Barco R9830350 Frozen Dessert Maker User Manual


 
R9830350 Octopus User Guide (2001-08) 4-5
4.3.4 Control Room Computer Organization
Network identification within a control room is key to determining the roles and responsibility of
operators. Under Windows NT, there are several pieces of information that can be used to identify an
operator. These identifying characteristics are:
User Name: Network name the person uses to log into the computer. This is not the login name used
for some applications.
Domain Name: The NT domain the user logs onto the network with.
Computer Name: The network name of the computer.
Group Name: Name of NT group or groups to which the user belongs.
All of these characteristics together give the supervisor the ability to uniquely identify each operator.
Using only a portion of those characteristics can create more general prioritization conditions.
Rules in the access list are parsed from left to right and from specific to general
matching criteria. First, the program attempts to find rules where the username is
specified directly, if this fails, it then looks for rules where the user name is "All". If
there are no matches to this point, then the connection is rejected. From the list of
rules that have matched thus far, the computer name is matched. If there is no
match with the computers the connection is rejected, otherwise the group name
and priority that is in the first match is used to identify this user connection.
A few examples of network setup should be useful to illuminate the possible applications of the
Administration client.
EXAMPLE: SUPERVISOR ACCESS ONLY
This is the example where there is a relatively static wallboard, which needs to be interacted with
infrequently, and then only by supervisory personnel. To accommodate this setup, one needs only to grant
access to the supervisor, and deny access to all others. The O
CTOPUS SERVER defaults to allow all people
access to the wall at identical priority, this default behavior needs to be changed to support the above
access profile.
To do this, you must first determine which user on your systems will act as supervisor for the control
room, with respect to the wallboard. For this exercise, this will be the user
ROK on the computer
KARCLT4H, who will be the only person with access to the OCTOPUS Server computer, KARCLT8M.