Topic Last Modified: 2010-04-16
You can use Communications Server Control Panel to view a list of the trusted applications that you have deployed in your Microsoft Communications Server 2010 environment. A trusted application is an application based on Microsoft Unified Communications Managed API (UCMA) 3.0 Core SDK that is trusted by Communications Server 2010. This trust relationship is summarized in the following list.
- Trusted applications are not challenged for authentication by
Communications Server 2010.
- Trusted applications are not throttled by Communications Server
2010 for SIP transactions, connections or outgoing Voice over
Internet Protocol (VoIP) calls.
- Trusted applications can impersonate any user and can join
conferences without appearing in rosters.
- Trusted applications are highly available and resilient.
In Communications Server Control Panel, you can see the name of the applications, the pool where they run, and the port they use.
To view a list of trusted applications
-
Open Communications Server Control Panel.
-
In the left navigation bar, click Topology.
-
Click the Trusted Application tab.
-
Click a column heading to sort the applications, if needed.