TIM Base

Basic functionalities of the TIM8 server

The basis of all modules is the TIM8 Base Server, which is accessible via a modern WebGui and is multilingual (DE/EN) (other languages on request). The server is monitored via SNMPv3 and a flexible role and permission system for end users, application users and administrators guarantees the secure use in all possible scenarios. All modules are based on a flexible license model, where the customer can individually choose the number of licenses and required modules.

The use of TIM in multi-cluster environments is given as well as the parallel administration of Cisco Unified Communications Mangers with different version levels. For rollout and deployment all common data sources (AD, LDAP, SQL, CSV file, etc.) can be used with the capability of continuous synchronization.

Multi-tenant capability

Multi-tenant capability (XMPP / SMTP per tenant, assigning licenses per tenant), no limitation in the number of groups, group pictures. The multi-tenant capability is based on a role-based permissions concept, which allows to assign individually defined roles and permissions to defined groups and users. This function is the basis of all modules and functions of TIM8.


Single Sign On (SSO)

With the Single Sign On feature of TIM8 it is possible for users to directly log in to TIM8 and their Jabber client after a single login to their PC without having to enter login information again.


Reporting

With TIM8 Reporting, reports can be created from the data available in TIM8. The data sets, search parameters, parameter names, sequence and sorting can be freely selected. Furthermore, reports can be automatically generated via the cronjob/scheduler module. With recurring execution e.g. daily updated inventory lists or number directories can be created. The permission system of TIM8 ensures that a multi-tenant capable and audit-proof reporting is achieved.


TCL Engine (TIM Provisioning necessary)

With the TIM8 TCL Engine even more network components can be managed via processes. Examples are port changes on switches or configuration changes on SRST routers. The TCL Engine can access all systems (independent of manufacturer) which can be administrated via a console access.


Certificate management, TLS (none / basic / strict)

With the integrated certificate management, certificates can be managed and the setting of security levels for communication with other systems can be configured.


TIM Shell

The TIM Shell is intended for the initial installation and for emergencies, if you do not (yet) have access to the graphical user interface (GUI) of the TIM8 server The TIM Shell uses the command line input with parameters common among administrators to perform basic configurations. Additionally the TIM Shell provides some tools for troubleshooting e.g. for backups, cluster operation and network.


Multi-group local Administrator

TIM8 provides local administrators, which can be created independently from CUCM or AD users and exist exclusively in the TIM realm. This enables the extensive use in shared environments and outsourcing projects.


Performance Statistics

For applications where no central monitoring via SNMP is available, TIM8 provides extensive performance statistics. From the data throughput of the network cards to the utilization of the server CPUs, administrators can inform themselves about all system parameters at any time.


TIM8 REST API - Access to the CISCO UC world

TIM8 is the first product on the market to offer a REST API, which allows third party systems (e.g. ITSM systems like ServiceNow) to obtain relevant data for further processes from the CISCO UC world. This takes place in real time, is fully documented and based on the quasi-standard Swagger.


Audit-proof log

Audit-proof logs/protocols are indispensable in medium and large environments. TIM8 contains a complete record of all actions on the TIM8 server, in the TIM8 cluster and with all connected external systems. Since the records can be searched in detail, irregularities on the TIM server or in the communication with third-party systems can be detected quickly and errors can be corrected immediately.