Enable the source protection feature – Rockwell Automation Logix5000 Controllers Add-on Instructions Programming Manual User Manual
Page 60

Chapter 2
Defining Add-On Instructions
Instruction
Description
True
This is simply the execution of the main logic routine.
False
In a ladder logic target routine, this entails placing an XIC before an instance of the instruction and
evaluating instruction results when the XIC is false.
In a Function Block target routine, this entails executing an instance of the instruction with the
EnableIn parameter set to zero (0).
Prescan
Place the controller in Program mode, then place it in Run mode.
Postscan
With the controller configured for SFC Automatic Reset, place an instance of the instruction into the
Action of an SFC. Run the SFC such that this Action is executed and the SFC proceeds beyond the step
that is associated with this Action.
You can apply source protection to your Add-On Instruction to protect your
intellectual property or prevent unintended edits of a validated source.
With source protection you can limit a user of your Add-On Instruction to
read-only access or prevent access to the internal logic or local tags used by the
instruction. You can protect the use and modification of your instructions with a
source key file when you distribute them.
You have two options when using source protection.
• Source Protected
Users without the source key cannot view any routine or local tags, or make
any edits to the Add-On Instruction. Select this option if you want to
protect the source definition of an Add-On Instruction from the view of a
user. This may be due to the proprietary nature of the algorithms or for
strict revision control.
• Source Protected with Viewable Option
Users without the source key can view all components of the Add-On
Instruction including its logic and local tags, but are prevented from making
any edits to the instruction.
Tip:
Apply source protection before generating an instruction signature for your Add-On Instruction definition.
You will need the source key to create a signature history entry.
When source protection is enabled, you can still copy the instruction signature or signature history, if they
exist.
Enable the source protection feature
If source protection is unavailable and not listed in your menus, you can enable it
by using the RS5KSrcPtc.exe tool on your installation CD.
Defining source protection
for an Add-On Instruction
60
Rockwell Automation Publication 1756-PM010F-EN-P - October 2014