Académique Documents
Professionnel Documents
Culture Documents
management provides.
This part describes how to manually unlock a locked user, how to create a temporary user
and how to kick out an online user as the system administrator.
Managing a task
One organization maps one region while one region may map multiple
organizations.
This figure describe the procedure of creating a region, an organization, and an employee.
You can configure the region code according your planning, you cant use the same
region code for the difference region.
Typical instance:
When you do the practice, you can configure this part according your country.
You can configure the region code according your real information.
IT department
Finance department
You can configure the staff number according your company rule, if your company
hasnt the rule of staff number, please use unique number for difference staff.
If you can query the staff information under the department, that means your
configuration of region, organization and staff are successful.
The system supports three types of users: Default user, Temp user, and Common user.
NOTE:
A temporary user can log in to the system for one time and use the password
directly for login.
User type:
Common user
Temp user
User source:
Employee
Partner
Type of IP address
None
Blacklist
Whitelist
This section describes how to specify a role, a user group, region rights, and interface
rights for a user as the system administrator.
A role is a set of menu and button rights, common rights, and interface rights of the
system. The user with an assigned role has the menu rights and function rights of the role.
Default role.
Common role.
NOTE:
The default roles cannot be deleted while common roles can be customized.
NOTE:
Only the default users sysadmin and AccountAdmin have the rights of default
roles. Default roles must not be assigned to customized users.
User
A user with an assigned role has the menu rights and matching function rights of
the role.
The user sysadmin is a supper user who has all the menu rights and matching
function rights of the system.
System administrator: The user has the rights of system management menus
(including the submenus) and matching function rights.
Product management administrator: The user has the rights of product
management menus (including the submenus) and matching function rights.
Service administrator: The user has the rights of the following menus
(including the submenus) and matching function rights of Resource
management, Charging management and Service management.
Service handling operator: The user has the rights of individual service
management menus (including the submenus) and matching function rights.
smapb: assigning rolex to user group and adding the smapb to the user group
Display order = 1
Permission ID = access
User type:
All
Default user
Common user
Temp user
Role Information
Authorized Node
Authorized Region
User Information
Role Information
Authorized Node
Authorized Region
Notes:
You need change the initial password when you log in for the first time.
Click Console.
This section describes how to configure access policies and how to set the restrictions on
users who log in to the system on Web pages as the system administrator.
Blacklist
Users are not allowed to log in to the system by using IP addresses in blacklists, but
they can log in to the system by using IP addresses in other lists.
Whitelist
Users can log in to the system by using only the IP addresses in whitelists.
Policy Type:
Web Security
Flow Control
None
Blacklist
Whitelist
Prerequisites
Before we configure the Control Web Access, we need first configure the access
policy.
For example: the access policy named limit login has been configured.
How to change the date and time format as the system administrator.
How to create a scheduled task that runs at the preset time as the system
administrator.
How to manually unlock a locked user, how to create a temporary user and how to
kick out online users as the system administrator.
How to query operation logs, run logs, security logs, or user logs as the system
administrator.
Data Format:
yyyy-MM-dd
MM-dd-yyyy
Time Format:
HH:mm:ss
HHmmss
yyyyMMddHHmmss
Yyyy-MM-dd HH:mm:ss
MM-dd-yyyy HH:mm:ss
Scheduled tasks are configured to delete logs, recycle mobile numbers, and synchronize
data.
Task type:
Execution mode:
One-time
Daily
Weekly
Monthly
After a scheduled task runs, the system notifies users in either of the following ways:
SM (Short Message)
Task status:
All
Ready
Failed
Running
Suspened
This section describes how to how to manually unlock a locked user, how to create a
temporary user and how to kick out online users as the system administrator.
This section describes how to manually unlock a locked user as the system administrator.
A user wants to log in to the system. If the number of times that the user enters wrong
passwords exceeds the threshold, the user is locked and the IP address is recorded in a
blacklist within a certain duration.
You can unlock the user using the following methods:
Automatic unlocking
Manual unlocking
Typical Instance
The smapa user is locked because the number of times that the user enters wrong
passwords exceeds the threshold. To unlock the user, conduct the following steps.
Typical Instance
You log in to the system as the smapa user at multiple IP addresses. The online user
at only one IP address user is allowed because of insufficient system resources.
To kick out online users smapa.
This section describes how to query operation logs, run logs, security logs, or user logs as
the system administrator.
Operation log
Run log
For example, a run log is generated when business logics fail to run.
Security log
For example, security logs record login success or failure, rights verification
success or failure, and more than three times login attempts.
User log
Log Level:
Emergency
Alert
Critical
Error
Warning
Notice
Information
Debug
3-Error
6-Information
7-Debug