User`s guide

6-24 Setting up Meridian Mail security
Authorization Codes
Standard 1.0 System Administration Guide January 1998
Authorization Codes
Introduction
Authorization codes allow users to place business calls from
stations normally restricted from doing so. These restricted
stations may be located in areas of public access or used by
employees who do not require broader calling privileges.
How it works
Authorization codes enable selected users to temporarily
override the access restrictions assigned to a station or a TIE
trunk. A user enters an authorization code which has an
associated Class of Service (CLS), TGAR, and Least Cost
Routing or Network Class of Service (NCOS). The user has the
calling privileges of the authorization codes rather than those of
the station or TIE trunk for the duration of the call.
Considerations
When you implement the Authorization Code feature, you
should consider making the authorization codes as long as your
corporate culture will allow, assigning unique authorization
codes to each user, and allowing calling privileges based on
user requirements.
You can also output the codes as part of the Call Detail Records
(CDR) to look for call patterns that indicate possible
unauthorized access or abuse. You should design and
implement procedures for assigning authorization codes to new
employees and for deleting codes that are no longer valid
because of attrition or abuse.
Note:
You may use authorization codes to override the station
restrictions imposed through the Least Cost Routing software.
Implementing and
auditing the feature
Use the following table to determine which overlay programs
and prompts should be used for implementing or auditing the
Authorization Codes feature.
For
Implement using Overlay
programs/features prompts Print using Overlay programs
Authorization codes LD88—all prompts LD 88 by authorization code