Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)

Security Guidelines for Cisco Unified Contact
Center Management Portal
Release 8.5(2)
July 2011
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE
WITHOUT NOTICE.ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE
ACCURATE BUT ARE PRESENTEDWITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL
RESPONSIBILITY FOR THEIR APPLICATION OFANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE
INFORMATION PACKETTHAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE.
IF YOU ARE UNABLE TO LOCATE THESOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO
REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California,
Berkeley (UCB) as part of UCBs public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of
the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS
ARE PROVIDED "AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES,
EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE
PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR
INCIDENTAL DAMAGES,INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING
OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of
Cisco's trademarks can be found at http://www.cisco.com/go/trademarks.Third party trademarks mentioned are the property of their
respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.
(1005R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display
output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative
content is unintentional and coincidental.
Copyright 2011 Cisco Systems, Inc. All rights reserved.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
ii
Contents
Preface ...........................................................................................................................v
Purpose ........................................................................................................................................ v
Audience ...................................................................................................................................... v
Organization ................................................................................................................................. v
Related Documentation ............................................................................................................... vi
Product Naming Conventions .................................................................................................... vii
Conventions ............................................................................................................................... vii
Obtaining Documentation and Submitting a Service Request .................................................... ix
Documentation Feedback ........................................................................................................... ix
1. Unified Contact Center Management Portal ............................................................ 1
Partitioning Considerations ......................................................................................................... 1
Inheritance and Policy Roots ...................................................................................................... 2
2. Setting up Security Roles .........................................................................................3
How to Create Roles ................................................................................................................... 3
How to Create a Non-Global Role .......................................................................................... 3
How to create a Global Roles ................................................................................................. 4
3. Setting Default Security Groups .............................................................................. 5
Default Security Groups .............................................................................................................. 5
Setting up Default Security Group .......................................................................................... 5
4. Folder Structure ........................................................................................................7
Creating a Folder Tree ................................................................................................................ 7
How to Create Folders ............................................................................................................ 7
Removing Default Folder Permissions ........................................................................................ 7
How to Remove Permissions from the Shared Folder ........................................................... 7
5. Configuring Security Groups ...................................................................................9
Global Permissions Groups ........................................................................................................ 9
How to Create Groups ............................................................................................................ 9
How to Assign Global Permissions to a Group ....................................................................... 9
Folder Permissions Groups ....................................................................................................... 10
How to Add Non-Global Permissions to a Group ................................................................. 10
How to Add a Group to a Group ........................................................................................... 11
6. Creating Users ......................................................................................................... 13
How to Create a User ................................................................................................................ 13
How to Add a User to a Group .............................................................................................. 14
7. Creating New Folders.............................................................................................. 15
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
iii
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
iv
Preface
Purpose
This document explains how to set up and maintain security for the Unified Contact
Center Management Portal (Unified CCMP). It should be read in conjunction with
the security section of the User Manual for Cisco Unified Contact Center
Management Portal, which describes the entities and operations involved in greater
detail.
Audience
This document is intended to be used by administrators responsible for the
commissioning and ongoing maintenance of the Unified Contact Center Management
Portal. All users responsible for managing security should have access both to this
document and to any records of the exact system setup chosen.
Organization
The following table describes the information contained in each chapter of this guide.
