Monday 24 April 2017

Electrospaces.net: The presidential communications equipment under Ba...

Electrospaces.net: The presidential communications equipment under Ba...: (Updated: January 31, 2017) Over the past five years, a range of articles on this weblog covered the secure and non-secure phones used by ...

Monday 17 April 2017

End-to-end authentication and encryption in Cisco Collaboration Manager



End-to-end authentication and encryption in Cisco Collaboration

Prerequisites

CUCM Version: 11.5
88X5 series phones
Jabber on-promise / off-promise all  set


Unified CM tomcat / tomcat-trust Multi Server Certificate



Tomcat signed by CA and root certification uploaded as Tomcat and Tomcat-trust


CA Signed CallManager certification
Root certification uploaded as CallManager-trust

Provisioning and Registering On-Premise Desk Phones and Clients

Jabber CSF and 8845 phones associated with users

Activating Cisco Certificate Authority Proxy Function (CAPF) 

Cisco Unified Serviceability, choose Tools > Service Activation



Configure desk phones (88x5) for CAPF enrollment via MIC authentication and confirm LSC install indicating successful CAPF enrollment



88x5: (Settings) > Admin settings > Security setup.


Move Unified CM Cluster to Mixed-Mode via CLI (soft e-Token) Method



SSH to the Unified CM
Note: hidden typing ‘y’ and enter
Verify ctl:


Verify cluster has moved to mixed-mode (Secure Mode) and that the desk phones have downloaded the new CTL. 

Change the CUCM Cluster Security from Mixed Mode to Non-Secure Mode with the CLI

This configuration is only for CUCM Release 10.X and later. In order to set the CUCM Cluster Security mode to Non-Secure, enter the utils ctl set-cluster non-secure-mode command on Publisher CLI. After this is complete, restart the TFTP and Cisco CallManager services on all nodes in the cluster that run these services.

Here is sample CLI output that shows the use of the command.

admin:utils ctl set-cluster non-secure-mode
This operation will set the cluster to non secure mode. Do you want to continue? (y/n):

Moving Cluster to Non Secure Mode
Cluster set to Non Secure Mode
Please Restart the TFTP and Cisco CallManager services on all nodes in the cluster that
run these services
admin:


More doc to read : here 
 
Restart Cisco TFTP  and Cisco CallManager services


88x5: Navigate to (Settings) > Admin settings > Status > Status messages


Unified CAPF Enrollment for Jabber Client

Sign out Jabber and sign in back again. the Jabber IP phone service will not connect until after the user has entered the authentication string and the CAPF enrollment operation has completed.

Create Secure Phone Security Profile and Apply to On-Premise Endpoints

Bulk phone update
88x5: Navigate to (Settings) > Admin settings > Security setup


Confirm Secure Calling (Phone to Phone, Jabber to Phone)

Answer the call at the 8845 and confirm that the encrypted “lock” icon is visible on both phone and jabber

Tuesday 11 April 2017

Jabber Mobile and Remote Access (MRA) with Cisco Expressway featured with SSO

Jabber Mobile and Remote Access (MRA) with Cisco Expressway featured with SSO

Prerequisite

This post will complete the configuring Expressway Core and Edge to provide MRA capability with SSO enabled. My test environment is under 11.5 and what else I have as following:
  • Public domain name: voicelab.ca by Go Daddy
  • Two public IPs assigned to Expressway E and IDP. You may have your own.
  • Internal  SRV record: _cisco-uds._tcp.MYDOMAIN.COM
  • External SRV records: _collab-edge._tls.YOURDOMAIN.COM , _sips._tcp.MYDOMAIN.COM
  • Assuming Jabber is working on promise with SSO

External SRV

_collab-edge._tls
IDP A record
Expressway-E A record
Use https://cway.cisco.com/tools/SrvRecord/ to check all required SRV are found.


CA Root Certificate

Assuming you have basic configuration done on both Expressway C and E, the next is to upload CA Root certificate.


