For administrators to install and configure the extension in Config Tool, and for operators to monitor the Advisor Master and Advisor Advanced intrusion panels in Security Desk, the correct user privileges must be granted to their user accounts.
No additional privileges for UTC Advisor Master and Advanced extension
This extension does not add privileges to Security Center.
Privileges common to all plugins and extensions
Administrators have access to all privileges. However, if you create a user account from the Provisioning template and you want this user to add and configure your extension, that user needs the following Security Center privileges.
Privilege | Description | Application | User role |
---|---|---|---|
View license | Allows the user to view the software license. | CT | Admin |
View role properties | Allows the user to view role properties. | CT | Admin |
Modify role properties | Allows the user to modify role properties. | CT | Admin |
Add roles | Allows the user to add roles. | CT | Admin |
Delete roles | Allows the user to delete roles. | CT | Admin |
View server properties | Allows the user to view server properties. | CT | Admin |
Modify custom field definitions | Allows the user to add, modify, and delete custom field definitions and custom data types. | CT | Admin |
Modify custom events | Allows the user to add, modify, and delete custom events. | CT | Admin |
Modify event-to-actions | Allows the user to add, modify, and delete event-to-actions. | CT | Admin |
Security Center intrusion detection privileges
Privilege | Task |
---|---|
Application privileges | |
Config Tool | To use Config Tool. |
Security Desk | To use Security Desk. |
Administrative privileges > Physical entities | |
View intrusion detection area properties | To view the intrusion detection area configuration pages in Config Tool. |
Modify intrusion detection area properties | To modify the intrusion detection area configurations in Config Tool. |
Add and delete intrusion detection areas | To add or delete intrusion detection areas in Config Tool. |
View intrusion detection unit properties | To view the intrusion detection unit configuration pages in Config Tool. |
Modify intrusion detection unit properties | To modify the intrusion detection unit configurations in Config Tool. |
Add and delete intrusion detection units | To add or delete intrusion detection units in Config Tool. |
Reset intrusion detection units | To restart the unit. |
Upgrade intrusion detection units | To upgrade the firmware and platform components of an intrusion detection unit. |
Administrative privileges > Alarm management | |
View alarm properties | To view alarm configuration pages in Config Tool. |
Modify alarm properties | To modify alarm configuration settings in Config Tool. |
Add and delete alarms | To add or delete alarms in Config Tool. |
Task privileges > Administration | |
Intrusion detection | To use the Intrusion detection task in Security Desk. |
Task privileges > Operation | |
Monitoring | To use the Monitoring task in Security Desk. |
Task privileges > Investigation | |
Intrusion detection area activities | To use the Intrusion detection area activities task in Security Desk. |
Task privileges > Maintenance | |
Intrusion detection unit events | To use the Intrusion detection unit events task in Security Desk. |
Task privileges > Alarm management | |
Alarm monitoring | To use the Alarm monitoring task in Security Desk. |
Alarm report | To use the Alarm report task in Security Desk. |
Action privileges > Alarms | |
Acknowledge alarms | To acknowledge active alarms in Security Desk. |
Forward alarms | To forward alarms in Security Desk. |
Snooze alarms | To snooze active alarms in Security Desk. |
Trigger alarms | To trigger alarms in Security Desk. |
Action privileges > Intrusion detection | |
Acknowledge intrusion alarm | To acknowledge alarms in intrusion detection areas in Security Desk. |
Arm | To arm an intrusion detection area from Security Desk or Config Tool. Replaces the "Arm and disarm intrusion detection areas" privilege found in Security Center 5.7 SR3 and earlier. |
Bypass | Bypass an intrusion detection area from Security Desk or Config Tool. |
Force | Force arm an intrusion detection area from Security Desk or Config Tool. |
Disarm | Disarm an intrusion detection area from Security Desk or Config Tool. Replaces the "Arm and disarm intrusion detection areas" privilege found in Security Center 5.7 SR3 and earlier. |
Silence intrusion alarm | To silence alarms in intrusion detection areas in Security Desk or Config Tool. |
Trigger intrusion alarm | To trigger alarms in intrusion detection areas in Security Desk or Config Tool. |
Action privileges | |
UTC Master | To monitor and control the intrusion detection units, areas, and inputs on UTC Advisor Master and Advanced panels. The UTC Advisor Master and Advanced extension must be installed. |
Security Center access control privileges
Search for all "access control" privileges. Go through the list and grant or deny access as required for each user.
Users that will manage and synchronize UTC intrusion panel users need to have any rights related to viewing cardholders, cardholder groups, and credentials.