In Cisco Unified Communications Manager Administration, use the menu path to configure roles.
Roles allow Cisco Unified Communications Manager administrators who have full administration privilege (access) to configure end users and application users with different levels of privilege. Administrators with full administration privilege configure roles and user groups. In general, full-access administration users configure the privilege of other administration users and end users to Cisco Unified Communications Manager Administration and to other applications.
Different levels of privilege exist for each application. For example, for Cisco Unified Communications Manager Administration, two levels of privilege exist: read privilege and update privilege. These privilege levels differ as follows:
- Users with update privilege can view and modify the Cisco Unified Communications Manager Administration windows to which the user group of the user has update privilege.
- A user with read privilege can view the Cisco Unified Communications Manager Administration windows that belong to the roles to which the user group of the user has read privilege. A user with read privilege for a window cannot, however, make any changes on those administration windows to which the user has only read privilege. For a user with read privilege, the Cisco Unified Communications Manager Administration application does not display any update buttons nor icons.
Roles comprise groups of resources for an application. If you want to do so, you can create custom roles that comprise custom groupings of resources for an application. At installation, default standard roles get created for various administrative functions. For example, to configure Audit Log Administration, choose the Standard Audit Log Administration role. When the Role Configuration window displays, click the Read or Update check box for the resource you want to configure and click Save.
Certain standard roles have no associated application nor resource. These roles provide login authentication for various applications.