Configuring user profiles and contacts, Configuring user profiles, Adding a profile – Chatsworth Products RIM-600 User Manual

Page 61

Advertising
background image

Chapter 2: Software

61

Configuring User Profiles and Contacts

Configuring User Profiles

The User Profile section controls who has access to the RIM-600 and who gets contacted when
an alarm occurs. The User Profile programming screen describes attributes of the user including:
name, title, company, dept, username, password, user code, time zone, classes, etc.
When an alarm occurs the RIM-600 will check the list of User Profiles to see who should be con-
tacted. Users whose class list includes the class of the alarm will be contacted. Each user can
have up to 8 contact destinations (phone numbers, e-mail addresses, …). Up to 64 different User
Profiles can be created. The RIM-600 can contact users using 6 different methods: voice, pager,
alphanumeric pager, fax, e-mail, and snmp trap.
The order of Profiles contacted can be changed. To move a Profile up or down in the list, click and
hold the Profile you wish to move and drag it to its new location, then release the mouse button.
The Profile should now display in its new location.

Adding a Profile

Right click on Profiles and select Add New Profile. The following screen will appear:

Figure 30: User Profile screen

The Name, Company, Department, and Title information are used to identify the user on reports
that the unit sends.
The Username, Password, and User Code are used for security purposes.
You must have a Username and Password to:

• go online with the unit
• request two-way e-mail features
• access other features of the unit.

The User Code is a four digit number that is required to request a voice status report and to
acknowledge alarms. When the RIM-600 receives a call, it will request the User Code. If a valid
User Code is entered, the unit will match this code to the User's Class List and report the status
of all Environmental Inputs and IP Alarms which correspond to the selected Classes. Voice Status
reports check User permission, and a user can only receive information on items that he has per-
mission to receive. This includes environmental and IP alarm status, PowerGate switching, ping
requests, and microphone listen-in. (See “Permissions” section.)

Chapter 2: Software

61

Advertising