Skip Navigation Links.

CDRv5 Client – Database Administration

image for CDRV5 client database administration summary
CDrv5 Database Administration Overview

If your computer is the ‘owner’ of the database and if you have ‘administrative privilege’, you can administer the database. By default, when you install a new CDRv5 database, you are automatically added as a CDRv5 Database administrator and you have full access to all records in the database. If you do not share the CDRv5 Database, you have nothing to do. However, if you share the database, you will need to perform some database administrative tasks and you will need to understand the basic database structure.

The MS-SQL security model supports Database security, Operating System security or mixed mode (both). Your database administrator (perhaps yourself) setup the security model when the MS-SQL Server was installed. The CDRv5 Client software supports all MS-SQL security models.

Understanding Database Security (Authentication)

The MS-SQL security model supports Database security, Operating System security or mixed mode (both). Your database administrator (perhaps yourself) setup the security model when the MS-SQL Server was installed. The CDRv5 Client software supports all MS-SQL security models.

Additionally, the database computer owner must add your Windows username in its CDRv5 User table and give you the desired CDRv5 access privileges. Otherwise, you will not be able to logon or query the database.

However, it is important to understand that the application will use a "mirror” username in its own security model. In other words, the CDRv5 Users table will have a user entry with a user name identical to the OS username. This is the name that is used by the CDRv5 application to manage the application privilege and access. The database can also be shared with other users by adding his/her username in the CDRv5 Database Users table. Nevertheless, the actual database access must also be configured to authorize a user to access the database.

In summary, the security is a two-step process: 1) authorize a domain user to access MS-SQL server using its own security configuration and 2) configuring the CDRv5 Database Users table to allow access to its data.

Understanding the data basic model

CDRv5 Table Description
Roles
  • Defines toll-free and terminating number access privileges
  • Users will be given a role which will determine their privileges
Users
  • Manages the list of users that can use the CDRv5 Database
  • Assign a role defined in the ‘Roles’ table to define the user’s access privileges to the CDRv5 Database records
  • ‘Administrative’ Privileges gives access to the CDRv5 Database administration
    Note: The ‘Password’ field is not used as it has been replaced by the MS-SQL security model. You can leave this field blank.
    Note: The ‘E-mail field will be used to send notifications to users.
    IMPORTANT: The username has to be exactly the same as the user’s Windows username identifier. The system uses that string to link the MS-SQL mix mode security to the CDRv5 Database privileges.
Toll-Free # Used to edit the available Toll-Free number list and assign English and French alias to each number.
Terminating # Used to edit the available Terminating number list and assign English and French alias to each number.
Toll-Free Group Used to create Toll-Free groups that put together sets of associated toll-free numbers. The group can be used in querying and generating reports.
Terminating Group Used to create Terminating groups that put together sets of associated toll-free numbers. The group can be used in querying and generating reports.
Caller Region Used to define geographical regions by specifying sets of originating numbers.


Accessing the Database Administration Features

Navigate to Home and use at the Database Administration group.


Roles

The following features are available:
  • Click ‘+’ to add a role. Click ‘-‘ to delete a role
  • Edit the role name in the in the grid under the ‘ROLENAME’ column or in the ‘Role Name’ edit box
  • Optionally add a user-friendly description to the role in the ‘Role Description’ box.
  • Check the ‘Can View All Toll-Free Numbers’ to give full access or select the ‘Toll-Free Numbers’ tab on the right panel and select individual numbers that can be viewed by that role.
  • Check the ‘Can View All Terminating Numbers’ to give full access or select the ‘Terminating Numbers’ tab on the right panel and select individual numbers that can be viewed by that role


Users

The following features are available:
  • Click ‘+’ to add a role. Click ‘-‘ to delete a CDRv5 User. Note: you cannot delete your own record.
  • The username should be the same as the Windows username credentials. This name is used to map the MS-SQL logon credentials with the CDRv5 Database privileges.
  • Select ‘Administrative Privileges’ to allow the selected user to administer the CDRv5 Database.


Toll-Free & Terminating Tables

For either Toll-Free or Terminating table you can give an alias - user-friendly name – in English and French to each number. By default, the alias is the number itself.


Toll-Free & Terminating Group Tables

The concept of group of numbers is to the members of a groups as one entity for the purpose of querying the database and generating reports. You can create Toll-Free groups and Terminating Groups. First create the group record in the left panel and then add the numbers belonging to the group in the right panel. Numbers can be entered in the grid without formatting symbols such as dash, and parenthesis.


Caller Regions Table

A caller region is a set of numbers that are associated with a telephone exchange which serves a geographical region. You can use default caller regions and create your own. On the left panel, you can name a region in English and French. On the right panel, you define the set of number included to the regions. Caller regions are used in querying and generating reports. You can create a caller region that is very general. For example, an area code defining a provincial region. You can also be very specific. For example, providing full phone numbers.

© 2020 Trillys Systems - CDRV5 Web Support