louis hammouti. agenda 1. introduction 2.access authorizations more restrictive in the experiments...

9
Louis Hammouti Louis Hammouti

Upload: tamsyn-parker

Post on 18-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Louis Hammouti. AGENDA 1. Introduction 2.Access authorizations more restrictive in the experiments 3.Access request managed by EDH 4.Access rules 5.Authorization

Louis HammoutiLouis Hammouti

Page 2: Louis Hammouti. AGENDA 1. Introduction 2.Access authorizations more restrictive in the experiments 3.Access request managed by EDH 4.Access rules 5.Authorization

AGENDAAGENDA

1. Introduction2. Access authorizations more restrictive in the experiments3. Access request managed by EDH4. Access rules5. Authorization Distribution System6. WEBADS

L. Hammouti

Page 3: Louis Hammouti. AGENDA 1. Introduction 2.Access authorizations more restrictive in the experiments 3.Access request managed by EDH 4.Access rules 5.Authorization

L. Hammouti

Authorization access and “concentric circle” concept

Access to main sites(Meyrin, Prevessin, experiment sites, border

Control room Libraries

Offices, Laboratories Building

s

Underground areasunlocked areas

ExperimentsSafety systemsLocked areas

Page 4: Louis Hammouti. AGENDA 1. Introduction 2.Access authorizations more restrictive in the experiments 3.Access request managed by EDH 4.Access rules 5.Authorization

EAST HALL

AD HALL

L. Hammouti

ISOLDE

DIRAC

CTF2

PS RINGBOOSTER

TT2

TT10

ADRING

ADTARGET

TT70

LINAC2CTF3 INJ.

CTF3PS

AD-PROT

EH-PRIM

P

AD-TARG

ISOPRIM

CTF3

Access points

The new authorization types for the PS (primary)

Page 5: Louis Hammouti. AGENDA 1. Introduction 2.Access authorizations more restrictive in the experiments 3.Access request managed by EDH 4.Access rules 5.Authorization

L. Hammouti

The authorization request in a zone must be made using EDH

Page 6: Louis Hammouti. AGENDA 1. Introduction 2.Access authorizations more restrictive in the experiments 3.Access request managed by EDH 4.Access rules 5.Authorization

L. Hammouti

Before accessing in a specific area, make sure that you …

have an access authorization for the area

have an access card (identification)

have a film badge in radiation areas

have followed the recommended safety courses

• Safety level (1+2) (COURB + COURG)

•Safety level 3 (COURS) (for SPS & LHC)

Page 7: Louis Hammouti. AGENDA 1. Introduction 2.Access authorizations more restrictive in the experiments 3.Access request managed by EDH 4.Access rules 5.Authorization

L. Hammouti

What’s it used for ?

Checking access rights people and drawing up listings for each area ; ADS checks if the :

• authorization request is OK• access card is OK• rules for the area are OK

Providing these listings by means of 2 interfaces • SQL views• Authorization files

Page 8: Louis Hammouti. AGENDA 1. Introduction 2.Access authorizations more restrictive in the experiments 3.Access request managed by EDH 4.Access rules 5.Authorization

L. Hammouti

PS

SPS building

East zone

Meyrin

Prevessin

SM18

Tunnel

IT Building

ACSDB1

Linux server

STSRV1

PPC

FOUNDATION

ORATCR

Access Card information

Safety Courses information

Film Badge information

EDH

TIS /RP

Authorization Listings

Authorizationrequest

Register service

SPS

AD

SQL views

Files

Page 9: Louis Hammouti. AGENDA 1. Introduction 2.Access authorizations more restrictive in the experiments 3.Access request managed by EDH 4.Access rules 5.Authorization

L. Hammouti

Click on “check your access, enter either your cernid or your name and click on “Find” button

Check if your access card and authorization type are valid(“yes” icon must be green); that means you are allowed to get in