Rockwell Automation FactoryTalk View Site Edition Users Guide User Manual
Page 5
![background image](/manuals/581457/5/background.png)
v
C
ONTENTS
•
•
•
• •
Integrating with other applications and customizing the system ..............................3– 14
4 • Setting up the FactoryTalk Directory ............................................. 4–1
FactoryTalk Directory in a networked system ....................................................4– 1
FactoryTalk Directory in a FactoryTalk View SE application............................4– 3
Local station applications ....................................................................................4– 3
Running network applications .............................................................................4– 4
Setting up FactoryTalk Directory for local station applications..........................4– 7
What happens if the Network Directory server is unavailable....................................4– 7
Gaining initial access to a FactoryTalk system...........................................................5– 3
Logging users on to and off from FactoryTalk View SE............................................5– 4
Logging on to the FactoryTalk Directory............................................................5– 4
Logging on to FactoryTalk View Studio .............................................................5– 5
Logging on to a FactoryTalk View SE Client .....................................................5– 6
Deciding how to secure a FactoryTalk View SE application .....................................5– 8
Securing FactoryTalk View SE applications at run time ....................................5– 9
Securing FactoryTalk system resources ............................................................5– 10
Setting up FactoryTalk accounts in FactoryTalk View SE .......................................5– 11
Setting up accounts in the Runtime Security editor ..........................................5– 11
Removing All Users from the Runtime Security list.........................................5– 14
Specifying login and logout macros ..................................................................5– 15
Removing Runtime Security accounts ..............................................................5– 16
Setting up run-time security for HMI project components .......................................5– 16
Assigning security codes to commands and macros .........................................5– 16
Assigning security codes to graphic displays ....................................................5– 18
Assigning security codes to
objects ........................................................5– 18
tags..............................................................5– 19
Lock operators into the run-time environment ..................................................5– 20
Use the signature button to control user actions................................................5– 21