Secondary logins are additional login credentials that can be created to allow members of your household or loved ones to interact with all or part of your system, depending on their permissions.
These logins are perfect for allowing a child or other family member to have access to some features in the Frontpoint app and website, like viewing live video from your cameras, without having access to more sensitive information.
-
-
- Only users with the Master Control permissions can create secondary logins. These permissions can only be managed from your Myfrontpoint.com account.
-
Create a Secondary Login
1) Log in to your account on Myfrontpoint.com
2) On the home screen, click on User on the left menu.
3) Click on Manage Logins at the top.
-
- In the Email Address field, enter the new user's email address. In the Login Name field, enter the new user's desired login name.
4) Click Save.
- An email will be sent to the user on how to set up the login with instructions on how to create their password and log in.
-
- If this email is not being received, confirm the user's email address is entered correctly and have the user check their junk and spam folder.
-
Control Login Permissions
1) On the Manage Logins page, click the secondary login's name to edit their permissions
2) The different permission levels grant specific access to various website features. Select one of the permission levels- Master Control, Full Control, Read Only, Limited Device Access, or Custom:
Master Control |
___________________________________________________________________________________ |
Full Control |
___________________________________________________________________________________ |
Read Only |
___________________________________________________________________________________ |
Limited Device Access |
___________________________________________________________________________________ |
Custom |
___________________________________________________________________________________ |
3) Click Save.
Want to create additional user codes to monitor who's disarming your system? Click here.
Comments
Article is closed for comments.