44b5c491a)
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=System Manager CA, OU=MGMT, O=AVAYA
Validity
Not Before: Jun 24 12:49:18 2016 GMT
Not After : Jun 24 12:49:18 2018 GMT
Subject: CN=AWSDev-14.cnda.avaya.com, O=Avaya, C=US
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:96:48:38:bb:64:aa:86:86:79:9a:ab:b5:a5:58:
c7:d7:9a:ee:ee:c3:39:f9:47:1a:9b:d4:f0:f9:5b:
02:c6:92:5d:aa:73:43:d2:c8:f6:e6:af:1a:77:91:
6d:0d:d9:0a:f8:17:64:4c:be:7c:18:e3:56:60:fa:
ec:b0:fb:75:38:b9:96:f1:78:8d:99:12:9a:2b:38:
e8:9c:f9:75:d2:2a:8d:63:83:d3:72:b7:6f:78:d8:
3d:b7:48:a8:90:ec:5d:c3:67:68:11:69:d2:0a:ff:
48:be:b8:6f:35:3a:b6:ed:d8:63:9e:0e:6e:c1:58:
5b:87:5e:78:5e:7c:a3:8e:8d
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Alternative Name:
DNS:AWSDev-14.cnda.avaya.com
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Authority Key Identifier:
keyid:03:1B:17:D2:B9:C7:0B:78:45:51:56:86:F1:4A:48:1A:3D:00:D4:D0
2. Concatenate the intermediate certificate file to the file created in the previous step.
For example:
cat intermediateca.crt >> certificate-chain.crt
Importing SIP CA certificate to the Avaya Aura® Device Services trust store
About this task
Before release 6.3.8, Session Manager used the default SIP CA to sign the certificate used by PPM
HTTP. After release 6.3.8, the System Manager CA is used. You must manually import SIP CA
certificate to the Avaya Aura® Device Services trust store if you had Session Manager 6.3.8 or
earlier, and upgraded to a later release.
Procedure
1. Log in to the Avaya Aura® Device Services server.
2. Type sudo keytool —importcert —file <CA_Certificate>.cer —
keystore /opt/Avaya/DeviceServices/<version>/CAS/<version>/cert/ssl-
ts.jks —alias "CA_alias"
Here, CA_Certificate is the name of the CA certificate file in PEM or DER format. CA_alias is
the alias you want to assign this certificate
Procedure
1. Run the configuration utility.
sudo /opt/Avaya/DeviceServices/<version>/CAS/<version>/bin/configureAADS.sh
3. In the Trusted LDAP certificate settings menu, configure the following settings:
• Certificate file: the path and filename for the LDAP trusted certificate. This file must be in
the PEM format.
• Truststore password: The password for the Tomcat trust store. This is the same
password as the MSS/Tomcat keystore password configured in the Front-end host,
System Manager and Certificate Configuration menu.
Note:
If you perform a silent installation, the equivalent parameters that you must configure in
the installation.properties file are the following:
• LDAP_TRUSTSTORE_CERTFILE
• LDAP_TRUSTSTORE_PASSWORD
Related links
LDAP settings configuration on page 100
Important:
For the hostname, always use the same Avaya Aura® Device Services server FQDN that
you use for generating certificates. You will be redirected to the Login page if you use the
IP address instead of the FQDN.
To gain access to the web-based administration portal, you must use an account that has the
Administrator role defined in the LDAP server configuration.
2. Select Server Connections > LDAP Configuration > Enterprise Directory.
3. Select the Secure LDAP check box.
4. Click Import Certificate to import the certificate file from the location where it is stored on
the hard disk.
5. Click Save.
Related links
LDAP settings configuration on page 100
The following sections contain tasks for configuring the LDAP server for Microsoft Active Directory
(AD).
The tasks follow the LDAP configuration example provided in this section, to provide a
comprehensive view of how the LDAP configuration must be made.
dc=example,
dc=com
dc=global,
dc=example,
dc=com
ou=Users, ou=Groups,
dc=global, dc=global,
dc=example, dc=example,
dc=com dc=com
cn=AMM User1, cn=AMM User2, cn=AMM User3, cn=AMMAdmin, cn=AMMUsers, cn=AMMAuditor, cn=AMMDelegates,
ou=Users, ou=Users, ou=Users, ou=Groups, ou=Groups, ou=Groups, ou=Groups,
dc=global, dc=global, dc=global, dc=global, dc=global, dc=global, dc=global,
dc=example, dc=example, dc=example, dc=example, dc=example, dc=example, dc=example,
dc=com dc=com dc=com dc=com dc=com dc=com dc=com
• [email protected]
• [email protected]
• givenName=User1
• sn=AADS
- AADS User 2 which has the following attributes:
• sAMAccountName=aadsuser2
• [email protected]
• [email protected]
• givenName=User2
• sn=AADS
- AADS Admin which has the following attributes:
• sAMAccountName=aadsadmin
• [email protected]
• [email protected]
• givenName=Admin
• sn=AADS
• Groups:
- “AADSAdmin” contains the users that can access the AADS OAMP GUI. In this example,
this group contains the DN (Distinguished Name) of the user “AADS Admin” as the value of
its “member” attributes.
- “AADSUsers” contains the users that can access the AADS REST interface. In this example,
this group contains the DN of the user “AADS User1” and the group “AADSDelegates” as
the value of its “member” attributes.
- “AADSAuditor” contains the users that have read-only access to the OAMP GUI. In this
example, this group contains the DN of the users “AADS User1” and “AADS User2” as the
values of its “member” attribute.
- “AADSDelegates” is a subgroup of “AADSUsers”. So the users in this group should also
have access to AADS REST interface. In this example, this group contains the DN of
the user “AADS User2” as the value of its “member” attributes.
Related links
LDAP settings configuration on page 100
Configuring the binding parameters on page 105
Configuring the authentication parameters on page 105
Configuring the role search parameters on page 107
Configuring the internationalization parameters on page 107
Configuring the user management parameters on page 109
Note:
Microsoft Active Directory uses a Secure LDAP
connection. For the LDAPS connection, a CA
(Certificate Authority) certificate for the CA that
signed the AD server certificate needs to be
imported into the Avaya Aura® Device Services
trust store before the LDAP configuration can be
made.
Bind User The user that has read/search access to Active global
Directory. \AADSAssistant
Bind Credential The password for the Bind User. admin123
Related links
LDAP configuration for Microsoft Active Directory on page 102
Procedure
1. In the Avaya Aura® Device Services CLI, run the following command to start the
configuration utility:
sudo /opt/Avaya/DeviceServices/<version>/CAS/<version>/bin/configureAADS.sh
Note:
For Microsoft Active Directory,
“userPrincipalName” is an optional attribute. So if
authentication using User Principal Name (or UPN)
is used, ensure that each user has the
“userPrincipalName” attribute set.
Base Context DN The base DN where the search for the user must start. dc=global,dc=exampl
Usually, the base DN is the root DN for the AD domain. e,dc=com
3. Select LDAP Configuration > Advanced LDAP parameters and configure the following
settings:
Parameter Description Example
Allow Empty The setting to enable user authentication without a false
Passwords password.
Microsoft Active Directory does not allow users to
authenticate without a password, so you must set the
Allow Empty Passwords setting to false.
Related links
LDAP configuration for Microsoft Active Directory on page 102
Important:
For the hostname, always use the same Avaya Aura® Device Services server FQDN that
you use for generating certificates. You will be redirected to the Login page if you use the
IP address instead of the FQDN.
