Cisco Finesse Release ES8 App User Guide
- June 13, 2024
- Cisco
Table of Contents
Cisco Finesse Release ES8 App User Guide
Cisco Finesse Release 12.5(1) ES8
File Name | MD5 Checksum |
---|---|
finesse-cce.1251.ES08.10000.cop.sgn | f65fae17867faf13ae27680ad4071d1b |
finesse-cce.1251.ES.Rollback.cop.sgn | 36011ee0a6f12de6b39eaaaa67369d2d |
Valid Upgrade Paths
Cisco Finesse Release 12.5(1) ES8 is delivered as a Cisco Option Package (COP) file. You can only apply this COP file to systems that have Cisco Finesse Release 12.5(1) FCS installed or any previous 12.5(1) ES.
Installing Finesse Release 12.5(1) ES8
You must perform the following procedure first on the primary Finesse node and then on the secondary Finesse node.
IMPORTANT: You must use the CLI to perform this upgrade. Do not use the Cisco Unified
Operating System Administration page to perform this upgrade or the
installation may not proceed.
Installing this ES or performing a rollback stops and restarts certain Finesse
services. To avoid interruption, perform the installation or rollback during a
maintenance window.
During ES installation and rollback, ensure that the SSH session is alive
throughout the installation process. If not, installation will not be
successful.
-
Download finesse-cce.1251.ES08.10000.cop.sgn to an SFTP server that can be accessed by the Finesse system.
-
Use SSH to log in to your Finesse system with the platform administration Account.
-
Access the CLI and run the following command: utils system upgrade initiate
-
Follow the instructions that appear on your screen.
When prompted, provide the location and credentials for the remote file system (SFTP server).
Note: The COP file performs a check to ensure that Cisco Finesse Release 12.5(1) is installed. If this release is not found on your system, an error is displayed, and the installation does not proceed. -
When presented with a list of available upgrade options, select finessecce.1251.ES08.10000.cop.sgn.
-
After installation is complete, restart the system using the command: utils system restart
-
To verify that Finesse is now running the correct release, access the CLI using the Administrator credentials and enter the following command: show version active Ensure that finesse-cce.1251.ES08.10000.cop.sgn is listed as an Optional package. Otherwise, contact Cisco Technical Support.
-
Check that the installation is successful by signing into Finesse (https://FQDN-of- Finesseserver:8445/desktop).
Note: Ensure that you clear the browser cache.
Rollback
If there is a problem with the installation, you can roll back to the previous
version as follows:
Note: The Finesse Rollback COP file restores your system to the base
Finesse Version (in this case, Cisco Finesse Release 12.5(1)).
- Download the file finesse-cce.1251.ES.Rollback.cop.sgn to an SFTP Server that can be accessed by the Finesse system.
- Use SSH to log in to your Finesse system with the platform administration Account.
- Access the CLI and run the following command: utils system upgrade initiate
- Follow the instructions that appear on yourscreen. When prompted, provide the location and credentials for the remote file system (SFTP server).
- When presented with the list of available upgrade options, select finessecce.1251.ES.Rollback.cop.sgn
- After rollback is complete, restart the system using the command: utils system restart
- To verify Finesse is now running the correct release, access the CLI using the Administrator
credentials and enter the following command: show version active
Ensure that finesse-cce.1251.ES.Rollback.cop.sgn is listed under Optional packages. Otherwise, contact Cisco Technical Support.
Note: Ensure that you clear the browser cache.
