User authentication

The computer login always uses the computer's name. The user login to the server can be done in several ways. Select carefully the method which is possible and sensible for your infrastructure.

Examples of useful application in different types of scenarios:

Description Method
Workgroup without a server; each user is logged in as an administrator. Integrated user administration, authentification with UC password. You must assign every workstation a unique login for the estos UCServer so that users can be uniquely identified.
Workgroup, every user is logged in with his unique user name. Integrated user administration with UC password. The user names are unique; no individual user names need to be set up. Every user receives his own password on the estos UCServer.
Windows® Domain (also with Active Directory® Server) Integrated user administration or Active Directory®, Windows® domain authentification. Users must also explicitly log in to the estos UCServer with their domain login.
Windows® domain (all users are logged on to the domain) Integrated user administration or Active Directory®, Windows® domain authentification. Users are automatically authentificated via their domain login at the estos UCServer.

Authenification with UC password
Each user uses an individual UC password to log into the estos UCServer. This UC password has nothing to do with the Windows® password and is configured in the user administration.

Windows® domain authentification
The Windows® user name and password are always used for authenticating CTI users. If the user is already logged into the domain on his workstation the user is authenticated directly with his Windows® login. If the user is not logged in to a domain he can still log in to the estos UCServer with his Windows® login credentials.
This is the greatest possible security to prevent unauthorized users from using a phone for which they have no authorization. Caution: use this setting only if all computers and users are members of a domain.
Use this setting only if all computers and users are members of a domain.

More information about the technical background of the authentication methods can be obtained on page Authentication of users.

Version 6.0