There is no mechanism in the Cisco UC portfolio to 'discover' devices and other applications. Any application that will be integrated in the UC portfolio will have to be peered with the other products. By "peered", I mean that there will need to be configuration on both sides for communication to be established. The reason for this is security. If a UCM discovered a rogue CUC or AD, then that would compromise the overall solution. So from a UCM perspective, you must define the IP/name of the peer applications or you must define an application user to be used by the peer application. This ensures that only trusted applications will be communicating with UCM and vice versa.
Technical Marketing Engineer