Maintenance Manual

Chapter 8 ICM Partitioning
Class and Object Security
8-12
Cisco ICM Enterprise Edition Administration Guide Release 6.0(0)
Object Security
Object security sets access privileges for specific records within a table or a group
of tables. There are two types of security objects:
A controlling object sets security on the object itself and a set of other
objects. For example, the Peripheral object is a controlling object that groups
Agents on a particular peripheral.
A controlled object derives its security from a controlling object. For
example, Agent is controlled by the Peripheral object.
Table 8-5 lists ICM objects and describes which database table each controls.
Note For complete details on each of the tables listed inTable 8-5, see the ICM
Enterprise Edition Database Schema Handbook.
Table 8-5 Security Objects (Sheet 1 of 16)
Object Description
Access
Levels
Controlling
Object Classes
ICM Database
Tables
Objects
Controlled
Agent Provides
security on
an Agent
Reference
Read
Peripheral Global
Peripheral
Agent
Agent_Half_
Hour
Agent_Logout
Agent_Real
Time
Agent_State_
Trace
Agent Desk
Settings
Provides
security to
use a set of
Agent Desk
Settings
Reference
Read
System Global
System
Agent_Desk_
Settings
Application_
Event
ICR_View