6 Build Protocols With Access Controls
Use this procedure to build protocols with Access Controls. When Access Controls is enabled,
the system requires an authorized user to accept protocol parameter updates. See the
Control chapter for details.
An authorized user can be determined by one of two ways.
•
Protocol Management will be authorized with no Log On Name and Password required if
the user currently logged in has the Standard User role.
•
If Access Controls is not enabled, when Protocol Management is selected, the user will be
presented with an authorization window.
1. From the image monitor, click
Mode menu, click Protocol Management , then Protocol Management .
2. From the
CT Login authentication window, enter your Log On Name and Password.
3. From the
4. Click [OK].
You will then be able to accept protocol parameter updates when building protocols.
Chapter 7 Dose Check
.
Illustration 3: CT Login Authentication Window
Revolution CT User Manual
Direction 5480385-1EN, Revision 1
Access
147