Chapter
Description
Chapter 1, “Unified Contact Center
Management Portal”
Discusses the nature of partitioning, and describes
issues that must be considered when planning the
security setup
Intended Audience: all audiences
Chapter 2, “Setting up Security
Roles”
Intended Audience: System
Administrators
Chapter 3, “Setting up Default
Security Groups ”
Intended Audience: System
Administrators
Chapter 4, “Folder Structure”
Intended Audience: System
Administrators
Chapter 5, “Configuring Security
Groups”
Intended Audience: System
Administrators
Chapter 6, “Creating Users”
Intended Audience: System
Administrators
Explains how to determine which roles, or sets of
permissions, will be required within your system, and
how to create them
Describes how to configure security in order for the
system to automatically set up necessary permissions
when certain folders are created
Describes how to set up the folder structure on which
security will be defined, including how security
permissions are inherited and how this inheritance can
be removed from specific folders
Explains how to assign permissions to users via user
groups, and how to set up groups and their memberships
to allow users to navigate to and work within the
appropriate folders
Describes how to create users and assign them to the
appropriate security groups
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
v
Chapter
Description
Chapter 7, “Creating New Folders”
Summarizes the steps needed to extend the security
infrastructure to newly added folders
Intended Audience: System
Administrators
Related Documentation
Documentation for Cisco Unified ICM/Contact Center Enterprise & Hosted, as well
as related documentation, is accessible from Cisco.com at:
http://www.cisco.com/cisco/web/psa/default.html.
•
Related documentation includes the documentation sets for Cisco CTI Object
Server (CTIOS), Cisco Agent Desktop (CAD), Cisco Agent Desktop - Browser
Edition (CAD-BE), Cisco Unified Contact Center Management Portal, Cisco
Unified Customer Voice Portal (CVP),Cisco Unified IP IVR, Cisco Unified
Intelligence Center, and Cisco Support Tools.
•
For documentation for these Cisco Unified Contact Center Products, go to
http://www.cisco.com/cisco/web/psa/default.html, click Voice and Unified
Communications, then click Customer Contact, then click Cisco Unified
Contact Center Products or Cisco Unified Voice Self-Service Products, then
click the product/option you are interested in.
•
For troubleshooting tips for these Cisco Unified Contact Center Products, go to
http://docwiki.cisco.com/wiki/Category:Troubleshooting, then click the
product/option you are interested in.
•
Documentation for Cisco Unified Communications Manager is accessible from:
http://www.cisco.com/cisco/web/psa/default.html.
•
Technical Support documentation and tools are accessible from:
http://www.cisco.com/en/US/support/index.html.
•
The Product Alert tool is accessible from (login required):
http://www.cisco.com/cgi-bin/Support/FieldNoticeTool/field-notice.
•
For information on the Cisco software support methodology, refer to Software
Release and Support Methodology: ICM/IPCC available at (login required):
http://www.cisco.com/en/US/partner/products/sw/custcosw/ps1844/prod_bulletin
s_list.html.
•
For a detailed list of language localizations, refer to the Cisco Unified
ICM/Contact Center Product and System Localization Matrix available at the
bottom of the following page:
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
vi
http://www.cisco.com/en/US/products/sw/custcosw/ps1001/prod_technical_refer
ence_list.html.
Product Naming Conventions
In this release, the product names defined in the table below have changed. The New
Name (long version) is reserved for the first instance of that product name and in all
headings. The New Name (short version) is used for subsequent instances of the
product name.
Note: This document uses the naming conventions provided in each GUI, which
means that in some cases the old product name is in use.
Old Product Name
New Name (long version)
New Name (short version)
Cisco IPCC Enterprise
Edition
Cisco Unified Contact Center
Enterprise
Unified CCE
Cisco System IPCC
Enterprise Edition
Cisco Unified System Contact
Center Enterprise
Unified SCCE
Note: Cisco Unified System
Contact Center Enterprise
(Unified SCCE) is supported in
8.5(2); however, there is not a
separate 8.5(2) version. If you
request features that are in
8.5(2), you must migrate to the
Unified ICM/CCE/CCH
software. Full migration
information is documented in
the Upgrade Guide for Cisco
Unified ICM/Contact Center
Enterprise &Hosted.
Cisco IPCC Hosted Edition
Cisco Unified Contact Center
Hosted
Cisco Intelligent Contact
Management (ICM)
Enterprise Edition
Cisco Unified Intelligent
Contact Management (ICM)
Enterprise
Cisco Intelligent Contact
Management (ICM) Hosted
Edition
Cisco Unified Intelligent
Contact Management (ICM)
Hosted
Cisco CallManager/Cisco
Unified CallManager
Cisco Unified
Communications Manager
Unified CCH
Unified ICM
Unified CM
Conventions
This manual uses the following conventions:
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
vii
Convention
Description
boldface font
Boldface font is used to indicate commands, such as entries, keys, buttons,
folders and submenu names. For example:
italic font
•
Chose Edit > Find.
