Understanding User Management
Back to User Management Main Page
Table of Contents
What is User Management?
The User Management module is used to create and manage the User accounts allowed to access CRM.COM, as well as to define authentication policies which will govern the maintenance and access of the Users to the System.
User Management Glossary
Terms | Description |
---|---|
Unit | A Unit represents a body of Users which belong to the same team and follow the same business processes; Users belong to Units. |
Organisational Unit | Organisational Units are used to organise the company’s network and define the collaboration between them (between whom? between Units?). Communities, Groups and Units are all CRM.COM Organisational Units. |
Security Profiles | Security Profiles are used to control User access to various features of the software. Access can be allowed or denied for each CRM.COM module individually. Each User is assigned to only one Security Profile. |
IP Address Pattern | You can define the IP addresses which are allowed or denied access to CRM.COM when logging in with a User. The Allowed or Denied IP Addresses can be defined using a pattern. A pattern consists of a part of the IP address from which Users can access CRM.COM, for example, 10.0.*.*, which represents all of the IP addresses which start from 10.0.x.x. |
Organisation | The database you connect to during login. |
Organisation Group | In case a company consists of multiple organisations (i.e. multiple databases), the organisations can be grouped under a single Group. |
Super Users | Super Users are authorised to access all areas and features of the software, including unrestricted access to Network Management and Security Management. A Super User can only be appointed by another Super User. Super Users can also view more detailed error messages than the rest of the Users. |
Developers | Users with access to the development tools embedded in CRM.COM, and which are available in all Summary pages, Data Entry pages, Analytics and Dashboards. Developers are granted the same permissions as normal Users as far as Network Management and Security Management restrictions are concerned. A developer can only be appointed by a Super User. |
CTI Enabled Users | CTI Enabled: Determines whether a User can access the embedded CTI tools through the Communication Centre screen. As this setting is found under the User Settings section, it can only be edited by Super Users.
|
User State | Defines whether a User is 'Active' or 'Inactive'. 'Active' Users can access the System and can be used for assignment in various entities of the software. 'Inactive' Users cannot access the System or be used for assignments. Information about previously 'Active' System Users which are now 'Inactive' is available to Users. |
LDAP Related Terms | |
Active Directory | Active Directory (AD) is a directory service that Microsoft developed for Windows domain networks and is included in most Windows Server Operating Systems as a set of processes and services. An AD domain controller authenticates and authorises all Users and computers in a Windows domain type network—assigning and enforcing security policies and installing or updating software. For example, when a User logs into a computer that is part of a Windows domain, Active Directory checks the submitted password and determines whether the User is a system administrator or a normal User. Active Directory makes use of Lightweight Directory Access Protocol (LDAP) versions 2 and 3, Microsoft's version of Kerberos, and DNS. |
LDAP | Lightweight Directory Access Protocol is an Internet protocol which is used to access and maintain a distributed organised set of records such as an email or telephone directory through web applications. |
Security Groups | Active Directory Security Groups enable the administrator to group Users according to their rights and permissions. |
User Domain | An IP Address or a string representing an IP Address. This IP Address is assigned to the personal computer of the User. Multiple IP Addresses can exist under the same domain. |
User Management Key Processes and Concepts
Processes / Concept | Description |
---|---|
Creating Users from User Templates | A Template within CRM.COM is used to reduce repetitive manual work. A User Template is used to create multiple Users in the System with the same characteristics. The data that is common between all Users can be added on a Template, leaving only unique values for Users to complete. |
Bulk Users Creation | Users can be created in bulk through a batch process, by using a User Template. Additional settings can be specified for each User, such as a password, email and CTI phone extension. |
Users with multiple Units | A User can be assigned to multiple Units. |
System Access, Super Users & Developers |
|
User Information Panel | The User Information Panel (available under ACCOUNT via the CRM.COM Top Menu Bar) displays the Unit and Group of the User and provides access to the User Data Entry page (to change User information). In case the password needs to be updated, the User will be required to enter both the previous and the new password. If the password change is executed by a Super User, the previous password is not required. |
User Languages |
Both System and Native Languages can be selected through the User Data Entry page either by an Admin or logged in User. |
Integration with Active Directory (Import Current Active Directory Users in CRM.COM) | Already established organisations (with hundreds of Users) which are using Microsoft's Active Directory (See Glossary above) have the option to import their registered Users from Active Directory directly to CRM.COM and map them to CRM.COM User accounts. Mapping Active Directory User accounts to CRM.COM accounts, provides the options to:
|
IP Authorisation Rules | IP Authorisation Rules are used to define IP addresses from which Users can access CRM.COM or IP addresses from which Users cannot access CRM.COM. Each IP Authorisation Rule contains a set of restrictions representing the Allowed and Denied IP Addresses. An IP Address restriction can either be a specific IP address, a range of IP Addresses or an IP Address Pattern. Each IP Authorisation Rule also contains a set of conditions which define the set of Users to which the rule applies. This set of conditions includes Users, Units, Groups or Communities in any required combination. Multiple IP Authorisation Rules can be configured and used as long as they are in 'Active' state. |
Password Expiration & History AVAILABLE FROM CRM.COM R10.0.0 | A User Password can be set as 'Valid' for a limited period. If a password is expiring in the next seven days, the System informs the Users about the number of days left upon login. The same password can never be selected by the same User. The process is also available for Active Directory Users
|
Control of User related Policies per Organisation Group AVAILABLE FROM CRM.COM R10.0.0 | User Authentication Policies is a module used to define various policies regarding User Settings, such as for passwords, Usernames and login attempt rules, which are used throughout a User's Life Cycle. If a Business requires multiple Organisations (CRM.COM databases), it can create multiple "User Authentication Policies" each one applicable for each Organisation Group. |
Viewing & Access Controls
Network Characteristics define the level of access for each record. i.e. whether it will be available for selection, viewing or editing.
