
About the DomainConfig.xml file ................................................................................................... 64
Create a DomainConfig.xml file ...................................................................................................... 65
Setting up services to start automatically on machine start-up ............................................ 66
Starting the iTX system services ..................................................................................... 67
Start the system services ............................................................................................................... 67
Checking the Server Controllers ............................................................................................. 68
Checking the iTX system services ........................................................................................... 70
Adding users to the security system ...................................................................................... 71
Security in an iTX system ................................................................................................ 72
The security system of the iTX System Service ...................................................................... 72
Users............................................................................................................................................... 72
Groups ............................................................................................................................................ 72
Security attributes .......................................................................................................................... 73
Configuring the security system ..................................................................................................... 74
The built-in administrator .............................................................................................................. 75
About Manual Logon ...................................................................................................................... 75
About the Security Tool ......................................................................................................... 76
Logging onto the Security Tool ....................................................................................................... 76
The Security Tool menus ................................................................................................................ 76
Using the Security Tool .......................................................................................................... 81
Open the Security Tool ................................................................................................................... 81
Manually log onto the Security Tool with administrator rights ..................................................... 81
Import users, groups or computers ............................................................................................... 81
Add a group .................................................................................................................................... 82
Add a user ...................................................................................................................................... 83
Modify the membership of a group ............................................................................................... 83
Assign a user, computer or application to one or more groups..................................................... 83
Set security options for a group, user, computer or application ................................................... 84
Set a manual log-on password ....................................................................................................... 84
Configuring a Media Watcher ........................................................................................ 85
The Setup tab ......................................................................................................................... 86
File-store types ............................................................................................................................... 87
Inbox settings ......................................................................................................................... 87
Specify an Inbox folder ................................................................................................................... 87
Monitor the Inbox folder................................................................................................................ 88
Hold event durations for .osc imports ........................................................................................... 88
Create browse copies of video clips ............................................................................................... 88
Create keyframes from video clips ................................................................................................. 88
Check mono tracks for Dolby E data .............................................................................................. 88
Group mono tracks ........................................................................................................................ 88
Extended Audio language tagging for grouping mono tracks ........................................................ 89
Set a delay for media-file registration ............................................................................................ 89
Set the high-water mark for the Inbox folder ................................................................................ 90
Apply the Inbox high-water mark to Media folders on iTX Media Stores ...................................... 90
March 2015 System Administrator Guide Page 5 of 404
Comentarios a estos manuales