•
Click Finish
Italic font is used to indicate the following:
• To introduce a new term; for example: A skill group is a collection of
agents who share similar skills.
• For emphasis; for example: Do not use the numerical naming
convention.
• A syntax value that the user must replace; for example: IF (condition,
true-value, false-value)
•
window font
< >
A book title; for example: Refer to the Cisco CRS Installation Guide
Window font, such as Courier, is used for the following:
•
Text as it appears in code or that the window displays: for example:
<html><title>Cisco Systems, Inc. </title></html>
•
Navigational text when selecting menu options; for example ICM
Configuration Manager > Tools > Explorer Tools >
Agent Explorer
Angle brackets are used to indicate the following:
•
For arguments where the context does not allow italic, such as ASCII
output
•
A character string that the user enters, but does not appear on the
window such as a password
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
viii
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and
gathering additional information, see the monthly What's New in Cisco Product
Documentation, which also lists all new and revised Cisco technical documentation,
at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as a Really Simple
Syndication (RSS) feed and set content to be delivered directly to your desktop using
a reader application. The RSS feeds are a free service and Cisco currently supports
RSS version 2.0.
Documentation Feedback
You can provide comments about this document by sending email to the following
address:
mailto:ccbu_docfeedback@cisco.com
We appreciate your comments.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
ix
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
x
1. Unified Contact Center
Management Portal
All resources within Unified Contact Center Management Portal (Unified CCMP) are
stored in individual folders in a hierarchical folder structure. This forms a virtualized
organizational structure unrelated to the configuration of the Unified CCMP
platform. Unified CCMP allows individual users or groups of users to be restricted to
performing actions within their own areas of responsibility, without being able to see
that other areas exist.
•
Users on one tenant folder are by default unable to see any details of other
tenant folders. Where one Unified ICM is shared between multiple
organizations (for example, a company and one or more outsourcers), a
similar level of partitioning can be achieved by separating resources into
different folder hierarchies and granting permissions on individual folders. In
this way, outsourcer users do not have permission to browse resources within
the company’s folder hierarchy.
•
Host administrators must be configured to allow full view of the folder
structure seeing resources across multiple tenants.
Partitioning Considerations
The permissions that users have on a folder determine their ability to see and
manipulate that folder and the folders inside it. For example, if a user does not have
Browse Folders permissions on a folder they cannot see that folder.
Note Granting permissions on a folder automatically grants users the ability to see all
the folders above it in the tree, or they would be unable to navigate to that folder.
This does not grant the user permission to see or manipulate the resources within
those folders.
In general, the Portal provides two different kinds of permissions:
•
Browse permissions allow a user to see the items of the specified type. For
example, having Browse Dimensions permissions on a folder allows a user to
examine resources in that folder when using the System Manager.
•
Manage permissions allow a user to move, add, change and delete items of
that type within the specified folder. There is no way to separate these
permissions; for example, to permit a user to change an item but not delete it.
If you want users to be able to manage some resources but not others, you
should place these resources in separate folders.
In order to modify some items, users need browse permissions on related items. For
example, in order to modify Agent and/or Skill Group configuration, a user must be
able to see the Peripheral that they belong to.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
1
Inheritance and Policy Roots
Each folder in the hierarchy is either a policy root, which can have specific
permissions applied to it, or inherits its own permissions from a policy root. For
example, a user given Browse Dimensions permissions on the tenant folder (which is
a policy root) in the diagram below would automatically receive Browse Dimensions
permissions on all the inheriting folders beneath it, as indicated by the blue arrows.
