User management mainly refers to the management of user permissions and user authentication. It includes user management, remote authentication configuration, role management, user security configuration and authorized databases.
Role Management
A role can be considered as a collection of users with the same permissions. The system assigns permissions to roles and then assigns roles to users. When configuring users, you can limit the scope of their operation permissions by setting their roles.
User's operation permissions include menu display and function permissions. Only when the operation permissions are granted to a user can the user perform the corresponding operations.
Procedure to Create a Role
1. In the menu, select System Management > User Management, select the Role Management tab to enter the Role Management page.
2. Click Add to enter the Add Role page, edit the name (must consist of Chinese characters, letters, numbers, underlines (_), dots (.) or dashes (-), within 64 characters), select permissions, and click Save.
User Management
After adding a role, you can add users for that role.
The system has the following four default users built-in:
admin: the super administrator, who has all system permissions. The system has only one super administrator.
security: the security administrator, who can configure databases and rules, view various alarm reports, and manage security officers.
system: the system administrator, who can configure and maintain system permissions.
audit: the audit administrator, who can view other users' operation logs, and manage auditors.
Procedure to Add a User
1. In the left menu, select System Management > User Management to enter the User Management page and click Add User.
2. Enter the page, edit the relevant information, and click Save when you finish.
Parameter | Description |
Username | Must consist of Chinese characters, letters, numbers, underlines (_), dots (.) or dashes (-), within 64 characters. |
Enable | Click on the switch next to Enable to determine whether to enable a user that is just added. |
Role | Specifies the user role, including built-in roles and user-defined roles. Required. |
Password/Confirm Password | Create and confirm a login password for the new user. The password is between 6 and 64 characters. When the strong password function is enabled, the password must meet the password strength requirements. When you change the password, the old and new passwords cannot be the same. |
Mobile Phone Number | You need to enter the user's mobile phone number. |
You need to enter the user's email address. | |
Verification Method | Authentication method for users to log in to the system. |
Login IP/MAC Address Restriction | Restricts the IP/MAC address used by users to log in to the system. There are three modes: no restriction, blocklist and trustlist. |
Login Time Limit | Limits the time for which users can log in to the system. |