Resolved Caveats and Feature Updates in Release 12.5(1) ES8
Defect ID | Description | Severity |
---|---|---|
CSCvv54659 | Random teams lost mapping with the desktop layouts, reason codes | |
etc and forced to default settings | 2 | |
CSCvy87804 | ASC gadget Queue mgmt tab not working due to big header size | 3 |
CSCvy95309 | Webproxy Error.log needs log rotation | 3 |
CSCvz44053 | Finesse Desktop get stuck when TPG refreshes | 3 |
CSCvy52741 | Finesse Contact List(Phonebook) usability issue due to current | |
scrollbar behavior | 3 | |
CSCvz35707 | Some shortcut keys not working in Windows | 4 |
Resolved Caveats and Feature Updates in Release 12.5(1) ES7
Defect ID | Description | Severity |
---|---|---|
CSCvw75958 | Information Disclosure via error message | 3 |
CSCvw95489 | ECE gadget not loading due to finesse url with port443 pattern | |
unavailable in shindig allowed origins | 3 | |
CSCvw95590 | After Reload or Re-login Default Desktop Layout is getting loaded | |
instead of Team Specific Layout | 2 | |
CSCvy67682 | Phonebook entry size should be increased in agent desktop | 6 |
CSCvu05151 | Not able to collect log of node2 from RTMT connected with Node1 | |
and vice versa | 3 | |
CSCvx68660 | Agents getting disconnected in Chrome 88+ | 2 |
CSCvx41290 | SSO agents able to authenticate to FIPPA interface with Non-SSO | |
credentials | 3 | |
CSCvt63305 | Enable the End Call button for MA | 3 |
CSCvw82295 | We found that username and another sensitive information were | |
disclosed in URL via get parameter during data transmission. | 3 | |
CSCvv68315 | Cisco Finesse Cross-Site Scripting Vulnerabilities | 3 |
CSCvy64178 | 10 second interleaved XMPP ping causes high CPU on load | 3 |
Resolved Caveats and Feature Updates in Release 12.5(1) ES6
Finesse Notification Service
Finesse Notification Service is proxied locally by the Webproxy service. The
Webproxy service is required to access both Finesse API and Notification
services.
Note: Third-party XMPP clients of the Finesse Notification Service must
issue keep alive pings to ensure that the connection stays alive.
Note: Cisco Finesse deployments with more than 1250 concurrent users
connected to a single Finesse cluster should use the default Websockets
notification mechanism.
Removed and Unsupported Features
Context Service Management
The Context Service Management feature is removed from the Cisco Finesse APIs.
Resolved Caveats and Feature Updates in Release 12.5(1) ES5
Defect ID | Description | Severity |
---|---|---|
CSCvw29409 | Finesse Teams lose mapping to Reason Codes and Phone Books | 2 |
CSCvu09289 | TestSSO shows unexpected page containing html tags for Finesse | |
VM’s | 4 |
Resolved Caveats and Feature Updates in Release 12.5(1) ES4
Defect ID | Description | Severity |
---|---|---|
CSCvu72410 | With active email when agent does relogin – Customer Journey is | |
not shown in CEJ | 6 | |
CSCvu68332 | Two Agent dn details are showing in intercept Drop intermittently | |
in case of secure conf monitoring | 3 | |
CSCvs93789 | UCCE: Wrap Up Timer counts down slower than actual time | 4 |
CSCvu92622 | get*ReasonCodes JavaScript API null entries | 3 |
CSCvv19884 | Unable to login agent into FIPPA phone after apply ES Cop ES | |
Cop:1201ES04 | 2 | |
CSCvt90362 | Setting openfire notification port enable/disable shows wrong | |
status in CLI | 3 |
Drop Participants from Finesse Desktop
The Drop button is displayed on the call control area only if the
administrator has set the permission for an agent or supervisor to drop
participants from the conference call.
For more information to drop participants from Finesse desktop see, Intercept
a Call section in the Common Tasks chapter of Cisco Finesse Agent and
Supervisor Desktop User Guide, Release 12.5(1) at
https://www.cisco.com/c/en/us/support/customer-collaboration/finesse/products-
user-guide-list.html.
Desktop Property Updates
The administrator can set permission to allow an agent or a supervisor, who is
the participant in a conference call using the Finesse desktop, to drop other
agents, supervisors, or non-agents from the conference call.