If you change an inheriting folder into a policy root, any existing permissions that
users have on that folder are copied in. If you change a policy root into an inheriting
folder, all the existing permissions that users have on that folder and its inheriting
folders are overwritten by the permissions set on its new policy root.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
2
2. Setting up Security Roles
Sets of individual permissions (or tasks), such as creating agents or viewing
resources, are gathered together into roles. There are two kinds of role that must be
used to grant permissions:
•
Global roles globally ‘switch on’ the ability to perform certain kinds of
action within the system, for example the ability to access the Security
Manager tool.
•
Non-global roles specify the tasks that can be performed within specific
folders, for example the ability to manage security within a specific tenant
folder.
To manage security for a folder, a user needs both a global role granting security
management permissions and a non-global role granting permission to manage
security within a particular folder.
Typically, a system is intended to be used primarily by a few categories of user. For
example, your users might fall into three categories:
•
Level 1 users - Supervisors, using the system solely in basic mode, to
manage agents, teams and skillgroups.
•
Level 2 users - Managing agents, teams and skillgroups, and also posting
information notices within their areas of responsibility.
•
Level 3 users - Performing administrative tasks such as managing resources,
creating users and adding them to user groups.
For each of these levels of user, you must set up a corresponding set of permissions,
or roles. You need to create both a non-global role and a global role containing the
necessary permissions for each category of user.
Note If the permissions you require are supplied by one or more of the system default
roles, you can use these instead of creating your own custom roles.
How to Create Roles
How to Create a Non-Global Role
From the Tools page, click Role Manager beneath the Security Manager tool:
1. Click New to display the New Role page.
2. Perform the following:
•
Name field enter the name of the role as it will appear in the system.
•
Description field enter any explanatory text, if required.
3. The tasks that can be added to the role are listed beneath the Name column.
Explanatory text for each task is displayed beneath the Description column.
Select the check boxes of the tasks to be added to the role.
4. Click Save to return to the Roles page, where your new role is now listed.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
3
How to create a Global Roles
From the Tools page, click the Global Security Manager link beneath the Security
Manager tool:
1. Click New to display the New Role page.
2. Perform the following:
•
Name field enter the name of the role as it will appear in the system.
• Description field enter any explanatory text, if required.
3. The tasks that can be added to the role are listed beneath the Name column.
Explanatory text for each task is displayed beneath the Description column.
Select the check boxes of the tasks to be added to the role.
4. Click Save to return to the Roles page, where your new role is now listed.
Note When creating global roles that allow access to the System Manager,
Information Notices or other tools, you also need to include the Advanced User
task to allow access to the Tools page.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
4
3. Setting Default Security Groups
Although permissions may be assigned to users individually, doing so makes the
security system chaotic and difficult to maintain.
A security group, also known as a user group, grants permissions to all users who are
members of that group. Groups may also be members of other groups, and therefore
‘inherit’ permissions from them.
Default Security Groups
By default, each time a policy root folder is created, up to three security groups are
automatically created within that folder, with permissions on that folder
automatically set up.
These default groups should be set to provide the permissions that users most
commonly require on folders.
Setting up Default Security Group
Click Settings from the menu at the top right of every page:
1. Select Security Settings. At the bottom of this page is the list of default
groups.
2. Check the groups that you want to have automatically created in each policy
root.
3. For each group, select a folder role, either an existing role or a custom role
created earlier, that that group should have on the policy.
4. Click Save.
Note It is not currently possible to change the global roles associated with the
default groups.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
5
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
6
4. Folder Structure
Permissions in Unified CCMP are folder based, and therefore a basic folder structure
for the system must be in place before security can be set up. You can add folders to
the system later, but it is easier to set up access to these correctly if the basic folder
and security structure is already in place.
You must read through this entire document before planning your folder structure.
Creating a Folder Tree
Typically, users and resources are kept in separate branches, but it is not necessary to
use this model. For example, you may find it convenient to store supervisor users in
the same folder as their agent teams.
Note For ease of maintenance, do not create more than eight hierarchical layers of
folders beneath the tenant root.
