Architecture

How does Call2Unlock work from the IT administrators perspective?

 

Call2Unlock has basically 3 components

  • IVR Engine

    phonesign

    This component interacts with the Corporate PBX of the company, sending audio messages to the user and getting the DTMF inputs from the user

  • LDAP command Engine

    icon

    interacts sending the appropriate commands to the Active Directory servers to perform the unlock or reset of the accounts in a secure and encrypted communication.

  • Web User Interface.

    icon

    Web site for Administrators, to  configure the system,, get reports, and self service pages, for end users, where they  can provide extra information like PIN numbers and secondary emails..

architecture
  1. Call2Unlock can be installed in any physical or virtual machine.

Is placed within the private network of the company, behind the private firewall. That makes Call2Unlock, a secure system.

 It can be directly integrated with any existing PBX in the company.

Call2unlock is also compatible with any Active Directory 2003 or higher.

You can associate phone extensions to users. So, users could apply changes, only if they call from their assigned extensions. Also External Calls can be allowed, by the administrator, adding the personal or external phones in a secure white list.