You can use advanced security options to restrict user access to sites, reporting, and real-time functions.
Before you can specify advanced security, you must create security lists (device lists, real-time monitor lists, report lists, site lists, and user lists). Each list must contain the devices, real-time monitors, reports, sites, and users to which employees are granted access. You can combine these lists when you assign a security role. For example, you can specify advanced security that permits users to create Employee Group Performance by Employee reports (specific report list) on Kanata employees (specific device list) only.
Before you can specify advanced security, you must create security lists (device lists, real-time monitor lists, report lists, site lists, and user lists). Each list must contain the devices, real-time monitors, reports, sites, and users to which employees are granted access.
Use the following security lists to define advanced security:
- Device list—Device lists specify devices for which employees may view real-time information. You create device lists to restrict access to statistics on specific employees. For example, you might want a manager to view certain employees only (specific device - Kanata employees). The device list must contain the device (employee group - in this case, Kanata employees) to which the user may gain access. Devices include Account Code Group, Agent group, DNIS group, Employee Division, Employee group, Extension Division, Queue group, Team, Trunk Group, Voice extension group, and Voice mail extension group.
Note:
If you add an agent to a device list, you must also add the associated employee.
- Device list—Device lists specify devices for which employees may view real-time information. You create device lists to restrict access to statistics on specific employees. For example, you might want a manager to view certain employees only (specific device - Kanata employees). The device list must contain the device (employee group - in this case, Kanata employees) to which the user may gain access. Devices include Account Code Group, Agent group, DNIS group, Employee group, Queue group, or Team.
Note:
If you add an agent to a device list, you must also add the associated employee.
- Device list—Device lists specify devices for which employees may view real-time information. You create device lists to restrict access to statistics on specific employees. For example, you might want a manager to view certain employees only (specific device - Kanata employees). The device list must contain the device (employee group - in this case, Kanata employees) to which the user may gain access. Devices include Account Code Group, Agent group, DNIS group, Employee group, Queue group, Team.
- Report list—You create report lists to restrict users from viewing specific report types. For example, you might want managers to view employee reports only (specific report category). The report list must contain the reports the user may run. If you do not assign a report list to the employee, then the employee will see every YourSite group and team when running reports and monitoring real-time activities (unless a basic security role is assigned to that employee that does not permit the employee to gain access to any reports).
- Profile list—You create a profile list to restrict users from managing specific real-time monitor profiles.
- Site list—You create a site list to restrict users to accessing only certain sites.
- Real-time monitor list—The real-time monitor list specifies real-time monitors to which you are granted access. You create a real-time monitor list to restrict access to particular real-time monitors. The real-time monitor list must contain the monitors that the user will access.
- User list—You create a user list to restrict a user from chatting online with certain employees. The user list must contain the employees with which the user may chat. For example, you might want managers to chat online with only the employees they supervise. If Jane manages Bill, Sue, and George, then you assign Jane an advanced security role that permits Jane to chat with Bill, Sue, and George (the user list would contain Bill, Sue, and George).
- Card design list—You create a card design list to restrict users from managing card designs (card designs specify the information displayed on agent, employee, and extensionagent and employee real-time monitors).
If you are using Windows Authentication, you must also enable the following browser settings:
- Under Internet Options > Security, enable ‘Automatic logon with current user name and password’
- Under Internet Options > Advanced, enable ‘Enable Integrated Windows Authentication’
To create a security list
- Under the Enterprise pane, click Security list. This displays a pane with the type of security list you want to create.
- Select the security list you want to add and click Add. A selection dialog appears displaying the Device Type
- Select the check boxes of the group you want to include in the device list. Click OK.
- Enter the list Name.
- Enter the list Description.
- Click Save to save the changes.
To delete a security list
- Under the Enterprise pane, click Security list.
- Select the security list you want to delete and click Delete.