The desktop property to drop participants from a conference call are:
- enableDropParticipantFor— This property is used to set permissions to allow the agents, supervisors, or both to drop other participants from the conference call. The possible values for the enableDropParticipantFor property are:
- supervisor_only— (default value) Only the supervisor, who is a participant of the conference call, can drop other agents in the conference call.
- conference_controller_and_supervisor—The supervisor who is a participant of the conference call or an agent who initiated the conference call (conference controller) can drop other participants.
- all—Any agent or supervisor who is a participant of the conference call can drop other participants.
- dropParticipant—This property controls the listing of agents and non-agents in the Drop options list of participants in the Finesse desktop. The possible values for the dropParticipant property are:
- agents— (default value) The agents or supervisors who are participants of the conference call are displayed in the Drop options list of participants in the Finesse desktop.
- all—The agents, supervisors, CTI Route Point, IVR port, a device to which no agent is signed in, or a caller device in the conference call are displayed in the Drop options list of participants in the Finesse desktop.
For more information see, Drop Participants from Conference section in the
Manage Desktop Layout chapter of Cisco Finesse Administration Guide, Release
12.5(1) at
https://www.cisco.com/c/en/us/support/customer-collaboration/finesse
/products-maintenanceguides-list.html.
Restricting Access to the External XMPP Notification Port 5223
Use the following CLI commands to restrict the IP addresses from accessing the
TCP-based XMPP notification port (5223) available for external client
connectivity.
Note:
-
These restrictions do not affect the desktop XMPP notification port 7443.
You can add, delete, or view the configured IP addresses only when the enable External Notification Port Access property is enabled on all the Finesse nodes in the cluster. Toenable access to port 5223 use the CLI command utils finesse set property webservices enable External Notification Port Access true. -
utils finesse notification external port access add [ip1,ip2,ip3]— This command adds one or more IP address(es) to the list of hosts that are configured to access Cisco Finesse XMPP notification port 5223. Multiple IP addresses can be provided as a comma-separated list.
-
utils finesse notification external port access delete— This command deletes one or more IP address(es) from the list of hosts that are configured to access Cisco Finesse XMPP notification port 5223. Multiple IP addresses can be provided as a comma-separated list.
-
utils finesse notification external_ port access delete all— This command deletes all the configured IP addresses allowed to access the Cisco Finesse XMPP notification port 5223.
-
utils finesse notification external port access list— This command lists all the configured IP addresses allowed to access the Cisco Finesse XMPP notification port 5223.
CLI Name Change
From Cisco Finesse Release 12.5(1) ES4 COP onward, all references to whitelist
in the CLIs are changed to allowed_ list.
Prior to Release 12.5(1) ES4 COP | Later to Release 12.5(1) ES4 COP |
---|---|
utils finesse gadget source check whitelist add | util s finesse gadget |
source check allowed list add
utils finesse gadget source_ check whitelist delete| utils finesse gadget
source check allowed_ list delete
utils finesse gadget _source _check whitelist list| utils finesse gadge
t_source_check allowedlist list
utils finesse frame access_ whitelist add| utils finesse frame _access
_allowed _list add
utils finesse frame access whitelist delete| utils finesse frame _access
_allowed _list delete
utils finesse frame access whitelist list| utils finesse frame access
allowed_ list list
Resolved Caveats and Feature Updates in Release 12.5(1) ES3
Defect ID | Description | Severity |
---|---|---|
CSCvt63305T | Disabling END call button causes Mobile agents to fail to end | |
Consult transfer calls. | 3 | |
CSCvs97990 | Domain is not considered to form FQDN of AWDB while finesse and | |
UCCE are in different domain. | 3 | |
CSCvt49980 | WXM Token fetch failure with 4xx RC returns certificate error in | |
response instead of actual 4xx RC. | 3 | |
CSCvu41099 | Finesse Supervisor Queue Data shows only 5 queue at a time. | 6 |
CSCvt65034 | Finesse 12.5 – Finesse agents do not reflect team specific desktop | |
layout. | 3 | |
CSCvj58268 | UCCX: finesse workflow; browser pop action not reflecting DNIS. | 2 |
CSCvu68325 | Title of the ‘Customer Journey Gadget’ is missing When you expand | |
the gadget from Agent Desktop | 3 |
Permissions to Drop Participants from Conference Use the following commands to allow an agent or a supervisor, who is the participant in a conference call, to drop another agent, supervisor, or caller (participants) from the conference call.
