For administrators to install and configure the module in Config Tool, and for operators to monitor the office space in Security Desk, the correct user privileges must be granted to their user accounts.
Privileges added by the Office Manager module
The following table lists the privileges added to Security Center when the module is installed. If these privileges are missing from the privileges list, the module is not installed on your local computer.
Although every company's organization is unique, we typically assign Config Tool and Security Desk privileges to users who install the module and set up the Security Desk workstations for operators. Operators are usually granted access to Security Desk privileges. Some privileges are required by all users.
Privilege | Description | Application | User role |
---|---|---|---|
Office Desks plugin privileges | |||
Export widget reports | To export data from Office Manager widgets in the Security Desk dashboard | SD | Operator |
View desk properties | To view the properties of a desk entity in Config Tool. | CT | Admin, Operator |
Modify desk properties | To modify the properties of a desk entity in Config Tool. | CT | Admin, Operator |
Add desks | To create desk entities in Config Tool. | CT | Admin |
Delete desks | To delete desk entities in Config Tool. | CT | Admin |
Office Conference Rooms plugin privileges | |||
View conference room properties | To view the properties of a conference room entity in Config Tool. | CT | Admin, Operator |
Modify conference room properties | To modify the properties of a conference room entity in Config Tool. | CT | Admin, Operator |
Add conference rooms | To create conference room entities in Config Tool. | CT | Admin |
Delete conference rooms | To delete conference room entities in Config Tool. | CT | Admin |
Traffic Sensor Management plugin privileges | |||
Run Instrumented area history report | To use the Instrumented area history report in Security Desk. | CT | Admin, Operator |
- SD
- Security Desk
- CT
- Config Tool
Dashboard privileges
The following table lists the privileges required to visualize and monitor information from Security Center Office Manager in Security Desk dashboards.
Task | Minimum required privileges |
---|---|
Viewing dashboards |
|
Modifying dashboards |
|
Creating dashboards |
|
Deleting dashboards1 | Manage private tasks or Delete public tasks |
1 Dashboards are removed by deleting the associated task.
Privileges common to all plugins and extensions
Administrators have access to all privileges. However, if you create a user account from the Provisioning template and you want this user to add and configure your module, that user needs the following Security Center privileges.
Privilege | Description | Application | User role |
---|---|---|---|
View license | Allows the user to view the software license. | CT | Admin |
View role properties | Allows the user to view role properties. | CT | Admin |
Modify role properties | Allows the user to modify role properties. | CT | Admin |
Add roles | Allows the user to add roles. | CT | Admin |
Delete roles | Allows the user to delete roles. | CT | Admin |
View server properties | Allows the user to view server properties. | CT | Admin |
Modify custom field definitions | Allows the user to add, modify, and delete custom field definitions and custom data types. | CT | Admin |
Modify custom events | Allows the user to add, modify, and delete custom events. | CT | Admin |
Modify event-to-actions | Allows the user to add, modify, and delete event-to-actions. | CT | Admin |
General privileges
Application privileges grant access to the Security Center applications.
Privileges | Description | Application | User role |
---|---|---|---|
Print/export reports | Allows the user to print and save reports to files. | SD | All |
Remove entries from a report | Allows the user to remove selected entries from reports in Security Desk. | SD | Admin |
Report incidents | Allows the user to report incidents in Security Desk. | SD | Integrator, Operator |
Modify reported incidents | Allows the user to modify incident reports and incident packages in Security Desk. | SD | Admin |
Security Center access control privileges
Search for all "access control" privileges. Go through the list and grant or deny access as required for each user.