Jump to: navigation, search

Capacity Rules

The Capacity Rules window enables you to set Capacity Rules for various operations in your environment. For example, you may choose to set Capacity Rules for how many voice interactions or email interactions, or a combination of both, can be processed at one time.

The Capacity Rules list displays the Capacity Rules in your environment. The list is organized in a hierarchy, starting with Tenants, configuration units, sites, and folders.

Important
Capacity rules that are disabled will appear grayed out in the list.

This list respects tenancy permission settings. You can access only those objects that you have been granted permission to access.

You can filter the contents of this list in two ways:

  • Type the name or partial name of an object in the Quick Filter field.
  • Click Tenant Filter to open the Tenant Filter window. In this window, click the check box beside each Tenant that you want to select. Use the Quick Filter field in this panel to filter the Tenant list.

You can sort the items in the list by clicking a column head. Clicking a column head a second time reverses the sort order.

Click a Capacity Rule to view more details about the rule in a new panel that opens to the right. From this panel, you can also edit Access Control. You can perform the following actions:

Creating Capacity Rules

[+] Show Procedure

Media Types

[+] Show Procedure

Validating Capacity Rules

[+] Show Procedure

Deleting Capacity Rules

[+] Show Procedure

Copying Capacity Rules

[+] Show Procedure

Enabling or Disabling Capacity Rules

[+] Show Procedure

The Access Control panel lists the access groups and users that have been configured explicitly with permissions for this object. When you are setting permissions, it is normally performed with the user(s) or access group(s) for which you want to grant access. This feature improves the manner in which permissions are set, and the scope is limited to managing permissions for a single database object. For additional instructions about granting, modifying, and removing permissions, refer to the Genesys Security Deployment Guide. You can perform the following actions:

Creating Access Permissions

[+] Show Procedure

Changing Access Permissions

[+] Show Procedure

Deleting Access Permissions

[+] Show Procedure

Feedback

Comment on this article:

blog comments powered by Disqus
This page was last modified on 20 November 2015, at 13:33.