Defining two ela trusted servers, Before you begin – Lucent Technologies INTUITY Messaging Solutions Enhanced-List Application 585-310-575 User Manual

Page 38

Advertising
background image

Administering AUDIX for ELA

28

Issue 1 July 1997

8. Press (F3)

to save this information to the system database.

The cursor returns to the command line, and the system displays the
message

Command Successfully Completed

.

9. Continue with the next procedure or enter

exit

to leave AUDIX

Administration.

Defining Two ELA Trusted Servers

The ELA software runs as two separate trusted servers. For the ELA servers to
communicate with the I

NTUITY

AUDIX server, they must be defined to the I

NTUITY

AUDIX system. The installation worksheets you received from your account
representative will have the exact names for the ELA trusted servers. However,
for the purposes of this document, the first ELA trusted server will be referred to
as the

administrative server and the second ELA trusted server as the delivery

server.

A request from ELA to send a message to an AUDIX mailbox involves invoking an
IMAPI session and locking the ELA mailbox. A server that uses IMAPI to access
an AUDIX mailbox is known as a trusted server.

!

SECURITY ALERT:

The procedures in this section include setting a password the trusted
server must use to access AUDIX. There is a secondary layer of security (in
addition to a trusted server password) that you can administer. This
additional layer of security involves setting a separate IMAPI password that
the trusted server must use before the system will allow an IMAPI session to
be invoked.

While administration of this additional password is optional, it is strongly
recommended. See your I

NTUITY

Messaging Solutions Release 4

Administration book.

Before You Begin

Before adding the ELA trusted server to the system, you will need the following
information:

Two unique 1- to 10-printable character server names for the ELA trusted
servers. These server names must be unique, not only from each other,
but from all other machines in the network (including fax call delivery
machines). Use the

li ma

and

li tr

commands to view all machines

currently in your network.

Additionally, the server names must comply with the guidelines for naming
machines your

I

NTUITY

Messaging Solutions Release 4 Administration

book for complete information on naming conventions).

ENTER

Advertising