User`s guide

6-74 Setting up Meridian Mail security
Overview
Standard 1.0 System Administration Guide January 1998
Overview
Introduction
You can use the following to control access to PBX
administration programs:
Password control
- Level 1 password
- Level 2 password
For more information, see “Password control” on
page 6-75.
Limited access to overlays
For more information, see “Limited access to overlays” on
page 6-77.
Limited access password—user name
For more information, see “Limited access password—user
name” on page 6-78.
Single Terminal Access (STA)
For more information, see “Single Terminal Access” on
page 6-79.
Multi-user login
For more information, see “Multi-user login” on page 6-80.
Input/Output port recovery
For more information, see “Input/Output port recovery” on
page 6-81.
History file
For more information, see “History file” on page 6-82.