Selecting which workstations users can remotely control - You can select which Security Desk workstations and monitors a user is allowed to remotely control using a CCTV keyboard, or using the Remote task in Security Desk. - Security Center 5.13

Security Center Administrator Guide 5.13

Product
Security Center
Content type
Guides > Administrator guides
Version
5.13
ft:locale
en-US
Last updated
2025-04-16

You can select which Security Desk workstations and monitors a user is allowed to remotely control using a CCTV keyboard, or using the Remote task in Security Desk.

What you should know

Every monitor controlled by Security Desk is assigned a unique monitor ID (displayed in the notification tray, and found in the General settings - Logical ID page in the System task). Using a CCTV keyboard, you can display an entity on a remote Security Desk workstation by specifying its monitor ID, tile ID, and the logical ID of the entity.
IMPORTANT: The following conditions must be met for a local user to be able to connect to a remote Security Desk workstation:
  • Both local and remote Security Desk must be running and connected to the same Security Center Directory.
  • The local user must have at least the same user privileges as the user who is logged on to the remote Security Desk.
  • The local user must be a member of at least one partition where the remote user has access rights (authorized user).
    NOTE: An authorized user of a partition isn’t necessarily a member of that partition. Similarly, a user who is a member of a partition isn’t necessarily an authorized user.
  • The local user must have at least the Remote privilege.

Procedure

  1. From the Config Tool homepage, open the User management task.
  2. Select the user to configure, and click the Advanced tab.
  3. Under the Allow remote control over section, click Add an item ().
  4. From the drop-down, select one of the following entity types:
    Application
    The specified workstation (COMPUTER - SecurityDesk) can be remotely controlled, regardless of who is logged on.
    Users
    Any Security Desk workstation where that user or a member of that user group is logged on can be remotely controlled.
  5. Select the associated entities, and click OK > Apply.