This section lists the settings found in User configuration tabs, in the User management task.
User - Properties tab
In the Properties tab, you can configure the user’s personal information and password.
- Activate or deactivate the user profile. A user cannot log on when their profile is deactivated. Deactivating a user’s profile while the user is logged on will immediately log off the user.
- Personal information
- The personal information of a user can be imported from your company’s directory service.
- First and last name
- First and last name of the user.
- Email address
- The email address of the user. Can be used to send emails, reports, or messages to the user.
- Password settings
- All users require a password to log on to Security Center. The user must have the Change own
password privilege for the password options to be enabled.
- Turn this option on to force the user to change their password after a given number of days.
- Change on next logon
- Turn this option on for Genetec Patroller™ or Security Desk to force the user to change their password the next time they log on.
- Change password
- To change someone else's password, you need to have the Modify user properties privilege.
- User level
- Set the user level. A user level is a numeric value assigned to users to restrict their ability to perform certain operations, such as controlling a camera PTZ, viewing the video feed from a camera, or staying logged on when a threat level is set. Level 1 is the highest user level, with the most privileges.
- Inherit from parent
- The user level can be inherited from a parent group. If the user has multiple parents, the highest user level is inherited. If the user has no parent group, the lowest user level (254) is inherited. You must set Inherit from parent option to Override in order to change this setting.
- Configure PTZ overrides
- Set different user level values for selected PTZ cameras. The override values allow you to give this user higher or lower priority over certain PTZ cameras.
User - Access rights tab
In the Access rights tab, you can view and configure the user’s access rights over partitions. This tab only appears when user-created partitions exist in the system.
- List of partitions
- Select a partition to grant access rights for that partition to the user. Access rights over parent and child partitions can be configured independently. Access rights inherited from parent user groups cannot be revoked.
- Select this option to grant full administrative rights over all entities contained in that partition to the user, including the rights to create and delete users, user groups, and child partitions.
- Display checked items ()
- Click to toggle the display between showing only selected partitions and all partitions.
User - Privileges tab
In the Privileges tab, you can view and configure the user’s privileges. The privileges of a user can be inherited inherited from parent user groups.
- The privilege is granted to the user.
- The privilege is denied to the user.
- This privilege must be inherited from a parent user group. If the user is not a member of any group, or if the privilege is also undefined to the parent user group, then the privilege is denied.
- Basic privileges can be superceded at the partition level if the user is authorized to access multiple partitions. Only Administrative and Action privileges, plus the privileges over public tasks, can be overwritten at the partition level.
- Additional settings ()
- Click to view additional commands for privilege templates.
- Apply template
- Select one of the privilege templates to apply.
- Set configuration to read-only
- Set all entity configuration privileges found under the Administrative privileges group to View properties.
- Set configuration to read-write
- Allow the modification of all entity configurations, including Add and Delete.
User - Advanced tab
In the Advanced tab, you can configure the user’s advanced settings.
- Logon settings
- Configure the user’s logon settings.
- User logon schedule
- Restrict the user logon according to schedules. A schedule can either be used to allow user logon or to block user logon.
- Logon supervisor of
- Lists the users whose logons are supervised by this current user. When a user in this list needs to log on to the system, the current user must also provide their username and password to complete the logon. A user can have more than one logon supervisor.
- Limit concurrent logons
- Set the maximum number of different workstations a user can log on to at the same time. This limit only applies to Security Desk. Config Tool is not restricted by this setting.
- Set this option to ON to lock the user out of their
Desk session after a
period of inactivity. To resume their current session, the user must re-enter
their password. This requirement can be inherited from a parent user group. You
must set Inherit from parent to
Override in order to change this setting.NOTE: If the user is authenticated through ADFS with passive authentication, the user will be logged off and their current session closed instead of being locked.
- Security Desk settings
- Configure the user’s Security
- List of active tasks
- Displays the tasks found in the user’s active task list.
- Hot actions
- Displays the hot actions mapped to the PC keyboard function keys (Ctrl+F1 through Ctrl+F12) when this user is logged on to Security Center using Security Desk.
- Allow remote control over
- Lists the Security Desk workstations this user is allowed to control remotely using the Remote task in Security Desk, or a CCTV keyboard. You can specify which workstations can be controlled by user, user group, or by specific workstation.
- Start task cycling on logon
- Turn this option on so that next time the user logs on from Security Desk task cycling starts automatically.
- Security settings
- Configure what the user can see in the system.
- Limit archive viewing
- Turn this option on to restrict the user's ability to view archived video to the last n days. This limitation can be inherited from a parent user group. If the user has multiple parents, the most restrictive limitation is inherited. If the user has no parent group, no restriction will be imposed. You must set Inherit from parent to Override to change this setting.
- Scramble entity names
- (Only non-administrative users) Turn this option on to display the entity GUID in Security Desk and Config Tool, everywhere the entity name is supposed to be displayed for this user. This option also prevents the user from updating the entity name fields in Config Tool.
- Include additional properties on export/snapshot
- Turn this option on to enable the user to include metadata to exported videos or snapshots, such as camera name, creation date, and camera coordinates, which can be useful for investigation.
- Default map
- The map loaded by default when the user opens the Maps task. If none is defined, the global default map configured at the Map Manager role level is used.