Specifications

Alto 818 Installation and Operation
7-2 P/N 66109074001 Rev. D
7.1 OVERVIEW
Before the database can be set up, all database parameters should be determined and recorded
in the setup sheets in Appendix B. All controlled doors, readers, monitor points, and relay
outputs, etc. must be identified and defined. All log events will have to be identified and assigned
a report number. Each individual who will be responsible for operating the system must have a
password and user rank assigned. Finally, all card holder groups and individual card holders
must be identified.
Database setup can be done before the Alto 818 is brought to the installation site and connected
to the rest of the system components. However, the Alto 818 must be connected to a terminal
and a power module. In addition, if command cards are to be set up with the GROUP command,
a reader must be connected.
7.1.1 SYSTEM ADMINISTRATOR
The term system administrator refers to the individual who has overall responsibility for the
integrity of system security. The system administrator assigns user passwords and ranks
through the USER command and should be the only person who knows these assignments.
The system administrator is responsible for database maintenance and should be the only
person who has access to the XSAVE and XLOAD commands for database backup and restore
purposes. Further, the system administrator is the only individual who can run diagnostics.
These operations are all functions of authorization rank A.
7.1.2 USER AUTHORIZATION RANK
As used in this text, the terms operator and user are synonymous. System operators are those
individuals who perform system functions by entering commands and data via the system
terminal or host computer. The extent to which any given operator is permitted to control the
system by the use of the Alto 818 commands is governed by that operators user authorization
rank.
During database setup, the USER command is used to assign up to 8 passwords and 6 user
authorization ranks, rank A through F, for system users. Consequently, after the database is set
up and the system is placed in operation, the availability of any system command to any operator