The only current way to do this would be to use IVR.
The person wanting to make the call would dial an access code for an IVR, the script would ask for auth code, then Telephone number. The IVR can then check to see if the code is valid by DB lookup, then make the call if the code is accepted.
This also then allows the possibility for additional billing services to be put in place. You can then also look at call barring based on call allowances etc......
It's more expensive than the basic system you are after, but it is also a better solution, as rather than simply block someone if they enter a wrong code, you could transfer them to security / admin, to find out why they are trying to make a call they are not authorised for.
The short answer is that you don't.... That isn't entirely true while at
the same time it kind of is, but for the most part you don't configure
the softkeys. You enable or disable them via TCL. Here is the long
answer. Be sure to read the whole thing or e...
Topology: IP Phone > Switches > Microsoft NPS setup to forward 802.1x
proxy to > ISE 2.1 patch 3 Authentication: EAP-TLS using Cisco MIC SANs
Phone Models 802.1X support? 802.1x flavor Addtl Comment EAP-MD5 EAP-TLS
Cisco 3905 Y Y N Cisco 6911 Y Y N Cisco ...
This document describe how DST changes and how time changes are
implemented in DST. Daylight Saving Time (DST) is the practice of
setting the clocks forward 1 hour from standard time during the summer
months, and back again in the fall, in order to make b...