19.08.2013 Views

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Appendix D<br />

Ad Hoc Conferencing and External<br />

Database Authentication<br />

The <strong>RMX</strong> Ad Hoc conferencing feature enables participants to start ongoing conferences onthe-fly,<br />

without prior definition when dialing an Ad Hoc-enabled Entry Queue. The created<br />

conference parameters are taken from the Profile assigned to the Ad Hoc-enabled Entry<br />

Queue.<br />

Ad Hoc conferencing is available in two modes:<br />

• Ad Hoc Conferencing without Authentication<br />

Any participant can dial into an Entry Queue and initiate a new conference if the<br />

conference does not exist. This mode is usually used for the organization’s internal Ad<br />

Hoc conferencing.<br />

• Ad Hoc Conferencing with External Database Authentication<br />

In this mode, the participant’s right to start a new conference is validated against a<br />

database.<br />

The external database application can also be used to validate the participant’s right to join<br />

an ongoing conference. Conference access authentication can be:<br />

• Part of the Ad Hoc conferencing flow where the participants must be authorized before<br />

they can enter the conference created in the Ad Hoc flow.<br />

• Independent of Ad Hoc conferencing where conference access is validated for all<br />

conferences running on the MCU regardless of the method in which the conference was<br />

started.<br />

Ad Hoc Conferencing without Authentication<br />

A participant dials in to an Ad Hoc-enabled Entry Queue and starts a new conference based<br />

on the Profile assigned to the Entry Queue. In this configuration, any participant connecting<br />

to the Entry Queue can start a new conference, and no security mechanism is applied. This<br />

mode is usually used in organizations where Ad Hoc conferences are started from within the<br />

network and without security breach.<br />

Starting a conference uses the following method:<br />

1 The participant dials in to the Ad Hoc-enabled Entry Queue.<br />

2 The Conference ID is requested by the system.<br />

3 The participant inputs a Conference ID via his/her endpoint remote control using<br />

DTMF codes.<br />

<strong>Polycom</strong>, Inc. D-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!