cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5096
Views
0
Helpful
14
Replies

Disabling sso (single sign on) discovery process

aalejo
Level 5
Level 5

After disabling SSO on jabber-config.xml (SSO_Enabled) still seeing jabber getting the list of UDS servers and trying to find SSO services available.

 

It is possible to disable any single sign on activity from the jabber windows client?

 

- Alex
 

2 Accepted Solutions

Accepted Solutions

Ok. You care correct. This trace is taken after UDS servers have been discovered. Now Jabber is checking to see if SSO is enabled.

[ucm90::UdsProvider::makeSSOEnabledRequest] - The home uds cluster's Cucm version '9.1.2' does not support SSO detection

So back to your original question then, you need to know if SSO can be disabled altogether? Is there any impact on Jabber operation at the moment..

Please rate all useful posts

View solution in original post

AAlejo,

Here is the answer: It is not possible..

"I understand that you would like to exclude some CUCM servers from jabber from UDS .

Unfortunately this  is not possible. Jabber clients are expected to be able to use any of the CCMCIP servers within the user's home cluster.
Jabber uses the servers specified in the _cisco-uds SRV record to find the home cluster of the user.Once we have found the home cluster of the user, jabber uses the CUCM /cucm-uds/servers REST API to find all servers in that cluster.
The list is randomly ordered and the first 3 servers are chosen as UDS/CCMCIP servers, this is done to  distribute the load of UDS queries between servers in the cluster."

Please rate all useful posts

View solution in original post

14 Replies 14

Ayodeji Okanlawon
VIP Alumni
VIP Alumni

UDS and SSO are totally different. So what do you really need to do? Jabber doesn't use SSO to discover uds servers. Jabber foes a query against the users home cluster. You can't disable this. 

Please rate all useful posts

Hey

 

Yes, SSO and UDS are two different features but if you follow the auto-discovery process on the jabber client you will find out that jabber uses discovered UDS server for discovering SSO enable severs.

Process:

1. Jabber query /cucm-uds/servers on home cluster

2. Jabber uses that server list to discover if some of those severs are SSO enable

Then both features are interlinked (on the discovery process at least).

 

- Alex

 

 

 

 

 

 

 

I think you may have missed a step there..Jabber uses a different query to discover if SSO is supported. It uses the /cucm-uds/version query which happens immediately after the UDS discovery against DNS (different from the actual UDS servers discovered for the cluster)

Here is the query..

https://dmark-cucmsub.brambie.com:8443/cucm-uds/version

Here is the response to the query with the uds version..

Response body: <?xml version="1.0" encoding="UTF-8" standalone="yes"?><versionInformation version="9.1.2" uri="https://dmark-cucmsub.brambie.com:8443/cucm-uds/version"><name>Cisco User Data Service</name><version>9.1.2</version><installedProducts><product>Cisco Unified Communications Manager</product><product>Cisco Enterprise License Manager</product></installedProducts></versionInformation>

+++Now here is jabber saying the UDS version doesn't support SSO+++

[ucm90::UdsUtilities::isLegacyUcm] - Uds Version (Legacy): 9.1.2
 [ucm90::UdsProvider::makeSSOEnabledRequest] - The home uds cluster's Cucm version '9.1.2' does not support SSO detection

 

Please rate all useful posts

Hi

That's only to discover if SSO is supported on the back end but after that it will go over each individual UDS server to find if SSO is enable.

Exact steps are:

 

1. Jabber query /cucm-uds/servers on home cluster to get UDS List

2. Jabber check is SSO is supported on each sever on UDS list. (using the link you provided)

3. If SSO is supported. Jabber uses that server list to discover if some of those severs on the UDS list have SSO enable

Then both features are interlinked (on the discovery process at least).

 

 - Alex

Ok. You care correct. This trace is taken after UDS servers have been discovered. Now Jabber is checking to see if SSO is enabled.

[ucm90::UdsProvider::makeSSOEnabledRequest] - The home uds cluster's Cucm version '9.1.2' does not support SSO detection

So back to your original question then, you need to know if SSO can be disabled altogether? Is there any impact on Jabber operation at the moment..

Please rate all useful posts

Yea,  there is a certificate issue that I am trying to avoid with one  UDS servers.

I haven't used SSO but here is what I know, jabber randomly connects to the list of UDS servers discovered from the home cluster. Even when you disable UDS services on a cucm server, jabber still discovers it during the UDS discovery. I had an issue also with certs recently and I wanted to see if I could exclude a server from the uds discovery so jabber doesn't do a secure connection to it to download user devices, but I had no luck. 

Please rate all useful posts

Sharing your bad luck here. :(

I had it in mind to query TAC on this. To see if we can exclude a server from the UDS discovery. I will do it now and update you

Please rate all useful posts

Nice,

 

Thanks :)

AAlejo,

Here is the answer: It is not possible..

"I understand that you would like to exclude some CUCM servers from jabber from UDS .

Unfortunately this  is not possible. Jabber clients are expected to be able to use any of the CCMCIP servers within the user's home cluster.
Jabber uses the servers specified in the _cisco-uds SRV record to find the home cluster of the user.Once we have found the home cluster of the user, jabber uses the CUCM /cucm-uds/servers REST API to find all servers in that cluster.
The list is randomly ordered and the first 3 servers are chosen as UDS/CCMCIP servers, this is done to  distribute the load of UDS queries between servers in the cluster."

Please rate all useful posts

What it is interesting is that sso discovery can not be disable neither  this UDS discovery mechanism.

 

 

 

 

 

I have asked the TAC guy, he will verify and come back to me on this also. Lets see what he says

Please rate all useful posts

The answer is no since SSO is enabled cluster wide not per server

Please rate all useful posts