Adding Service Provider Tenants
This procedure describes how to configure a Service Provider tenant. See Add Main Tenant to Live Platform for details of the parameter configuration.
➢ | Do the following: |
1. | In the Menu , choose Topology and then select the Tenants tab. |
2. | Click Add. |
3. | Configure the General details as described in the table below: |
Tenant Details - General
Parameter |
Description |
||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Tenant Name |
Enter the name of the Service Provider account. |
||||||||||||
HTTP Operator |
This operator manages services running on devices that connect directly to Live Platform over HTTP. Connection requests sent to Live Platform by these devices are managed through this operator. In the example below, the assigned HTTP Operator is 'irOperator' for the Interaction Insights service (the Operator name should logically identify the service).
This operator is used by the following services:
|
||||||||||||
Users URI Regexp |
This parameter facilitates generating statistics on calls made exclusively from URIs in a specific tenant. Operators can run a regional expression to find the URIs associated with the specific tenant and then generate statistics exclusively on them.
If in a five minute interval there are more than 2000 different URIs,the URI statistics for this five minute interval will not be saved. |
||||||||||||
Subnet (CIDR Notation) |
Enter the tenant's subnet mask. Must be in prefix format x.x.x.x/y. For example: 255.255.0.0/16. For any region under the tenant, subnet mask is not mandatory, but if it is configured, its subnet mask must be within the tenant's, for example, 255.255.0.0/1. |
||||||||||||
Azure Tenant ID |
Service Provider Azure Tenant ID. |
||||||||||||
NAT IP |
This option can be configured when Live Platform is deployed behind a different NAT to customer tenants. It allows the configuration of an applicative level NAT interface for each tenant domain; Devices’ incoming communication like SNMP traps, license reports and file upload/download will communicate via the tenants’ NAT interface. |
||||||||||||
Domain |
The name of the tenant domain that is used for connecting devices to Live Platform. When defined and the parameter "FQDN Support for Auto-Detection" is enabled (see Global Configuration), devices that are connected to Live Platform are automatically added under the relevant tenant instead of to the default Auto Detection region. |
||||||||||||
Internal Mail Server from Address |
If your enterprise uses Live Platform's internal email server for Alarms Forwarding, use this parameter to configure the internal mail server’s 'From Address'. For example, if you configure adelev@TrunkOperator.com for this parameter and you configure 'Adele Vance' for the parameter following in this table ('Internal Mail Server Real Name'), then all alarms forwarded from Live Platform by email from rules configured with 'Use Internal Mail Server' will be from address: adelev@TrunkOperator.com |
||||||||||||
Internal Mail Server Real Name |
The corresponding name of the System Administrator configured for the 'Internal Mail Server from Address' above. |
||||||||||||
Description |
Enter a tenant description to facilitate effective management later. |
||||||||||||
Masked Digits Number |
The number of digits to mask from phone numbers in the Calls details. |
||||||||||||
Interaction Insights |
Enables the Onboarding and management of Compliance Recording customers. |
||||||||||||
Device Manager |
Enables the Onboarding and management of Device Manager customers. |
||||||||||||
Source Email |
Source email of the tenant. |
||||||||||||
Live Setup ID |
The Live Setup ID used by the Metering Service, see Metering Reports |
4. | Click the Services tab. |
5. | Select the Check box adjacent to the services that you wish to enable for the tenant. |
You cannot disable support of the Hybrid entities service if there are existing customers attached to a Hybrid service.
6. | Click the down arrow to configure the Live Setup ID metering tag, see Metering Reports. |
7. | Click the Contact Info tab. |
8. | Click OK and then click the SNMP tab. |
9. | Use the following table as reference when configuring the SNMP v2 parameters. |
Tenant Details – SNMP v2
Parameter |
Description |
---|---|
SNMP Read Community |
Enter an encrypted SNMP read community string. The default value for the SNMP read community string is taken from the SNMP main template. |
SNMP Write Community |
Enter an encrypted SNMP write community string. The default value for the SNMP write community string is taken from the SNMP main template. |
Trap Community |
Enter the Trap Community string to be received as part of the Notification message. The default value for the SNMP trap community string is taken from the SNMP main template. |
10. | Use the following table as reference when configuring the SNMP v3 parameters. |
Tenant Details – SNMP v3
Parameter |
Description |
|||||||||
---|---|---|---|---|---|---|---|---|---|---|
Security Name |
Enter a name for SNMP v3. Example: OVOC User. |
|||||||||
Security Level |
From the drop-down, select one of the following:
|
|||||||||
Authentication Protocol |
From the drop-down, select either:
|
|||||||||
Authentication Key |
Enter an Authentication Key. The default is taken from main SNMP template. |
|||||||||
Privacy Protocol |
Select one of the following:
|
|||||||||
Privacy Key |
Enter a Privacy Key. The default is taken from main SNMP template. |
SNMPv2/SNMPv3 account credentials are not automatically configured so you need to manually configure identical settings in the device's Web interface (see the device's documentation for more information).
