Table of Contents
10
Adding an Account, Using Admin and View.............................................................................................................
155
Naming Restrictions........................................................................................................................................156
User Groups....................................................................................................................................................157
Updating an Account......................................................................................................................................157
Adding an Account in LocalView ..............................................................................................................................157
Updating an Account in LocalView.................................................................................................................158
Granting Rights..........................................................................................................................................................158
To Customize the Rights in an Account .........................................................................................................158
To Base Rights On Those of Another User ....................................................................................................159
User Rights and Security................................................................................................................................159
To Deny Access.........................................................................................................................................................159
Removing a User's Account......................................................................................................................................160
To Delete an Account Used Onsite, to Access LocalView.............................................................................160
Security for a Multi-Media System ....................................................... 161
Security Options........................................................................................................................................................161
Securing the Multi System ........................................................................................................................................161
Security Priorities ............................................................................................................................................162
Limiting the Use of Admin...............................................................................................................................163
To Limit Access to Admin Documentation .....................................................................................................163
Password Guidelines ......................................................................................................................................163
Passwords.......................................................................................................................................................164
Multi Database Security..................................................................................................................................165
SQL-Server Option..........................................................................................................................................165
SQL-server Type Logon, Reserved for Multi Operators.................................................................................165
System Password......................................................................................................................................................166
Road Map to Setting the System Password...................................................................................................167
Changing the System Password, Part 1 (of 3): Using Admin........................................................................168
Changing System Password, Part 2: Multi-Media Units ................................................................................168
Changing System Password, Part 3: Updating Users ...................................................................................169
Status Report ..................................................................................................................................................169
Removing a System Password .................................................................................................................................169
Remove From All Units ...................................................................................................................................170
Remove on One of Many Units.......................................................................................................................171
System Password Extras ................................................................................................................................172
Replacing a Unit ........................................................................................................................................................172
To Replace a Unit when a System Password Is in Force ..............................................................................173
Last Valid Password........................................................................................................................................174
If A Used Unit Comes from Another Multi System .........................................................................................174
To Re-enter a Site Definition for a Unit with a System Password ..............................................175
To Check if the Correct System Password Was Typed .................................................................................176
User Password ..........................................................................................................................................................176
Administrator Password..................................................................................................................................176
To Set the Administrator Account’s Password...............................................................................................177
Rights of User Accounts............................................................................................................................................178
Guidelines .......................................................................................................................................................179
To View the Rights of a User and the Sites He may Access..........................................................................179
Right to Use Admin.........................................................................................................................................180
To Grant Access to Admin..............................................................................................................................180
Right to Use Maintenance...............................................................................................................................180
Right to Use View............................................................................................................................................181
Right to Access a Site.....................................................................................................................................182
To Define an Account’s Access to Certain Sites............................................................................................182
Limiting the Time that a Unit Can Be Used ....................................................................................................183
To Limit Use of Cameras: Camera Partitioning..............................................................................................183
High-Security Considerations.........................................................................................................................184