Note: Only agents and supervisors can drop participants in the conference call.
utils finesse set property webservices enable Drop Participant For supervisor only— This command allows only the supervisor, who is a participant of the conference call, to drop other agents in the conference call. The supervisor cannot drop a CTI Route Point, IVR port, a device to which no agent is signed in, or a caller device. By default, this property is set to supervisor _ only.
- utils finesse set property webservices enable Drop Participant For conference controller and supervisor— This command allows,
- the supervisor to drop any agents, CTI Route Point, IVR port, a device to which no agent is signed in, or a caller device in the conference call.
- the conference controller (an agent who initiated the conference call) to drop another agent, supervisor, CTI Route Point, IVR port, a device to which no agent is signed in, or a caller device in the conference call.
- utils finesse set_property webservices enable Drop Participant For all— This command allows any agent or supervisor in the conference call to drop another agent, supervisor, CTI Route Point, IVR port, a device to which no agent is signed in, or a caller device in the conference call.
Dialog—Drop Participant from Conference API
Cisco Finesse, Release 12.5(1) ES3 COP or higher permits an agent or
supervisor, who is the participant in a conference call, to drop another
agent, supervisor, or caller (participants) from the conference call.
This feature is only available for supervisors by default. The Finesse CLI can
be used to enable the
Dialog—Drop Participant from Conference API to agents and also to allow
dropping other non-ACD participants from the call.
Supported Content Security Policy Directives
Content Security Policy (CSP) is a standardized set of security directives
that can inform the browser of the policies to be used to help mitigate
various forms of attacks. CSP frame-ancestor policy defines the allowable
locations from where the Finesse desktop can be accessed as an embedded HTML
content, which can help prevent click-jacking attacks.
Use the following CLI commands to view, add, or delete the frame access
sources in the response header of all the Cisco Finesse URLs within their HTML
pages. This ensures only the valid sources configured will be able to embed
the Cisco Finesse URLs in their iFrame.
Note: Internet Explorer does notsupport frame-ancestors, and therefore
will not block any web sites running on Internet Explorer, from loading Cisco
Finesse within it.
- utils finesse frame_access_whitelist add [source1,source2]—This command adds one or more frame access sources (webpages), thereby allowing the configured sources to embed the Cisco Finesse URLs in their iFrames. Multiple sources can be provided as a comma-separated list. The source should be of the following format:
- https://
:[port] - https://IP:[port]
- https://
:port,https:// :port
- https://
Note: Wildcard character * is also supported for the FQDN and port entries, which indicates that all the legal FQDN or ports are valid.
- utils finesse frame_access_whitelist delete— This command lists the choices for deleting theframe access sources (webpages). The choice should be an index as displayed from the list ofallowed frame access sources. The list provides the option to delete a single source or all configured sources.
- utils finesse frame_access_whitelist list— This command lists all the frame accesssources (webpages).
Resolved Caveats and Feature Updates in Release 12.5(1) ES2
Defect ID | Description | Severity |
---|---|---|
CSCvu02913 | XMPP Notification namespace changed from |
‘http://jabber.org/protocol/pubsub’ to ‘urn:xmpp:push:0’.| 4
IP Address or Hostname or Domain Name Change
Administrator can change the IP address or hostname or domain name of the
Cisco Finesse cluster nodes in your deployment has been introduced.
