|Maintenance Notice - PDF Generation|
|Dynamic PDF generation for web-based content is temporarily unavailable. This maintenance affects dynamic PDF files that are generated from either the HTML-based page or manual that you are viewing. Links that normally allow this functionality have been hidden, and will reappear as soon as the feature is restored.
The Capacity Rules window enables you to set Capacity Rules for various operations in your environment. For example, you may choose to set Capacity Rules for how many voice interactions or email interactions, or a combination of both, can be processed at one time.
The Capacity Rules list displays the Capacity Rules in your environment. The list is organized in a hierarchy, starting with Tenants, configuration units, sites, and folders.
This list respects tenancy permission settings. You can access only those objects that you have been granted permission to access.
You can filter the contents of this list in two ways:
- Type the name or partial name of an object in the Quick Filter field.
- Click Tenant Filter to open the Tenant Filter window. In this window, click the check box beside each Tenant that you want to select. Use the Quick Filter field in this panel to filter the Tenant list.
You can sort the items in the list by clicking a column head. Clicking a column head a second time reverses the sort order.
Click a Capacity Rule to view more details about the rule in a new panel that opens to the right. From this panel, you can also edit Access Control. You can perform the following actions:
Creating Capacity Rules[+] Show Procedure
Media Types[+] Show Procedure
Validating Capacity Rules[+] Show Procedure
Deleting Capacity Rules[+] Show Procedure
Copying Capacity Rules[+] Show Procedure
Enabling or Disabling Capacity Rules[+] Show Procedure
The Access Control panel lists the access groups and users that have been configured explicitly with permissions for this object. When you are setting permissions, it is normally performed with the user(s) or access group(s) for which you want to grant access. This feature improves the manner in which permissions are set, and the scope is limited to managing permissions for a single database object. For additional instructions about granting, modifying, and removing permissions, refer to the Genesys Security Deployment Guide. You can perform the following actions: