Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.



Html
<div id="fb-root"></div>
<script>(function(d, s, id) {
  var js, fjs = d.getElementsByTagName(s)[0];
  if (d.getElementById(id)) return;
  js = d.createElement(s); js.id = id;
  js.src = 'https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v2.11';
  fjs.parentNode.insertBefore(js, fjs);
}(document, 'script', 'facebook-jssdk'));</script>

...

Info

Hotel Manager is a part of Wildix WebAPI library. This document explains how to configure and to use Hotel Manager extension.

Created: December 2018

Updated: March 2021

Permalink: https://confluence.wildix.com/x/8IPIAQ

Table of Contents

Introduction

...

For managing restrictions and ACL for calls placed from hotel rooms, create a separate ACL group in WMS → Users → Groups-> Users ->Groups


Note

Note that rooms will be displayed in Hotel Manager interface by their ACL group. This means, in case you would like to group your rooms by, for example, floor they are located on, you should create several ACL groups. You can enable one ACL group to inherit from another one. More information on ACL groups in the document: ACL rules and Call classes management.

...

Info

You can also use Hotel Manager in the following ways:

  • use Hotel Manager on your web server accessible via HTTP/HTTPS - download the JavaScript library from the dedicated server: the new version (starting from WMS 5.02.20201015.2)/ the old version and then upload the Hotel Manager folder on your server
  • upload Hotel Manager on your Wildix PBX - follow the instructions published in WebAPI documentAccess WebAPI Demo 

To access the Hotel Manager page, select the PBX user to use for access to the Hotel Manager interface (receptionist), and make sure that:

...

Enable PIN bypass for ACL restricted calls

This feature may often be applied to phones located in hotel common areas or in conference rooms. Here is an example:

  1. User dials a number that is restricted on this phone (for example, international phone number)

  2. User is prompted for the PIN since the call is not allowed from this phone normally

  3. User enters the PIN and if allowed based upon the entered PIN, the system routes the call to the restricted destination

...