Skip to content

Configuration

In this section of the platform, you can manage a lot of things related to the logs of the system, the security, specifics configurations and the flows!

Log

In this section, you can manage the logs of the system that can be useful to find and fix issues of the platform. There are 9 different types of logs.

Types of logs

  • Application: This log will show every error or important message from the server.
  • Dependencies: This log will show show the information of every dependency.
  • Flows: This log will show the information of every flow going through the system.
  • Database: This log will show every query to a database and his result.
  • Telephony: This log will show show the information of telephony.
  • Black list: This log will show the information of everything that goes through the blacklist flow.
  • Auditory: This log will show the information of request sended to the server from the portal.
  • API: This log will show the information of request sended to the server from the portal.
  • External services: This log will show the request from uContact and his response from an external services.

Levels

Also, there are 9 levels for the logs, are the following:

  • Severe
  • Warning
  • Info
  • Fine
  • Debug
  • Finer
  • Finest
  • Trace
  • All

Security

In this section you can configure the mandatories settings and the format of the passwords. Below are the inputs

Password expiration (days)

The password is going to expire after this days and the user will need to change it to log in.

Login failed attempts

After this amount of failed attempts, the account is going to be blocked.

Last used passwords

This configuration remember the last used passwords, so the agent can´t use one of last passwords depending on the number that you configure there.

Disable inactive user (days)

After this quantity of days, if the user not log in into uContact, the account is going to be disable.

Password format

Passwords can have specifics settings and format.

Lowercase

If you enable this option, password must include at least a lowercase letter.

Capital letters

If you enable this option, password must include at least a capital letter.

Numbers

If you enable this option, password must include at least a number.

Special characters

If you enable this option, password must include special characters.

Minium length

If you input this option, password must have a lenght major than the number.

Agents

Interaction timeouts (seconds)

The time that it takes for the interaction to return to the queue after the agent loses connection. If not set, it returns inmediately.

Allow spy screen

It allows spying and recording the screen of the agents, they must enable browser permissions and shared their screen.

System

Address

Portal address.

Local address

Portal address IP.

User

Uses root user by default but other user could be defined. (AsteriskUser)

Password

User password Operating System of the PBX (default: password is that you must install the operating system), changing here also changes automatically in the OS, not directly change the operating system because the system will fail. (AsterisUserPass)

uContact Server Address

IP of PBX server. (AsteriskIP)

External IP

Apps server IP.

External Asterisk IP

Asterisk SSH Port

Port to connect through SSH. (AsteriskSSHPort)

Default connector

Defines the email default connector for the email channels.

Email alerts

Stun/Turn

Stun server

Stun's server address, allows the NAT clients to configure calls to a VOIP provider located outside from their local network.

Turn host

It is used to make calls on NAT networks, it is necessary to provide a host, user and password.

User

Unique name that identifies TURN.

Password

TURN password.

User turn in calls

Use turn in shared screen

Flows

In this section you will find all the flows that were created. You can see the detaild of each one and modify or delete if you want and have permissions.

uContact by net2phone