You can use advanced security options to restrict user
access to sites, reporting, and real-time functions.
Before you can specify advanced security, you must create security
lists (device lists, real-time monitor lists, report lists, site
lists, and user lists). Each list must contain the devices, real-time
monitors, reports, sites, and users to which employees are granted
access. You can combine these lists when you assign a security role. For
example, you can specify advanced security that permits users to
create Employee Group Performance by Employee reports (specific
report list) on Kanata employees (specific device list) only.
Use the following security lists to define advanced security:
- Device list—Device lists specify devices for which employees
may view real-time information. You create device lists to restrict
access to statistics on specific employees. For example, you might
want a manager to view certain employees only (specific device -
Kanata employees). The device list must contain the device (employee
group - in this case, Kanata employees) to which the user may gain
access. Devices include Account Code Group, Agent group, DNIS group,
Employee Division, Employee group, Extension Division, Queue group,
or Team, Trunk Group, Voice extension group, and Voice mail extension
group.
Note: If you add an agent to a device list, you must also
add the associated employee.
- Report list—You create report lists to restrict users
from viewing specific report types. For example, you might want
managers to view employee reports only (specific report category).
The report list must contain the reports the user may run. If you
do not assign a report list to the employee, then the employee will
see every YourSite group and team when running reports and monitoring
real-time activities (unless a basic security role is assigned to
that employee that does not permit the employee to gain access to
any reports).
- Profile list—You create a profile list to restrict users
from managing specific real-time monitor profiles.
- Site list—You create a site list to restrict users to
accessing only certain sites.
- Real-time monitor list—The real-time monitor list specifies
real-time monitors to which you are granted access. You create a
real-time monitor list to restrict access to particular real-time
monitors. The real-time monitor list must contain the monitors that
the user will access.
- User list—You create a user list to restrict a user from
chatting online with certain employees. The user list must contain
the employees with which the user may chat. For example, you might
want managers to chat online with only the employees they supervise.
If Jane manages Bill, Sue, and George, then you assign Jane an advanced
security role that permits Jane to chat with Bill, Sue, and George
(the user list would contain Bill, Sue, and George).
- Card design list—You create a card design list to restrict
users from managing card designs (card designs specify the information
displayed on agent, and employee, and extension real-time monitors).
If you are using Windows Authentication, you must also enable
the following browser settings:
- Under Internet Options >
Security, enable ‘Automatic logon with current user name and password’
- Under Internet Options > Advanced, enable ‘Enable Integrated
Windows Authentication’
To create a security list
- Under the Enterprise pane,
click Security list.
- Select the security list you want to create and click Add.
- Type the list Name.
- Type the list Description.
- Click the Members tab.
- If you are creating a device or reports list, after Filter
by, select a category to narrow the items that display in the
list (for example, AgentEmployee group).
- Select the check boxes of the members you want to include in
the list.
- Click Save.
To delete a security list
- Under the Enterprise pane,
click Security list.
- Select the security list you want to delete and click Delete.