Note:
- If the certificates are invalid or have expired, you must renew the certificates before using the CLI set network hostname.
- If you want to apply Rollback COP after changing the IP address or hostname or domain name, then revert to the previous IP address or hostname or domain name.
For more information on the detailed procedure, see the Manage IP Address and
Hostname section in
Cisco Finesse Administration Guide, Release 12.5(1) at
https://www.cisco.com/c/en/us/support/customer-collaboration/finesse
/products-maintenance-guideslist.html.
Agent Skill Target ID
The skill ID associated to the agentsigned in, is available in the User API
response, User JavaScript object,
and gadget configuration. This API is supported only for Unified CCE
deployments.
- The following field has been added to the response of User REST APIs:
- skill Target Id—The Skill Target ID assigned to the agent in the Unified CCE Database.
The following are the updates in the JavaScript APIs:
- finesse. gadget. Config—Added a field cce Skill Target Id which refers to the skill ID of the user.
- finesse.restservices.User—Added a function get Skill Target Id() which retrieves the skill ID of the user.
Resolved Caveats and Feature Updates in Release 12.5(1) ES1
Defect ID | Description | Severity |
---|---|---|
CSCvs63882 | Agent2 desktop throws error when agent1 initiates & completes the | |
transfer from Phone. | 3 | |
CSCvs67331 | Agent Extension details are not retained on login page after | |
browser restart. | 3 | |
CSCvs84446 | Scrollbar in maximized gadgets and width difference in page-level | |
and nav-level gadget containers. | 3 | |
CSCvs73491 | Chrome 80 breaks Cisco Finesse Single Sign-On APIs for third-party | |
integrations. | 6 | |
CSCvh92040 | [ENH] Finesse – Throttling mechanism for DTMF request flood. | 6 |
CSCvt01050 | Restrict use of port 5223 to avoid throttling. | 6 |
CSCvt12626 | Cisco Web Proxy service down after upgrading UCCX from 12.0 to | |
12.5. | 3 | |
CSCvt21004 | Support consumption of finesse /sso/token api across multipletabs | |
in same browser instance. | 6 | |
CSCvt20801 | Association of resources to teams are not allowed in PCCE. | 3 |
Enable or Disable Plain XMPP Socket—Port 5223
CLI commands have been introduced to facilitate the modification of
configuration properties with ease.
Use the following CLI commands to enable or disable the external access of the
Cisco Finesse Notification Service TCP-based XMPP port (5223). The port can be
enabled for external client connectivity only if you have third-party
solutions that connect directly to the Finesse Notification Service over this
port. By default, the port is enabled (value is set to true).
When the port is enabled, it can be accessed between the Cisco Finesse nodes
(primary and secondary) and also outside the Cisco Finesse clusters. When the
port is disabled, it can be accessed only between the Cisco Finesse primary
and secondary nodes.
- utils finesse set_property webservices enable External Notification Port Access true: Enables access to 5223 port, which provides external clients with TCP based XMPP connectivity to notifications provided by the Cisco Finesse Notification Service.
- utils finesse set_property webservices enableExternalNotificationPortAccess false: Disables access to 5223 port, which provides external clients with TCP based XMPP connectivity to notifications provided by the Cisco Finesse Notification Service.
- utils finesse show_property webservices enable External Notification Port Access: Displays the current access status to 5223 port, which provides external clients with TCP based XMPP connectivity to notifications provided by the Cisco Finesse Notification Service.
Note:
-
* The external Notification port is used by an alternate node in the Finesse cluster and disabling it will only prevent third-party clients from connecting to it.
- Fine-grained access to this port based on client IP can be achieved using the utils finesse notification external_port_access CLI.Dual-Tone Multi Frequency (DTMF) Desktop Behavior
CTI communication architecture has been optimized in Cisco Finesse Release 12.5(1), which has introduced changes in the Finesse API behavior. As a result of this change, it is suggested that call control requests for the same device should not be sent to the Finesse server until the response to a previous call control request has been received. Multiple DTMF requests can however be send one after another, and the server queues them up for you without any error.
