Specify access to operations performed on an Alarm Summary table

Specify which users have access to perform certain operations on an Alarm Summary table. To enable all users to perform an operation, set security access to
Full Access
. For example, determine that all users have access to acknowledge an alarm. In this case, set the access for
Acknowledge
ViewRTAlarmSumAckButton.png to
Full Access
. Alternatively, determine that security access for acknowledging an alarm depends on the role of user. In this case, set the Access properties to
Inherit
. Inherited access levels include
Full Access
,
Read-Only
access, or
No Access
.
To specify access to operations performed on an Alarm Summary table
  1. On the screen, select the Alarm Summary table.
  2. In the
    Properties
    window, select the
    Properties
    tab.
  3. Expand the
    Security
    node.
  4. Locate the property for the button to set access:
    • AcknowledgeAccess
      . Set access for
      Acknowledge
      ViewRTAlarmSumAckButton.png on the selected Alarm Summary table. This button changes the alarm state from unacknowledged to acknowledged.
    • DisableAccess
      . Set access to
      Disable
      viewrtalarmsumdisablebutton
      o
      n the selected Alarm Summary table. This button stops an alarm condition from being evaluated, effectively turning off the alarm.
    • ResetLatchedAccess
      . Set access to
      Reset Latched
      ViewRTAlarmOptsRstLatch on the selected Alarm Summary table. This button resets a latched alarm in the In Alarm state.
    • ShelveAccess
      . Set access to
      Shelve
      ViewRTAlarmSumShelveButtonV5 on the selected Alarm Summary table. This button prevents the notification of new state changes for an alarm or alarm condition.
  5. In the field, select an option:
    • Full Access
      . Specify that all users have access to the button.
    • Inherit
      .
      Specify that the button inherits access from the screen.
      Inherited access for a user role can be Full Access, Read-Only access, or No Access. If a button inherits Read-Only access, hash marks appear across the button on the HMI device. An error appears if the user presses the button. If a button inherits No Access from the screen, the user does not have access to the screen containing the alarm table. In this case, the screen does not appear in the
      Navigation menu
      .
Provide Feedback
Have questions or feedback about this documentation? Please submit your feedback here.
Normal