10.12.1Changing Required User Access Levels

The Level Required For table in this screen is used to customize what access level is required to perform certain actions within the E2 unit. There are four rows in this table, each of which corresponds to a different type of E2 function or application.

Refrigeration Control - This category includes changes or actions involving refrigeration applica- tions specific to RX controllers (Suction Groups, Condensers, Circuits, CC-100s, etc.).

Building Control - This category includes changes or actions involving building control applications specific to BX controllers (AHUs, Zones, Lighting Control, Time Schedule, Demand Control, etc.).

Common Control - This category includes control applications common to both RX and BX control- lers (Sensor Control, Time Schedules, Conversion Cells, Analog or Digital Combiners, Global Dataetc.).

Advanced Control - This category includes applica- tions common to both boxes that are only used by advanced users, such as Loop/Sequence Control- lers, Refrigeration or HVAC Simulations, etc.

Each row has five columns, each of which corresponds to a different category of user actions.

Setpoint - This includes all actions that change application setpoints. Also, clearing one or more alarms out of the Alarm Advisory Log is considered a “setpoint” action (refer to Section 12.10.8.3, Clearing, for the definition of “clearing alarms”).

Bypass - This includes all actions that bypass a device to a certain state, such as initiating a manual defrost, or configuring an application input desig- nated as a “bypass.” Also, resetting one or more alarms in the Alarm Advisory Log is considered a “bypass” operation (refer to Section 12.10.8.2, Resetting, for the definition of “resetting alarms”).

Override - This includes any user-ordered override of a setpoint, input, or output.

Config - This includes all actions that change an application setting. This includes configuring inputs and outputs.

Alarm Ack - This includes acknowledging one or more alarms in the Alarm Log.. If this field is set to 1, alarms can be acknowledged on the Alarm Advi- sory Log without a user logging into the controller first. If set to 2, 3, or 4, login is required before a user can acknowledge alarms. The default is set to 3

(controller login required for acknowledging alarms). Refer to Section 12.10.8.1, Acknowledg- ing, for the definition of “acknowledging alarms.”

For each row and column of the Level Required For table, enter the desired minimum priority level that will be required for users to perform actions on each type of appli- cation. E2 will check this table when a user attempts an action to verify the user has the appropriate access level to make the change. If the user’s access level is equal to or above the priority setting in the table, access will be allowed. If not, access will be denied.

10.12.2Creating a New User

Account

After entering the User Access Setup screen by press- ing Passwords/User Access from the System Infor- mation menu:

1.Move the cursor so that it is somewhere in the Users box at the bottom of the screen.

2.Press (ADD USER) to put a blank record at the bottom of the list.

3.Type in the user name (Username), and then move to the next field (Password) by pressing the right arrow button.

4.Type in a password for the next user, then press the right arrow button to advance to the next field.

5.The Auto Logout feature determines the maxi- mum time user may be inactive before being logged out. Enter the amount of time for the user and press the right arrow button.

6.Enter the appropriate access level for the user. See Table 10-7.

7.Press (BACK).

10.12.3 Deleting a User

To delete a user from the system:

1.Move the cursor so that it is highlighting the record to delete in the Users box at the bottom of the screen, and press (DELETE USER).

2.A question box will appear to double check the deletion of the current record. Press if you are sure about the deletion.

10-14 E2 RX/BX/CX I&O Manual

026-1610 Rev 13 14-SEP-2011

Page 126
Image 126
Emerson E2 operation manual Changing Required User Access Levels, Creating a New User Account, Deleting a User