Editing Devices For Threat Levels; Figure 135. Setting Threat Level Permissions For A Device - Chamberlain IPAC Administrator's Manual

Table of Contents

Advertisement

IPAC Server Administrator's Manual

Editing Devices for Threat Levels

An administrator with appropriate permissions can determine whether or not a device can
be active at, above, or below certain threat levels by defining the privileges on the Edit
Device page.
To set a threat level for a device:
1. Scroll over the Configuration link. The sub-navigation menu displays.
2. From the Devices link, click Devices. The Devices page displays.
3. Select the device you wish to edit or click the Create New Device button.
4. Under the threat levels section, choose when this device is active from the
dropdown menu. Options are to ignore threat levels entirely, or to have the
device be active at, at or more severe, or at or less severe than a selected
threat level.
5. Optionally, an administrator may select if the device will also require two-factor
authentication. Options are to ignore threat levels entirely, or to have the device
be active at, at or more severe, or at or less severe than a selected threat level.
6. Click Save.
241
Setting threat level permissions for a device
Figure 135.
Page 241 of 334

Advertisement

Table of Contents
loading

Table of Contents