Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info

The call logger is extremely easy to protect and offers plenty of scope for keeping unauthorised users from accessing your valuable call data.

HTML
<p>Briefly, there are two methods of protection: console based (to protect the actual application) and network-based (to allow only particular information to reach certain clients).</p>

<p>Both methods require the main administrator to setup users and passwords using a simply entry screen as shown below:</p>

<img class="screenshot naked" src="http://www.tri-line.com/common/img/documentation/tim_professional/protection_method_1.png" alt="Protection method" />

<p>This screen is accessible from the Users & Passwords... menu item, located on the View menu.</p>

<p>Add a user by clicking the Add User button, then entering the details into the new window that appears...</p>

<img class="screenshot naked" src="http://www.tri-line.com/common/img/documentation/tim_professional/protection_method_2.png" alt="Protection method" />

<p>Using this simple entry screen, you can set each of the two methods of protection by following the procedures here:</p>

<h4>Console Locking</h4>

<p>Set up a user with a username console (in lower case), choose a password, then select (Console Access) from the Extension Group drop-down list.  Click on the Add button, and the user will appear in the list.  Only one user (named console) can be setup for console access.</p>

<h4>Web Username restrictions</h4>

<p>When running reports, the extension groups that are accessible can be
forcibly restricted to a single group.  This is most often used in an
organisation where a department manager is given access only to
his/her own information, and no-one else's.</p>

<p>Additionally, any number of users may be setup who may access all extension groups' data.</p>

<p>To setup a user who may only view a single group of extensions, simply click on the Add User button on the Users & Passwords screen (as described above).  In the Add User box that appears, enter a username and a password of your choice, but from the Extension Group drop-down list, choose the extension group to whom this user is granted access.</p>

<p>To add a user who may access all extensions, leave the Extension
Group drop-down list empty (the default), or select the blank item at the
top of the list.</p>

<p>A user who has access to all extension information will be shown in the
User List with a yellow smiley-face icon (), as opposed to a
restricted user, a double human head & shoulder symbol ().</p>

TIM Professional offers two methods of securing your system:

  • console based - to protect the actual application
  • network based - to allow only particular information to reach certain clients

Both methods require the main administrator to set up the users and passwords using the entry screen.

Console Locking

Access the top-left menu and select 

Keywordmacro
LabelView
  -> 
Keywordmacro
LabelUsers and passwords
. In the new window that appears, click on the
Inlineimage
URL/download/attachments/7242077/add_button.png
button to add a new user.

Screenshotmacro
Borderfalse
Shadowfalse
URL/download/attachments/7241990/protection_method_1.png

Within the new screen that pops up, set up a user with the username

Keywordmacro
Labelconsole
(all characters in lower case), enter a password, then select (Console Access) from the Extension Group drop-down list. Click on the OK button to add the console user to the list.

Info

Only one user named

Referencemacro
Labelconsole
can be setup for Console Access.

Screenshotmacro
Borderfalse
Shadowfalse
URL/download/attachments/7241990/protection_method_3.png

Web Username restrictions

TIM Professional allows you to set up users whose access to the system is restricted to a specific group.

To configure this, access the top-left menu and select 

Keywordmacro
LabelView
  -> 
Keywordmacro
LabelUsers and passwords
. In the Add New User window that appears, enter a username and password for your new user and select the group you want to grant them access, from the Extension Group drop-down list.

Screenshotmacro
Borderfalse
Shadowfalse
URL/download/attachments/7241990/protection_method_2.png

To add a user who may access all extensions, leave the Extension Group drop-down list empty (the default), or select the blank item at the top of the list.

A user who has access to all extension information will be shown in the User List with a 

Inlineimage
URL/download/attachments/7241990/user_icon_1.png
icon, as opposed to a restricted user, a 
Inlineimage
URL/download/attachments/7241990/user_icon_2.png
symbol.