Skip to end of metadata
Go to start of metadata
You are viewing an old version of this page. View the current version. Compare with Current ·  View Page History

The call logger is extremely easy to protect and offers plenty of scope for keeping unauthorised users from accessing your valuable call data.

Briefly, there are two methods of protection: console based (to protect the actual application) and network-based (to allow only particular information to reach certain clients).

Both methods require the main administrator to setup users and passwords using a simply entry screen as shown below:

Protection method

This screen is accessible from the View ? Users & Passwords... menu.

Add a user by clicking the button, then entering the details into the new window that appears...

Protection method

Using this simple entry screen, you can set each of the two methods of protection by following the procedures here:

Console Locking

Set up a user with a username console (in lower case), choose a password, then select (Console Access) from the Extension Group drop-down list. Click on the Add button, and the user will appear in the list. Only one user (named console) can be setup for console access.

Web Username restrictions

When running reports, the extension groups that are accessible can be forcibly restricted to a single group. This is most often used in an organisation where a department manager is given access only to his/her own information, and no-one else's.

Additionally, any number of users may be setup who may access all extension groups' data.

To setup a user who may only view a single group of extensions, simply click on the Add User button on the Users & Passwords screen (as described above). In the Add User box that appears, enter a username and a password of your choice, but from the Extension Group drop-down list, choose the extension group to whom this user is granted access.

To add a user who may access all extensions, leave the Extension Group drop-down list empty (the default), or select the blank item at the top of the list.

A user who has access to all extension information will be shown in the User List with a yellow smiley-face icon (), as opposed to a restricted user, a double human head & shoulder symbol ().

Labels: