Configuration
In this section of the platform, you can manage a lot of things related to the logs of the system, the security, specifics configurations and the flows!
Log
In this section, you can manage the logs of the system that can be useful to find and fix issues of the platform. There are 9 different types of logs.
Types of logs
- Application: This log will show every error or important message from the server.
- Dependencies: This log will show show the information of every dependency.
- Flows: This log will show the information of every flow going through the system.
- Database: This log will show every query to a database and his result.
- Telephony: This log will show show the information of telephony.
- Black list: This log will show the information of everything that goes through the blacklist flow.
- Auditory: This log will show the information of request sended to the server from the portal.
- API: This log will show the information of request sended to the server from the portal.
- External services: This log will show the request from uContact and his response from an external services.
Levels
Also, there are 9 levels for the logs, are the following:
- Severe
- Warning
- Info
- Fine
- Debug
- Finer
- Finest
- Trace
- All
Security
In this section you can configure the mandatories settings and the format of the passwords. Below are the inputs
Password expiration (days)
The password is going to expire after this days and the user will need to change it to log in.
Login failed attempts
After this amount of failed attempts, the account is going to be blocked.
Last used passwords
This configuration remember the last used passwords, so the agent can´t use one of last passwords depending on the number that you configure there.
Disable inactive user (days)
After this quantity of days, if the user not log in into uContact, the account is going to be disable.
Password format
Passwords can have specifics settings and format.
Lowercase
If you enable this option, password must include at least a lowercase letter.
Capital letters
If you enable this option, password must include at least a capital letter.
Numbers
If you enable this option, password must include at least a number.
Special characters
If you enable this option, password must include special characters.
Minium length
If you input this option, password must have a lenght major than the number.
Agents
Interaction timeouts (seconds)
The time that it takes for the interaction to return to the queue after the agent loses connection. If not set, it returns inmediately.
Allow spy screen
It allows spying and recording the screen of the agents, they must enable browser permissions and shared their screen.
System
Address
Portal address.
Local address
Portal address IP.
User
Uses root user by default but other user could be defined. (AsteriskUser)
Password
User password Operating System of the PBX (default: password is that you must install the operating system), changing here also changes automatically in the OS, not directly change the operating system because the system will fail. (AsterisUserPass)
uContact Server Address
IP of PBX server. (AsteriskIP)
External IP
Apps server IP.
External Asterisk IP
Asterisk SSH Port
Port to connect through SSH. (AsteriskSSHPort)
Default connector
Defines the email default connector for the email channels.
Email alerts
Stun/Turn
Stun server
Stun's server address, allows the NAT clients to configure calls to a VOIP provider located outside from their local network.
Turn host
It is used to make calls on NAT networks, it is necessary to provide a host, user and password.
User
Unique name that identifies TURN.
Password
TURN password.
User turn in calls
Use turn in shared screen
Flows
In this section you will find all the flows that were created. You can see the detaild of each one and modify or delete if you want and have permissions.