Required privileges for UTC Advisor Master and Advanced extension - UTC Advisor Master and Advanced 3.1

UTC Advisor Master and Advanced Intrusion Panel Extension Guide 3.1

Applies to
UTC Advisor Master and Advanced 3.1
Last updated
2023-12-11
Content type
Guides > Plugin and extension guides
Language
English
Product
UTC Advisor Master and Advanced
Version
3.1

For administrators to install and configure the extension in Config Tool, and for operators to monitor the Advisor Master and Advisor Advanced intrusion panels in Security Desk, the correct user privileges must be granted to their user accounts.

No additional privileges for UTC Advisor Master and Advanced extension

This extension does not add privileges to Security Center.

Privileges common to all plugins and extensions

Administrators have access to all privileges. However, if you create a user account from the Provisioning template and you want this user to add and configure your extension, that user needs the following Security Center privileges.

Privilege Description Application User role
View license Allows the user to view the software license. CT Admin
View role properties Allows the user to view role properties. CT Admin
Modify role properties Allows the user to modify role properties. CT Admin
Add roles Allows the user to add roles. CT Admin
Delete roles Allows the user to delete roles. CT Admin
View server properties Allows the user to view server properties. CT Admin
Modify custom field definitions Allows the user to add, modify, and delete custom field definitions and custom data types. CT Admin
Modify custom events Allows the user to add, modify, and delete custom events. CT Admin
Modify event-to-actions Allows the user to add, modify, and delete event-to-actions. CT Admin

Security Center intrusion detection privileges

Privilege Task
Application privileges
Config Tool To use Config Tool.
Security Desk To use Security Desk.
Administrative privileges > Physical entities
View intrusion detection area properties To view the intrusion detection area configuration pages in Config Tool.
Modify intrusion detection area properties To modify the intrusion detection area configurations in Config Tool.
Add and delete intrusion detection areas To add or delete intrusion detection areas in Config Tool.
View intrusion detection unit properties To view the intrusion detection unit configuration pages in Config Tool.
Modify intrusion detection unit properties To modify the intrusion detection unit configurations in Config Tool.
Add and delete intrusion detection units To add or delete intrusion detection units in Config Tool.
Reset intrusion detection units To restart the unit.
Upgrade intrusion detection units To upgrade the firmware and platform components of an intrusion detection unit.
Administrative privileges > Alarm management
View alarm properties To view alarm configuration pages in Config Tool.
Modify alarm properties To modify alarm configuration settings in Config Tool.
Add and delete alarms To add or delete alarms in Config Tool.
Task privileges > Administration
Intrusion detection To use the Intrusion detection task in Security Desk.
Task privileges > Operation
Monitoring To use the Monitoring task in Security Desk.
Task privileges > Investigation
Intrusion detection area activities To use the Intrusion detection area activities task in Security Desk.
Task privileges > Maintenance
Intrusion detection unit events To use the Intrusion detection unit events task in Security Desk.
Task privileges > Alarm management
Alarm monitoring To use the Alarm monitoring task in Security Desk.
Alarm report To use the Alarm report task in Security Desk.
Action privileges > Alarms
Acknowledge alarms To acknowledge active alarms in Security Desk.
Forward alarms To forward alarms in Security Desk.
Snooze alarms To snooze active alarms in Security Desk.
Trigger alarms To trigger alarms in Security Desk.
Action privileges > Intrusion detection
Acknowledge intrusion alarm To acknowledge alarms in intrusion detection areas in Security Desk.
Arm To arm an intrusion detection area from Security Desk or Config Tool.

Replaces the "Arm and disarm intrusion detection areas" privilege found in Security Center 5.7 SR3 and earlier.

Bypass Bypass an intrusion detection area from Security Desk or Config Tool.
Force Force arm an intrusion detection area from Security Desk or Config Tool.
Disarm Disarm an intrusion detection area from Security Desk or Config Tool.

Replaces the "Arm and disarm intrusion detection areas" privilege found in Security Center 5.7 SR3 and earlier.

Silence intrusion alarm To silence alarms in intrusion detection areas in Security Desk or Config Tool.
Trigger intrusion alarm To trigger alarms in intrusion detection areas in Security Desk or Config Tool.
Action privileges
UTC Master To monitor and control the intrusion detection units, areas, and inputs on UTC Advisor Master and Advanced panels. The UTC Advisor Master and Advanced extension must be installed.

Security Center access control privileges

Search for all "access control" privileges. Go through the list and grant or deny access as required for each user.

Users that will manage and synchronize UTC intrusion panel users need to have any rights related to viewing cardholders, cardholder groups, and credentials.