For administrators to install and configure the extension in Config Tool, and for operators to monitor the DMP Intrusion Panel in Security Desk, the correct user privileges must be granted to their user accounts.
Privileges added by the DMP Intrusion Panel extension
The following table lists the privileges added to Security Center when the extension is installed. If all of these privileges are missing from the privileges list in your user accounts, then the extension is not installed on your local computer.Although every company's organization is unique, we typically assign Config Tool and Security Desk privileges to users who install the extension and set up the Security Desk workstations for operators. Operators are usually granted access to Security Desk privileges. Some privileges are required by all users.
- SD
- Security Desk
- CT
- Config Tool
Privileges | Description | Application | User role |
---|---|---|---|
View intrusion detection unit users | To view the Users page of an intrusion detection unit in Config Tool.* | CT | Admin |
Modify intrusion detection unit users | To modify the Users page of an intrusion detection unit in Config Tool.* | CT | Admin |
Reset sensors | To reset the state of all 24-hour wireless inputs to Normal in Security Center from Security Desk. | SD | Operator |
Privileges common to all plugins and extensions
Administrators have access to all privileges. However, if you create a user account from the Provisioning template, and you want this user to add and configure your extension, that user needs the following Security Center privileges.
Privilege | Description | Application | User role |
---|---|---|---|
View license | Allows the user to view the software license. | CT | Admin |
View role properties | Allows the user to view role properties. | CT | Admin |
Modify role properties | Allows the user to modify role properties. | CT | Admin |
Add roles | Allows the user to add roles. | CT | Admin |
Delete roles | Allows the user to delete roles. | CT | Admin |
View server properties | Allows the user to view server properties. | CT | Admin |
Modify custom field definitions | Allows the user to add, modify, and delete custom field definitions and custom data types. | CT | Admin |
Modify custom events | Allows the user to add, modify, and delete custom events. | CT | Admin |
Modify event-to-actions | Allows the user to add, modify, and delete event-to-actions. | CT | Admin |
Privileges common to all intrusion detection extensions
Privilege | Task |
---|---|
Application privileges | |
Config Tool | To use Config Tool. |
Security Desk | To use Security Desk. |
Administrative privileges > Physical entities | |
View intrusion detection area properties | To view the intrusion detection area configuration pages in Config Tool. |
Modify intrusion detection area properties | To modify the intrusion detection area configurations in Config Tool. |
Add and delete intrusion detection areas | To add or delete intrusion detection areas in Config Tool. |
View intrusion detection unit properties | To view the intrusion detection unit configuration pages in Config Tool. |
Modify intrusion detection unit properties | To modify the intrusion detection unit configurations in Config Tool. |
Add and delete intrusion detection units | To add or delete intrusion detection units in Config Tool. |
Reset intrusion detection units | To restart the unit. |
Upgrade intrusion detection units | To upgrade the firmware and platform components of an intrusion detection unit. |
Administrative privileges > Alarm management | |
View alarm properties | To view alarm configuration pages in Config Tool. |
Modify alarm properties | To modify alarm configuration settings in Config Tool. |
Add and delete alarms | To add or delete alarms in Config Tool. |
Task privileges > Administration | |
Intrusion detection | To use the Intrusion detection task in Security Desk. |
Task privileges > Operation | |
Monitoring | To use the Monitoring task in Security Desk. |
Task privileges > Investigation | |
Intrusion detection area activities | To use the Intrusion detection area activities task in Security Desk. |
Task privileges > Maintenance | |
Intrusion detection unit events | To use the Intrusion detection unit events task in Security Desk. |
Task privileges > Alarm management | |
Alarm monitoring | To use the Alarm monitoring task in Security Desk. |
Alarm report | To use the Alarm report task in Security Desk. |
Action privileges > Alarms | |
Acknowledge alarms | To acknowledge active alarms in Security Desk. |
Forward alarms | To forward alarms in Security Desk. |
Snooze alarms | To snooze active alarms in Security Desk. |
Trigger alarms | To trigger alarms in Security Desk. |
Action privileges > Intrusion detection | |
Arm | To arm an intrusion detection area from Security
Desk or Config
Tool. Replaces the "Arm and disarm intrusion detection areas" privilege found in Security Center 5.7 SR3 and earlier. |
Bypass | Bypass an intrusion detection area from Security Desk or Config Tool. |
Force | Force arm an intrusion detection area from Security Desk or Config Tool. |
Disarm | Disarm an intrusion detection area from Security
Desk or Config
Tool. Replaces the "Arm and disarm intrusion detection areas" privilege found in Security Center 5.7 SR3 and earlier. |
Silence intrusion alarm | To silence alarms in intrusion detection areas in Security Desk or Config Tool. |
Trigger intrusion alarm | To trigger alarms in intrusion detection areas in Security Desk or Config Tool. |
Security Center access control privileges
Search for all "access control" privileges. Go through the list and grant or deny access as required for each user.
Users that will manage and synchronize DMP intrusion panel users need to have any rights related to viewing cardholders, cardholder groups, and credentials.