Specifications
Keri Systems, Inc. Doors
TM
Users Guide
01914-002 Rev. 5.5 Section 2: Setup System 2-45
7.0 Setup Operators
This section describes the process for creating system operators and assigning operator privileges. The
operators are the people who will be performing the work – creating the databases required by the
Doors software to do its job and monitoring the system once everything has been downloaded to the
controllers. Every operation performed by an operator has an operator identification number attached to
it. This allows you to track operator performed changes.
Since the default operator has access rights to every operation, anyone who knows the default
operator name and password will have complete programming access. Keri Systems
recommends, at a minimum, changing the default operator name and password to protect your
access control network.
7.1 Editing the Default Operator
1. Click on the Setup ⇒ Operators pull-down menu. The Setup Operators window appears (see Figure
2-52).
Figure 2-52: Setup Operators Window
NOTE: The Grant Amnesty operator option does not appear unless local anti passback is enabled (see
“Set Local Anti Passback” on page 13 in this section).
2. Double-click in the “Name” field. The current operator name is highlighted. Type a descriptive
name for the operator being assigned Operator Number 1 (the default operator).
NOTE: There is a 15 character maximum for the operator name.
3. It is essential that the default operator has the ability to perform any and every action within the
Doors program. Verify every option is set to so that Operator Number 1 will have full
access to all program options. Use the scroll on the bottom to view all the operator options.
4. Double-click in the “Password” field. For the Password, enter a string of characters or numbers, 4
characters minimum to 8 characters maximum, case sensitive (that is, the program does keep track
of UPPERCASE versus lowercase characters). The password should be something easily
remembered by the operator, but not easily guessed by unauthorized personnel.
5. To ensure that the password entered is correct, it must be entered again in the “Retype Password”
field. The characters entered into the “Retype Password” field must exactly match the Password
field.