To gain access to the web-based administration portal, you must use an account that has the
Administrator role defined in the LDAP server configuration.
4. Click Save.
5. Click Modify Attribute Mappings.
6. Configure the following settings:
Parameter Description Default value
nativeFirstName The attribute that stores the “given name” of the user in givenName
the language of the LDAP server.
nativeSurName The attribute that stores the “surname” of the user in the sn
language of the LDAP server.
givenName This is only applicable if the language in AD is one of
the non-Latin script based ones.
surName This is only applicable if the language in AD is one of
the non-Latin script based ones.
The "nativeFirstName" and "nativeSurName" parameters allow the user to identify the LDAP
attributes used to store the user's native language given name and surname. These are
mandatory parameters with defaults of "givenName" and "sn".
The "givenName" and "surName" parameters allows the user to identify the LDAP attributes
used to store the ASCII transliteration of the user's given name and surname, respectively.
These are optional parameters and only used only if the "Language used in Directory"
parameters are set to one of the non-Latin script languages.
The internationalization of the names must be done using the language tags specified
in RFC 3866.
To configure internationalization for Microsoft Active Directory, you must configure custom
attributes for the native and the ASCII transliterations of the names, if both types of names
are needed.
7. Click Save.
The Avaya Aura® Device Services services restart for the changes to take effect.
Related links
LDAP configuration for Microsoft Active Directory on page 102
Related links
LDAP configuration for Microsoft Active Directory on page 102
If the Avaya Multimedia Messaging sends a validation request to Avaya Aura® Device Services for
address [email protected], the Avaya Aura® Device Services will set the filter as follows:
OR: 8 items
Filter: ([email protected])
Filter: (mail=sip:[email protected])
Filter: (mail=xmpp:[email protected])
Filter: (mail=smtp:[email protected])
Filter: ([email protected])
Filter: (msrtcsip-primaryuseraddress=sip:[email protected])
Filter: (msrtcsip-primaryuseraddress=xmpp:[email protected])
Filter: (msrtcsip-primaryuseraddress=smtp:[email protected])
Leave the IMHandle and IMHandle-1 attributes unmapped. Avaya Multimedia Messaging uses the
EmailAddress value as the internal contact. When the EmailAddress and IMHandle mapping return
different attribute values, the validation might fail.
System Manager query
Avaya Multimedia Messaging sends a query to Avaya Aura® Device Services, which first queries
LDAP, brings back the information, and extracts the values returned for EmailAddress and
SMGRLoginname. Avaya Aura® Device Services then queries System Manager using
SMGRLoginName, and if that fails, then it uses EmailAddress.
Application Field Name System Manager Field Name
SMGRLoginName Login Name
Email address Login Name, OR Microsoft Exchange
Communication Address, OR Other Email
Communication Address
The user information is available in both Enterprise Directory and System Manager
If Avaya Aura® Device Services is able to retrieve data from both Enterprise Directory and System
Manager, it merges these two data sets, and sends this information back to the Avaya Multimedia
Messaging server.
If Avaya Aura® Device Services queries the System Manager data, and if it does not find any related
information from System Manager, it sends back the data only from Enterprise Directory.
The user information is available on System Manager but not on Enterprise Directory
The Avaya Multimedia Messaging server sends a query to Avaya Aura® Device Services. If the
relevant user is not available on Enterprise Directory, the query is redirected to System Manager.
Avaya Aura® Device Services attempts to use the received URI from Avaya Multimedia Messaging
to match the System Manager, Login Name, Microsoft Exchange Communication Address, or Other
Email Communication Address.
If a match is found, then Avaya Aura® Device Services extracts the SMGRLoginName, creates a
query filter with the SMGRLoginName, and then sends another query to the Enterprise Directory.
The fetched data is merged with System Manager data and sent back to Avaya Multimedia
Messaging. If the second query to Enterprise Directory fails to bring back data because no relevant
data exists, then only System Manager data is sent back to the Avaya Multimedia Messaging server.
User in Enterprise Directory and System Manger
Table 8: Avaya Multimedia Messaging server mappings
Avaya Multimedia Messaging sends a validation request for [email protected] to Avaya Aura®
Device Services, which then sends a query to Enterprise Directory with the filter shown in Enterprise
Directory querySystem Manager queryThe user information is available in both Enterprise Directory
and System Manager on page 110.
OR: 8 items
Filter: ([email protected])
Filter: (mail=sip:[email protected])
Filter: (mail=xmpp:[email protected])
Filter: (mail=smtp:[email protected])
Filter: ([email protected])
Filter: (msrtcsip-primaryuseraddress=sip:[email protected])
Filter: (msrtcsip-primaryuseraddress=xmpp:[email protected])
Filter: (msrtcsip-primaryuseraddress=smtp:[email protected])
When Enterprise Directory gets a match for [email protected], it returns:
[email protected]
[email protected]
Avaya Aura® Device Services sends the following query to System Manager:
Filter: Login [email protected]
When System Manager gets a match on Login Name, it returns the Avaya SIP handle and the
Avaya Presence or IM Handle.
Avaya Aura® Device Services merges the information and returns handles to Avaya Multimedia
Messaging:
Contact = [email protected]
SIP Handle= [email protected]
XMPP [email protected]
Related links
LDAP attribute mapping on page 110
Important:
For the hostname, always use the same Avaya Aura® Device Services server FQDN that
you use for generating certificates. You will be redirected to the Login page if you use the
IP address instead of the FQDN.
To gain access to the web-based administration portal, you must use an account that has the
Administrator role defined in the LDAP server configuration.
2. Select Server Connections > LDAP Configuration > Enterprise Directory.
3. Click Modify Attribute Mappings.
4. Find the address application field.
5. In the combo box next to the address application field, select postalCode.
6. Click Save.
7. To apply the changes immediately, click Force update.
Related links
LDAP attribute mapping on page 110
Attribute mapping use case: adding the language to the directory service response
About this task
The following task provides a use case for attribute mapping when the Directory Service Response
contains the language of the user.
The attribute used for determining the language of a user depends on each organization.
By default, the language field does not have a default attribute mapping. The
preferredLanguage attribute used in the following example is not a pre-loaded attribute. You
must type the preferredLanguage name in the custom attribute field.
Important:
Before you type the name of a custom attribute, ensure that the attribute is available in your
Directory configuration and that the attribute is available or part of the global catalogue.
The following procedure describes how to map the preferredLanguage attribute to the
language application field by using the custom attribute field.
Procedure
1. Log in to the Avaya Aura® Device Services administration portal.
The URL for gaining access to the administration portal is https://<hostname>:8445/
admin.
Important:
For the hostname, always use the same Avaya Aura® Device Services server FQDN that
you use for generating certificates. You will be redirected to the Login page if you use the
IP address instead of the FQDN.
To gain access to the web-based administration portal, you must use an account that has the
Administrator role defined in the LDAP server configuration.
2. Select Server Connections > LDAP Configuration > Enterprise Directory.
3. Click Modify Attribute Mappings.
4. Find the language application field.
5. In the Custom Attribute Field column that corresponds to the language application field,
click the cell and type preferredLanguage.
6. Click Save.
7. To apply the changes immediately, click Force update.
Related links
LDAP attribute mapping on page 110
Related links
LDAP settings configuration on page 100
Role configuration
To search the role base context and under it, set Search Scope to 2 or SUBTREE_SCOPE . The
configuration of the following roles is the same, regardless of the configured search mechanism:
Role Description Example
Administrator Role This role specifies the list of the “role” string extracted from AADSAdmin
LDAP that would be mapped to the Avaya Aura® Device
Services server ADMIN application role.
User Role This role specifies the list of the “role” string extracted from AADSUsers
LDAP that would be mapped to the Avaya Aura® Device
Services server USERS application role.
Auditor Role This role specifies the list of the “role” string extracted from AADSAuditor
LDAP that would be mapped to the Avaya Aura® Device
Services server AUDITOR application role.
Service Avaya Aura® Device Services does not currently use this role. Leave this setting
Administrator Role blank.
Services Avaya Aura® Device Services does not currently use this role. Leave this setting
Maintenance and blank.
Support Role
Security While this role is present in the Avaya Aura® Device —
Administrator Role Services configuration script, it is not currently used by
Related links
LDAP settings configuration on page 100
deployments. By using this configuration, calls are preserved during any network transition
from Wi-Fi to cellular data when the client IP address can change during an active call.
• Implement for internal access only and all remote devices must use VPN: This
configuration is used when a security policy is in place such that all traffic must be either
internal or via VPN. The VPN solution that is deployed must have sufficient bandwidth and
latency to support the expected volume of VoIP calls.
Procedure
1. In the Avaya SBCE, navigate to Device Specific Settings > Relay Services.
2. In the Remote Configuration field, configure the parameters with the following values:
• Remote Domain: the Avaya Aura® Device Services server domain.
• Remote IP: the IP address of the Avaya Aura® Device Services server.
• Remote Port: the Front-end port for reverse proxy configured during the Avaya Aura®
Device Services server installation. The default value is 8443.
• Remote Transport: TCP.
3. In the Device Configuration field, configure the parameters with the following values:
• Published Domain: the Avaya Aura® Device Services server domain.
• Listen IP: the External Avaya SBCE IP address created for Avaya Aura® Device Services
relay.
• Listen Port: 8443 or 443.
• Connect IP: the internal Avaya SBCE IP address.
• Listen Transport: TCP.
Related links
Avaya Aura Device Services remote access configuration on page 118
Important:
The Avaya Aura® Device Services enabled client must import the System Manager's Root
Certificate in order to successfully establish the SSL connection with the A10 server.
Procedure
1. Log in to the ACOS Admin interface.
2. In the Config Mode tab, select SLB > SSL Management > Certificate.
3. Click Import.
4. Enter the required information:
• The name of the certificate file
• The source for importing the certificate: local, remote, or text
• The certificate file format
• The source for importing the Key file: local, remote, or text
• The key file format
Note:
In order for the Split-Horizon DNS to work properly, you must provide the certificate
Common Name with a Fully-Qualified Domain Name and not an IP address. The A10
external FQDN must also match the Avaya Aura® Device Services internal FQDN
5. Click OK and then click Save.
Importing the A10 Server SSL Certificate
About this task
The following procedure describes how to import the A10 Server SSL Certificate.
Before you begin
Obtain an X509 certificate and the associated private key from a Certificate Authority.
Important:
The A10 server will not be able to establish an SSL connection with the backend Avaya Aura®
Device Services server if the Server SSL certificate has not been provisioned.
Procedure
1. Log in to the ACOS Admin interface.
2. In the Config Mode tab, select SLB > SSL Management > Certificate.
3. Click Import.
4. Enter the required information:
• The name of the certificate file
• The source for importing the certificate: local, remote, or text
• Connection limit
• Connection resume
• Slow start
• Spoofing cache
• Firewall
• Stats data
• Extended stats
• Server template
• HA priority cost
• Description
5. (Optional) Create an alternate server.
6. Expand the Port section and configure the connection details for the Avaya Aura® Device
Services backend servers.
7. Click OK and then click Save.
Creating a virtual server
About this task
The following procedure describes how to create a virtual server using the A10 interface.
Procedure
1. Log in to the ACOS Admin interface.
2. In the Config Mode tab, select SLB > Service > Virtual Server.
3. Click Add.
4. Enter the required information:
• The name of the virtual server
• The IP address or the CIDR subnet
• Enable or disable the virtual server
• The condition for disabling the virtual server
• Enable or disable the ARP status
• Enable or disable the Stats Data
• Enable or disable Extended Stats
• Flag for redistribution
• HA group
• Virtual server template
• Policy template
• Description
5. Expand the Port section and configure the connection details for the virtual server.
6. Click OK and then click Save.
Creating a service group
About this task
The following procedure describes how to create a service group using the A10 interface.
Procedure
1. Log in to the ACOS Admin interface.
2. In the Config Mode tab, select SLB > Service > Service Group.
3. Click Add.
4. Enter the required information:
• The name of the service group
• The service group type
• The service group algorithm
• Enable or disable the Auto Stateless Method
• The traffic replication
• The health monitor
• The server template
• The server port template
• The policy template
• Enable or disable minimum active members
• Enable or disable priority affinity
• Enable sending a client reset when the server selection fails
• Enable sending log information for the backup server events
• Enable or disable Stats Data
• Enable or disable Extended Stats
• Priority
• Description
5. Expand the Server section and configure the servers of the service group.
6. Click OK and then click Save.
c. Click Add.
d. Configure the authentication template.
e. Click OK and then click Save.
5. To edit a virtual service, perform the following actions:
a. In the ACOS Admin interface, click the Config Mode tab.
b. Select SLB > Service > Virtual Service.
c. Click Edit.
d. Edit the virtual service.
e. Click OK and then click Save.
Warning:
To be able to handle all the HTTP requests, at least two virtual IP nodes- the Virtual IP master
node and Virtual IP backup node must function correctly at all times. If both virtual IP master
node and virtual IP backup nodes are unavailable, the Avaya Aura® Device Services server
does not function correctly.
For example:
id -u Avaya
Procedure
1. Install the initial node.
2. Install one or more additional nodes.
Important:
Proceed with the next steps only after installing all the Avaya Aura® Device Services
nodes.
3. After all the required cluster nodes are installed, perform the following actions on the Avaya
Aura® Device Services initial node to configure the SSH/RSA Public/Private keys:
a. To open the Avaya Aura® Device Services configuration utility, run the following
command:
sudo /opt/Avaya/DeviceServices/<version>/CSA/<version>/bin/configureAADS.sh
b. Select Clustering Configuration > Cluster Utilities > Configure SSH/RSA Public/
Private Keys.
The system displays the other nodes that are configured in the cluster.
c. Ensure that the list of nodes is complete and enter n (no).
d. When the system prompts you to enter a user name for a host, enter the Linux user that
was used to install the Avaya Aura® Device Services installation.
e. If the system prompts you to replace the existing keys, enter y (yes).
f. If the system displays the following error, enter y (yes):
The authenticity of the host can't be established.
g. When the system prompts you to enter a password for a host, enter the password of the
Linux user that was used to install the Avaya Aura® Device Services installation.
h. When the configuration is complete, press Enter and exit the configuration menu.
4. (Optional) Start every node in the cluster individually.
Using a Linux shell for each Avaya Aura® Device Services server in the cluster, run the
following command:
sudo service AADSService start
The configuration menu is also accessible at a later time, by running the Avaya Aura® Device
Services configuration utility.
7. Perform the LDAP configuration.
Important:
The LDAP configuration for the cluster is performed during the installation of the initial
node. Additional configuration on each of the additional nodes is not required.
8. Select Clustering Configuration > Virtual IP Configuration to enable the usage of a virtual
IP address.
