cbs icbs system management

51
 

Upload: burhan

Post on 01-Mar-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 1/50

 

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 2/50

 

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 3/50

This section describes the process of system configuration and functions which the system

management provides.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 4/50

This part describes the process of creating a user.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 5/50

This part describes how to manually unlock a locked user, how to create a temporary user

and how to kick out an online user as the system administrator.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 6/50

The system management provides the following other functions:

Managing user access

Set the restrictions on users

Change the date and time format

Managing a task

Managing log query

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 7/50

This section describes how to create a region, an organization, and an employee.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 8/50

Relationship between concept

One-to-many relationship between region and organization

One organization maps one region while one region may map multiple

organizations.

One-to-many relationship between organization and employee

An employee must belong to an organization while an organization may have

multiple employees.

One-to-many relationship between employee and user

A user can map either an employee or a partner.

An employee can map multiple users.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 9/50

This figure describe the procedure of creating a region, an organization, and an employee.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 10/50

This is a typical configuration instance.

Jiangsu is a Province of China.

You can configure the region code according your planning, you can’t use the same

region code for the difference region.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 11/50

Typical instance:

Nanjing is a city of Jiangsu.

When you do the practice, you can configure this part according your country.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 12/50

This is a typical configuration instance.

ABC Telecom Company is an operator in Nanjing.

You can configure the region code according your real information.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 13/50

This is a typical configuration instance.

Besides the OM department, telecom company should have:

IT department

Finance department

Please configure this part according your real department information.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 14/50

This is a typical configuration instance.

Li Hang is a staff of ABC Telecom Company, OM Department.

You can configure the staff number according your company rule, if your company

hasn’t the rule of staff number, please use unique number for difference staff. 

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 15/50

If you can query the staff information under the department, that means your

configuration of region, organization and staff are successful.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 16/50

This section describes how to create a user as the sysadmin user.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 17/50

The system supports three types of users: Default user, Temp user, and Common user.

NOTE:

A temporary user can log in to the system for one time and use the password

directly for login.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 18/50

This is the user planning.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 19/50

Please Create the user smapb by following step2.

User type:

Common user

Temp user

User source:

Employee

Partner

Type of IP address

None

Blacklist

Whitelist

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 20/50

This section describes how to specify a role, a user group, region rights, and interface

rights for a user as the system administrator.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 21/50

A role is a set of menu and button rights, common rights, and interface rights of the

system. The user with an assigned role has the menu rights and function rights of the role. Roles are classified into two types:

Default role.

Common role.

NOTE:

The default roles cannot be deleted while common roles can be customized.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 22/50

You can assign a role to a user using the following methods:

Assigning a role to a user directly

Assigning a role to a user group and adding users to the group

NOTE:

Only the default users sysadmin and AccountAdmin have the rights of default

roles. Default roles must not be assigned to customized users.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 23/50

User 

A user with an assigned role has the menu rights and matching function rights ofthe role.

The user sysadmin is a supper user who has all the menu rights and matching

function rights of the system.

You can create the following users as the sysadmin user:

System administrator: The user has the rights of system management menus

(including the submenus) and matching function rights.

Product management administrator: The user has the rights of productmanagement menus (including the submenus) and matching function rights.

Service administrator: The user has the rights of the following menus

(including the submenus) and matching function rights of Resource

management, Charging management and Service management.

Service handling operator: The user has the rights of individual service

management menus (including the submenus) and matching function rights.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 24/50

 

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 25/50

This is a typical configuration instance.

smapa and smapb belong to Nanjing Region.

We can use two ways to assign the role to the user

smapa: assigning rolex to smapa directly.

smapb: assigning rolex to user group and adding the smapb to the user group

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 26/50

Set the interface parameters as follows:

Method name = web

Display order = 1

Permission ID = access

Response Duration (ms) = 10

Retain default values for other parameters.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 27/50

Set the role parameters as follows:

Role name = rolex

Role type = Common role

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 28/50

User type:

All

Default user

Common user

Temp user

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 29/50

Add User Group steps:

User Group Information

Role Information

Authorized Node

Authorized Region

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 30/50

Modify user information steps:

User Information

User Group Information

Role Information

Authorized Node

Authorized Region

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 31/50

Notes:

You need change the initial password when you log in for the first time.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 32/50

Operation for smapb:

Enter the user name and initial password.

The system prompts you to change the initial password.

Change the initial password and click OK.

The system displays the home page.

Click Console.

Choose Operator from the navigation tree.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 33/50

This section describes how to configure access policies and how to set the restrictions on

users who log in to the system on Web pages as the system administrator.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 34/50

Blacklist

Users are not allowed to log in to the system by using IP addresses in blacklists, butthey can log in to the system by using IP addresses in other lists.

Whitelist

Users can log in to the system by using only the IP addresses in whitelists.

You can set whitelists or blacklists, or do not set any one.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 35/50

Policy Type:

Web Service Security

Web Security

Flow Control

Name List Type

None

Blacklist

Whitelist

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 36/50

Prerequisites

Before we configure the Control Web Access, we need first configure the accesspolicy.

For example: the access policy named limit login has been configured.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 37/50

This section describes

How to change the date and time format as the system administrator.

How to create a scheduled task that runs at the preset time as the system

administrator.

How to manually unlock a locked user, how to create a temporary user and how to

kick out online users as the system administrator.

How to query operation logs, run logs, security logs, or user logs as the system

administrator.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 38/50

 

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 39/50

Data Format:

yyyy-MM-dd

MM-dd-yyyy

Time Format:

HH:mm:ss

HHmmss

Date and Time Format:

yyyyMMddHHmmss

Yyyy-MM-dd HH:mm:ss

MM-dd-yyyy HH:mm:ss

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 40/50

Scheduled tasks are configured to delete logs, recycle mobile numbers, and synchronize

data.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 41/50

Task type:

You can select from the dropdown box.

Execution mode:

One-time

Daily

Weekly

Monthly

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 42/50

After a scheduled task runs, the system notifies users in either of the following ways:

SM (Short Message)

Email

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 43/50

Task status:

All

Ready

Failed

Running

Suspened

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 44/50

This section describes how to how to manually unlock a locked user, how to create a

temporary user and how to kick out online users as the system administrator.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 45/50

This section describes how to manually unlock a locked user as the system administrator.

A user wants to log in to the system. If the number of times that the user enters wrongpasswords exceeds the threshold, the user is locked and the IP address is recorded in a

blacklist within a certain duration.

You can unlock the user using the following methods:

Automatic unlocking

The locked user will be unlocked automatically after a certain duration.

Manual unlocking

Choose Operator > Unlock to unlock the user.

Typical Instance

The smapa user is locked because the number of times that the user enters wrong

passwords exceeds the threshold. To unlock the user, conduct the following steps.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 46/50

Typical Instance

You log in to the system as the smapa user at multiple IP addresses. The online userat only one IP address user is allowed because of insufficient system resources.

To kick out online users smapa.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 47/50

This section describes how to query operation logs, run logs, security logs, or user logs as

the system administrator. Operation log 

For example, an operation log is generated when an operator adds a

scheduled task or product.

Run log 

For example, a run log is generated when business logics fail to run.

Security log 

For example, security logs record login success or failure, rights verification

success or failure, and more than three times login attempts.

User log 

For example, a user log is generated when a user registers a subscriber.

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 48/50

Log Level:

Emergency

Alert

Critical

Error

Warning

Notice

Information

Debug

Operation Log Level

3-Error

6-Information

7-Debug

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 49/50

 

7/25/2019 CBS ICBS System Management

http://slidepdf.com/reader/full/cbs-icbs-system-management 50/50