cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
6877
Views
18
Helpful
15
Replies

Reminder: CUC UM w/O365 Stops Working With Legacy Permissions

Brad Magnani
Cisco Employee
Cisco Employee

In November 2024, a Cisco Field Notice was published indicating Microsoft would be decommissioning RBAC Application Impersonation, which Unity Connection has historically used to sync voicemail to O365.  Microsoft just begun shutting off the functionality as they indicated they would and many customers have been suddenly without UM.  This is creating integrations to fail which did not upgrade before the deadline.  In order for Unity Connection to continue to function with O365 integrations, you will need to be running a version of Unity Connection listed in the "Fixed Release" column outlined in the Field Notice here: https://www.cisco.com/c/en/us/support/docs/field-notices/742/fn74203.html  

Once upgraded to a supported CUC version, there is also a new permission (full_access_as_app) required on the Azure side outlined in step 4g in the UM Configuration Guide.

https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/connection/14/unified_messaging/guide/b_14cucumgx/b_14cucumgx_chapter_01.html#ID-2370-000005f5

Be sure that you remove the existing legacy permissions after adding this new permission.

If you're troubleshooting Mbxsync traces wondering if you are affected by this change, the logs will show the 403 bad response coming from Azure, the signature in the logs can resemble lines like these:

HTTP status=[403 Forbidden] Diagnostic=[Bad response from server, HTTP code returned: 403]

a:ErrorForbiddenImpersonationHeader</faultcode><faultstring xml:lang="en-US">ExchangeImpersonation SOAP header is not supported in delegate flow.

***EDIT*** You may find yourself already on a fixed release but UM still stopped working despite your having properly enabled full_access_as_app permission in Azure.  In months past, if you upgraded to one of the fixed versions (great!), CUC would use the new client credentials flow by default.  However, this could cause problems if you still chose to keep RBAC Application Impersonation permissions in place on the Azure side by not configuring the new full_access_as_app permission.  Customers in this situation were given a temporary workaround to manually update the DB to force CUC to use the previous RBAC Application Impersonation method. 

Now that Microsoft has removed RBAC Application Impersonation, this has now caused UM failure for these customers who have been running with the manual workaround in place (many have forgotten it was in place).  The manual DB workaround needs to be reverted so that CUC will go back to using the new client credentials flow.

If you're in this situation where you're on a fixed release with the correct Azure permissions configuration and not sure if you've been running with the manual forced RBAC workaround from the past, you can run the command below to check, and if necessary revert CUC back to the default method of using client credentials, which is the way all fixed versions of CUC should be running.

Check the current value of "valuelong" on your system:

1 = RBAC Application Impersonation
0 = Client credential flow

run cuc dbquery unitydirdb select valuelong,fullname from tbl_configuration where fullname like '%GrantType%'

valuelong fullname
--------- ---------------------------------------------
1 System.Messaging.MbxSynch.OAuthTokenGrantType

If valuelong=1, this must be set back to 0 to use the new Client credential flow.

run cuc dbquery unitydirdb update tbl_configuration set valuelong=0 where fullname like '%GrantType%'

Then you will need to:

1. Restart the "Connection Mailbox Sync" service from Cisco Unity Connection Serviceability > Tools > Service Management.

2. Reset the Unified Messaging Service using "Reset" button on the Unified Messaging Service configuration page.


Hope this helps,
Brad

 

15 Replies 15

Jerry-ETA
Level 1
Level 1

This did the trick.  Thank you very much.

Well done, just ran into the issue today. Thanks.

Best Regards

LWama
Level 1
Level 1

Hello everyone, when we try to execute the command for validate what setting we have, we had this result :
run cuc dbquery unitydirdb select valuelong,fullname from tbl_configuration where fullname like '%GrantType%'
No records found
Any idea if I have to execute the next command or my case is diffrent? 

@LWama What version are you running?

We run the version 14 SU2 (14.0.1.12900-69)

That is why, you're not on a fixed version, that row doesn't exist in the DB so there's no point in checking that command in your situation.  You need to be running 14SU3 or later to resolve the problem.  Once you upgrade and proper Azure permission is granted, you should begin functioning normally again.

Ok perfect, I will contact the TAC for have access to the update. Actually, Cisco support site doesn't let me download it.

Thanks a lot for your time

If you don’t have access to download it would mean that you don’t have a contract that covers the product.



Response Signature


LWama
Level 1
Level 1

This means that Cisco's magnificent license/support management system is (once again) unable to link my contract numbers with my products.
The problem will be resolved with a TAC as usual, but the license management is catastrophic...

gmcvb
Level 1
Level 1

Is there a workaround for this issue? We are currently using an older system version, 11.5.1.18900-97, and cannot upgrade because we do not have an active contract with Cisco.

Brad Magnani
Cisco Employee
Cisco Employee

Unfortunately not.  The EOL version you're on doesn't have the code to perform the new OAuth client credential authorization flow.

What would need to be done if customer is running 12.5

piyush aghera
Spotlight
Spotlight

EDIT: It seems like Azure just needed some time to sync the permissions. It is working now with previously mentioned changes.

Hello,

I have Unity 14Su3 and had that 403 error. When checked the "valuelong" field it was set to 1. So changed it to 0, reset service - Connection Mailbox Sync- and Unified Messaging service. I also removed older permissions from Azure, now I have below permissions.

piyushaghera_0-1744128073446.png

Now I am getting below error:

piyushaghera_0-1744128305768.png

Please advise if my Azure API permissions are correct and if I am missing anything else.

Thank you.