Important:
The virtual IP address is used for redundancy management, which is supported for three
or more Avaya Aura® Device Services nodes.
If you use an external load balancer, configuring a virtual IP address is not necessary.
If you use an external load balancer, you must configure the Avaya Aura® Device
Services Front-end host as the FQDN of the load balancer.
If you set Enable virtual IP to y (yes), the system displays new configuration options for the
virtual IP address.
Important:
Write down the virtual IP authentication password. You need this password for
configuring the virtual IP backup node.
Next steps
• Install additional cluster nodes.
• Configure the SSH/RSA Public/Private keys.
Important:
Installation of an additional node will impact ongoing Avaya Aura® Device Services operations
and must be performed during a maintenance window.
Procedure
1. On the additional node, run the Avaya Aura® Device Services installation binary.
2. Select Cluster Configuration and do the following:
a. Set the Initial cluster node option to n (no).
b. Ensure that the Local Node IP address option is set to the IP address of the current
node.
c. Set the Cluster seed node to the IP address of the seed node.
d. Set the User ID (UID) of product user on seed node to the ID of the non-root Linux
user that performs the Avaya Aura® Device Services server installation.
e. Select Return to Main Menu and press Enter.
3. Select the Front-end host, System Manager and Certificates configuration menu and
configure the settings that are accessible from the menu.
4. Select Apply and press Enter.
5. Select Session Manager Cassandra Configuration and do the following:
a. In the Session Manager IP or FQDN Address [localhost] field, type the IP or FQDN
address of the associated Session Manager.
b. In the Session Manager Asset IP or FQDN Address field, type the asset IP address
or the FQDN of Session Manager.
c. Select Apply and press Enter.
6. Select Clustering Configuration > Virtual IP Configuration > Enable Virtual IP menu to
enable or disable the usage of a virtual IP address.
Important:
The virtual IP address is used for redundancy management, which is supported for two
or more Avaya Aura® Device Services nodes.
If you use an external load balancer, configuring a virtual IP address is not necessary.
If you use an external load balancer, you must configure the Avaya Aura® Device
Services Front-end host as the FQDN of the load balancer.
If you set Enable virtual IP to y (yes), the system displays new configuration options for the
virtual IP address.
Note:
The virtual IP address must be enabled only for the nodes that handle load balancing
and you must set only one additional node as a virtual IP backup node.
The backup node is a node that has Enable virtual IP set to y (yes) and Virtual IP
master node set to n (no).
You only need to configure the virtual IP while you install the seed node and the backup
node. If you install any additional node after seed node and backup node, the system will
configure the virtual IP automatically.
7. To configure the virtual IP, do the following:
a. In the Virtual IP address field, type the virtual IP address shared by all the cluster
nodes.
b. In the Virtual IP interface field, type the interface used for the virtual IP address.
If you are using a configuration that has multiple Ethernet interfaces, you must set this
value to eth0.
c. In the Virtual IP master node field, type n (no).
d. In the Virtual IP authentication password field, type the password that you have set in
the seed node.
e. Select Apply and press Enter.
f. Select Return to Main Menu and press Enter.
8. Select Continue and press Enter.
9. Select Continue > Accept and continue > Continue.
10. Click Accept to accept the End-User License Agreement.
The system displays a new configuration menu for further configuration of the Avaya Aura®
Device Services server.
11. Configure the other settings required for the Avaya Aura® Device Services server installation
and select Continue to finish the installation.
Next steps
• Install other additional nodes, if required.
Procedure
1. Change the LDAP configuration by performing one of the following actions on one of the
Avaya Aura® Device Services cluster nodes:
• Run the configureAADS.sh script and select LDAP Configuration.
• Log in to the administration portal and select Server Connections > LDAP
Configuration > Enterprise Directory.
2. Restart each node in the Avaya Aura® Device Services cluster.
3. Log on to each of the other cluster nodes and run the setSeedNode.sh script with the IP
address of the new seed node as a parameter.
4. Restart the Avaya Aura® Device Services service on the new seed node.
sudo service AADSService restart
5. Restart the Avaya Aura® Device Services service on the other cluster nodes.
sudo service AADSService restart
Next steps
• Disable the virtual IP on the old seed node.
• Configure the new node to be the virtual IP Master node. The initial node of the cluster is
usually designated as the virtual IP master node.
Procedure
1. Log in to the System Manager web console.
2. Click Inventory > Manage Elements.
3. Select the Session Manager instance that is associated with Avaya Aura® Device Services,
and click Edit.
4. In the Personal Profile Manager (PPM) - Connection Settings section, select the Limited
PPM Client Connection check box.
5. In the Maximum Connections per PPM Client field, type 3.
6. Select the PPM Packet Rate Limiting check box.
7. In the PPM Packet Rate Limiting Threshold field, type 200.
8. Click Commit.
The default port for TLS is 3346 and for TCP is 3336.
• If you have iView 9.0, set the com.vnex.vcms.core.aadsIP Avaya Scopia® parameter to
the Avaya Aura® Device Services address and restart iView to apply the changes.
Avaya Aura® Device Services accepts the incoming connection if the address matches the
address on the iView synchronization page on the Avaya Aura® Device Services
administration web interface.
4. Log in to the Avaya Aura® Device Services web interface.
5. Click Server Connections > iView Synchronization.
6. In the Version number field, select the iView version.
Avaya Aura® Device Services supports only one iView version at a time. Therefore, you must
select either 8.3 or 9.0 from the Version Number field.
7. In the IP address field, type the IP address or FQDN for iView.
For example, type alphaiview1.dr.avaya.com.
8. If you have iView 8.3, do the following:
a. In the Port to bind the connection field, type the port number.
b. Select the Secure connection check box to use TLS connection between Avaya Aura®
Device Services and iView 8.5.
9. Click Save.
10. Restart the Avaya Aura® Device Services service.
If the certificate expires within 360, 180, 30, or 0 days, the system logs a certificate expiry
notification to the /var/log/messages file.
Removing EASG
About this task
Use this procedure to remove EASG permanently. You can use the OVA deployment process to
reinstall EASG.
Procedure
In the SSH console, run the following command to remove EASG:
sudo /opt/Avaya/permanentEASGRemoval.sh
Note:
All certificates, certificate authorities, and certificate revocation lists
uploaded to the EMS must be valid X.509 certificates in the PEM format.
Certificates not in this format might be converted using a proper SSL tool,
such as the publicly available OpenSSL tool. You can access this tool from
https://www.openssl.org/.
Installed CA The unsigned public key certificates from a Certificate Authority (CA), which
Certificates vouch for the correctness of the data contained in a certificate and verify the
signature of the certificate.
Installed Certificate The Certificate Revocation Lists (CRLs) that contain the serial numbers of CSRs
Revocation Lists that have been revoked, or are no longer valid, and should not be relied upon by
any system subscriber.
Install Certificate
Name Description
Type The type of certificate that you want to install.
Options are: Certificate, CA Certificate, or Certificate Revocation List.
Name The name of the certificate that you want to install.
This field is optional, and if not specified, the filename of the uploaded certificate
is used as the certificate name. Additionally, specifying a name same as another
certificate will overwrite the existing certificate with the one being uploaded.
Overwrite Existing An option to control whether uploading a certificate with the same name is
permitted.
If this field is cleared, uploading a certificate with the same name as another
certificate causes failure. If this field is selected, when you upload a certificate
with the same name overwrites an existing certificate.