11. | Click OK and then click the HTTP tab. |
12. | Use the following table as reference when configuring the HTTP parameters. |
Tenant Details - HTTP
Parameter |
Description |
||||||
---|---|---|---|---|---|---|---|
Device Admin User |
Enter the device Web server user name. Example: Admin. Password - "Admin". The default is taken from the main HTTP template. |
||||||
Device Admin Password |
Enter the Web server password. Example: Admin. The default is taken from the main HTTP template. |
||||||
Connectivity |
From the drop-down, select either:
The default is taken from main SNMP template. |
13. | Click OK and then click the Operators tab. |
Tenant Details- Operators
Parameter |
Description |
---|---|
Local Authentication: Assigned Operators |
From the drop-down, select an operator from the list of operators. Only operators configured as 'tenant' type operators are displayed. The list will be empty if no such operator has been configured, in which case you can click the button described next, to add a 'tenant' type operator. The parameter lets you assign an operator – or operators – to the tenant. see Adding Local System Operators (Optional) for more information about configuring 'tenant' type operators. |
|
Operator authentication can be configured locally, in the OVOC (see "Configuring Operator Authentication Locally" in the OVOC User’s Manual). Click the button to add a new 'tenant' type operator; the 'Tenant Operator Details' screen opens. The operator is then assigned to the tenant and displayed in the drop-down list. |
AD Authentication: Group Name |
Applies to 'tenant' type operators. When an operator logs in to OVOC, OVOC (before allowing the operator access) checks with the enterprise's Azure Active Directory if the User Group which the operator is associated in OVOC is compatible with the User Group defined in Azure Active Directory . If they match, then when logged in, the operator is assigned to this tenant. Note: this parameter must be configured with the name of the Security Group that you added in Adding Main Tenant Operators and Assigning to Azure GroupsRegistering OVOC Application in Main Tenant. |
Azure AD Group: Object ID |
Service Provider operators can be assigned to a specific Azure AD Group whose members they are designated to manage. For example, in the Finance Group, the operator "aiLogAdmin" manages only employees in the Finance department. This operator can only view and manage the Finance group employees. The same logic applies for other managed groups for the same tenant. This feature enables affiliated corporations to be managed under the Active Directory tenant of their Parent corporate group. See Mapping Azure Groups to Customer Tenant
|
14. | Click OK and then click the License tab. |
15. | Use the following table as reference when configuring the License parameters. |
Tenant Details – License
License Pool |
Description |
---|---|
Devices |
Enter the total number of devices that can be managed by this tenant's License Pool, i.e., CloudBond 365 devices, SBC devices, gateway devices and MSBR devices allowed by your license. The parameter only defines systems. It does not include phones. |
SBC Registrations |
Enter the number of SIP endpoints that can register with the SBCs allowed by your license. |
SBC Sessions |
Enter the number of concurrent call sessions supported by the SBCs in your deployment. |
SBC Signaling |
Enter the number of SBC signaling sessions supported by the SBCs in your deployment. |
SBC Transcoding |
Enter the number of SBC transcoding sessions supported by the SBCs in your deployment. |
CB Analog Devices |
Support pending. Currently unsupported. |
CB PBX Users |
Support pending. Currently unsupported. |
CB Users |
Enter the number of CloudBond 365 users per tenant. Divide the total number of CloudBond 365 users allowed by your license, by the number of tenants in your deployment. If you purchased a license for 1000 CloudBond 365 users and you have four tenants in your deployment, 250 users can be allocated to each tenant. You cannot exceed the total number of CloudBond 365 users covered by your license. It's your decision how to distribute them over tenants. |
CB Voicemail Accounts |
Support pending. Currently unsupported. |
Voice Quality |
|
Devices |
Enter the number of SBCs, gateways and MSBRs that can be mon- itored in this tenant. |
Endpoints |
Enter the number of endpoints that can be monitored in this tenant. |
Sessions |
Enter the number of concurrent call sessions the SBCs deployed in this tenant. |
Users |
Enter the number of users supported by the SBC/s deployed in this tenant. |
Reports |
Select the number of reports to allocate to the tenant. In the example here, a total of 5 can be allocated. If 6 are chosen, the indication bar turns red alerting you that the total has been exceeded. |
Endpoints Management |
|
Endpoints |
Enter the number of endpoints the Device Manager application supports for this tenant. |
16. | Click OK and then click the ZOOM tab. |
17. | Select the ZOOM Enabled check box to enable onboarding of Zoom customers for this tenant. |
18. | Enter the Zoom carrier code. |
For full setup, see Zoom SysAdmin Setup.
19. | Click OK and then click the Operator Connect tab. |
20. | See Configuring Operator Offerings. |
21. | Click the App Registration tab. |
22. | Enter the White Label FQDN: This feature enables Service Providers to request a CCM for white labeling including a Vanity URL and Login Page with a Corporate logo. |
23. | Enter the White Label Display Name: This name is displayed in the login screen. If this field is not defined then the Service Provider tenant name is displayed in the login screen. |
24. | Select the Enable Custom App Registration check box. This feature configures a Landing page for onboarding new customers to join to a specific reseller. |
a. | Configure the following parameters for the unique Service Provider registration: |
◆ | Security Azure Hostname: https://login.microsoftonline.com/ |
◆ | Azure AD Path Type File: |
-Tenant: Local License (check)
-Organizations: Live Platform can access Azure AD in the enterprise network if a standard service is purchased.
◆ | Azure Tenant ID: Tenant ID of the White label reseller |
◆ | Azure Client ID: Application (Client) ID of the White label reseller |
◆ | Azure Client Secret; Client secret of the App registration of the White label reseller |
25. | Click OK; the new tenant is added. |