Product Documentation
    • 17 Feb 2023
    • 12 Minutes to read
    • Contributors
    • Dark
    • PDF

    Product Documentation

    • Dark
    • PDF

    Article summary


    Here you will find technical documentation, release notes, and other supporting documents to help you find solutions or learn about Nectar's products and services.

    Technical Notes


    After upgrading to version 2022.1, if you have or plan to manipulate a properties file that uses a file path or directory, then you must verify that you are using the proper backslash (\) or forward slash (/)

    - Use double backslash (\\), for example, :\\<folder|file>
    - Use single forward slash (/), for example, :/<folder|file>

    Use single forward slash (/), for example, /<folder|file>

    General Data Protection Regulation

    You must upgrade to ‘Release 7.2 or later’ to enable the new General Data Protection Regulation (GDPR) audit logging. Logging is enabled by default but can be customized to suit your specific auditing needs. The Apps\etc\log4j2.xml file is used to enable that customization after the upgrade to ‘Release 7.2 or later’.
     The upgrade to ‘Release 7.2 or later’ will back up your existing log4j2.xml file before installing the new version of that file.
    If you have previously customized the log4j2.xml file, you will have to manually migrate those changes to the new log4j2.xml file. Your previous version can be accessed by navigating to Apps\rollback\etc\log4j2.xml AFTER you have upgraded.

    For Information on how to enable auditing to prepare for the GDPR, refer to one of the following guides:

    • Nectar Foundation Installation Guide
    • Central Intelligence Platform (CIP) Install/Upgrade Guide
    • CIP/EIP Administration Guide
    • Remote Intelligence Gateway (RIG) Administration Guide
    • Perspective Administration and User Guide


    All information in this document is subject to change without notice. Although the information is believed to be accurate, it is provided without guarantee of complete accuracy and without warranty of any kind. It is the user's responsibility to verify and test all information in this document and the user accepts full responsibility for all resulting outcomes.


    SRSTP, CMP-RIG, CMP-DA, CMP-CA, Converged Management Platform, CMP, Vendor Knowledge Module, VKM, Vendor Quality Module, and VQM are trademarks of Nectar Services Corp.

    Microsoft, Internet Explorer, Windows, Windows Server, Windows Vista, Win32, and the Microsoft logo, Windows logo, Windows logo (2002), Internet Explorer logo, Lync Logo and Windows start button, are registered trademarks. Lync 2010, Lync 2013, Skype for Business, Windows XP, Windows 2008, Windows 2010, Windows 2012, and Windows 2016 are trademarks of Microsoft.

    CentOS Marks (CentOS 6 and CentOS 7) are trademarks of Red Hat, Inc.

    Oracle, Oracle logo, Java, Solaris, all trademarks and logos that contain Oracle, Solaris, or Java, and certain other trademarks and logos, are trademarks or registered trademarks of Oracle Corporation or its subsidiaries in the United States and other countries.

    Cisco, Cisco Unified Communications Manager, Cisco Call Manager Express, Cisco Unity, Cisco Unity Express, Cisco Unified Border Element, are registered trademarks. Cisco UCM, Cisco CME, Unity, Unity Express, and CUBE, are trademarks of Cisco.

    Avaya® and the Avaya® logo are trademarks of Avaya® Inc. and may be registered in certain jurisdictions.

    All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.

    End User Legal Agreement

    The following are the End User License Agreement ("EULA") terms between Nectar Services Corp. ("Nectar") and the End User ("User"):

    A. LIMITATION OF LIABILITY. Under no circumstances and under no legal theory, whether in contract, tort (including negligence), strict liability or any other theory whatsoever, shall Nectar be liable for any damages that you, the User, may suffer from or in connection with your use of, or inability to use, your equipment, or the Nectar software products. This limitation includes, but is not limited to, damages resulting from loss or theft of data; transmission delays or failures; service interruptions; unauthorized access or damage to records, software programs or other information or property; loss of profits; loss of goodwill; cost of cover; or any other special, incidental, consequential, direct, indirect or punitive damages, however caused. This limitation will apply even if Nectar has been advised of, or is aware of, the possibility of such damages. Because some states or other jurisdictions may not allow for the exclusion of certain warranties or certain forms of liability, some or all of the exclusions set forth in this EULA may not apply. If any of such exclusions are not allowed under the laws of a particular state or other jurisdiction for any reason, then Nectar's maximum liability for any type of damages with respect to any network, equipment or software shall be limited to the amount of the charges paid by the User to Nectar for the software products hereunder, for the twelve (12) month period prior to the occurrence of the event giving rise to such liability. Such limit shall apply to the aggregate of all claims regarding such software products. Nectar does not and cannot control the quality of other parties' networks to which you, the User, or Nectar must interconnect, and disclaims any and all liability that may arise from the performance, including failure, of other parties' networks. In no event shall Nectar be liable for the fraudulent or illegal use of its software products by any of User's employees, agents, consultants or User authorized persons ("User's Personnel") having access to the Nectar software products.