Allow Weak/Certificate An option to permit usage of a weak private keys. This option bypasses the
Key check that requires strong private keys. EMS rejects private keys lesser than
2048 bits or signed with an MD5 based hash by default.
Certificate File The location of the certificate on your system. Depending on your browser, click
Browse or Choose file to browse for the file.
If the third party CA provides separate Root CA and Intermediate certificates, you
must combine both files into a single certificate file for Avaya SBCE. To combine
the files, add the contents of each certificate file one after the other, with the root
certificate at the end.
Trust Chain File The trust chain file used to verify the authenticity of the certificate. Depending on
the browser, click Browse or Choose File to locate the file.
Key The private key that you want to use. You can opt to use the existing key from the
filesystem or select a file containing another key.
Key File The button that is displayed when you select Upload Key File in the Key field.
Depending on the browser, click Browse or Choose File to locate the file.
Generate CSR
Name Description
Country Name The name of the country within which the certificate is being created.
State/Province Name The state/province where the certificate is being created.
Locality Name The locality (city) where the certificate is being created.
Organization Name The name of the company or organization creating the certificate.
Organizational Unit The group within the company or organization creating the certificate.
Common Name The name used to refer to or identify the company or group creating the
certificate.
You cannot provide wildcard (*) characters in this field.
Algorithm The hash algorithms (SHA256) to be used with the RSA signature algorithm.
Name Description
Key Size (Modulus The certificate key length (2048, or 4096) in bits.
Length)
Key Usage The purpose for which the public key might be used: Key Encipherment, Non-
Extension(s) Repudiation, Digital Signature.
The Digital Signature and Key Encipherment options are selected by default.
Subject Alt Name An optional text field that can be used to further identify this certificate.
You can provide multiple comma-separated entries in this field. You cannot
provide wildcard (*) characters in this field.
Avaya SBCE does not support SIP URI as a valid value for the Subject Alt
Name field.
Passphrase The password used when encrypting the private key.
Confirm Passphrase A verification field for the Passphrase.
Contact Name The name of the individual within the issuing organization acting as the point-of-
contact for issues relating to this certificate.
Contact E-mail The e-mail address of the contact.
8. In the Trust Chain File field, click Browse and browse to the location of the trust chain file.
This step is required if the CA provided a separate certificate trust chain.
If the third party CA provides separate Root CA and Intermediate certificates, you must
combine both files into a single certificate file for Avaya SBCE. To combine the files, add the
contents of each certificate file one after the other, with the root certificate at the end.
9. Click Upload.
The system uploads the signed X.509 certificate, and the key file, if necessary, to the EMS.
Next steps
Synchronize the certificate to Avaya SBCE through a secure shell (SSH) session.
Installing CA certificate
Before you begin
Change the extension of the CA certificate to .crt.
Procedure
1. In the left navigation pane, click TLS Management > Certificates.
2. Click Install.
3. In the Type field, select CA Certificate.
4. In the Name field, type a name for the certificate.
In this command, >> is used to append the root CA certificate file to the end of the
auth_ca.crt file.
4. Check that each certificate in the auth_ca.crt file is correct using the OpenSSL
command.
You should see the new root CA certificate and the System Manager root CA certificate.
5. Import the intermediate CA certificate and the root CA certificate to the Avaya SBCE trust
store if you are using reverse proxy on the Avaya SBCE to Avaya Aura® Device Services.
6. Run the configuration utility:
/opt/Avaya/DeviceServices/version/CAS/version/bin/configureAADS.sh
7. Click Front-end host, System Manager and Certificate Configuration.
8. Click Use System Manager for Certificates and type n to not use System Manager for
certificates.
9. Click REST Interface certificate configuration. If the certificate is not in the PKCS12
format, type n on the REST Interface certificate configuration screen.
10. Add the key file to the REST interface PEM key file and the certificate chain to the REST
interface PEM certificate file.
11. Click Signing authority certificate configuration on the Front-end host, System Manager
and Certificate Configuration screen.
12. If the CA root certificate is not in the PKCS12 format, type n.
13. Click Signing Authority PEM certificate file and add the signing authority CA certificate.
14. Click Return to previous menu.
15. Click Apply.
6. Click Choose File and browse to the third party root CA certificate.
7. Click Commit.
8. Restart the System Manager JBOSS™ process.
From the SSH session on the System Manager, run the following command as a root
user:
service jboss restart
Note:
The service jboss restart command affects the service for the System Manager.
Field Description
TLS Profile
Profile Name The descriptive name used to identify this profile.
Certificate The certificate presented when requested by a peer.
Certificate Info
Peer Verification One of three check boxes indicating whether peer verification is required:
• Required: The incoming connection must provide a certificate, the certificate
must be signed by one of the Peer Certificate Authorities, and not be
contained in a Peer Certificate Revocation List. In a client profile
configuration screen, the Required check box is a locked setting and cannot
be deselected.
• Optional: The incoming connection may optionally provide a certificate. If a
certificate is provided, but is not contained in the Peer Certificate Authority
list, or is contained in a Peer Certificate Revocation List, the connection will
be rejected.
• None: No peer verification will be performed.
Note:
Peer Verification is always required for TLS Client Profiles, therefore the
Peer Certificate Authorities, Peer Certificate Revocation Lists, and
Verification Depth fields will be active.
Peer Certificate The CA certificates to be used to verify the remote entity identity certificate, if
Authorities one has been provided.
Note:
Using Ctrl or Ctrl+Shift, any combination of selections can be made from
this list.
Using Ctrl+Shift , the user can drag to select multiple lines, and using
Ctrl, the user can click to toggle individual lines.
Peer Certificate Revocation lists that are to be used to verify whether or not a peer certificate is
Revocation Lists valid.
Note:
Using Ctrl or Ctrl+Shift, any combination of selections can be made from
this list.
Using Ctrl+Shift , the user can drag to select multiple lines, and using
Ctrl, the user can click to toggle individual lines.
Verification Depth The maximum depth used for the certificate trust chain verification. Each CA
certificate might also have its own depth setting, referred to as the path length
constraint. If both are set, the lower of these two values is used.
Renegotiation Parameters
Renegotiation Time The amount of time after which the TLS connection must be renegotiated. This
field is optional and must be set to 0 to disable.
Field Description
Renegotiation Byte The amount of bytes after which the TLS connection must be renegotiated.
Count This field is optional and must be set to 0 to disable.
Handshake Options
Version The TLS versions that the client or servers accepts or offers.
The options are:
• TLS 1.2
• TLS 1.1
• TLS 1.0
The default value for this field is TLS 1.2. Ensure that you select an
appropriate TLS version according to the TLS version that the server supports.
Ciphers The level of security to be used for encrypting data. Available selections are:
• Default: The cipher suite recommended by Avaya.
• FIPS: The cipher suite recommended by Avaya for FIPS 140–2 compatibility.
• Custom: Selecting the Custom radio button enables a user-defined level of
encryption that can be configured by using the Value field described below.
Value A field provided to contain a textual representation of the ciphers settings used
by OpenSSL.
For a full list of possible values, see the OpenSSL ciphers documentation at
http://www.openssl.org/docs/apps/ciphers.html.
Note:
The Value field is an advanced setting that must not be changed without
an understanding of how OpenSSL handles ciphers. Invalid or incorrect
settings in this field can cause insecure communications or even
catastrophic failure.
Related links
Creating a new TLS server profile on page 148
5. Click Finish.
The system installs and displays the new TLS client profile.
