Core Manager: System Management

Site: QSC
Course: Q-SYS Level 1 Training
Book: Core Manager: System Management
Printed by: Guest user
Date: Friday, 6 December 2024, 12:45 PM

Description

Video Transcript

00:07
Welcome back. Let’s look at the System Management section of the Core Manager’s features.
00:13
The first tab you’ll see here is User Control Interfaces or UCIs,
00:18
which allows you to access and manage the security for every UCI deployed in your design.
00:23
For any interface, you could select it first and then choose to Open the UCI directly,
00:30
which will launch an HTML web browser-version of your UCI for you to control on screen.
00:35
Of course, you could also use this HTML link to access your UCI directly from any web browser
00:41
without ever navigating through the Core Manager.
00:44
But you may also want to restrict people from accessing your UCI, whether it’s on a web browser,
00:50
or a UCI Viewer, or even on a Q-SYS touchscreen.
00:54
To do so, let’s access the Pin Manager to create some permissions.
00:58
By default there are no PINs, so press the Plus button to create one.
01:03
A PIN simply requires a Name of the person who is logging on, and their personal numeric code.
01:09
You can create as many pins as you like, or delete them using the trash can icon.
01:14
Do note that these are not tied to the User profiles you created for Core Manager.
01:20
These are specifically for people who need to log into the UCI to control the system,
01:25
like the employees of your venue.
01:27
Once you’ve created some PINS, you can then click the “Edit Access” button for your UCI
01:33
to determine which of those PINS are valid on your selected UCI.
01:38
Now, when a user tries to access your UCI, they’ll have to input their PIN first.
01:43
They don’t need to input their username, just the PIN.
01:47
The user name is only used as part of the report sent to the Event Log,
01:51
to notify you who has logged in to that UCI.
01:55
This enables you to give everyone their own unique PIN so you always know who has accessed the screen.
02:01
If you’d prefer to let multiple users use the same generic PIN, that’s an option as well.
02:06
If you don’t want a particular UCI to require a PIN login, you can remove all pins from its access list.
02:13
No, that doesn’t mean that nobody can access it,
02:16
it means there are no restrictions on who can access it, so it has no PIN code screen at all.
02:22
The next two tabs involve your Conferencing system: Softphones and Contacts.
02:28
We’ll look at these sections in depth in later modules,
02:31
but for now you can see that Softphone allows you to register your VOIP credentials
02:36
and select audio codecs for systems that incorporate any Softphones,
02:40
and the Contacts section lets you create a local phone directory of names and phone numbers,
02:46
or to access an LDAP contact list on your network.
02:49
The Cameras tab allows you to customize various elements
02:53
if you are using any of the Q-SYS PTZ-IP video peripherals.
02:58
There are additional training videos that go into these components more in-depth,
03:01
but at a glance you can edit the resolution and frame rate of your IP streams,
03:06
change your Multicast mode and address range, as well as edit the static images the Cameras can present.
03:12
There are options for a Privacy Image when the camera engages Privacy Mode,
03:16
an “Exiting Privacy Image” that displays when the camera is reorienting itself as Privacy mode disengages,
03:23
and an Offline Image when the camera is not connected.
03:27
These can all be customized for your venue, provided you use a JPEG image no larger than 3 MB.
03:33
There is also a Video Endpoints tab.
03:36
For a full course on how to integrate our HDMI encoder and decoder device,
03:41
you’ll want to check out the Video 101 training curriculum.
03:45
But you can see here
03:46
that this offers very similar functionality as the cameras – in which you can adjust its Multicast Mode,
03:52
as well as upload your own graphics.
03:54
The Video encoder can display any of three custom graphics which are great for company logos
04:00
or standby instructions, or an idle screen when no source is detected.
04:05
Finally you’ll see a tab for Dynamic Pairing,
04:08
which is a feature that allows you to pair a physical device
04:11
to one of your virtual peripherals based on its MAC address.
04:15
Shocker: We have a video for that one too. It’s available available in our Quickstarts section.
04:21
And that’s it for Core Manager!
04:23
Next we’ll look at the third tool, which is called the Q-SYS Administrator.
04:27
Take a quick break, and continue whenever you’re ready.

Lesson Description

Manage your UCI access, and explore functions specific to your system’s use of softphones, cameras, and video endpoints