Required privileges for DMP intrusion panel extension - DMP intrusion panel 4.1

DMP Intrusion Panel Extension Guide 4.1

Applies to
DMP intrusion panel 4.1
Last updated
2021-06-11
Content type
Guides > Plugin and extension guides
Language
English (United States)
Product line
Ecosystem (add-ons) > DMP intrusion panel
Version
4.1

For administrators to install and configure the extension in Config Tool, and for operators to monitor the DMP intrusion panel in Security Desk, the correct user privileges must be granted to their user accounts.

Privileges added by the DMP intrusion panel extension

The following table lists the privileges added to Security Center when the extension is installed. If all of these privileges are missing from the privileges list in your user accounts, then the extension is not installed on your local computer.

Although every company's organization is unique, we typically assign Config Tool and Security Desk privileges to users who install the extension and set up the Security Desk workstations for operators. Operators are usually granted access to Security Desk privileges. Some privileges are required by all users.

Legend for applications:
SD
Security Desk
CT
Config Tool
Privileges Description Application User role
View intrusion detection unit users To view the Users page of an intrusion detection unit in Config Tool.* CT Admin
Modify intrusion detection unit users To modify the Users page of an intrusion detection unit in Config Tool.* CT Admin
Reset sensors To reset the state of all 24-hour wireless inputs to Normal in Security Center from Security Desk. SD Operator
*This privilege is installed by both the DMP and Bosch extensions.

Privileges common to all plugins and extensions

Administrators have access to all privileges. However, if you create a user account from the Provisioning template, and you want this user to add and configure your extension, that user needs the following Security Center privileges.

Privilege Description Application User role
View license Allows the user to view the software license. CT Admin
View role properties Allows the user to view role properties. CT Admin
Modify role properties Allows the user to modify role properties. CT Admin
Add roles Allows the user to add roles. CT Admin
Delete roles Allows the user to delete roles. CT Admin
View server properties Allows the user to view server properties. CT Admin
Modify custom field definitions Allows the user to add, modify, and delete custom field definitions and custom data types. CT Admin
Modify custom events Allows the user to add, modify, and delete custom events. CT Admin
Modify event-to-actions Allows the user to add, modify, and delete event-to-actions. CT Admin

Privileges common to all intrusion detection extensions

Privilege Task
Application privileges
Config Tool To use Config Tool.
Security Desk To use Security Desk.
Administrative privileges > Physical entities
View intrusion detection area properties To view the intrusion detection area configuration pages in Config Tool.
Modify intrusion detection area properties To modify the intrusion detection area configurations in Config Tool.
Add and delete intrusion detection areas To add or delete intrusion detection areas in Config Tool.
View intrusion detection unit properties To view the intrusion detection unit configuration pages in Config Tool.
Modify intrusion detection unit properties To modify the intrusion detection unit configurations in Config Tool.
Add and delete intrusion detection units To add or delete intrusion detection units in Config Tool.
Reset intrusion detection units To restart the unit.
Upgrade intrusion detection units To upgrade the firmware and platform components of an intrusion detection unit.
Administrative privileges > Alarm management
View alarm properties To view alarm configuration pages in Config Tool.
Modify alarm properties To modify alarm configuration settings in Config Tool.
Add and delete alarms To add or delete alarms in Config Tool.
Task privileges > Administration
Intrusion detection To use the Intrusion detection task in Security Desk.
Task privileges > Operation
Monitoring To use the Monitoring task in Security Desk.
Task privileges > Investigation
Intrusion detection area activities To use the Intrusion detection area activities task in Security Desk.
Task privileges > Maintenance
Intrusion detection unit events To use the Intrusion detection unit events task in Security Desk.
Task privileges > Alarm management
Alarm monitoring To use the Alarm monitoring task in Security Desk.
Alarm report To use the Alarm report task in Security Desk.
Action privileges > Alarms
Acknowledge alarms To acknowledge active alarms in Security Desk.
Forward alarms To forward alarms in Security Desk.
Snooze alarms To snooze active alarms in Security Desk.
Trigger alarms To trigger alarms in Security Desk.
Action privileges > Intrusion detection
Arm To arm an intrusion detection area from Security Desk or Config Tool.

Replaces the "Arm and disarm intrusion detection areas" privilege found in Security Center 5.7 SR3 and earlier.

Bypass Bypass an intrusion detection area from Security Desk or Config Tool.
Force Force arm an intrusion detection area from Security Desk or Config Tool.
Disarm Disarm an intrusion detection area from Security Desk or Config Tool.

Replaces the "Arm and disarm intrusion detection areas" privilege found in Security Center 5.7 SR3 and earlier.

Silence intrusion alarm To silence alarms in intrusion detection areas in Security Desk or Config Tool.
Trigger intrusion alarm To trigger alarms in intrusion detection areas in Security Desk or Config Tool.

Security Center access control privileges

Search for all "access control" privileges. Go through the list and grant or deny access as required for each user.

Users that will manage and synchronize DMP intrusion panel users need to have any rights related to viewing cardholders, cardholder groups, and credentials.