Cisco Cisco IP Contact Center Release 4.6.1 Technical References

Page of 557
Security Tables - Database Rules
To see an illustration and a list of all tables in the Security category, click 
.
You might choose to restrict access to some objects in the ICM/IPCC database to speci
fi
c users,
specific groups of users, or to a specific entity (such as a division within a company). The
enterprise consists of one or more entities. The 
 tables define the
entities within an enterprise.
The 
 table defines groups of users or individual users who have specific
access rights. If a row in the User Group table defines a group, each user who is a member of
that group is con
figured in the 
 table. ICM/IPCC software also
uses the 
 tables to track the state of user groups.
The 
 table is used to allow an agent to log in as a Supervisor.
The 
 table defines the different feature sets that may be used by
different users. One set of features may be mapped to multiple users.
Each individual item for which the ICM/IPCC software controls access is an object. The 
 table contains information about these objects. The 
 table contains
information about row-level security for objects. The 
 table defines
the access that specific user groups have for specific objects.
 table defines the access that specific users have for specific
objects. The possible access levels for each object are defined in the 
 table. The ICM/IPCC software uses the 
intermediate table to build User Security Control records.
A category of objects on which access is controlled is a class. The 
 table
defines these categories. The 
 table specifies the level of access a user
group has to a specific class. The access levels that are available for a class are specified in the
 table.
The 
 table defines the mapping of classes to objects.
Skill Target - Database Rules
To see an illustration and a list of the Skill Target tables, click 
Peripheral Targets
Each peripheral can have man
and 
. These entities are collectively known as 
.
 of agents. Teams are for monitoring
purposes only; they are not used for routing calls. The 
maps agents to teams.
Database Schema Handbook Cisco ICM/IPCC Enterprise & Hosted Editions Release 7.2(1)
448
Chapter 5: - Database Rules
Security Tables - Database Rules