beautypg.com

Security in an itx system, The security system of the itx system service, Users – Grass Valley iTX System v.2.6 User Manual

Page 72: Groups

background image

Security in an iTX system

Security in an iTX system

The security system of the iTX System Service

The iTX System Service operates a security system for checking the rights of operators who log

onto iTX

Desktops to use the system content – or “assets” (video clips, schedules, etc.). This

enables iTX to manage security in two ways:

Access permissions. iTX controls access to information that is stored in the System

Database; it gives authorised users access to assets; it denies such access to

unauthorised users. To make this possible, the security system keeps a list of

permissions for all assets. The list contains details of which registered groups, users,

computers and applications have access, of any defined type (e.g. read or write), to

each asset.

User rights. iTX controls what tasks users can perform with the assets that they have

access to; e.g. some users may have the right to delete media files.

The security system does not directly allow or deny any user or computer the use of any asset.

Instead, it authenticates users and computers (i.e. checks their credentials) at the request of

other iTX services and applications. The requesting service or application then determines

whether or not to allow a user or computer to use its functionality on the asset.

Users

iTX Desktop users log onto an iTX system with their Windows-network user accounts, which

have associated user rights. Before they can do this, you have to manually register the users in

the security system. In doing so, you create user accounts and set security options for them.

The user names (logon IDs) for these accounts must be the same as the user names in

the Windows network.

You do not need to set passwords in the security system for the new accounts.

Any non-registered user that logs onto the iTX system does so as a guest user; there is a special

user account for this. By default the guest user has very limited user rights, which you may

change.

You can withdraw access rights from any registered user. You may do this temporarily, by

disabling the user account; or permanently, by deleting the user account.

Groups

Access permissions and user rights may be assigned to individual users, computers and

applications, or to any defined group of these as a whole. A group may contain any number of

users, computers, applications and other groups.

The easiest way to set identical security options for multiple users is to create a group

containing these users and set the security options for the group.

March 2015

System Administrator Guide

Page 72 of 404

This manual is related to the following products: