DMA Operations Guide
Frequently Asked Questions
22
When the Polycom DMA system connects to a Microsoft Exchange server
3
(if the calendaring service is enabled; see
page 97), it may present a certificate to the Microsoft Exchange server to
identify itself.
Unless the Allow unencrypted calendar notifications from Exchange
server security option is enabled (see
page 32), the Polycom DMA system offers the same SSL server certificate
that it offers to browsers connecting to the system management interface.
The Microsoft Exchange server must be configured to trust the certificate
authority. Otherwise, the Calendaring Service status (see
page 156) remains Subscription pending indefinitely, the Polycom DMA
system does not receive calendar notifications, and incoming meeting
request messages are only processed approximately every 4 minutes.
When the Polycom DMA system connects to an RMX MCU configured
4
for secure communications (this is not the default), a certificate may be
used to identify the RMX MCU (server) to the Polycom DMA system
(client).
Q. Is it secure to send my certificate request through email?
A. Yes. The certificate request, signed certificate, intermediate certificates,
and authority certificates that are sent through email don't contain any
secret information. There is no security risk in letting untrusted third
parties see their contents. For maximum security, verify the certificate
fingerprints (which can be found in the Certificate Details popup) with the
certificate authority via telephone. This ensures that a malicious third
party didn't substitute a fake email message with fake certificates.
Q. Why doesn't the information on the Certificate Details popup match
the information that I filled out in the signing request form?
A. Commercial certificate authorities routinely replace the organizational
information in the certificate with their own slightly different description
of your organization.
Q. I re-installed the Polycom DMA system software. Why can't I re-install
my signed public certificate?
A. X.509 certificates use public/private key pair technology. The public
key is contained in your public certificate and is provided to any web
browser that asks for it. The private key never leaves the Polycom DMA
system. As part of software installation, the Polycom DMA system
generates a new public/private key pair. The public key from your old key
pair can't be used with the new private key. To re-use your signed public
certificate, try restoring from backup. Both the public and private keys are
saved as part of a backup file.
Management and Security Overview
"Calendaring Service"
"Security Configuration"
"Dashboard"
on
on
on
Polycom, Inc.
Need help?
Do you have a question about the DMA 7000 and is the answer not in the manual?