6 Build Protocols With Access Controls
Use this procedure to build protocols with Access Controls. When Access Controls is enabled,
the system requires an authorized user to accept protocol parameter updates. See the
Access
Control
chapter for details.
An authorized user can be determined by one of two ways.
•
Protocol Management will be authorized with no Log On Name and Password required if
the user currently logged in has the Standard User role.
•
If Access Controls is not enabled, when Protocol Management is selected, the user will be
presented with an authorization window.
1.
From the image monitor, click
.
2. From the
Mode
menu, click
Protocol Management
, then
Protocol Management
.
3. From the
CT Login
authentication window, enter your Log On Name and Password.
Illustration 3: CT Login Authentication Window
4. Click [OK].
You will then be able to accept protocol parameter updates when building protocols.
Revolution CT User Manual
Direction 5480385-1EN, Revision 1
Chapter 7 Dose Check 147