    B. CERTAIN RULES AND LIMITATION OF USE. The User agrees to comply at all times with  any and all applicable local, state and federal law, or the law of any country which may assert jurisdiction over the activity involved. Any content, material, message or data made available or transmitted, wherever it is sent from, viewed, received or retrieved, that is in violation of any applicable law or regulation, is strictly prohibited. You, the User, shall use your best efforts to safeguard the software products provided hereunder, through the implementation of your own Internal Use Policy and Procedure to prevent use of the software products: (i) to breach a computer security system without the consent of the owner, or to gain access to a system, protected or otherwise, without the consent of its owner; (ii) to intercept or cause the interception of, or to disclose, electronic communications, including e-mails; (iii) to post or transmit data which is threatening, obscene, indecent or defamatory; (iv) to post or transmit any data which violates export control laws; or (v) to commit fraud or any other illegal activity. Furthermore, under no circumstances will the User take any action that could result in any harm or damage to: (a) Nectar's network; (b) any other network(s); (c) Nectar's premises; or (d) Nectar's equipment or software. In no event shall Nectar be responsible for either the misappropriation or illegal use of its software products by the User or User's Personnel. User must at all times, conform to this EULA Section B's Certain Rules and Limitations of Use ("Rules") set forth herein, and as amended from time to time. It is important that User review these Rules regularly to ensure that User complies with them. If, for any reason Nectar learns of, or suspects inappropriate or illegal use of its facilities, network, software products, or other networks accessed through User's or Nectar's network, or any other violation of these Rules, then User agrees to cooperate in any resulting investigation by Nectar or the appropriate authorities. If any inappropriate or illegal use is found, and if User fails to cooperate with any investigation of such use, or if Nectar deems such action necessary in its sole discretion to prevent imminent harm to the network or facilities of Nectar or any third party, or disruption to User's or Nectar's services, Nectar may immediately suspend or terminate the software products to User. Furthermore, upon written Notice to User, Nectar may modify or suspend the software products, as necessary, to comply with any law or regulation, as reasonably determined by Nectar. User, on behalf of itself, its affiliates, successors, assigns, officers, directors, and Personnel, agrees to indemnify, defend and hold harmless Nectar, its successors, assigns, officers, directors, employees and agents ("Nectar Indemnified Parties") from and against any and all liabilities, losses, expenses and claims for personal injury or property damage, arising from or relating to any content used or transmitted by User or User's Personnel, made against any Nectar Indemnified Party, or arising from, or relating to, the User or User's Personnel's negligent acts or omissions, willful misconduct or breach of any of User's representations or obligations under this EULA.

    C. SOFTWARE LICENSE; NO RESALE; RESTRICTIONS; ALL RIGHTS RESERVED. Nectar grants to User, a non-licensable, non-exclusive and non-transferable license to use the software, except as provided for under this EULA. The User shall not, in any way, re-sell, license or allow any third party to use the software without receiving Nectar's prior written consent. Except for the limited license rights granted herein, Nectar reserves all rights in the software, and any modifications made thereto, including all title, ownership rights, intellectual property rights, trademark rights, copyrights and software rights ("Proprietary Rights"), and it shall have the exclusive right to protect and enforce its Proprietary Rights in its software products. In furtherance thereof, and to the fullest extent possible under applicable law, the User agrees that it will not: (i) make any copies or duplicates of the software products provided, without the prior written consent of Nectar (except one copy for disaster recovery purposes); (ii) disassemble, reverse assemble, decompile, reverse engineer or otherwise attempt to decipher or reconstruct any source code (or the underlying ideas, algorithms, structure or organization) from the software; (iii) modify or create any derivative works of the software (including, without limitation, translations, transformations, adaptations or other recast or altered version); (iv) use, copy, sell, lease, sub-lease, rent, loan, assign, convey or otherwise transfer the software, except as expressly authorized under this EULA; (v) distribute, disclose or allow use of the software, in any format, through any time-sharing service, service bureau, network or by any other means, to or by any third parties; (vi) delete, alter, add to or fail to reproduce in and on any software product, and any trademark, copyright or other notices appearing in or on any copy, media or package materials provided by Nectar; or (vii) permit or encourage any third party to do any of the foregoing. In the event User breaches any of the Software License Restrictions and Limitations set forth herein and above, Nectar shall provide written Notice to User that if within ten (10) business days of User's receipt of a reasonably detailed written request to cure said breach, the User fails to comply and cure said breach, then Nectar may terminate, effective immediately, the software license granted hereunder, and shall be entitled to exercise all available and permitted rights hereunder. Upon such termination, the User shall immediately pay all outstanding licensing fees and termination charges as may be applicable; and it shall cease use of Nectar's software products. Nectar shall have the right to conduct periodic internal audit review of the User's locations to confirm compliance with the foregoing and to ensure that User is not using the software products in excess of the quantities authorized, or at locations other than authorized.

