Skip Navigation Links.
Server Software Update
Server License Managment
Server Storage Management
Server Module LM
Server Module DM
Server Module RT
Server Module SW
Queried Call Completion
Queried Network Call Analysis
Queried Customer Service
Queried Peak Volume
Installation and Configuration – CDRv5 Client
Create a new folder. For example: 'C:\CDRv5Client'
Copy all files from the CDRv5 Client package into the newly created folder. If the package is in a ZIP file, unzip the files into the newly created folder
The package contains a file called "CDRv5Client.EXE". This application is all you need to configure, monitor and use the application:
Optionally, you can create a shortcut and place it on your desktop. Right-click on "CDRv5Client.EXE" and click on "Create shortcut". Move the shortcut on the desktop
Optionally, you can pin "SiteAdminVCL.EXE" to the taskbar. Right-click on "CDRv5Client.EXE" and click on "Pin to Taskbar"
Optionally, you can pin to Start menu. Right-click on "CDRv5Client.EXE" and click on "Pin to Start"
CDRv5 Customer Server Software Package: This package consists of a set of files required to run the CDRv5 Customer Server software.
A license file and a license key: The license file will be named 'TrillysSystemsCdrServer_Ent_XX_XX.INI' where 'XX' are unique identifier. The license key is a string formatted as 'XXXX-XXXX-XXXX-XXXX'. You should have received it separately. Note that you will also receive other license files/keys for other components. The license file name prefixes are different for every product.
Administrative Privileges: You must have administrative privileges and be able to install services.
NOTE: Uninstalling the application requires you to delete the folder. The application will leave no other trace
Initial Configuration Procedures (Getting Started)
The first time CDRv5 Client launches; it will go thru the connectivity wizard. This wizard will guide you as to how to configure your application. The wizard will allow you to override any configuration parameters. Any parameter can also be reconfigured at any time.
Step 1 will scan the local area network for available CDRv5 Server(s). You can select the server you want from the list. If no server is shown, you can type the IP address of the anticipated CDRv5 server. Click 'OK' to accept the change, or click 'Skip'
Step 2 will scan the local area network for any existing MS-SQL servers and any existing CDRv5 Database. The list will show the SQL server and will put a check mark against the servers that host a CDRv5 Database. You have many choices:
Use an existing CDRv5 Database
Install "SQL Server 2014" before continuing. This requires you to have purchased and obtained MS-SQL 2014 installation kit
Install "SQL Express 2014" which is distributed with this application. SQL Express 2014 is limited to 10GB of storage and can be used with low volume of call records
Once you have automatically or manually configured a MS-SQL Server, you can use the "Create CDRv5 Database on Selected Server" to create an empty database
Step 3 - create a CDRv5 database requires that you provide the proper security credentials and click on "Create Database"
Understanding Database Ownership
Each CDRv5 Database has an "Owner" computer. The owner computer is the only computer that can update the database with new CDR and CPM records. Other computers can only use the database for query purposes. The owner computer can also perform database administration tasks such as defining new users.
Understanding Database Security
The MS-SQL security model supports Database security, Operating System security or mixed mode (both). You database administrator (perhaps yourself) setup the security model when the MS-SQL Server was installed. The CDRv5 Client software supports all MS-SQL security models. However, it is important to understand that the application will use a "mirror” username in its own security model.
In other words, the CDRv5 Users table will have a user entry with a user name identical to the OS username. This is the name that is used by the CDRv5 application to manage the application privilege and access. The database can also be shared with other users by adding his/her username in the CDRv5 Database Users table. Nevertheless, the actual database access must also be configured to authorize a user to access the database.
In summary, the security is a two step process: 1) authorize a domain user to access MS-SQL server using its own security configuration and 2) configuring the CDRv5 Database Users table to allow access to its data.
No Video Available Currently