03-04-2025 09:56 AM - edited 03-20-2025 01:53 PM
In November 2024, a Cisco Field Notice was published indicating Microsoft would be decommissioning RBAC Application Impersonation, which Unity Connection has historically used to sync voicemail to O365. Microsoft just begun shutting off the functionality as they indicated they would and many customers have been suddenly without UM. This is creating integrations to fail which did not upgrade before the deadline. In order for Unity Connection to continue to function with O365 integrations, you will need to be running a version of Unity Connection listed in the "Fixed Release" column outlined in the Field Notice here: https://www.cisco.com/c/en/us/support/docs/field-notices/742/fn74203.html
Once upgraded to a supported CUC version, there is also a new permission (full_access_as_app) required on the Azure side outlined in step 4g in the UM Configuration Guide.
Be sure that you remove the existing legacy permissions after adding this new permission.
If you're troubleshooting Mbxsync traces wondering if you are affected by this change, the logs will show the 403 bad response coming from Azure, the signature in the logs can resemble lines like these:
HTTP status=[403 Forbidden] Diagnostic=[Bad response from server, HTTP code returned: 403]
a:ErrorForbiddenImpersonationHeader</faultcode><faultstring xml:lang="en-US">ExchangeImpersonation SOAP header is not supported in delegate flow.
***EDIT*** You may find yourself already on a fixed release but UM still stopped working despite your having properly enabled full_access_as_app permission in Azure. In months past, if you upgraded to one of the fixed versions (great!), CUC would use the new client credentials flow by default. However, this could cause problems if you still chose to keep RBAC Application Impersonation permissions in place on the Azure side by not configuring the new full_access_as_app permission. Customers in this situation were given a temporary workaround to manually update the DB to force CUC to use the previous RBAC Application Impersonation method.
Now that Microsoft has removed RBAC Application Impersonation, this has now caused UM failure for these customers who have been running with the manual workaround in place (many have forgotten it was in place). The manual DB workaround needs to be reverted so that CUC will go back to using the new client credentials flow.
If you're in this situation where you're on a fixed release with the correct Azure permissions configuration and not sure if you've been running with the manual forced RBAC workaround from the past, you can run the command below to check, and if necessary revert CUC back to the default method of using client credentials, which is the way all fixed versions of CUC should be running.
Check the current value of "valuelong" on your system:
1 = RBAC Application Impersonation
0 = Client credential flow
run cuc dbquery unitydirdb select valuelong,fullname from tbl_configuration where fullname like '%GrantType%'
valuelong fullname
--------- ---------------------------------------------
1 System.Messaging.MbxSynch.OAuthTokenGrantType
If valuelong=1, this must be set back to 0 to use the new Client credential flow.
run cuc dbquery unitydirdb update tbl_configuration set valuelong=0 where fullname like '%GrantType%'
Then you will need to:
1. Restart the "Connection Mailbox Sync" service from Cisco Unity Connection Serviceability > Tools > Service Management.
2. Reset the Unified Messaging Service using "Reset" button on the Unified Messaging Service configuration page.
Hope this helps,
Brad
03-10-2025 11:56 AM
This did the trick. Thank you very much.
03-17-2025 05:44 PM
Well done, just ran into the issue today. Thanks.
03-20-2025 07:28 AM
Hello everyone, when we try to execute the command for validate what setting we have, we had this result :
run cuc dbquery unitydirdb select valuelong,fullname from tbl_configuration where fullname like '%GrantType%'
No records found
Any idea if I have to execute the next command or my case is diffrent?
03-20-2025 10:27 AM - edited 03-20-2025 10:27 AM
@LWama What version are you running?
03-20-2025 12:05 PM
We run the version 14 SU2 (14.0.1.12900-69)
03-20-2025 12:22 PM
That is why, you're not on a fixed version, that row doesn't exist in the DB so there's no point in checking that command in your situation. You need to be running 14SU3 or later to resolve the problem. Once you upgrade and proper Azure permission is granted, you should begin functioning normally again.
03-20-2025 12:38 PM
Ok perfect, I will contact the TAC for have access to the update. Actually, Cisco support site doesn't let me download it.
Thanks a lot for your time
03-20-2025 01:52 PM
If you don’t have access to download it would mean that you don’t have a contract that covers the product.
03-20-2025 02:21 PM
This means that Cisco's magnificent license/support management system is (once again) unable to link my contract numbers with my products.
The problem will be resolved with a TAC as usual, but the license management is catastrophic...
03-25-2025 02:37 PM
Is there a workaround for this issue? We are currently using an older system version, 11.5.1.18900-97, and cannot upgrade because we do not have an active contract with Cisco.
03-25-2025 03:44 PM
Unfortunately not. The EOL version you're on doesn't have the code to perform the new OAuth client credential authorization flow.
04-02-2025 10:32 AM
What would need to be done if customer is running 12.5
04-02-2025 12:03 PM
Per this document it seems that you’d need to be on 12.5 SU7 or newer. https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/connection/12x/unified_messaging/b_12xcucumgx/b_12xcucumgx_chapter_01.html
04-08-2025 09:05 AM - edited 04-08-2025 09:41 AM
EDIT: It seems like Azure just needed some time to sync the permissions. It is working now with previously mentioned changes.
Hello,
I have Unity 14Su3 and had that 403 error. When checked the "valuelong" field it was set to 1. So changed it to 0, reset service - Connection Mailbox Sync- and Unified Messaging service. I also removed older permissions from Azure, now I have below permissions.
Now I am getting below error:
Please advise if my Azure API permissions are correct and if I am missing anything else.
Thank you.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide