Trusted Applications

This content is no longer actively maintained. It is provided as is, for anyone who may still be using these technologies, with no warranties or claims of accuracy with regard to the most recent product version or service release.

A typical Microsoft Unified Communications Managed API 2.0 Core SDK application is trusted by Microsoft Office Communications Server 2007 R2. A trusted application is represented by an msRTCSIP-TrustedService object in Active Directory.

There are two types of trusted applications. The two types differ by the type of endpoint used:

  • Communication- and collaboration-enabled applications use ApplicationEndpoint.

  • Middle-tier client applications that emulate Microsoft Office Communicator use UserEndpoint.

Communication- and Collaboration-Enabled Applications

Examples include Automated Call Distributor, Instant Message (IM) Bot, Interactive Voice Response, Conference Bridge, and Personal Virtual Assistant.

An ApplicationEndpoint endpoint designates a service involving communications, possible user interactions, and collaborations. It is represented by a Contact object in Active Directory. It can communicate, using IM or audio, with one or more remote parties, and can collaborate using presence (through Enhanced Presence subscription and publication). ApplicationEndpoint can be assigned a SIP URI and a Dialed Number Identification Service (DNIS) telephone number.

Applications that require multimodal communications or presence must register against Office Communications Server.

ApplicationEndpoint is globally trusted and uses server permissions. It is highly available.

ApplicationEndpoint load balances communications across multiple Front End Servers.

Middle-Tier Client Applications

Examples include Web clients.

A UserEndpoint designates an Information Worker endpoint. An Information Worker is represented by a User object in Active Directory. A UserEndpoint endpoint is assigned an Address of Record (AOR) and registers against Office Communications Server.

UserEndpoint is not globally trusted and cannot impersonate another user or join a conference as a trusted user.

UserEndpoint caches one connection that is used for all its communications and collaborations.