Maintenance Manual

Chapter 8 ICM Partitioning
ICM Partitioning Overview
8-6
Cisco ICM Enterprise Edition Administration Guide Release 6.0(0)
ICM Partitioning Security
The security provided by Partitioning involves checking the user’s access
privileges.
User Privileges
Security settings can be assigned directly to a user. A user account is created on
the Windows domain.The system administrator then defines the access rights of
the user to different objects in the ICM database tables.
Note Non-system administrators can assign security settings if they have maintenance
access to the ICM system class and maintenance access to the object for which
they wish to assign access.
Users can be granted access to data by their access level to the:
Class to which the data belongs.
Data object
A user’s access level to data is determined both by the user’s access privileges and
the access privileges of the group(s) to which the user belongs.
User Groups
To simplify security administration, you can define user groups and assign users
to these groups. A user group is a collection of ICM users that exists only in ICM,
not in the domain. You can grant to each group the appropriate set of rights within
the system for the tasks that they will need to perform.
For example, you might want to create groups for the following:
Users who can make changes to the carrier interfaces
Users who can add and remove peripherals
For each peripheral, users who can change the configuration within that
specific peripheral