The CR service is an active – active SfB application which is responsible for recording voice/chat mails and should be installed on all LUCS machines.
- Run the CR.Setup.msi
- On the Luware-LUCS-CR Configuration Settings screen of the setup make sure you fill the
- Instance Name
- Port number
- SfB Server Version
- Configure Certificate Security
For security reason LUCS provides possibility to use certificate-based encryption and verification during the components communication. To configure certificate based authentication, select ‘Configure Certificate Security’ check box and press ‘Next’ button to open a page with server certificate settings.Example of filled Luware-LUCS-CR Configuration Settings screen
If ‘Configure Certificate Security’ check box was set to true, configure the server certificate settings as the next step. The client settings specify which settings CR will use while connecting to PS. The server settings are used to validate another services when they try to connect to CR.
|Mode||Transfer security modes offered by WCF to ensure a secured communication between a client and a server.||None : This mode ensures that no security is applied while communication between server and client.|
Transport: As the name suggests, it is concerned with security of communication between a client and a service over a network protocol. It guarantees the confidentiality and integrity of messages at transport level since transport security secures the entire communication channel.
|Validation Mode||The mode that specifies how incoming certificate is validated and how trust is determined .||None: In this mode no validation is perfomed.|
ChainTrust: : In this mode WCF simply validates the certificate against the issuer of a certificate known as a root authority (the expiration time is checked too).
PeerTrust: In this mode WCF simply checks if the incoming certificate is installed in the Trusted People folder in the certificate store (the expiration time is checked too).
PeerOrChainTrust: Mixed mode.
|Is Dedicated||The flag that defins which certificate is used for encryption.||False: Encryption is done with default certificate. It means that certificate with the hostname of the machinefrom the Personal Store is used on server side.|
True: Encryption is done with a dedicated certificate. It means there is possibility to configure identifier (thumbprint) of the certificate.
|Thumbprint||The thumbprint is a hash value computed over the complete certificate, which includes all its fields, including the signature.||→ See Prepare Certificate Thumbprint|
Note: The system reports all errors related to connection or certificate issues to a log file ‘C:\Program Files\Luware AG\LUCS-ICH\log \connectionIssues.log’.
- Open Services and start the installed service.
- Check that the service is successfully started without any errors in Event Viewer or in the log file
'c:\Program Files\Luware AG\LUCS-CR\log\regularLog.txt'
In the WebConfigurator application:
- Open -> Topology -> Components (Server)
Add CR component as it is shown in the example (select the CR Server Type, System Instance, Activity Order and fill the service’s Settings according to the table below):WebConfigurator - CR Component Configuration
Key Description O365ClientId The unique O365ClientId provided after the application registration in O365 O365CommonAuthorityUrl The O365CommonAuthorityUrl provided by O365
O365EndpointUri The O365EndpointUri provided by O365
O365Ressourceid The O365Ressourceid provided by O365
SipUris The configured SIP URIs of the Application Endpoints which will participate in conversations for recording. To get the required value
- run Get-CsTrustedApplicationEndpoint command in SfB Server Management Shell
- search for the right component by application
- copy SIP URIs
They will be divided by semicolon ‘;’