For administrators to install and configure the plugin in Config Tool, and for operators to monitor the tracking system in Security Desk, the correct user privileges must be granted to their user accounts.
Privileges added by the Restricted Security Area Surveillance plugin
The following table lists the privileges added to Security Center when the plugin is installed. If all of these privileges are missing from the privileges list in your user accounts, then the plugin is not installed on your local computer.
Although every company's organization is unique, we typically assign Config Tool and Security Desk privileges to users who install the plugin and set up the Security Desk workstations for operators. Operators are usually granted access to Security Desk privileges. Some privileges are required by all users.
|Acknowledge target||Allows the user to acknowledge targets.||SD||Operator|
|Arm/disarm perimeters||Allows the user to arm and disarm RSA perimeters.||SD||Operator|
|Arm/disarm zones||Allows the user to arm and disarm RSA zones.||SD||Operator|
|Maintenance mode||Allows the user to set RSA zones to maintenance mode.||CT, SD||Admin|
- Security Desk
- Config Tool
Privileges common to all plugins and extensions
Administrators have access to all privileges. However, if you create a user account from the Provisioning template, and you want this user to add and configure your plugin, that user needs the following Security Center privileges.
|View license||Allows the user to view the software license.||CT||Admin|
|View role properties||Allows the user to view role properties.||CT||Admin|
|Modify role properties||Allows the user to modify role properties.||CT||Admin|
|Add roles||Allows the user to add roles.||CT||Admin|
|Delete roles||Allows the user to delete roles.||CT||Admin|
|View server properties||Allows the user to view server properties.||CT||Admin|
|Modify custom field definitions||Allows the user to add, modify, and delete custom field definitions and custom data types.||CT||Admin|
|Modify custom events||Allows the user to add, modify, and delete custom events.||CT||Admin|
|Modify event-to-actions||Allows the user to add, modify, and delete event-to-actions.||CT||Admin|
Application privileges grant access to the Security Center applications.
|Print/export reports||Allows the user to print and save reports to files.||SD||All|
|Remove entries from a report||Allows the user to remove selected entries from reports in Security Desk.||SD||Admin|
|Report incidents||Allows the user to report incidents in Security Desk.||SD||Integrator, Operator|
|Modify reported incidents||Allows the user to modify incident reports and incident packages in Security Desk.||SD||Admin|
Security Center video privileges
The Restricted Security Area Surveillance plugin uses cameras and video. Search for all "video" privileges. Go through the list and grant or deny access as required for each user.