User configuration tabs - Security Center 5.9

Security Center Administrator Guide 5.9

Applies to
Security Center 5.9
Last updated
Content type
Guides > Administrator guides
Security Center

This section lists the settings found in User configuration tabs, in the User management task.

User - Properties tab

In the Properties tab, you can configure the user’s personal information and password.
Activate or deactivate the user profile. A user cannot log on when their profile is deactivated. Deactivating a user’s profile while the user is logged on will immediately log off the user.
Personal information
The personal information of a user can be imported from your company’s directory service.
First and last name
First and last name of the user.
Email address
The email address of the user. Can be used to send emails, reports, or messages to the user.
Password settings
All users require a password to log on to Security Center. The user must have the Change own password privilege for the password options to be enabled.
Turn this option on to force the user to change their password after a given number of days.
Change on next logon
Turn this option on for Genetec Patroller™ or Security Desk to force the user to change their password the next time they log on.
Change password
To change someone else's password, you need to have the Modify user properties privilege.
User level
Set the user level. A user level is a numeric value assigned to users to restrict their ability to perform certain operations, such as controlling a camera PTZ, viewing the video feed from a camera, or staying logged on when a threat level is set. Level 1 is the highest user level, with the most privileges.
Inherit from parent
The user level can be inherited from a parent group. If the user has multiple parents, the highest user level is inherited. If the user has no parent group, the lowest user level (254) is inherited. You must set Inherit from parent option to Override in order to change this setting.
Configure PTZ overrides
Set different user level values for selected PTZ cameras. The override values allow you to give this user higher or lower priority over certain PTZ cameras.

User - Access rights tab

In the Access rights tab, you can view and configure the user’s access rights over partitions. This tab only appears when user-created partitions exist in the system.
List of partitions
Select a partition to grant access rights for that partition to the user. Access rights over parent and child partitions can be configured independently. Access rights inherited from parent user groups cannot be revoked.
Select this option to grant full administrative rights over all entities contained in that partition to the user, including the rights to create and delete users, user groups, and child partitions.
Display checked items ()
Click to toggle the display between showing only selected partitions and all partitions.

User - Privileges tab

In the Privileges tab, you can view and configure the user’s privileges. The privileges of a user can be inherited inherited from parent user groups.
The privilege is granted to the user.
The privilege is denied to the user.
This privilege must be inherited from a parent user group. If the user is not a member of any group, or if the privilege is also undefined to the parent user group, then the privilege is denied.
Basic privileges can be superceded at the partition level if the user is authorized to access multiple partitions. Only Administrative and Action privileges, plus the privileges over public tasks, can be overwritten at the partition level.
Additional settings ()
Click to view additional commands for privilege templates.
Apply template
Select one of the privilege templates to apply.
Set configuration to read-only
Set all entity configuration privileges found under the Administrative privileges group to View properties.
Set configuration to read-write
Allow the modification of all entity configurations, including Add and Delete.

User - Advanced tab

In the Advanced tab, you can configure the user’s advanced settings.
Logon settings
Configure the user’s logon settings.
User logon schedule
Restrict the user logon according to schedules. A schedule can either be used to allow user logon or to block user logon.
Logon supervisor of
Lists the users whose logons are supervised by this current user. When a user in this list needs to log on to the system, the current user must also provide their username and password to complete the logon. A user can have more than one logon supervisor.
Limit concurrent logons
Set the maximum number of different workstations a user can log on to at the same time. This limit only applies to Security Desk. Config Tool is not restricted by this setting.
Set this option to ON to lock the user out of their Security Desk session after a period of inactivity. To resume their current session, the user must re-enter their password. This requirement can be inherited from a parent user group. You must set Inherit from parent to Override in order to change this setting.
NOTE: If the user is authenticated through ADFS with passive authentication, the user will be logged off and their current session closed instead of being locked.
Security Desk settings
Configure the user’s Security Desk workspace.
List of active tasks
Displays the tasks found in the user’s active task list.
Hot actions
Displays the hot actions mapped to the PC keyboard function keys (Ctrl+F1 through Ctrl+F12) when this user is logged on to Security Center using Security Desk.
Allow remote control over
Lists the Security Desk workstations this user is allowed to control remotely using the Remote task in Security Desk, or a CCTV keyboard. You can specify which workstations can be controlled by user, user group, or by specific workstation.
Start task cycling on logon
Turn this option on so that next time the user logs on from Security Desk task cycling starts automatically.
Security settings
Configure what the user can see in the system.
Limit archive viewing
Turn this option on to restrict the user's ability to view archived video to the last n days. This limitation can be inherited from a parent user group. If the user has multiple parents, the most restrictive limitation is inherited. If the user has no parent group, no restriction will be imposed. You must set Inherit from parent to Override to change this setting.
Scramble entity names
(Only non-administrative users) Turn this option on to display the entity GUID in Security Desk and Config Tool, everywhere the entity name is supposed to be displayed for this user. This option also prevents the user from updating the entity name fields in Config Tool.
Include additional properties on export/snapshot
Turn this option on to enable the user to include metadata to exported videos or snapshots, such as camera name, creation date, and camera coordinates, which can be useful for investigation.
Default map
The map loaded by default when the user opens the Maps task. If none is defined, the global default map configured at the Map Manager role level is used.