Author: Adrien Plessis

Using Powershell 3.0 and REST to access Sonus SBC1000/2000

Summary

Since release 3.0 of Sonus SBC 1000/2000 firmware, REST license is free of charge and you can use it for multiple scenarios.

REST APIs are provided for developers who want to programmatically integrate the Sonus SBC 1000/2000 into their applications, and for administrators who want to script interactions with the Sonus SBC 1000/2000.

One of these scenarios is scripting provisioning, that allows you to program multiple SBCs with same parameters, in a one shot execution instead of having to program manually one by one each SBCs.

This is often the case when you need to deploy multiple SBCs in a same country, creating the same routing and transformation tables manually each time.

Here are some quick start tips to let you easily jump into REST programming through Microsoft Powershell.

Continue reading

Lync 2013 Databases and Replication

Summary

Databases and Replication are the dorsal spine of every Lync deployment since Lync server 2010. They allow a Lync environment to have only one configuration tools set (Topology Builder and Control Panel). They are used to share the information between the server, the pool and the sites, without them nothing can work on your Lync environment, but there isn’t a lot of information about it on the Web. Here is a dive into those processes that make Lync so efficient.

Continue reading

Update Microsoft certificate authorities to use the SHA-2 hashing algorithm

Summary

Microsoft is announcing a policy change to the Microsoft Root Certificate Program. The new policy will no longer allow root certificate authorities to issue X.509 certificates using the SHA-1 hashing algorithm for the purposes of SSL and code signing after January 1, 2016. Using the SHA-1 hashing algorithm in digital certificates could allow an attacker to spoof content, perform phishing attacks, or perform man-in-the-middle attacks.

Recommendation: Microsoft recommends that certificate authorities no longer sign newly generated certificates using the SHA-1 hashing algorithm and begin migrating to SHA-2. Microsoft also recommends that customers replace their SHA-1 certificates with SHA-2 certificates at the earliest opportunity.

Continue reading