Security Privileges for Users and Groups

Security options for user and groups are defined by the administrator or authorized personnel. You can apply security restrictions at the group level, the user level, or both. The following are security rules for determining whether a privilege is extended or denied to a user:

  • If a user lacks a privilege and is added to a group, the group privileges are extended to that user.
  • Least restrictive permissions take precedence. One exception is that a user and group can be denied access to an application action or a defined data point. Deny takes precedence over Allow.

Once a group or user account is defined, you define its application privileges for the group and user.

Privileges can be extended or denied to users and groups on an application-by-application basis. The Application Actions section is where you define the privileges for a User or for a Group. Each client application has its own set of actions that you have precise control over. See Users and Groups for addition information.

Granting and Denying Access

Each of the following tabs contain Allow these operations and Deny these operations sections. Click + to enter the string. During run-time, theGENESIS64 client sends an point string for access testing (granted or denied). The include and exclude lists are string-compared as described below for each active user and group until access is granted. OPC point strings are used in this example, but the same logic applies to all objects that require access:

  • Compare the OPC point string with each string in the include list until a match is found. If no match is found, access is denied.
  • If a match is found in the include list, compare the OPC point string with every string in the exclude list. If no match is found in the exclude list, access to the point is granted, and no further testing of active groups and users is performed.

About Tabs

Securing Individual Equipment Commands

The Assets tab of a Security User or Security Group setting can separately allow or disallow the use of individual commands defined on equipment in AssetWorX™. This is controlled by the Execute checkbox and the command name in the text field.

While the browse button helps with setting up the correct syntax for the text field, here are a few examples to explain the logic. The first three columns of the table correspond to settings in the Assets tab on either the User or Group setting.

The correct syntax must be set up manually.

Allow view or ack these alarms

Execute

Visualize

Description

ac:Equipment/|CmdName=MyCommand

  ☑

  ☐

The Asset Navigator just shows the command named MyCommand on ac:Equipment/

The visibility of the ac:Equipment/ must be enabled by another entry on the Asset tab of Security.

 ac:Equipment/|CmdName=MyCommand

  ☑

  ☑

The same as the previous row. The Visualize checkbox has no effect at all because the text field specifies a command

*|CmdName=MyCommand

  ☑

  ☑

Allows the MyCommand command on all Equipment.

Again, the Visualize checkbox has no effect.

 ac:Equipment/

  ☑

  ☐

As no command name is specified, this allows all commands on the equipment ac:Equipment/.

See Also:

Users and Groups

Security Overview

Displaying Current Logged-In User Information