April 27, 2004 Manual Version 1.01
2.4
The example above can be taken one additional step, if two press operators are given different user
names and different passwords. One operator can be assigned the ability to change tonnage monitor
limits in addition to the ability to reset tonnage monitor faults, while the other operator is not assigned
the ability to change the tonnage monitor limits.
Section 2.2.3 Password Only Mode
The “Password Only” mode allows for sixteen users. Each user can be assigned access to some or all of
the restricted items. This mode does not use the RUN/PROG key.
The example listed above indicated that setup personnel required access to all restricted items. In the
“Key or Password” mode, the setup personnel used the RUN/PROG key to gain access to all of the
restricted items. In the “Password Only” mode, the setup personnel can still have access to all of the
restricted items, but the system must be configured as such. The setup personnel must be assigned a user
name and password. In addition, all restricted items would be assigned access to the setup personnel.
Section 2.2.4 Key and Password Mode
The “Key and Password” mode requires the user to have the RUN/PROG key, user name, and user
password. Operation is basically the same as the Password only mode, except that in addition to
entering the password the user must switch the RUN/PROG key to the PROG position.
Section 2.2.5 Tonnage Monitor Restricted Items
The following table lists the tonnage monitor restricted items name and function.
TONNAGE MONITOR RESTRICTED ITEMS
NAME
FUNCTION
TM Bypass
Bypass the Tonnage Monitor
TM Reset
Reset Tonnage Monitor Faults
TM Peak High Limits
Change the Tonnage Monitor Peak High Limits
TM Peak Low Limits
Change the Tonnage Monitor Peak Low Limits
TM Reverse Limits
Change the Tonnage Monitor Reverse Limits
TM Auto Setup
Perform a Tonnage Monitor Automatic Setup
TM Data Windows
Change the Tonnage Monitor Data Windows High Limits, Low
Limits, Start Angle, and Stop Angle
Section 2.2.6 Access Control Operation
To gain access control the user must use one of two means or a combination of these two means. These
means are the RUN/PROG key or the user password system.
Summary of Contents for OmniLink II
Page 5: ...April 27 2004 Manual Version 1 01 iv ...
Page 7: ...April 27 2004 Manual Version 1 01 1 2 ...
Page 21: ...April 27 2004 Manual Version 1 01 3 8 ...
Page 44: ...April 27 2004 Manual Version 1 01 4 23 Section 4 5 4 N A ...
Page 45: ...April 27 2004 Manual Version 1 01 4 24 ...
Page 69: ...April 27 2004 Manual Version 1 01 7 14 ...
Page 77: ...April 27 2004 Manual Version 1 01 8 8 ...