Related links
TLS client profile screen field descriptions on page 151
Note:
Peer Verification is always required for TLS Client Profiles, therefore the Peer
Certificate Authorities, Peer Certificate Revocation Lists, and Verification Depth
fields will be active.
Peer The CA certificates to be used to verify the remote entity identity certificate, if one has
Certificate been provided.
Authorities
Note:
Using Ctrl or Ctrl+Shift, any combination of selections can be made from this list.
Using Ctrl+Shift , the user can drag to select multiple lines, and using Ctrl, the user
can click to toggle individual lines.
Peer Revocation lists that are to be used to verify whether a peer certificate is valid.
Certificate
Revocation Note:
Lists Using Ctrl or Ctrl+Shift, any combination of selections can be made from this list.
Name Description
Using Ctrl+Shift , the user can drag to select multiple lines, and using Ctrl, the user
can click to toggle individual lines.
Verification The maximum depth used for the certificate trust chain verification. Each CA certificate
Depth might also have its own depth setting, referred to as the path length constraint. If both are
set, the lower of these two values is used.
Extended Determines whether or not server certificates will be verified only by the DNS entry in the
Hostname Common Name or Subject Alt Name of the certificate served by the remote server.
Verification
Custom Permits the user to define a custom hostname that will be accepted if served by the
Hostname remote server. This is primarily intended for use with legacy Avaya products.
Override
Renegotiation Parameters
Renegotiation The amount of time after which the TLS connection must be renegotiated. This field is
Time optional and must be set to 0 to disable.
Renegotiation The number of bytes after which the TLS connection must be renegotiated. This field is
Byte Count optional and must be set to 0 to disable.
Handshake Options
Version The TLS versions that the client or servers accepts or offers.
The options are:
• TLS 1.2
• TLS 1.1
• TLS 1.0
The default value for this field is TLS 1.2. Ensure that you select an appropriate TLS
version according to the TLS version that the client supports.
Ciphers The level of security to be used for encrypting data. Available selections are:
• Default: The cipher suite recommended by Avaya.
• FIPS: The cipher suite recommended by Avaya for FIPS 140–2 compatibility.
• Custom: Selecting the Custom radio button enables a user-defined level of encryption
that can be configured by using the Value field described below.
Value A field provided to contain a textual representation of the ciphers settings used by
OpenSSL.
For a full list of possible values, see the OpenSSL ciphers documentation at http://
www.openssl.org/docs/apps/ciphers.html.
Note:
The Value field is an advanced setting that must not be changed without an
understanding of how OpenSSL handles ciphers. Invalid or incorrect settings in this
field can cause insecure communications or even catastrophic failure.
Related links
Creating a client profile on page 150
Authentication prerequisites
You must have the following to set up IWA:
• An Active Directory server.
• A DNS server for the DNS domain of Active Directory.
• A Windows client on the Active Directory domain.
• An AADS server that is resolvable by the DNS.
• A domain user that will be mapped to the Service Principal Name (SPN) of the AADS server.
• Domain users for all individual users.
Important:
The Active Directory, Windows client, and AADS server must resolve each other’s FQDNs.
However, they do not need to use the same DNS server or to belong to the same zone.
Note:
For information about setting up the DNS server, see Administering Avaya Communicator for
Android, iPad, and Windows.
Important:
• If you are using Active Directory 2003, you must use setspn -A instead of setspn
-S.
• When you use setspn -S, the Active Directory server searches for other users with
the same SPN assigned. If the server finds a duplicated SPN, see step 3 on
page 155.
3. (Optional) To remove a duplicated SPN from another user, run the following command:
setspn -d <SPN> <old user>
The tomcat.keytab file enables AADS to authenticate against the Kerberos Key
Distribution Center (KDC). This file assigns a random password to the user.
5. Transfer the generated tomcat.keytab file to the AADS server using the OAMP
administration portal.
Since this is a credentials file, handle it securely and delete the original file after this file is
imported into the AADS server. You can generate and re-import a new tomcat.keytab file
anytime.
Note:
The patch level reported by the above command is not used at this time, and is to be
ignored.
Next steps
If the above system version is already on the recommended system update, then no further action is
required.
If the above system version is lower than the recommended system update version, then continue
with the process to download and stage the update.
Related links
System layer (OS) updates on VMware virtual machines on page 158
5. To stage the update, change to the required directory and perform the following staging
command:
cd ucapp-system-3.0.0.0.9
sudo ./update.sh --stage
6. (Optional) To free up disk space, clean up the downloaded and extracted files using the
following commands:
cd..
rm ucapp-system-3.0.0.0.9.tgz
rm -rf ucapp-system-3.0.0.0.9
Tip:
It is recommended to clean up the downloaded and extracted artifacts after staging. The
staging operation copies the content to an internal system area. The downloaded and
extracted content are no longer required.
7. To verify that the update has been staged, query the status:
sysUpdate --status
Note:
The sysUpdate command is added to the system the first time a system update is
staged. After staging, if the command is not recognized, you must exit the current
session and establish a new session. Establishing a new session creates the
sysUpdate command (alias) for the new session.
Tip:
If a system update is staged in error, the staged update can be deleted as follows. It is
not possible to delete a staged update once the installation of the update has started.
sysUpdate --delete
For additional help with the sysUpdate command, use one of the following commands.
The --help option provides command line syntax. The --hhelp option provides
verbose help.
sysUpdate --help
sysUpdate --hhelp
Next steps
Install the staged update during a maintenance window.
Related links
System layer (OS) updates on VMware virtual machines on page 158
Procedure
1. Log in to the administrative account using SSH.
2. Type sysUpdate ––install to start the installation
Tip:
The progress of the update can be monitored using one of the following commands. The
first command uses the Linux tail browser, whereas the second uses the Linux less
browser.
sysUpdate --monitor
sysUpdate --monitor less
You can obtain logs of the current, and previous, system layer update installations, by
using the following command. This command places a zip file of the logs in the current
working directory.
sysUpdate --logs
Related links
System layer (OS) updates on VMware virtual machines on page 158
After the upgrade is complete, restart services, and then check DRS replication on System
Manager
Note:
In case you add a third load the upgrade will fail and the system will prompt to remove
an old load.
Related links
Rolling back Avaya Aura Device Services on page 163
Upgrading existing test configurations on page 164
3. In an AADS cluster, run the same command on every node to roll back to the previous
version.
4. After rolling back every node in the cluster, type sudo /etc/init.d/AADSService
start.
The AADS service starts.
Related links
Upgrading Avaya Aura Device Services on page 162
Overview
This section describes the maintenance and troubleshooting procedures specific to deploying Avaya
Aura® Device Services. For more information about troubleshooting steps and commands, see
Administering Avaya Aura® Device Services.
Service unavailable
Condition
Avaya Aura® Device Services services are not available and displays a 503 error.
Cause
Avaya Aura® Device Services is not paired to Session Manager.
DRS synchronization is not complete.
Traffic exceeds acceptable limits.
Solution
1. Log in to Session Manager and check whether Avaya Aura® Device Services is paired to the
Session Manager.
2. Wait for traffic to reduce to acceptable limits.
3. Ensure that DRS synchronization is done.
runUserDiagnostics tool
The runUserDiagnostics tool is used with the clitool-acs.sh tool for collecting and dumping user
and contact-related information.
You can run the command for a user by:
• specifying the user’s email ID
• specifying a filename that contains comma separated email IDs of more than one user
The tool generates an excel file for each user. The file name contains the email address of the
user to distinguish the file name for each user.
