Specify access to operations performed on an Alarm Summary table
Specify which users have access to perform certain operations on an Alarm Summary table. To enable all users to perform an operation, set security access to
to
Full Access
. For example, determine that all users have access to acknowledge an alarm. In this case, set the access for Acknowledge

Full Access
. Alternatively, determine that security access for acknowledging an alarm depends on the role of user. In this case, set the Access properties to Inherit
. Inherited access levels include Full Access
, Read-Only
access, or No Access
. To specify access to operations performed on an Alarm Summary table
- On the screen, select the Alarm Summary table.
- In thePropertieswindow, select thePropertiestab.
- Expand theSecuritynode.
- Locate the property for the button to set access:
- AcknowledgeAccess. Set access forAcknowledge
on the selected Alarm Summary table. This button changes the alarm state from unacknowledged to acknowledged.
- DisableAccess. Set access toDisableon the selected Alarm Summary table. This button stops an alarm condition from being evaluated, effectively turning off the alarm.
- ResetLatchedAccess. Set access toReset Latched
on the selected Alarm Summary table. This button resets a latched alarm in the In Alarm state.
- ShelveAccess. Set access toShelve
on the selected Alarm Summary table. This button prevents the notification of new state changes for an alarm or alarm condition.
- In the field, select an option:
- Full Access. Specify that all users have access to the button.
- Inherit.Inherited access for a user role can be Full Access, Read-Only access, or No Access. If a button inherits Read-Only access, hash marks appear across the button on the HMI device. An error appears if the user presses the button. If a button inherits No Access from the screen, the user does not have access to the screen containing the alarm table. In this case, the screen does not appear in theNavigation menu.
Provide Feedback