Client-Server CSR

On both C and E
Download CSRs and save them


Client-Server Template

The CA component of Microsoft Active Directory Certificate Server (ADCS) must be able to issue a certificate that can be used for authentication of the Expressway as client or server

AD CS in Windows Sever 200 Standard R2 (and later) can issue these types of certificates, if you create a certificate template for them. The default "Web Server" certificate template in AD CS creates a certificate fro Server Authentication. The server certificate for the Expressway also needs Client Authentication if you want to configure a neighbor or traversal zone with mutual authentication( where TLS verify mode is enabled) 



1. open the Certificate Authority application by going to Start > All Programs > Administrative Tools > Certification Authority.
2. Click the plus (+) sign next to dcloud-AD1-CA to expand it and click on Certificate Templates below.
3. Right click on Certificate Templates and choose Manage from the pop-up menu.
4. Right click on Web Server and choose Duplicate Template from the pop-up menu.
5. Verify Microsoft Server 2003 Enterprise is selected and then click OK.
6. Configure the following parameters for the New Template.
• Template display name: ClientServer
• Template name: ClientServer (pre-populated)
• Click the Request Handling tab and click the checkbox for Allow private key to be exported
• Click the Extensions tab
• Verify that Application Policies is selected and then click Edit
• Click Add
• Click to highlight Client Authentication from the list, click OK, and then click OK to confirm the addition
• Click OK one more time to save the new template
7. Close the Certificate Template Console by using the X in the top right corner of the window.
8. Right click on Certificate Templates and choose New > Certificate Template to Issue from the pop-up menu.
9. Click ClientServer from the list to highlight it and then click OK.
10. Close the Certificate Authority (certsrv) console.


Submit and Download a CA Signed Certificate

Do this on both E and C

Upload CA Signed Certificate

Do this on both E and C
After this, restart both server.

Expressway-C for Unified Communications



Secure Traversal between Expressway-E and Expressway-C



Contact Photo Resolution



When Cisco Jabber is running in remote mode through MRA, the Corporate Directory and contact source type is automatically set to UDS. There is no additional configuration required for this behavior to function.


A webserver has been configured to host contact photos at the following URL:
http://Ad1.YOURDOMAIN.COM/directory/
Upload Jabber-Config.xml
<config>
<Policies>
<EnableSIPURIDialling>True</EnableSIPURIDialling>
<File_Transfer_Enabled>True</File_Transfer_Enabled>
</Policies>
<Client>
<enablesavechathistorytoexchange>True</enablesavechathistorytoexchange>
<InternalExchangeServer>ad1.yourdomain.com</InternalExchangeServer>
<Persistent_Chat_Enabled>true</Persistent_Chat_Enabled>
</Client>
<Directory>
<SipUri>mail</SipUri>
<UseSIPURIToResolveContacts>true</UseSIPURIToResolveContacts>
<BDISipUri>mail</BDISipUri>
<BDIUseSIPURIToResolveContacts>true</BDIUseSIPURIToResolveContacts>
<BusinessPhone>telephoneNumber</BusinessPhone>
<UDSPhotoURIWithToken>http://ad1.yourdomain.com/directory/%%uid%%.jpg</UDSPhotoURIWithToken>
</Directory>
</config>


Verify:
http://ucm-pub.YOURDOMAIN.COM:6970/jabber-config.xml

HTTP Server Allow List





SAML Single Sign-On (SSO) Inside the Network

IdP Configuration

 The Federation Metadata Explorer is an online tool that will retrieve the federation metadata document from your AD FS service and display the contents in a readable format.

In general, the ADFS metadata is here:

https://server/FederationMetadata/2007-06/FederationMetadata.xml

You can just save the file.


Upload Metadata:


Assign Domain for IdP

Export SP Metadata from Expressway-C



Add a Relying Party Trust for Cisco Expressway-E

A trust can be created by importing "federation metadata", that is, data that describes a Relying Party or Claims Provider and allows for easy creation of the corresponding trust. A federation metadata document is an XML document that conforms to the WS-Federation 1.2 schema. Federation metadata may be imported from a file, or the partner may make the data available via https.



This information includes the URLs for the WS-Federation Passive protocol and\or the SAML 2.0 Web SSO protocol, one or more relying party identifiers and, typically, the X.509 Certificate used to encrypt any claims sent to the relying party. This essentially maps specific LDAP attributes from an attribute store that you define to a set of outgoing claims that can be used for authorization.


Set Relying Party Trust Properties for Expressway-E



In ADFS you configure a relying party trust to tell ADFS where it can expect claims to come from - it will trust the relying party so that when a user is authenticated they can be redirected back to that application (you don't want to give a user a token to present to an application you do not trust).

Right click the icon for the Windows PowerShell in the task bar and click Import system modules to launch Windows PowerShell with system module commands for AD FS.


Copy and paste the following command text and then press Enter.
Set-ADFSRElyingPartyTrust -TargetName "exp-e-1.YOURDOMAIN.COM" -SAMLResponseSignature MessageAndAssertion -SignatureAlgorithm http://www.w3.org/2000/09/xmldsig#rsa-sha1


A succesful command will result in NO return data as shown below.


Jabber off-net login through mobile phone