UC Connector Configuration
The Genesys UC Connector is used in integration with Lync / Skype for Business to provide presence synchronization of users, who act as contact center agents for the Genesys solution. To do this, UC Connector subscribes to the Lync / Skype for Business presence service and monitors presence events for all registered users. It reports presence status variations to Stat Server through a configurable mapping filter.
UC Connector connects with the Front End Pool and subscribes to Agent statuses periodically. The Front End Server notifies Genesys when there are any status changes to the Microsoft presence status of Agents.
Purpose: To configure UC Connector to register with the Front End Pool and Subscribe for Lync / Skype for Business Users.
Prerequisites:
- Generating the Client Certificate
- One of the following:
1. In Genesys Administrator, open the UC Connector application and click the Options tab.
2. Set the value of the Microsoft-OCS\contact option to a valid Lync / Skype for Business User URI.
- For example:
sip:lync_user1@lync-domain.com
4. Click the Configuration tab. In the Command Line Arguments field, and add following information:
-cert_store_file "<client_certificate_path>" -cert_store_pass <client_certificate_password> -cert_store_type jks -key_store_file "<server_certificate_path>" -key_store_pass <server_certificate_password>” -ket_store_type pkcs12
Note:
- <client_certificate_path>—location of the client certificate created in Generating the Client Certificate.
- <client_certificate_password>—the client certificate password created in Generating the Client Certificate.
- <server_certificate_path>—location of the server certificate created in either
Generating the Server Certificate Using Skype for Business Management Shell or Generating the Server Certificate Using Microsoft Management Console or CA Web Access.
- <server_certificate_password>—the server certificate password created in either Generating the Server Certificate Using Skype for Business Management Shell or Generating the Server Certificate Using Microsoft Management Console or CA Web Access.
UC Connector can be provisioned to connect to multiple Front End Server hosts belonging to the same Pool. This
is compulsory when connecting to Lync / Skype for Business Enterprise Edition.
Purpose: To configure UC Connector to connect to multiple Front End Server hosts in the same Pool.
1. Export the pfx (pkcs12) files from both Front End Server hosts using mmc on Windows (for example, certificate1.pfx and certificate2.pfx). During the export a password will be specified for each file (for example, pwd1 and pwd2).
2. Import the files from Step 1 into a new keystore with a new password (for example, pwd_final):
- If the final keystore is java keystore, use the following commands:
Type: keytool.exe -importkeystore -v -srckeystore certificate1.pfx
-destkeystore final_certificate.jks -srcstoretype pkcs12
-deststoretype jks -srcstorepass pwd1 -deststorepass pwd_final
Type: keytool.exe -importkeystore -v -srckeystore certificate2.pfx
-destkeystore final_certificate.jks -srcstoretype pkcs12
-deststoretype jks -srcstorepass pwd2 -deststorepass pwd_final
- If the final keystore is pkcs12 keystore, use the following commands:
Type: keytool.exe -importkeystore -v -srckeystore certificate1.pfx
-destkeystore final_certificate.pfx -srcstoretype pkcs12
-deststoretype pkcs12 -srcstorepass pwd1 -deststorepass pwd_final
Type: keytool.exe -importkeystore -v -srckeystore certificate2.pfx
-destkeystore final_certificate.pfx -srcstoretype pkcs12
-deststoretype pkcs12 -srcstorepass pwd2 -deststorepass pwd_final
3. Start UC Connector with the following arguments in command line:
- for java keystore:
-cert_store_file final_certificate.jks -cert_store_pass pwd_final
-cert_store_type jks
- for pkcs12 keystore:
-cert_store_file final_certificate.pfx -cert_store_pass pwd_final
-cert_store_type pkcs12