For LDAP Authentication of end users, does CUCM attempt a top down approach? If so, what would be sufficient to cause an attempt to authenticate a user with a secondary or tertiary server? From the behavior I am seeing, it appears that as long as an...