User`s guide
6-74 Setting up Meridian Mail security
Overview
Standard 1.0 System Administration Guide January 1998
Overview
Introduction
You can use the following to control access to PBX
administration programs:
• Password control
- Level 1 password
- Level 2 password
For more information, see “Password control” on
page 6-75.
• Limited access to overlays
For more information, see “Limited access to overlays” on
page 6-77.
• Limited access password—user name
For more information, see “Limited access password—user
name” on page 6-78.
• Single Terminal Access (STA)
For more information, see “Single Terminal Access” on
page 6-79.
• Multi-user login
For more information, see “Multi-user login” on page 6-80.
• Input/Output port recovery
For more information, see “Input/Output port recovery” on
page 6-81.
• History file
For more information, see “History file” on page 6-82.