Entity | Network Characteristics | Description |
---|---|---|
Users |
| |
User Templates |
|
User Management Related Modules
Entity | Interaction of Users with Entity |
---|---|
Contact Information | A Contact Information is available for each User in the System. |
Units | User access rights in the System are assigned through the Units the Users belong to. |
Security Profile | Access to modules is allowed or restricted based on the single Security Profile each User belongs to. |
Activities | Activitiesare assigned to Users. |
Service Requests | Service Requests are assigned to Users. |
Jobs | Jobs are assigned to Users. |
Leads | Leads are assigned to Users. |
User Management - Business Examples
The following section provides business examples of how the CRM.COM User Management module is used.
Company ZX wants to set up a User account for their Marketing Manager
Business Requirement
Company ZX wants to set up a User account for their Marketing Manager with the following requirements:
- Country: Finland.
- Language: The System language should be English, but Finnish terms should be available when the User hovers over labels with the mouse.
- Demographics: Male.
- Access Rights: Full Access rights. Any restrictions and rules defined in any CRM.COM module should not be applied to this User.
- The Home Screen should be set to Analytics.
CRM.COM Solution
- Configuration
- Create New User
- Enter main information:
- Username
- Full Name
- System Language: English
- Native Language: Finnish
- Password
- Demographics:
- Gender: Male
- Native Language: Finnish
- Country of Residence: Finland
- Preference:
- Analytics
- Settings
- Security Profile: Team Managers
- State: Active
- Units:
- Marketing Unit
- Save User
- From User's screen:
- Actions: Change Settings
- Enable: is Super User
- Enable: is Super User
- Actions: Change Settings
More Information on creating Users can be found at: Managing Users.
Use Templates to create Users for Call Centre Agents
Business Requirement
Company ZX wants to set up a User Template for their Call Center Operators to create a new User every time a new Call Centre agent is hired.
- Country: Finland.
- Language: The System language should be English, but Finnish terms should be available when the User hovers over labels with the mouse.
- Home Screen should be set to Communication Centre.
CRM.COM Solution
- Create Template
- Enter main information:
- Template Name: CustomerServiceEnglish
- System Language: English
- Native Language: Finnish
- Demographics:
- Native Language: Finnish
- Country of Residence: Finland
- Preferences:
- Communication Center
- Settings:
- Security Profile: Call Center Agents
- State: Active
- Check: Super User, Developer, CTI Enabled
- Domain: www.companyTV.com
- Units:
- isDefault: Admin Unit
- Additional: Marketing Unit
- Enter main information:
- Create New User
- Enter main information:
- Template: CustomerServiceEnglish
- Username: m.jones
- Full Name: Maria Jones
- Email: m.jones@companyTV.com
- Password: (make sure the password meets the System requirements)
- Demographics:
- Title: Mrs
- Date of Birth: 1 May 1975
- Name Day: 15 August
- Settings
- Phone Extension: 2175
- Enter main information:
More Information on Creating User Templates can be found at: Configuring User Templates.
Company ZX wants to generate Bulk User accounts for their Call Center using an existing User Template
Business Requirement
Company ZX wants to create 10 User accounts in bulk for their Call Center Operators using an existing Template:
CRM.COM Solution
- Configuration
- Create New User Template: Customer Service English
- Template should also have
- Domain
- CTI Enabled
- Template should also have
- Bulk Users Creation
- Enter main information:
- Template: Customer Service English
- Number of Users: 10
- Password Settings: Same as Username
- Email Settings: Username@domain
- Enter Users to be Generated:
- Click CREATE
- For each User row specify:
- Username
- First Name
- Last Name
- Phone
- Click SET EMAIL
- Click SET PASSWORD
- Edit the password to meet the System Requirements
- Confirm the password
- Click SET AS ACTIVE
- Enter main information:
- Click SUBMIT
- Create New User Template: Customer Service English
More Information on Creating Users in Bulk can be found at: Bulk Users Creation.
Related Areas
-
Configuring User Authentication Settings — Learn to configure User Authentication Settings
-
Configuring User Templates — Learn to configure User Templates
-
Understanding User Management — Understand the usage of User Management within CRM.COM
-
Managing Users — Learn to work with Users
-
Bulk Users Creation — Learn how to generate a large volume of Users using User Templates
-
Handling Invalid Login Attempts — Learn to handle Invalid User Login Attempts