Microsoft Teams Direct Routing is a feature that allows organizations to connect their existing phone systems to Microsoft Teams. It enables them to use their own equipment, like PBXs and analog devices, alongside Teams for making and receiving calls. This means they can keep using their familiar phone setup while also taking advantage of the collaboration and communication features in Teams. It's a flexible solution that works well for organizations that want to integrate their current phone systems with Teams, even if they are in different locations or have contracts with different phone service providers.
Sounds simple enough, right? Unfortunately, everything is a bit trickier in the Gov Cloud.
Today, we're embarking on a journey into the intricate world of Direct Routing in Office 365 GCC High environments – the secret sauce that brings Session Border Controllers (SBCs) and Microsoft Teams Phone together. But hold on, because I've got some wisdom to share that will hopefully make this ride a little smoother: you've got to pick the right Root Certificate Authority (CA) when grabbing those certificates for Direct Routing.
In the world of Office 365 GCC High, Microsoft has laid down some strict rules about which root CAs get the green light for certificates in Direct Routing. It's like having a rulebook for a board game – you want to play by the rules because Microsoft won't play at all if you don't.
In recent times, there's been a shake-up in the Commercial Cloud environment. Microsoft started waving goodbye to the trusty "Baltimore CyberTrust Root" in Azure's TLS certificate lineup back in August 2020. It's been a slow dance, reaching its peak in 2022, with all those brand-new Azure TLS/SSL endpoints proudly showcasing updated certificates tied to the fresh-faced Root CAs. But here's the kicker – this grand evolution skipped over the Direct Routing configuration in Microsoft GCC High. As of today, the documented requirement is still DigiCert Global Root CA and DigiCert High Assurance EV Root CA.
Let's talk about traps. When you go to the DigiCert's portal for a certificate, be cautious. The default setting will nudge you towards a G2 certificate. Spoiler alert: G2 certificates don't play nice with Direct Routing in Office 365 GCC High. To sidestep this digital dilemma, pick "DigiCert Global Root CA" from the dropdown menu during certificate creation. Also, keep using that trusty "Baltimore CyberTrust Root" for now in your configuration.
By sticking with the DigiCert Global Root CA during certificate creation and keeping your SBCs in tune with the "Baltimore CyberTrust Root," you're on the road to success with Direct Routing in Office 365 GCC High. But let's keep in mind that Microsoft is always fine-tuning their cloud game, and I believe that in the future, Direct Routing in GCC High will sync up with Commercial Azure TLS Certificate requirements. Keep your tech radar sharp, stay updated with Microsoft's references, and you're good to go.
Unlock the Future of Communication and Collaboration Are you ready to transform your communication and collaboration strategy? Contact Summit 7 today to explore the possibilities that Microsoft Teams GCCH and Direct Routing can offer your organization