How to Create Folders
From the Tools page, click Create a Folder beneath the System Manager tool:
Caution It is not possible to edit a folder’s name or description once it has been
created, so you must be careful when choosing and entering the folder details.
1. In the Name field, enter a name for the new folder.
2. In the Description field, enter any explanatory text for the folder, if required.
3. Uncheck the Inherit Permissions box to create a policy root, or check it to
create an inheriting folder.
4. Click Save to save the new folder in the tree.
Select the Create Another check box if you wish to create further folders.
Note Policy roots must be kept to a minimum to optimize system performance;
however, it is possible to designate every folder in the tree as a policy root.
Removing Default Folder Permissions
By default, every user created is added to the Everyone security group in the Root
folder.
The Everyone group gives users permission to browse any items in the Shared
folder. If you intend a user to have this permission, remove the Everyone group’s
permissions on the Shared folder tree.
How to Remove Permissions from the Shared Folder
From the Tools page, click the View Groups link beneath the Security Manager
tool:
1. Select the root folder to display the groups contained in that folder.
2. Select the check box of the Everyone group and click Assign Permissions.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
7
3. Select the Shared folder in the tree. The roles (sets of permissions) which
you can grant the group on this folder are displayed.
4. Ensure all check boxes are unchecked and click OK.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
8
5. Configuring Security Groups
Global Permissions Groups
In the tenant root folder, create a number of user groups corresponding to the
different classes of permission that that tenant will be granting its users and assign
them the appropriate global roles.
Setting up these global permissions groups allows other users to assign a limited set
of global security permissions while keeping the number of users able to edit global
security to a minimum.
How to Create Groups
From the Tools page, click the Group Manager link beneath the Security Manager
tool:
1. Select the folder to which you wish to add the new group (in this case, the
tenant root).
2. Click New. The Create a new user group page displays.
3. Fill in the following fields:
•
Name field, enter a name for the new group.
•
Description field, enter any explanatory text, if required.
4. If you wish to create more than one new group for the selected folder, select
the Create Another check box.
5. Click OK to save the new group in the selected folder.
How to Assign Global Permissions to a Group
From the Tools page, click the Global Security Manager link beneath the Security
Manager tool:
1. Click the global role name to open the Edit Global Role.
2. Select the Members tab. This tab lists the existing Global Role members.
3. Select Add Members. This displays a tree structure with a list of users and
groups located in the selected folder.
4. Select users and groups to add/remove them from the global role.
5. Select Close.
6. Select Save to add these users to the global role.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
9
Folder Permissions Groups
Each policy root requires a set of groups corresponding to the different categories of
user who need to perform tasks within that folder or set of folders.
If the default groups do not provide all the permissions your users need, you need to
set up further groups in each policy root. Assign each of them the appropriate folder
role you created earlier and make each a member of the appropriate global
permissions group.
In most cases, users with permission to perform a task in a parent folder must be able
to perform it in a sub-folder. For example, senior administrators with the ability to
manage resources across the tenant need to have permissions on the tenant root and
on all policy roots beneath. To achieve this, each group in a policy root should be
made a member of the corresponding group in any policy root beneath it in the folder
tree.
The exception to the rule is any supervisor users group, as supervisors using Basic
Mode cannot work with resources in more than one folder.
Note When changing a user or group’s permissions in a folder, you can apply those
changes to sub-folders using the Change permissions for sub-folders check box.
How to Add Non-Global Permissions to a Group
From the Tools page, click View Groups beneath the Security Manager tool:
1. Select the folder in the tree that contains the group that is to be granted
permissions. The groups associated with the selected folder displays.
2. Select the check box of the required group and click Assign Permissions.
3. Select the folder in the tree that you want to grant permissions on. The roles
that you can apply to the selected folder displays.
Note If the available roles are dimmed, this means that the folder is currently
inheriting permissions from its parent. Click the link provided to make the folder
a policy root and assign folder-specific permissions to it.
