19.08.2013 Views

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Appendix D-Ad Hoc Conferencing and External Database Authentication<br />

• If the correct conference password is entered, the participant is prompted to enter the<br />

chairperson identifier key.<br />

— If no identifier is entered, the participant is connected to the conference as a<br />

standard participant.<br />

• If the chairperson identifier is entered, the participant is prompted to enter the<br />

chairperson password.<br />

• When the participant enters the chairperson password or his/her personal password, it<br />

is sent to the external database application for validation.<br />

— If the password is incorrect the participant is disconnected from the MCU.<br />

• If there is a match, the participant is granted the right to join the conference as<br />

chairperson. In addition, the external database application sends to the MCU the<br />

following parameters:<br />

— Participant name (display name)<br />

— Participant Information, such as the participant E-mail. These fields correspond to<br />

Info 1, 2, 3 and 4 fields in the Participant Properties - Information dialog box.<br />

To enable conference access validation for all participants the following conferencing<br />

components are required:<br />

• The external database must hold the Chairperson Password or the participant’s Alias.<br />

• The Conference IVR Service assigned to the conference (defined in the Profile) must be<br />

configured to check the external database for the Chairperson password only when the<br />

participant enters the chairperson identifier key (either pound or star). In addition, it<br />

must be configured to prompt for the chairperson identifier key and password.<br />

System Settings for Ad Hoc Conferencing and External Database<br />

Authentication<br />

Ad Hoc Settings<br />

Before a participant can initiate an Ad Hoc conference (with or without authentication), the<br />

following components must be defined:<br />

• Profiles<br />

Defines the conference parameters for the conferences that will be initiated from the Ad<br />

Hoc-enabled Entry Queue. For more details, see "Conference Profiles” on page 1-1.<br />

• Entry Queue IVR Service with Conference ID Request Enabled<br />

The Entry Queue Service is used to route participants to their destination conferences,<br />

or create a new conference with this ID. For details, see "IVR Services” on page 16-1.<br />

In Ad Hoc conferencing, the Conference ID is used to check whether the destination<br />

conference is already running on the MCU and if not, to start a new conference using<br />

this ID.<br />

• Ad Hoc - enabled Entry Queue<br />

Ad Hoc conferencing must be enabled in the Entry Queue and a Profile must be<br />

assigned to the Entry Queue. In addition, an Entry Queue IVR Service supporting<br />

conference ID request. For details, see "Entry Queues” on page 6-1.<br />

<strong>Polycom</strong>, Inc. D-7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!