Role Based Security

The different types of Keyfax KeyNect users.

Keyfax KeyNect provides a flexible role-based permissions security model allowing organisation administrators to control what users can access via the Keyfax KeyNect portal. The different types of KeyNect users would typically be...

KeyNect User

KeyNect allows the creation of video calls from a desktop PC to a mobile device through it's Create Calltab in the KeyNect portal. A KeyNect user can have permissions to simply view call resources of calls made by other staff or have permissions to create their own calls and review those calls only (or both - for more details see 'KeyNect Roles').

Keyfax User

KeyNect also works in tandem with Keyfax. The Keyfax video call question allows a call centre script to be authored that included a video call. When the question is 'asked' the name, mobile number and email address of the tenant is auto-populated in the question fields, clicking next at that point:

  1. Sends and SMS to the mobile device with a URL link to the call

  2. Opens the desktop end of the call

The call is connected by the mobile user when they are happy to share their camera feed and videos and still images can be recorded. The URLs to these videos and images are then made available to the Keyfax user and any host software that may have instigated the Keyfax session.

See Starting a Keyfax Call

Call-Centre - Subcontractor User

KeyNect supports the concept of authorised users from another organisation having call-centre rights to use KeyNect on another company's behalf via Keyfax.

This is intended to allow external call-centre contractors to have access to make video calls from Keyfax using KeyNext against a central account managed by the main licensor.

External User (e.g. Out of Office / On Site Engineer)

KeyNect supports the concept of authorised users from another organisation having access to video call resources (videos and images) that they did not themselves create.

This is intended to allow external site-contractors to have read-only access to those resources as required. These users can choose to have read-only access only, or purchase licenses to make their own video calls.

Last updated