To prevent CTI errors, the Finesse desktop disables call control buttons such as Hold, Transfer, Consult, Wrap-Up, and End across all calls when the DTMF Keypad is opened until the responses to all of the DTMF requests have been completed or timed out. It is suggested that third-party clients follow the same design. The number of outstanding DTMF requests and the timeout duration can be configured using the Finesse CLI.
DTMF Pending Requests Threshold Count
DTMF Keypad prevents new operations when network or server slowness results in more than configured number of (default of 20) outstanding response to previous DTMF requests are awaited. This number can be configured using properties CLI.
-
To configure the DTMF threshold count for pending requests:
utilsfinesse set_property desktop pendingDTMFThresholdCount -
To view the configured DTMF threshold count:
utils finesse show_property desktop pendingDTMFThresholdCount
DTMF Request Timeout
Cisco Finesse waits for a configured time for each DTMF pending request.
- The default timeout is 5 seconds.
- To configure the DTMF timeout for pending requests:
utils finesse set_property desktop dtmfRequestTimeoutInMs
Note: These DTMF desktop properties can be customized at team level desktop properties configuration. For more information, see Customize Desktop Properties in Cisco Finesse Administration Guide at https://www.cisco.com/c/en/us/support/customer-collaboration/finesse /products-maintenance-guideslist.html.
SSO Desktop Updates
SSO Desktop Updates
- In SSO mode the access token and refresh tokens are changed to ‘httponly’ mode cookies for security reasons.
SSO Developer Updates
- Cisco Finesse REST APIs are enhanced to get the access token and refresh tokens in the response body.
- Third-party clients who were relying on the SSO cookie values must change their JavaScript APIs to use the enhanced Finesse REST APIs.
- Fetch Access Token API endpoint (https://finesse1.xyz.com/desktop/sso/token) has a new optional parameter return_refresh_token=true|false to get the refresh token in the response body.
Note: When you use the return_refresh_token=true query parameter in
Single Sign-On— Fetch Access Token API, access token and refresh token cookies
are not added to the response.
All information is provided as part of the response body, which can be
directly used by the thirdparty clients. Use this query parameter when third-
party clients use Cisco Finesse SSO APIs alongside Finesse desktop in the same
browser. Using this query parameter prevents agent logging out from Finesse
desktop due to the override of the desktop cookie due to third-party client
activity.
- On Refreshing existing access token, use the new optional parameter refreshtoken= along with the existing token in the query parameter.
Note: If the token was initially fetched with the return_refresh_token=true query parameter, then the refresh token in request payload is mandatory.
Fix for Vulnerabilities in jquery, jquery-migrate & jquery-ui libraries
To fix the XSS related vulnerabilities for jquery, jquery-migrate and jquery-
ui, Finesse has done the following:
- Upgraded the jQuery version to: 1.12.4 and jquery-migrate to: 1.4.1. These addresses certain reported CVEs (Refer the related Defect notes for more details about addressed CVEs).
- Specific code fixes are backported to address remaining CVEs (which are not covered in step: 1) which are reported for both the libraries, that is, jquery and jquery-ui.
Fix Vulnerabilities in Bootstrap library
To fix the XSS related vulnerabilities for Bootstrap, Finesse has done the
following:
- Code fixes are backported to address reported CVEs (Refer the related Defect notes for more details about addressed CVEs) for Bootstrap library.
BOM for jQuery and Bootstrap for Finesse
Finesse JavaScript API Documentation Updates For other API documentation improvements, refer to the Cisco Finesse 12.5(1) JavaScript API documentation on Cisco Devnet.
Bug Search Tool
To access the Bug Search Tool, go to https://bst.cloudapps.cisco.com/bugsearch/ and log in with your Cisco.com user ID and password.
References
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>