4. Select the check box of the required role and click Save.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
10
How to Add a Group to a Group
From the Tools page, click View Groups beneath the Security Manager tool:
1. Select the parent folder to display the groups associated with that folder.
2. Select the check box of the group to be given membership of another group
and click Add to Group.
3. Select the child folder.
4. Select the check box of the corresponding group and click OK. Members of
the group in the parent folder are now able to perform the same actions in the
child folder.
Note Groups may be members of multiple groups.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
11
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
12
6. Creating Users
Unified CCMP treats user accounts similarly to resources. That is, each user account
must be contained within a specific folder and users with appropriate permissions on
that folder can change the user’s properties (such as the password), or move or delete
the account.
The folder that contains a particular user account determines only which users have
permissions to modify that user account. The home folder specified for each user
account determines which folder that user automatically works within when they log
in to Unified CCMP. Advanced Users might navigate out of their home folder to
work in other folders that they have permissions on, but Basic Users are only able to
see, change, and create resources within their home folder.
The home folder is entirely independent of the folder that contains the user account.
For example, you can create a user in the folder Users/Atlanta but set their home
folder to be Resources/Atlanta.
Once a user has been created, grant them folder permissions by adding them to the
appropriate group within each folder that they should have access to. For example, if
you want the above user to have Advanced permissions within their home folder, you
would add them to the Advanced Users group for Resources/Atlanta.
Note No user other than the host administrator must ever be given any security
management permissions on the folder that contains their user account.
How to Create a User
From the Tools page, click View Users beneath the Security Manager tool:
1. Select the folder in which to create the new user.
2. Click New to display the Create a new user page.
3. Fill in the following fields:
•
User Name field, enter the name for the new user account. The user will
use this name to login to the Portal.
•
Password field, enter the password for the new user.
•
Confirm Password field, re-enter the selected password.
•
First Name and Last Name fields, enter the user's details.
•
Email field, enter the email address (if any) of the new user.
•
Description field, optionally enter any explanatory text.
•
User Home Folder the home folder that the user will start in when they
log in. If you leave this blank, it defaults to the folder the user is created
in.
4. Select any of the following check boxes that are applicable:
•
Advanced check box if the user is to be assigned global roles that allow
them to access Advanced Mode tools such as the System Manager.
Note The number of advanced users must be limited as far as is practical.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
13
•
Enabled check box to ensure that the user is live in the system. If
unchecked, the system saves the new user account, but the user is unable
able to log in.
•
User must change password at next Logon check box to prompt the
new user to change their password after their first login.
•
Password Never Expires check box to assign the password to the new
user indefinitely.
•
User cannot change password check box to prevent the new user from
changing their own password (it can still be changed by administrators).
5. To create more than one new user in the selected folder, select the Create
Another check box.
6. Click OK.
You may now optionally add the new user to a group using the Add to Group
menu option.
Note All users created for a tenant are automatically assigned to the Everyone
group, so it is important to be sure that the permissions of this group have been
set up as desired.
How to Add a User to a Group
From the Tools page, click the User Manager link beneath the Security Manager
tool:
1. Select the folder containing the user to display the users contained in that
folder.
2. Click the user to display a page showing the user details.
3. Select the Groups tab.
4. Click Add to Group. A pop-up opens.
5. Navigate through the folder tree on the left to the folder containing the group
the user is to be added to.
6. Check the check box of the group or groups. You may select groups from
multiple folders.
7. Close and Save.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
14
7. Creating New Folders
Once the basic security structure has been set up, any new folder created that is not
intended to inherit permissions from its parent must have the standard groups set up
within it. This procedure is summarized as follows:
1. Create the new folder.
2. Edit the default groups if necessary.
3. Create any non-default groups required in the folder.
4. Grant each new group the appropriate role on the new folder.
5. Add each new group to the appropriate global security role.
6. Add each folder permissions group in the parent folder to the corresponding
group in the new folder.
You can then grant permissions on the new folder to users as described
previously.
Security Guidelines for Cisco Unified Contact Center Management Portal Release 8.5(2)
15