The CIC service is an active – passive component and has to be installed on all LUCS server machines.

CIC is responsible for the following features:

  • Synchronization of SfB related changes
  • Synchronization of User properties over SfB

Installation

  1. Run the LUCS.CIC.Setup.msi
  2. On the Luware-LUCS-CIC Configuration Settings screen of the setup pay attention to fill the
    1. Instance Name
    2. Port number
    3. SfB Server Version
    4. Configure Certificate Security
  3. For security reason LUCS provides possibility to use certificate-based encryption and verification during the components communication. To configure certificate based authentication, select ‘Configure Certificate Security’ check box and press ‘Next’ button to open a page with server certificate settings.

    Example of filled Luware-LUCS-CIC Configuration Settings screen
  4. If ‘Configure Certificate Security’ check box was set to true, configure the server and client certificate settings as the next step. The client settings specify which settings CIC will use while connecting to PS. The server settings are used to validate another services when they try to connect to CIC.

    Example of CIC Certificate settings
SettingsDescriptionValue
ModeTransfer security modes offered by WCF to ensure a secured communication between a client and a server.None : This mode ensures that no security is applied while communication between server and client.

Transport: As the name suggests, it is concerned with security of communication between a client and a service over a network protocol. It guarantees the confidentiality and integrity of messages at transport level since transport security secures the entire communication channel.

Validation ModeThe mode that specifies how incoming certificate is validated and how trust is determined .None: In this mode no validation is perfomed.

ChainTrust: : In this mode WCF simply validates the certificate against the issuer of a certificate known as a root authority (the expiration time is checked too).

PeerTrust: In this mode WCF simply checks if the incoming certificate is installed in the Trusted People folder in the certificate store (the expiration time is checked too).

PeerOrChainTrust: Mixed mode.

Is DedicatedThe flag that defins which certificate is used for encryption.False: Encryption is done with default certificate. It means that certificate with the hostname of the machinefrom the Personal Store is used on server side.

True: Encryption is done with a dedicated certificate. It means there is  possibility to configure identifier (thumbprint) of the certificate.

ThumbprintThe thumbprint is a hash value computed over the complete certificate, which includes all its fields, including the signature.



→  See Prepare Certificate Thumbprint


Note: The system reports all errors related to  connection or certificate issues to a log file ‘C:\Program Files\Luware AG\LUCS-ICH\log\connectionIssues.log’.

Open Services and start the installed service.

  • Check that service is successfully started without any errors in Event Viewer or in the log file

c:\Program Files\Luware AG\LUCS-CIC\log\regularLog.txt

Configuration

In the Luware-LUCS-Configurator application:

  1. Open LUCS Configurator -> Topology -> Components (Server)
  2. Add CIC component as it is shown in the example (select the CIC Server Type, System Instance, Activity Order and fill the service’s Settings according to the table below):

    WebConfigurator - CIC Component Configuration
    KeyHow to get the value
    AdSynchronizationTimeInSecThe amount of seconds that identifies a time period before the previous and next full synchronization with Active Directory.


    By default is set to one minute.

    ApplicationIDIdentifies the registered SfB Application of ICH. To get the required value


    1. run Get-CsTrustedApplication command in SfB Server Management Shell

    2. search for the right component by application port number or name

    3. copy the ApplicationId

    Example: urn:application:lucs

    ConferencingPolicyNameThe name of the conferencing policy, which will be created and assigned by CIC for the application endpoints.
    LyncServerURIEnter the SfB Server URI.


    Example: https://fepool1.dev.local/OCSPowershell

    MaximumUsersCountPerSynchronizationRoundDefault Value:  50
    MmApplicationIdIdentifies the registered SfB Application of MM. To get the required value


    1. Run Get-CsTrustedApplication command in SfB Server Management Shell

    2. search for right component by application port number or name

    3. copy the ApplicationId

    Example: urn:application:mm

    MmTrustedApplicationPoolFQDNEnter the MM Trusted Application Pool FQDN. Example: lucs.dev.local
    Office365PoolingTimeInSecThe polling time in seconds to get users for every tenant.

    Default Value:  3600
    PasswordPassword created for CIC service user to access the SfB remote PowerShell.
    ReistrarPoolAdPAthInformation of Reistrar Pool in LDAP
    TrustedApplicationPoolFQDNEnter the ICH Trusted Application Pool FQDN. Example: lucs.dev.local
    UserAdPathList of paths to AD devided by semicolon
    UsernameUsername created for CIC service user to access the SfB remote PowerShell.


    Example: dev.local\cic_srv

    VerbaProvisioningEnabledFlag if Verba provisioning should be enabled.
    VerbaProvisioningLoginVerba login name to provision the user and services
    VerbaProvisioningPasswordPassword of the login name to provision the user and services on Verba.
    VerbaProvisioningUriURI to the Verba server to provision the user and services.


    Example: https://verba.dev.local/verba/api

    VerbaRoleMappingServiceList of service roles devided by semicolon
    VerbaRoleMappingUserList of user roles devided by semicolon