Specify access to operations performed on an Alarm Manager table

Specify which users have access to perform certain operations on an Alarm Manager table. For example, determine that all users, regardless of their assigned security role, have access to enable an alarm. To do this, set the
EnableAccess
property to
Full Access
. Alternatively, determine that security access to enabling alarms depends on the role assigned to the logged in user. In this case, set the
EnableAccess
property to
Inherit
.
To specify access to operations performed on an Alarm Manager table
  1. On the screen, select the Alarm Manager table.
  2. In the
    Properties
    window, select the
    Properties
    tab.
  3. Expand the
    Security
    node.
  4. Locate the property for the button to set access:
    • DisableAccess
      .
      Set access to
      Disable
      viewrtalarmsumdisablebutton on the selected Alarm Manager table. This button stops an alarm condition from being evaluated, effectively turning off the alarm.
    • EnableAccess
      . Set access to
      Enable
      enableV5 on the selected Alarm Manager
      table. This button allows an alarm condition to be evaluated, effectively turning on the alarm.
    • ResetCountAccess
      . Set access to
      Reset Alarm Counts
      reset_alarm_countsV5 on the selected Alarm Manager table. This button resets the Alarm Count value to zero on the alarm table. The alarm count indicates the number of times an alarm has gone into the In Alarm State.
    • ShelveAccess
      . Set access to
      Shelve
      ViewRTAlarmSumShelveButtonV5 on the selected Alarm Manager table. This button prevents the notification of new state changes for an alarm or alarm condition.
    • UnshelveAccess
      . Set access to
      Unshelve
      unshelvev5 on the selected Alarm Manager table. This button resumes the notification of new state changes for an alarm.
  5. In the box, select an option:
    • Inherit
      .
      Specify that access to the button is inherited from the screen.
    • Full Access
      . Specify that all users have access to the button.
      Inherited access for a user role can be Full Access, Read-Only access, or No Access. If a button inherits Read-Only access, hash marks appear across the button on the HMI device. Pressing the button displays an error. If a button inherits No Access from the screen, there is no access to the screen containing the alarm table. In this case, the screen does not appear in the
      Navigation menu
      on the HMI device.
Provide Feedback
Have questions or feedback about this documentation? Please submit your feedback here.
Normal