BUS C H- /AB B- S ECU R E @ HO M E2CSM 6 0072 7D0 9 01 9/ 562.3 KeypadThe touch keypad consists of 17 keys. These are used to navigate the menus and the icons✓ Confirm the value entered or selected. Press any point on the displayed menu to save thedata and move to the higher menu level.1 2 3…0 Alphanumerical keys that allow numbers or letters to be entered Leave the current work session without saving. If pressed when navigating a level 3 menu,it brings you back to the main level 2 menu used to access it, without losing enabling set-tingsRemove a setting or a character depending on the context.2.4 AuthenticationIn order to access the menus and operate the central unit, authentication is required via an IDand password, both of which are numerical. The ID and password are stored as codes. Eachuser is also assigned specific privileges that determine what they can do. There are no pre-set factory users. The duration of the work session is 3 minutes for level 2 users and 1 hourfor level 3 users.2.4.1 User IDThe user ID is a 1 digit numerical code, between 0 and 9, assigned in order by the systemID 0 is reserved for a level 3 user (installer), ID 1 is for a level 2 user (user) or a level 4 user(Maintenance personnel).At least one level 3 user and one level 2 user must be set for each system.2.4.2 PasswordThe password (PIN) consists of 5 digits and is chosen freely by the user. The PIN can only bemodified by its owner, using a specific procedure.2.5 Authorisation levelThe authorisation level determines what individual users can and cannot do after authentica-tion. There are three levels of authorisation:- Level 2 classifies the users who use the intrusion alarm system on a daily basis.- Level 3, Installer: can set up or modify the configuration of the system. There can onlybe one installer per system. To use the system, a level 3 user must be authorised inadvance by a level 2 user.- Level 4. Refers to users who can update or change the central unit firmware. Becausethis operation is critical to the proper functioning of the system, it is required to ena-ble users who have already gone through the authentication process using their log-in details to be authenticated again on a specific basis.Level 3 Installer users and level 2 Superusers correspond to the authorisation levels of thesame names provided for in regulation EN 50131-1.The table below outlines the permissions granted to each authorisation level.