User configuration tabs

This section lists the settings found in User configuration tabs, in the User management task.

User - Properties tab

In the Properties tab, you can configure the user’s personal information and password.
  • Status: Click to hide description
    Activate or deactivate the user profile. A user cannot log on when their profile is deactivated. Deactivating a user’s profile while the user is logged on will immediately log off the user.
  • Personal information: Click to hide description
    The personal information of a user can be imported from your company’s directory service.
    • First and last name: Click to hide description
      First and last name of the user.
    • Email address: Click to hide description
      The email address of the user. Can be used to send emails, reports, or messages to the user.
  • Password settings: Click to hide description
    All users require a password to log on to Security Center. The user must have the Change own password privilege for the password options to be enabled.
    • Expires: Click to hide description
      Turn this option on to force the user to change their password after a given number of days.
    • Change on next logon: Click to hide description
      Turn this option on for Genetec Patroller™ or Security Desk to force the user to change their password the next time they log on.
    • Change password: Click to hide description
      To change someone else's password, you need to have the Modify user properties privilege.
  • User level: Click to hide description
    Set the user level. A user level is a numeric value assigned to users to restrict their ability to perform certain operations, such as controlling a camera PTZ, viewing the video feed from a camera, or staying logged on when a threat level is set. Level 1 is the highest user level, with the most privileges.
    • Inherit from parent: Click to hide description
      The user level can be inherited from a parent group. If the user has multiple parents, the highest user level is inherited. If the user has no parent group, the lowest user level (254) is inherited. You must set Inherit from parent option to Override in order to change this setting.
    • Configure PTZ overrides: Click to hide description
      Set different user level values for selected PTZ cameras. The override values allow you to give this user higher or lower priority over certain PTZ cameras.

User - Access rights tab

In the Access rights tab, you can view and configure the user’s access rights over partitions. This tab only appears when user-created partitions exist in the system.
  • List of partitions: Click to hide description
    Select a partition to grant access rights for that partition to the user. Access rights over parent and child partitions can be configured independently. Access rights inherited from parent user groups cannot be revoked.
  • Administrator: Click to hide description
    Select this option to grant full administrative rights over all entities contained in that partition to the user, including the rights to create and delete users, user groups, and child partitions.
  • Display checked items (): Click to hide description
    Click to toggle the display between showing only selected partitions and all partitions.

User - Privileges tab

In the Privileges tab, you can view and configure the user’s privileges. The privileges of a user can be inherited inherited from parent user groups.
  • Allow: Click to hide description
    The privilege is granted to the user.
  • Deny: Click to hide description
    The privilege is denied to the user.
  • Undefined: Click to hide description
    This privilege must be inherited from a parent user group. If the user is not a member of any group, or if the privilege is also undefined to the parent user group, then the privilege is denied.
  • Exceptions: Click to hide description
    Basic privileges can be superceded at the partition level if the user is authorized to access multiple partitions. Only Administrative and Action privileges, plus the privileges over public tasks, can be overwritten at the partition level.
  • Additional settings (): Click to hide description
    Click to view additional commands for privilege templates.
    • Apply template: Click to hide description
      Select one of the privilege templates to apply.
    • Set configuration to read-only: Click to hide description
      Set all entity configuration privileges found under the Administrative privileges group to View properties.
    • Set configuration to read-write: Click to hide description
      Allow the modification of all entity configurations, including Add and Delete.

User - Advanced tab

In the Advanced tab, you can configure the user’s advanced settings.
  • Logon settings: Click to hide description
    Configure the user’s logon settings.
    • User logon schedule: Click to hide description
      Restrict the user logon according to schedules. A schedule can either be used to allow user logon or to block user logon.
    • Logon supervisor of: Click to hide description
      Lists the users whose logons are supervised by this current user. When a user in this list needs to log on to the system, the current user must also provide their username and password to complete the logon. A user can have more than one logon supervisor.
    • Limit concurrent logons: Click to hide description
      Set the maximum number of different workstations a user can log on to at the same time. This limit only applies to Security Desk. Config Tool is not restricted by this setting.
    • Auto-lock: Click to hide description
      Set this option to ON to lock the user out of their Security Desk session after a period of inactivity. To resume their current session, the user must re-enter their password. This requirement can be inherited from a parent user group. You must set Inherit from parent to Override in order to change this setting.
      NOTE: If the user is authenticated through ADFS with passive authentication, the user will be logged off and their current session closed instead of being locked.
  • Security Desk settings: Click to hide description
    Configure the user’s Security Desk workspace.
    • List of active tasks: Click to hide description
      Displays the tasks found in the user’s active task list.
    • Hot actions: Click to hide description
      Displays the hot actions mapped to the PC keyboard function keys (Ctrl+F1 through Ctrl+F12) when this user is logged on to Security Center using Security Desk.
    • Allow remote control over: Click to hide description
      Lists the Security Desk workstations this user is allowed to control remotely using the Remote task in Security Desk, or a CCTV keyboard. You can specify which workstations can be controlled by user, user group, or by specific workstation.
    • Start task cycling on logon: Click to hide description
      Turn this option on so that next time the user logs on from Security Desk task cycling starts automatically.
  • Security settings: Click to hide description
    Configure what the user can see in the system.
    • Limit archive viewing: Click to hide description
      Turn this option on to restrict the user's ability to view archived video to the last n days. This limitation can be inherited from a parent user group. If the user has multiple parents, the most restrictive limitation is inherited. If the user has no parent group, no restriction will be imposed. You must set Inherit from parent to Override to change this setting.
    • Scramble entity names: Click to hide description
      (Only non-administrative users) Turn this option on to display the entity GUID in Security Desk and Config Tool, everywhere the entity name is supposed to be displayed for this user. This option also prevents the user from updating the entity name fields in Config Tool.
    • Include additional properties on export/snapshot: Click to hide description
      Turn this option on to enable the user to include metadata to exported videos or snapshots, such as camera name, creation date, and camera coordinates, which can be useful for investigation.
  • Default map: Click to hide description
    The map loaded by default when the user opens the Maps task. If none is defined, the global default map configured at the Map Manager role level is used.