Syntax
sudo ./clitool-acs.sh runUserDiagnostics [-e email_address] [-f
<absolute_filepath><filename>] [-d <email_address>][-a]
d Deregisters a registered user and removes all user related data from Avaya
Aura® Device Services
filename Filename containing comma separated email IDs. The file must be accessible
from the misc directory for clitool and stored under opt/Avaya or a sub-
directory.
absolute_filepath Absolute filepath of the directory where the filename containing comma
separated email IDs is stored.
Example
The following examples show how the runUserDiagnostics tool can be used with the available
features.
sudo ./clitool-acs.sh runUserDiagnostics -e [email protected]
Creates an output file for containing contact related information for [email protected].
sudo ./clitool-acs.sh runUserDiagnostics -f /opt/Avaya/filelist.txt
Creates output files containing contact related information for every email specified in /opt/
Avaya/filelist.txt.
sudo ./clitool-acs.sh runUserDiagnostics -d [email protected]
Deregisters [email protected] and removes all data related to this user from Avaya Aura®
Device Services.
sudo ./clitool-acs.sh runUserDiagnostics -a
Checks the number of contacts in Session Manager and Avaya Aura® Device Services for all
registered Avaya Aura® Device Services users and creates a file opt/Avaya/Contacts.xls.
Files
The following files are associated with the runUserDiagnostics tool:
• opt/Avaya/DeviceServices/version/CAS/version/misc/clitool-acs.sh
• /opt/Avaya/Contact.xls
Session Manager has its own table called contact. The Avaya Aura® Device Services table
is called contacts. Ensure you delete only the Avaya Aura® Device Services contacts
table.
• Run a script to remove keyspaces.
Type the following script code and create a .sh file:
#!/bin/bash
#Copyright 2016-2017 Avaya Inc., All Rights Reserved.
#
# THIS IS UNPUBLISHED PROPRIETARY SOURCE CODE OF Avaya Inc.
#
# The copyright notice above does not evidence any actual or intended
# publication of such source code.
#
# Some third-party source code components may have been modified from their
# original versions by Avaya Inc.
#
# The modifications are Copyright 2016-2017 Avaya Inc., All Rights Reserved.
#
# Avaya - Confidential & Restricted. May not be distributed further without
# written permission of the Avaya owner.
############################################################################
gatherDBUserPassword
CAS_KEYSPACES="`getKeyspaceList`"
if [[ ! "$?" = "0" ]]; then
echo "The user name , password for cassandra may not be correct please
verify"
exit
fi
cql=""
for KEYSPACE in $CAS_KEYSPACES
do
#echo $KEYSPACE
if [[ $KEYSPACE == community* ]] ;
then
cql="Use $KEYSPACE;DROP TABLE IF EXISTS contacts;"
$CASSANDRA_HOME/bin/cqlsh -u $DB_USER -p $DB_PASSWORD --ssl -e "$cql"
echo $cql
fi
done
In this example, the backup was created in the /home/admin directory. The backup file
name specified is backup2016.
BackupAADS.sh options
The backupAADS.sh script is located in the /opt/Avaya/DeviceServices/<version>/CAS/
<version>/bin directory.
You can use the following options with the backupAADS.sh script:
4. Run the restore script by providing the path to the backup file.
For example:
sudo ./restoreAADS.sh /home/admin/backup2016_uc-aads1-traffic
RestoreAADS.sh options
The restoreAADS.sh script is located in the /opt/Avaya/DeviceServices/
<version>/CAS/<version>/bin directory.
You can use the following options with the restoreAADS.sh script:
Documentation
See the following related documents at http://support.avaya.com.
Title Use this document to: Audience
Implementing
Deploying Avaya Aura® Device Services Deploy Avaya Aura® Device Services. Sales Engineers,
Solution Architects,
Implementation
Engineers, Support
Personnel
Deploying Avaya Aura® Session Deploy the Session Manager OVA. Sales Engineers,
Manager Solution Architects,
Implementation
Engineers, Support
Personnel
Administering
Administering Avaya Aura® Device Administer Avaya Aura® Device Services. Sales Engineers,
Services Solution Architects,
Support Personnel
Administering Avaya Aura® Session Administer the Session Manager Sales Engineers,
Manager interface. Solution Architects,
Support Personnel
Related links
Finding documents on the Avaya Support website on page 178
4. In Enter your Product Here, type the product name and then select the product from the
list.
5. In Choose Release, select an appropriate release number.
6. In the Content Type filter, click a document type, or click Select All to see a list of all
available documents.
For example, for user guides, click User Guides in the Content Type filter. The list displays
the documents only from the selected category.
7. Click Enter.
Related links
Documentation on page 178
Support
Go to the Avaya Support website at http://support.avaya.com for the most up-to-date
documentation, product notices, and knowledge articles. You can also search for release notes,
downloads, and resolutions to issues. Use the online service request system to create a service
request. Chat with live agents to get answers to questions, or request an agent to connect you to a
support team if an issue requires additional expertise.
Examples of Microsoft Active Directory LDAP configuration that uses the user ID as
the account name
# Binding parameters
ldapUrl=ldaps://gdc.global.example.com:3269
bindDN=global\AADSAssistant
bindCredential=admin123
# Authentication parameters
uidAttrID=sAMAccoutName
baseCtxDN=dc=global,dc=example,dc=com
allowEmptyPasswords=false
# Internationalization parameters
language=en
Examples of Microsoft Active Directory LDAP configuration that uses the email
address as the account name
# Binding parameters
ldapUrl=ldaps://gdc.global.example.com:3269
bindDN=global\AADSAssistant
bindCredential=admin123
# Authentication parameters
uidAttrID=mail
baseCtxDN=dc=global,dc=example,dc=com
allowEmptyPasswords=false
rolesCtxDN=ou=Groups,dc=global,dc=example,dc=com
roleAttrID=cn
roleAttrIsDN=false
roleNameAttrID=
roleRecursion=1
searchScope=2
adminRole=AADSAdmin
usersRole=AADSUsers
auditorRole=AADSAuditor
# Internationalization parameters
language=en
# search reference
ref: ldap://upper.ottawa.valley.eh/DC=upper,DC=ottawa,DC=valley,DC=eh
# search reference
ref: ldap://DomainDnsZones.ottawa.valley.eh/DC=DomainDnsZones,DC=ottawa,DC=val
ley,DC=eh
# search result
search: 2
result: 0 Success
# numResponses: 3
# numReferences: 2
# search reference
ref: ldap://DomainDnsZones.west.bytown.city/DC=DomainDnsZones,DC=west,DC=bytown,DC=city
# search reference
ref: ldap://ForestDnsZones.west.bytown.city/DC=ForestDnsZones,DC=west,DC=bytown,DC=city
# search reference
ref: ldap://west.bytown.city/CN=Configuration,DC=west,DC=bytown,DC=city
# search result
search: 2
result: 0 Success
# numResponses: 5
# numEntries: 1
# numReferences: 3
# search result
search: 2
result: 10 Referral
text: 0000202B: RefErr: DSID-03100781, data 0, 1 access points
ref 1: 'ottawa.valley.eh'
ref: ldap://ottawa.valley.eh/dc=ottawa,dc=valley,dc=eh
# numResponses: 1
If the Avaya Aura® Device Services receives a Referral, it will attempt to resolve the returned LDAP
URI and launch a new query for each returned referral, with the same filter. This is unless specified
otherwise in the referral.
