Configuring security, Protocol settings, Security modes – Rockwell Automation 1756-HIST2G Historian ME 2.1 User Manual
Page 167
![background image](/manuals/579093/167/background.png)
9 • M
ANAGING
S
ECURITY
157
Configuring Security
To configure FactoryTalk Historian ME Security settings, click Configure Historian
in the top navigation bar, and then click System Security in the left navigation bar.
All clients should be logged out before making any changes to the security mode.
Protocol Settings
Setting up a secure server is a very complex process and is outside the scope of this
documentation. Therefore, Rockwell highly recommends that you have an IT
administrator experienced in setting up secure servers set up secure protocols and
assist you with module security configuration. FactoryTalk Historian ME supports
the following protocols:
HTTP - Hypertext Transfer Protocol, an application-level protocol for distributed,
collaborative, hypermedia information systems.
HTTPS - secure HTTP, a combination of the HTTP and a cryptographic protocol.
If you choose HTTPS, any communication through the web interface will be
encrypted for security purposes. If you select HTTPS protocol, select Yes or No to
verify your Certificate Authority (CA) certificate issuer.
Security Modes
This section provides an overview of the security modes available for the FactoryTalk
Historian ME:
FactoryTalk Security
Native security
The users and user groups available will depend on the security mode selected. The
users and user groups created in the FactoryTalk Security mode are only available if
the FactoryTalk Security mode is selected. Similarly, the users and groups created in
the Native security mode are only available if the Native security mode is selected.
If you try to switch to the HTTPS protocol and your configuration is invalid for any
reason, the system will log you out and return to the web interface login page.
Setting up a secure server can be a complex process and set up is outside the scope
of this document. Therefore, Rockwell recommends that you work with your local IT
administrator experienced in setting up secure servers set up secure protocols to
configure security.