Maintenance Manual
8-3
Cisco ICM Enterprise Edition Administration Guide Release 6.0(0)
Chapter 8 ICM Partitioning
ICM Partitioning Overview
For example, if you grant a user access to the Peripheral class, that user can access
the configuration data for all peripherals and all the data associated with each of
those peripherals in the enterprise. On the other hand, if you grant a user access
to a peripheral object—the Scranton ACD, for example—that user can access only
the configuration data for that specific peripheral and its related data (trunks,
services, skill groups, agents, etc.).
By selectively granting access to specific classes and objects, you can ensure that
each user has the full access he or she needs without allowing unnecessary or
unwanted access to other data.
Mapping Objects
Most objects have a direct mapping between the database security object and a
configuration item. For example, the Agent database security object directly maps
to Agents created through the Agent Explorer or the Agent Bulk Configuration
Tool. However, some objects do not have a configuration object, but rather, serve
only as a mapping device between the Class and Object levels.
Note This mapping is required because Classes do not have a direct association with
tables.
Table 8-1 lists these mapping objects:
Some objects intersect the Network Interface Class and the Peripheral Class,
where access levels can be assigned to the object either through the Network
Interface class or the Peripheral Class. The Network/Peripheral object exists for
such objects.
Table 8-1 Special Mapping Objects
Class Objects
Call Call
Network Interface Network Interface, Network/Peripheral
Peripheral Peripheral Global, Network/Peripheral
System System