Which certificate must be in the Certificate Signing Request to accommodate the Lync administrator requirements?

A customer asks you to build a SIP/SIMPLE IM federation between a Cisco Unified Communication Manager IM & Presence environment and a Microsoft Lync 2013 environment. The Lync administrator insists that TLS is used for the federation and that the SSL certificate used by Cisco Unified Communication Manager IM & Presence is signed by the private CA of the enterprise. Which certificate must be in the Certificate Signing Request to accommodate the Lync administrator requirements?
A. cupxmpp
B. tomcat
C. cupxmpps2s
D. ipsec
E. cup

cisco-exams

2 thoughts on “Which certificate must be in the Certificate Signing Request to accommodate the Lync administrator requirements?

  1. E for SIP
    Supported Interdomain Federation Integrations
    The supported external domains that an IM and Presence Service node can federate with are:
    • Microsoft Office Communications Server Releases 2007, R2, Microsoft Lync 2010 and 2013 over SIP
    C for XMPP

    Microsoft Lync/OCS/LCS Call Control | cup | cup-trust

    XMPP Federation | Cup-xmpp-s2s | cup-xmpp-trust
    The trust certificates for cup-xmpp-s2s are stored in cup-xmpp-trust along with the general XMPP trust certificates.

    Generate Certificate Signing Request for IM and Presence Service
    IM and Presence Service certificates should be signed by the same Certificate Authority (CA) that is used by Lync/OCS/LCS. You must complete the following two-step process to obtain a CA-signed certificate:

    Generate an IM and Presence Service Certificate Signing Request (CSR).
    Upload the CA signed certificate onto IM and Presence Service.
    The following procedure describes how to generate and download a CSR from IM and Presence Service. IM and Presence Service CSRs are 2048 bit in size.

    Procedure
    Step 1 Log in to the Cisco Unified IM and Presence Administration user interface. Choose Security > Certificate Management on IM and Presence Service.
    Step 2 Click Generate CSR.
    Step 3 From the Certificate Purpose drop-down list, choose cup.
    Step 4 Click Generate CSR.
    Step 5 When the Status shows “Success: Certificate Signing Request Generated” click Close.
    Step 6 Click Download CSR.
    Step 7 From the Certificate Name drop-down list, choose cup.
    Step 8 Click Download CSR to download the certificate to your local computer.
    Step 9 After the certificate has downloaded, click Close.

    XMPP
    Step 1 Log in to the Cisco Unified IM and Presence Operating System Administration user interface. Choose Security > Certificate Management.
    Step 2 Click Generate Self-signed.
    Step 3 From the Certificate Purpose drop-down list, choose cup-xmpp-s2s and click Generate.
    Step 4 Restart the Cisco XCP XMPP Federation Connection Manager service. Log in to the Cisco Unified IM and Presence Serviceability user interface. Choose Tools > Control Center – Network Services to restart this service.
    Step 5 Download and send the certificate to another enterprise so that it can be added as a trusted certificate on their XMPP server. This can be a IM and Presence Service node or another XMPP server.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.