Operating instructions
Chapter
7
RFID Access Management
8018582/2015-11-03
Operating instructions| SICK
91
Subject to change without notice
Working with RFID Access
Management
7.5.4
Defining the access of the Information Security Officer to access logs using the four eyes principle
By default, the Information Security Officer can log in to RFID Access Management
independently of the Operator or Integrator role and view the access logs. The two eyes
principle therefore applies to the Information Security Officer.
The four eyes principle applies to the Operator and Integrator. For both roles, access to
the access logs has to be granted by the password of the Information Security Officer.
Alternatively, you can also set up the four eyes principle for the Information Security
Officer. The Information Security Officer can then only access the access logs when
another person has already logged in as an Operator or Integrator. In this case, the
Login window only allows the user to log in as an Operator or Integrator.
Access to the access logs is granted by the Information Security Officer entering the
password directly when the user wishes to open the access logs.
The four eyes principle also applies to the Operator and Integrator in this scenario.
1. Click the
Configuration
icon. You will be taken to the
Integrator
tab.
The
Direct ISO Login
checkbox is ticked by default. This means that the Information
Security Officer can log in to RFID Access Management independently of another user
role and view the access logs.
2. If you untick the checkbox, it is no longer possible for the Information Security Officer to
log in separately. Access to the access logs then requires a second user to have logged
in beforehand.