Security in an itx system, The security system of the itx system service, Users – Grass Valley iTX System v.2.6 User Manual
Page 72: Groups

Security in an iTX system
Security in an iTX system
The security system of the iTX System Service
The iTX System Service operates a security system for checking the rights of operators who log
onto iTX
Desktops to use the system content – or “assets” (video clips, schedules, etc.). This
enables iTX to manage security in two ways:
•
Access permissions. iTX controls access to information that is stored in the System
Database; it gives authorised users access to assets; it denies such access to
unauthorised users. To make this possible, the security system keeps a list of
permissions for all assets. The list contains details of which registered groups, users,
computers and applications have access, of any defined type (e.g. read or write), to
each asset.
•
User rights. iTX controls what tasks users can perform with the assets that they have
access to; e.g. some users may have the right to delete media files.
The security system does not directly allow or deny any user or computer the use of any asset.
Instead, it authenticates users and computers (i.e. checks their credentials) at the request of
other iTX services and applications. The requesting service or application then determines
whether or not to allow a user or computer to use its functionality on the asset.
Users
iTX Desktop users log onto an iTX system with their Windows-network user accounts, which
have associated user rights. Before they can do this, you have to manually register the users in
the security system. In doing so, you create user accounts and set security options for them.
•
The user names (logon IDs) for these accounts must be the same as the user names in
the Windows network.
•
You do not need to set passwords in the security system for the new accounts.
Any non-registered user that logs onto the iTX system does so as a guest user; there is a special
user account for this. By default the guest user has very limited user rights, which you may
change.
You can withdraw access rights from any registered user. You may do this temporarily, by
disabling the user account; or permanently, by deleting the user account.
Groups
Access permissions and user rights may be assigned to individual users, computers and
applications, or to any defined group of these as a whole. A group may contain any number of
users, computers, applications and other groups.
The easiest way to set identical security options for multiple users is to create a group
containing these users and set the security options for the group.
March 2015
System Administrator Guide
Page 72 of 404