Maintenance Manual
8-5
Cisco ICM Enterprise Edition Administration Guide Release 6.0(0)
Chapter 8 ICM Partitioning
ICM Partitioning Overview
For more information about setting the security access for business entities, see
Installing and Configuring ICM Partitioning, page 8-28.
Access Privilege Levels
For each class and object in the ICM software database, you can grant users or
groups a specific access privilege level. The access level determines what rights
the user has to the associated data, as described in Table 8-2.
Not all access levels can be applied to all classes and objects. For example, a user
can only have Read or Reference access to call detail data; ICM software does not
permit Maintenance access to call detail data.
You can intermix different levels of security. For example, you might choose to
give some users Read access to a wide range of data, but grant them Maintenance
access to only a subset of that data.
Note The highest—that is, the most permissive—access level to a particular piece of
data “wins.”
Table 8-2 Access Levels
Access Level Description Example: Peripheral Access
Maintenance Permits the User or Group to read, update, and
delete the object.
Allows the user to create, modify,
or delete the services, skill groups,
etc., for a peripheral.
Reference Permits the User or Group to read the object
and use it in a script.
Allows the user to reference
peripheral-level variables in a
script.
Read Permits the User or Group to see the object,
but not change it or use it in a script.
Allows the user to see the
peripheral and the associated
peripheral real-time and historical
data
No access Restricts access to the object. (This is the
default if a User or Group is not explicitly
assigned an access level.)
Allows no access.