Please enable JavaScript to view this site.

UC Module

> Overview

Password Authentication (Referred Authentication)

Scroll Prev Up Next More

The password authentication for access to the services hosted by the server can use either each services' own security settings or use the security user accounts configured for the Management Services service running on the Unified Communications Module.

The Enable referred authentication setting controls the method used.

These settings are only accessible if logged in via referred authentication or as the local Linux root. Therefore, when disabled, the setting can only be re-enabled by logging in using the local Linux root name and password.

This is the default for new installation. When enabled, the security settings of the Management Services service running on the Unified Communications Module control access to the following other services:

Web control menus

Voicemail Pro admin

one-X Portal for IP Office admin

IP Office Web Manager

With referred authentication disabled, each service controls access using its own local account settings.


For servers upgraded from pre-IP Office Release 9.0, the default authentication used depends on the status of the web control Administrator password:

If the Administrator password is still default, the server defaults to Enable referred authentication.

If the Administrator password is not default, the server does not default to Enable referred authentication.


Performance figures, data and operation quoted in this document are typical and must be specifically confirmed in writing by Avaya before they become applicable to any particular order or contract. The company reserves the right to make alterations or amendments at its own discretion. The publication of information in this document does not imply freedom from patent or any other protective rights of Avaya or others. All trademarks identified by ™, ® or © are registered trademarks or trademarks respectively are the property of their respective owners.

Use of this site indicates acceptance of its cookies and analytics, and acceptance of the Avaya privacy policy.

© 2022 Avaya
Issue 16.d.-
Thursday, February 17, 2022