beautypg.com

Rockwell Automation FactoryTalk View Site Edition Users Guide User Manual

Page 95

background image

5

S

ETTING

UP

SECURITY

5–13

• •

5 • Pl

aceh

ol

der

If you prefer to set up permissions by assigning user accounts to the selected security
code, select Action.

3. Click Add, select the user or group account to add, and then click OK.

4. In the Runtime Security list, select the account you just added.

5. Select the Allow check box beside the FactoryTalk View Security Codes that you want

to explicitly allow for the selected account.

To select all of codes A to P, select the Allow check box beside All Actions, or the
check box beside the FactoryTalk View Security Codes heading.

6. Select the Deny check box beside the FactoryTalk View Security Codes that you want

to explicitly deny for the selected account.

7. Repeat steps 3 to 6, for each user or group account you want to set up with Runtime

Security.

Example – Setting up run-time access to HMI components

Only users assigned the necessary FactoryTalk View security codes can run secured
commands, open secured graphic displays, or write to secured HMI tags at run time.

In this example, three user groups are added to the Runtime Security accounts list, and
given the following security codes:

The Supervisors group is allowed security codes A through P.

The Operators group is allowed security codes B, C, and E.

The Visitors groups is allowed Security B.

Then, the following HMI project components are given security codes:

A graphic display named Overview has security code B.

A graphic display named Boiler has security code C.

If you are setting up security for a network application, you must select a computer account
with the user account, before you can click OK.

You can also deny a security code by clearing the Allow check box. If you do this, keep in
mind that an explicit Deny always takes precedence, even over an explicit Allow. This is
important if the account you are setting up security for belongs to more than one group.

For example, if John Doe belongs to one group that allows codes ABC, and to another group
that explicitly denies code B, then John Doe will only allow codes A and C. For more
information, see “Understanding inherited permissions” on page 5-33.