    D. LIMITED WARRANTY. For a period of ninety (90) days following agreement to these EULA terms and access to the software products, Nectar represents and warrants that the software products will perform in all material respects in accordance with its published documentation, and that at the time of such access, it shall contain no virus, worm, time bomb, Trojan horse or other such disabling or damaging computer code, nor shall use of the software products violate any laws or the rights of any third parties. In the event the accessed software products fail to conform to the foregoing limited warranty, during the limited warranty period, Nectar will, at its option and expense, promptly replace or correct such software product. Subject to the foregoing limited warranty, and in all other respects: (i) the software is provided on an "AS IS" basis; (ii) Nectar does not make and hereby disclaims any and all warranties of any kind, whether express or implied, including, but not limited to, any warranty of fitness for a particular purpose, merchantability, title or any warranty arising from any course of dealing, usage or trade practice; and (iii) Nectar does not warrant that the operation of the software will be uninterrupted or error-free, or that defects in the software will be corrected. The User is solely responsible for determining the appropriateness of the software for your use, and you accept full responsibility for all risks associated with its use.

    E. INDEMNIFICATION. Nectar shall, at its own cost and expense, defend, indemnify and hold harmless User and User's Personnel (collectively, "User Indemnitees") from and against any claim or suit (including reasonable attorneys' fees and expenses) brought against any User Indemnitee to the extent that such action is based on a claim that Nectar's software products, when used in accordance with this EULA, infringes any copyright, trade secret rights or patent rights of any third party ("Infringement") and Nectar shall pay all costs, settlements and damages incurred in connection with any such claim, provided: (a) Nectar shall have sole control of the defense and/or settlement of such claim or suit (except that User may participate in the defense and/or settlement of any such claim with counsel of its own choosing, and at its own expense); (b) User will notify Nectar promptly, in writing, (provided that that any delay or failure of notice shall not relieve Nectar of its obligations except to the extent prejudiced thereby) of each such claim or suit and shall give Nectar all information known to User relating thereto; and (c) User will cooperate with any reasonable request of Nectar in the settlement or defense of any such claim or suit. To the extent that any settlement involves material commitments, responsibilities or obligations on the part of the User, such settlement shall require the prior written consent of the User.

    If all or any part of the software products are, or in the opinion of Nectar may become the subject of any claim or suit for Infringement, or in the event of any adjudication that the software or any part thereof does infringe, or if the use of the software or any part thereof is enjoined, Nectar may, at its expense and discretion do one or more of the following: (i) procure for User the right to use the software products or affected part of the software; (ii) replace the software products or the affected part of the software with non-infringing software providing substantially similar functionality; (iii) modify the software products or the affected part of the software to make it non-infringing; or (iv) if none of the foregoing remedies are commercially feasible, terminate this EULA.

    Nectar shall have no obligation hereunder, to the extent a claim is based upon: (1) the use of any prior version of the software, if such Infringement would have been avoided by use of the then-current software version, which was made available to User by Nectar, and User chose not to use such then-current software version; (2) the combination, operation or use of the software with software or data which was not provided or endorsed by Nectar, if such infringement would have been avoided in the absence of such combination, operation or use; or (3) modification of the software by anyone other than Nectar or a third party acting on Nectar's behalf.

    The foregoing states the User's entire remedy for Infringement of third-party Intellectual Property Rights by the Nectar software products.

    Contact Us

    If you have any questions or suggestions, please contact Nectar Documentation at We value your feedback.

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.

    Eddy, a generative AI, facilitating knowledge discovery through conversational intelligence