Automatic Exit From The Configuration; Webadmin Access Log - Mitel SMB Controller System Manual

Mivoice office 400
Hide thumbs Also See for SMB Controller:
Table of Contents

Advertisement

U
SER ACCESS CONTROL
C
5
C
HAPTER
ONFIGURATION
Change password
Any user who has been assigned an authorisation profile in which the User access control administration
right is released is authorised to modify the passwords of all user accounts. It is therefore advisable to
assign this administration right restrictively.
Users whose password has been changed are prompted to enter their newly assigned password the next
time they log in. The same applies to users whose accounts have been newly created.
Users without the administration right User access control can only change their own password.
Access with incorrect password
For user account, after a maximum of 15 unsuccessful logins, the account is disabled for 10 minutes. The
account is automatically re-enabled after 10 minutes. The account does not require administrator to
re-enable.
Lost password
If another user has also been defined with the User access control administration right released, he can
simply overwrite with a new password the password lost by another user. The next time he logs in, the
corresponding user is prompted to change the password and enter the new one he has been assigned.
: For security reasons, there is no password-free access for the SMB Controller. Be careful with your
NOTE
passwords.

Automatic exit from the configuration

Access to the configuration is interrupted if no changes are made to a parameter value or the navigation
system is not used during a specific timeout.
This is valid for both configuration tools, the SMB Controller Manager as well as for WebAdmin.

WebAdmin access log

An access log with 20 entries is drawn up for each user account so that the history of accesses to the
configuration can be tracked. Denied access attempts using erroneous or incorrectly type passwords are
also logged. The logs can be read by each user (authorization level) Administrator in Expert mode
required).
Retrieving the log data
The system monitors all the accesses and failed access attempts and saves them in the file system of the
communication server. These lists can be retrieved locally or remotely. (
=ez or
=z3).
CLIP verification
If in the general maintenance settings (
=t0) of the parameter CLIP required is activated, remote main-
tenance is only possible if the retrieving party is using a CLIP. The CLIP number is also recorded by the
access log.
Entering the processes in the log
Each access attempt generates an entry in the corresponding list.
171

Advertisement

Table of Contents
loading

Table of Contents