User Management

2025-06-10 09:02:32

User management mainly refers to the management of user permissions and user authentication. It includes user management, remote authentication configuration, role management, user security configuration and authorized databases.

 

Role Management

A role can be considered as a collection of users with the same permissions. The system assigns permissions to roles and then assigns roles to users. When configuring users, you can limit the scope of their operation permissions by setting their roles.

User's operation permissions include menu display and function permissions. Only when the operation permissions are granted to a user can the user perform the corresponding operations.

 

Procedure to Create a Role

1. In the menu, select System Management > User Management, select the Role Management tab to enter the Role Management page.

2. Click Add to enter the Add Role page, edit the name (must consist of Chinese characters, letters, numbers, underlines (_), dots (.) or dashes (-), within 64 characters), select permissions, and click Save.

 

User Management

After adding a role, you can add users for that role.

The system has the following four default users built-in:

  • admin: the super administrator, who      has all system permissions. The system has only one super administrator.

  • security: the security      administrator, who can configure databases and rules, view various alarm      reports, and manage security officers.

  • system: the system administrator,      who can configure and maintain system permissions.

  • audit: the audit administrator, who      can view other users' operation logs, and manage auditors.

 

Procedure to Add a User

1. In the left menu, select System Management > User Management to enter the User Management page and click Add User.

2. Enter the page, edit the relevant information, and click Save when you finish.

Parameter

Description

Username

Must   consist of Chinese characters, letters, numbers, underlines (_), dots   (.) or dashes (-), within 64 characters.

Enable

Click   on the switch next to Enable to determine whether to enable a user   that is just added.

Role

Specifies   the user role, including built-in roles and user-defined roles. Required.

Password/Confirm   Password

Create   and confirm a login password for the new user. The password is between 6 and   64 characters. When the strong password function is enabled, the password   must meet the password strength requirements. When you change the password,   the old and new passwords cannot be the same.

Mobile   Phone Number

You   need to enter the user's mobile phone number.

Email

You   need to enter the user's email address.

Verification   Method

Authentication   method for users to log in to the system.

Login   IP/MAC Address Restriction

Restricts   the IP/MAC address used by users to log in to the system. There are three   modes: no restriction, blocklist and trustlist.

Login   Time Limit

Limits   the time for which users can log in to the system.


pILQVBCzKhsC