beautypg.com

Designing a dependable control system, Planning how to secure the system, Designing a dependable control system – 9 – Rockwell Automation FactoryTalk View Site Edition Users Guide User Manual

Page 67: Planning how to secure the system – 9

background image

3

P

LANNING

AN

APPLICATION

3–9

• •

3 • Pl

aceh

ol

der

HMI tag alarm requirements for the application

Organizing HMI tags

Before creating the HMI tags, plan how to organize them:

Develop naming conventions for the HMI tags. Choose names that are familiar and
logical to everyone. This makes troubleshooting easier.

Group related HMI tags in ways that make most sense for the application. For
example, group all similar devices, or group related areas of the plant floor.

To group related HMI tags, you can create folders in the Tags editor. For greater
organization, create nested folders.

Designing a dependable control system

Planning which parts of the control system to secure and which to make redundant will
help you design a more dependable, available system.

Planning how to secure the system

When planning how to secure the control system, consider:

The types of users or groups of users that require access to different areas of the plant,
or parts of the control system.

Who will have administrative privileges, for example, to set up security for the
system.

Whether and when users must log on to the system, or change their passwords.

Which HMI project components to secure, for example, to prevent accidental changes
to graphic displays, or to control who can write to certain HMI tags.

Whether to restrict access to computers in certain areas of the plant.

For more information, see Chapter 5, Setting up security.

Do not place all HMI tags in the root folder of the database. HMI tags contained in nested
folders do not contribute to the total number of tags in the root folder. It is recommended that
you limit the number of tags in any folder to less than 2000.

Planning security for groups of users is recommended, to simplify management of users with
common security needs.