![]() |
![]() |
![]() |
Trusted Server Security
A trusted server is a software application in a domain outside of Intuity AUDIX. A trusted server uses its own login and password to launch a Intuity Messaging Applications Programming Interface (IMAPI) LAN session and access Intuity AUDIX mailboxes. Examples of trusted servers are:
- Synchronizer software running on an email server
- Enhanced List Application (ELA) software running as a server on the Intuity AUDIX system
Trusted servers can access and manipulate an Intuity AUDIX message just as an Intuity AUDIX application can do. See Electronic Mail: Overview for information pertaining to trusted servers, domains, and integration of email and other trusted server software with Intuity AUDIX.
When securing a system that allows access from another domain, you must consider security from both an internal and an external perspective. Internal security focuses on preventing or recovering from damage if a breach occurs. For example, a breach can occur when a virus is transmitted in a software file attached to the Intuity AUDIX message. External security involves administration to prevent access from an unauthorized source, such as a trusted server or trusted server administrator. See Trusted Server Security for information specific to security.
There are two trusted server administration screens, the Trusted Server Profile screen and the IMAPI Password screen. Detailed information and procedures for completing these screens can be found in:
![]() http://www.avaya.com Avaya UCS Information Development |
![]() |
![]() |
![]() |