Typically, the referred to URI will be equal to the base context in the query.
Recommendations
Minimize the number of queries sent to the Enterprise source for any given transaction. This might
improve Avaya Aura® Device Services performance, and also minimize the impact on the source.
Base Context:
To avoid referrals when choosing base context DN, choose the highest granularity that your
enterprise source is authoritative in.
Active Directory:
The ForestDNSZones, DomainDNSZones, and Configuration partitions are not replicated to the
global catalog. Therefore, search requests to global catalog will not return references to said
partitions. Thus if possible it is advisable to use the global catalog on Active Directory instead of the
standard LDAP source.
Multiple Domains:
If the Enterprise is built on Active Directory, it is advisable to use global catalog, instead of counting
on referral or reference. This might minimize the number of queries. If using alternate Enterprise
sources, you might experience degradation if many or all queries require referral to another source.
Related links
Changing the password of the Avaya Aura Device Services virtual machine on VMware through
SSH on page 186
• Hard disk 2
• Hard disk 3
Before you begin
Install the VMware with an Enterprise Plus license.
Procedure
1. Shut down the Avaya Aura® Device Services virtual machine.
2. In the vSphere client inventory, select and right-click the Avaya Aura® Device Services virtual
machine and click Edit Settings.
3. On the Virtual Machine Properties window, in the Hardware tab, select one of the following:
• Hard disk 2
• Hard disk 3
4. Change the hard disk size settings and click OK.
5. Restart the Avaya Aura® Device Services virtual machine.
6. Log in to the Avaya Aura® Device Services server.
7. To apply changes to the size of a virtual disk, use the following commands:
a. To resize an application virtual disk, type the following commands:
presize -v /dev/sdb
lvextend -l +100%FREE /dev/mapper/application_vg-Avaya
resize2fs /dev/mapper/application_vg-Avaya
b. To resize the media data virtual disk, use the following commands:
presize -v /dev/sdb
lvextend -l +100%FREE /dev/mapper/media_vg-Avaya
resize2fs /dev/mapper/media_vg-Avaya
Procedure
1. If the virtual machine is installed and running, log in to the system, and shut down the
operating system by running the following command:
sudo shutdown -h now
Tip:
For more information about this command, you can use the following commands:
• For syntax help: sys volmgt -h
For <volume>, specify the name of the volume as it appears in the Volume > Name column.
All --extend operations are run as background tasks.
a. To monitor the status of the operation in progress or of the last completed operation, run
the following command:
sys volmgt --monitor less
b. To gather all volume management logs into a zip file in the current working directory, run
the following command:
sys volmgt --logs
c. If a disk has multiple volumes and more than one volume is being increased in size, use
one of the following commands to allocate a specific amount of unused space to a
volume:
sys volgt --extend <volume> <x>m
sys volgt --extend <volume> <x>g
sys volgt --extend <volume> <x>t
4. Verify that the new space has been allocated to the volume by running the following
command:
sys volmgt --summary
Due to disk overhead, the size of the volume reported under the Volume > LVM Size column
will never exactly match the size reported under the Volume > File System > Size column.
a. If you suspect that the file system size is not correct, verify that the operation is
complete by running the following command:
sys volmgt --status
b. If the status is reported as “Complete”, you can correct the situation using --extend
without an increment value:
sys volmgt --extend /var/log
This operation does not add more space to the volume that hosts the file system.
Instead, it reissues the command to make full use of the current volume.
Tip:
Similar to using --extend to increase volume sizes, you can also monitor the --
extend operation and gather logs using the following commands:
sys volmgt --monitor less
sys volmgt --logs
Related links
Thin vs. thick deployments on page 187
Aliases provide an alternate and convenient way to run commonly used commands without
specifying long path names. The arguments available for the original commands apply for the
command aliases as well.
Alias Description
app Provides commands for application-specific tasks such as backup, restore, and
view status. If you type app without arguments, the system displays the available
subcommands.
For example, the following commands give the same results
• sudo /opt/Avaya/DeviceServices/version/CAS/bin/backupAADS.sh, use
• app backup
svc Provides commands for managing services, such as starting, stopping, and viewing
status. If you type svc without arguments, the system displays the available
subcommands.
For example, the following commands give the same results:
• sudo service AADSService location
• svc aads location
cdto Provides an easy way to navigate through directories of the installed application. If
you type cdto without arguments, the system displays the available subcommands.
For example, the following commands give the same results:
• cd /opt/Avaya/DevicesSerivces/version/CAS/version
• cdto cas
D I
data center importing
adding ...........................................................................30 LDAP certificate .................................................... 72, 117
field descriptions ...........................................................31 SIP CA certificate ......................................................... 99
data corruption ...................................................................169 trusted certificate ...................................................72, 117
data storage clustering ........................................................ 32 increasing
deploying disk size ..............................................................187, 192
Open Virtual Application ......................................... 42, 45 Increasing the size of a disk volume
OVA using vSphere Client ...................................... 42, 45 virtual machine ........................................................... 190
Deploying an OVA file Initial Installation Configuration
Avaya Aura Device Services ........................................ 46 field description .............................................................64
Device Services ............................................................46 installation
deployment checklist ........................................................................41
thick ............................................................................ 187 Installation
thin ..............................................................................187 checklist ..................................................................40, 60
deployment methods ........................................................... 40 installation data ....................................................................17
descriptions installing
LDAP parameter ......................................................... 115 CA certificate .............................................................. 145
disk partitioning ....................................................................21 certificate to SBCE ..................................................... 144
DNS server .......................................................................... 33 Installing
DNS SRV records ................................................................ 36 an additional node ...................................................... 131
downloading installing SIP CA certificate ................................................172
System Manager PEM certificate ............................... 145 integrated Windows authentication support setup ............. 154
downloading software IWA
using PLDS ...................................................................19 active directory ........................................................... 155
Downloading system layer .................................................159 administration portal ................................................... 156
prerequisites ............................................................... 154
E Windows Domain Controller setup ............................. 155
enabling
enhanced access security gateway after OVA
L
deployment ................................................................. 136 latest software patches ........................................................ 16
PPM rate limiting ........................................................ 134 LDAP
end entry configuration ............................................................... 114
create ..........................................................................141 LDAP configuration
extracting system layer ...................................................... 159 Active Directory authentication parameters ................105
Active Directory binding parameters ...........................105
F Active Directory internationalization parameters ........ 107
Active Directory role search parameters .................... 107
field description Active Directory user management parameters ......... 109
TLS Certificates screen .............................................. 139 attribute mapping ........................................................ 110
field descriptions attribute mapping use case .........................................113
Hosts ............................................................................ 48 change LDAP parameters after installing cluster ....... 133
Locations ...................................................................... 48 import secure LDAP certificate ................................... 101
new profile .................................................................. 151 Microsoft Active Directory ...........................................102
U
uninstalling
Avaya Aura Device Services ...................................... 169
Update Static Routing ..........................................................48
updating
DNS addresses ............................................................ 37
NTP addresses .............................................................38
search domains ............................................................ 37
upgradeAutoConfigTestConfigurations .............................. 164
upgrading
Avaya Aura Device Services ...................................... 162
test configurations ...................................................... 164
upload
certificate file ...............................................................143
V
verifying
cassandra service started .............................................32
videos ................................................................................ 179
viewing
current CA .................................................................... 99
virtual IP address
configuring .............................................................. 53, 73
Virtual Machines .................................................................. 48