...
Both methods require the main administrator to set up the users and passwords using the entry screen.
Console Locking
Access the top-left menu and select
->
Referencemacrokeywordmacro |
---|
|
. In the new window that appears
, click on the
button to add a new user. Screenshotmacro |
---|
Border | false |
---|
Shadow | false |
---|
URL | /download/attachments/72419907242077/protectionadd_method_1button.png |
---|
|
The following window will pop up: button to add a new user. Screenshotmacro |
---|
Border | false |
---|
Shadow | false |
---|
URL | /download/attachments/7241990/protection_method_21.png |
---|
|
Within this the new screen , you can configure each of the two methods of protection, by following the procedure below:
Console Locking
Set that pops up, set up a user with the username
(all characters in lower case), enter a password, then select
(Console Access) from the
Extension Group drop-down list. Click on the
OK button to add the console user to the list.
Info |
---|
Only one user named can be setup for Console Access. |
HTML |
---|
<p>Briefly, there are two methods of protection: console based (to protect the actual application) and network-based (to allow only particular information to reach certain clients).</p>
<p>Both methods require the main administrator to setup users and passwords using a simply entry screen.</p>
<p>The following screen is accessible from the <span class="keyword">View ? Users & passwords...</span> menu.</p>
<p>Add a user by clicking the <img class="icon" src="http://www.tri-line.com/common/img/documentation/tim_professional/add_button.png" /> button, then entering the details into the new window that appears...</p>
<img class="screenshot naked" src="http://www.tri-line.com/common/img/documentation/tim_professional/protection_method_1.png" alt="Protection method" />
<p>Once you click the <img class="icon" src="http://www.tri-line.com/common/img/documentation/tim_professional/add_button.png" /> button, the following window pops up:</p>
<img class="screenshot naked" src="http://www.tri-line.com/common/img/documentation/tim_professional/protection_method_2.png" alt="Protection method" />
<p>Using this simple entry screen, you can set each of the two methods of protection by following the procedures here:</p>
<h4>Console Locking</h4>
<p>Set up a user with a username console (in lower case), choose a password, then select <span class="keyword">(Console Access)</span> from the <span class="reference">Extension Group</span> drop-down list. Click on the <span class="button">OK</span> button, and the user will appear in the list. Only one user (named console) can be setup for Console Access.</p>
<h4>Web Username restrictions</h4>
<p>When running reports, the extension groups that are accessible can be
forcibly restricted to a single group. This is most often used in an
organisation where a department manager is given access only to
his/her own information, and no-one else's.</p>
<p>Additionally, any number of users may be setup who may access all extension groups' data.</p>
<p>To setup a user who may only view a single group of extensions, simply click on the <img class="icon" src="http://www.tri-line.com/common/img/documentation/tim_professional/add_button.png" /> button on the <span class="keyword">Users & passwords...</span> screen (as described above). In the <span class="reference">Add New User</span> window that appears, enter a username and a password of your choice, but from the <span class="reference">Extension Group</span> drop-down list, choose the extension group to whom this user is granted access.</p>
<p>To add a user who may access all extensions, leave the <span class="reference">Extension
Group</span> drop-down list empty (the default), or select the blank item at the
top of the list.</p>
<p>A user who has access to all extension information will be shown in the
<span class="reference">User List</span> with a <img class="icon" src="http://www.tri-line.com/common/img/documentation/tim_professional/user_icon_1.png" /> icon, as opposed to a
restricted user, a <img class="icon" src="http://www.tri-line.com/common/img/documentation/tim_professional/user_icon_2.png" /> symbol.</p>
|
false | URL | /download/attachments/7241990/protection_method_3.png |
---|
|
Web Username restrictions
TIM Professional allows you to set up users whose access to the system is restricted to a specific group.
To configure this, access the top-left menu and select
-> . In the Add New User window that appears, enter a username and password for your new user and select the group you want to grant them access, from the Extension Group drop-down list. Screenshotmacro |
---|
Border | false |
---|
Shadow | false |
---|
URL | /download/attachments/7241990/protection_method_2.png |
---|
|
To add a user who may access all extensions, leave the Extension Group drop-down list empty (the default), or select the blank item at the top of the list.
A user who has access to all extension information will be shown in the User List with a
Inlineimage |
---|
URL | /download/attachments/7241990/user_icon_1.png |
---|
|
icon, as opposed to a restricted user, a Inlineimage |
---|
URL | /download/attachments/7241990/user_icon_2.png |
---|
|
symbol.