Table of Contents
Identifications Module Overview
The Identifications Module allows callers to be recognised using stored database information. Identified callers can be routed through a specific call flow or excluded from certain services based on predefined criteria.

Advantages of Caller Identification
Identification enables organisations to:
- Track call volumes per office or department.
- Personalise service based on caller identity.
- Restrict or prioritise access for certain callers.
Example Scenario
A multinational company’s technical helpdesk supports ICT-related queries worldwide. Using caller identification, the system:
- Tracks call volumes from different offices.
- Displays caller details in the agent’s application.
- Routes authorised callers to the international helpdesk.
- Groups callers by office for more efficient reporting.
Similar use cases include:
- Offering premium service to paying customers.
- Differentiating new vs. returning callers.
Caller Identification Methods
Method | Description |
---|---|
CLI – Calling Line Identification | Stores the caller’s phone number for recognition. Allows routing based on wildcards (* ) or ranges (- ), useful for sorting calls by country or area code. |
DNIS – Dialed Number Identification Service | Recognises callers based on the number they dialled. Used when organisations assign dedicated numbers for specific groups. |
CHNL – Channel Number Identification | Identifies calls using the Channel Number. |
PID – Personal Identity (PIN-based identification) | Requires callers to enter a unique PIN to verify their identity, often used for premium services or secure personal calling. |
PID with Confirmation | Same as PID, but requires the caller to confirm their PIN entry before proceeding. |
Subject-Based Identification | For Text Channels, calls can be identified based on their subject line, enabling more contextual routing. |
Benefits of Caller Identification
- Displays caller details in the agent’s Client application.
-
Enables customised call flows, such as:
- Routing callers to dedicated services or departments.
- Playing personalised prompts, e.g., "Safe and Sure welcomes you to Gold Service Assistance."
-
Allows call prioritisation:
- Identified callers can be placed higher or lower in the queue based on priority settings.
Each Identification Module is linked to an Identification List, containing the stored caller data.
Step 1: Create an identification list
The Identification List enables multiple Identification Modules to reference a single member list, improving efficiency in caller identification. This allows for sequential identification, such as CLI first, followed by PID.

1. Access Identification Lists
- In the Explorer Pane, navigate to Voice > Identification Lists.
- A list of existing Identification Lists will be displayed.
2. Create a New Identification List
- Click Add.
- Assign a logical name to the Identification List.
- Click Add to save.
3. Configure Identification Members
- Select the newly created Identification List.
- Click on the Identification Members tab.
- Click Add to insert new members.
4. Identification Member Fields
Field | Description |
---|---|
Name | Enter the caller’s name, or if identifying a group of callers, enter the group or service name. |
IdentificationNumber | If PID identification is used, enter the PID number per member. |
Description | Displays caller details in the Agent application Client (e.g., user type, organisation, status). |
Telephone Number | If CLI identification is used, this number will serve as the reference. Wildcard (* ) or range (- ) entries are supported.
|
$USER Entry | This entry checks whether the number belongs to a registered user, including guest and external users. |
Email Address | Displays the caller’s email in the Client application. |
LinkInstance | Specifies the next module assigned to this caller. |
Module Type | If no next module is assigned, the default action is executed. |
Note: The $USER
entry is always checked last in an Identification List.
5. Importing Members into an Identification List
Export Existing Data First
- Select the Identification List you wish to update.
- In the Identification Members tab, enter details for one member.
- Click Export to save a CSV file.
- Choose a location to store the exported file.
Edit & Import Data
- Open the exported file in Microsoft Excel.
- Add new members and fill in their data.
- Click Import and select the updated CSV file.
- Click OK to complete the import.
Note: A duplicate check is performed based on:
- Identification Number
- Telephone Number
- Email Address
Step 2: Create an identification
The Identification Module allows callers to be recognised based on pre-stored information and routed accordingly. You can configure various identification methods to enhance call handling.

1. Access Identification Settings
- In the Explorer Pane, navigate to Phone & Text > Identifications.
- A list of existing Identification Modules will be displayed.
2. Create a New Identification Module
Click Add to create a new Identification Module.
Configure the following settings:
Name – Assign a name to the module (displayed in reports).
Identification Method – Select how the caller should be recognised:
- CLI – Calling Line Identity (matches stored phone numbers).
- Called Phone Number – Recognises calls based on the dialled number (DNIS).
- PID – Personal Identity (requires callers to enter a PIN).
- PID with Confirmation – Same as PID, but requires PIN confirmation.
- Channel Number – Identifies calls based on the Channel Number.
Identification List – Select the list of members used by this module.
Copy Fields (Default = Always) – Controls which caller details appear in the Client application:
- Always – Caller details are always displayed in the Client.
- When Empty – Displays UCS User details if the identified caller is a UCS User.
- Never – Caller details are not displayed.
3. Identification Code Settings
If PID or PID with Confirmation is used, enter the following details:
Request Input Prompt – The prompt played when the caller enters the Identification Module (e.g., "Please enter your personal registration number and end with a Hash.").
Max Number of Digits – Specifies the maximum digits allowed for the PID.
- The system processes input when the caller presses "#".
-
Processing delays follow the UMC Messagebox settings:
- First Digit Timeout – Maximum wait time for the first digit.
- Time Between Digits – Maximum wait time between entries.
Max Number of Retries – Defines how many times the caller can re-enter the PID.
- If the caller exceeds the limit, they will be routed to the Error Action (see below).
4. Exception Handling
- Error Prompt – The message played if the caller fails identification.
- Error Action – The fallback destination for failed identification attempts.
- Default Action – If an identified caller has no assigned next module, they will be routed to the Default Action.
5. Save the Identification Module
- Click Add to save your changes.