Previous Page Next Page

Conference security

You manage conference security in two principal ways:

Permissions, such as the ability to attach documents to messages, are defined at the group level. Access to particular forums within a conference is defined at the conference level.

For any conference, you define the groups you want to have access to that conference. And for any forum in the conference, you can define which groups will have access to that forum. This process of narrowing access allows you to predefine exactly who you want to have access to your conferences and what features you want to make available.

Conference and forum security

Since all conferences consist of forums, groups, and users, you can define very specific access to forums where messages are viewed and exchanged. Since each forum you create must be explictly assigned to one or more conferences, you can organize your conferences and forums to achieve very specific conferencing goals.

User and group security

You choose from three levels of access to control who logs in to your conference.

  1. You can force users to register themselves before logging in.
  2. You can require each user to be approved prior to entering a conference. This can allow an administrator to assign a user awaiting approval to a specific group that has the access rights appropriate to that particular user type. When the user logs in following approval, access is defined by the rights available to the user’s assigned group. Users awaiting approval to enter a conference automatically receive notification by email once their registration has been approved or denied.
  3. You can force all users to log in prior to entering a conference.

Message security

You can set up your conference so that messages must be approved by a conference moderator before they are actually posted to the conference. Moderators can be defined for each conference to approve messages and users. Users who post messages to a conference that requires message approval receive automatic notification by email once their message has been approved or denied.

Previous Page Page Top Next Page