beautypg.com

3 password only mode, 4 key and password mode, 4 access control operation – LINK Systems 5100-8 Tonnage & Analog Signal Monitor User Manual

Page 82: 1 run/prog key switch operation, Password only mode, Key and password mode, Access control operation, Run/prog key switch operation, 3 access control modes

background image



Doc

#:

L-802-1110 Page

80 Rev.

02

11.3 Access Control Modes

The OmniLink control has many parameters or operations where access may need to be restricted to
certain personnel. Common examples include resetting faults, changing limit settings, and bypassing
modules. The OmniLink control provides several means to limit access to these parameters or
operations. These parameters and operations are called restricted items.

The OmniLink control uses combinations of two different methods to limit access to restricted items.
These methods are the RUN/PROG key switch on the operator terminal and a user password system.
The user password system assigns names and passwords to up to sixteen users. These two methods can
be used alone or in combination with each other. When a user employs the proper method to gain
access, he will have the ability to perform the actions and/or change the parameters which have been
designated to his control.

There are four possible modes of operation for the restricted access system. They are the “Key Only”
mode, the “Key or Password” mode, the “Password Only” mode, and the “Key and Password” mode.
The control can be configured to operate in any one of these four modes.

11.3.1 Key Only Mode

The “Key Only” mode is the least complex of the four modes. This mode employs the RUN/PROG
key as the only method to limit access to restricted items. Any user with the RUN/PROG key can
access all of the restricted items. Without the RUN/PROG key, user access to all of the restricted items
is prohibited.

Although the “Key Only” mode has the advantage of being easy to use, it does have a disadvantage.
This mode cannot give a particular user access to only some of the restricted items. When operating in
this mode, any user with the RUN/PROG key will have access to all of the restricted items.

11.3.2 Key or Password Mode

The key or password mode allows for either of two methods to gain access to the restricted items. A
user with RUN/PROG key can access all of the restricted items. A user with the correct password can
access the restricted items that have been designated for that particular user only. The system allows for
passwords to be assigned to sixteen users. Each user can be assigned access to any or all of the
restricted items.

The following is an example of a “Key or Password” mode operation. The RUN/PROG key is given to
the die set-up personnel. A press operator is assigned a user name and password. With the password
the operator can reset tonnage monitor faults. This is the only tonnage monitor related item to which the
operator has access. In order to load a die, the set-up personnel uses the RUN/PROG key to recall a job
from job storage. The set-up personnel will also be able to make changes to tonnage monitor limits.
Once the set-up personnel sets the die and verifies its correct operation, the operator is left to run the die.
If a tonnage monitor fault occurs, the operator can enter the correct password and then reset the fault.
However, the operator cannot change tonnage monitor limits. This will allow the operator to keep
running the job and reset faults that occur. However, if consistent stops occur because a tonnage
monitor limit needs changing, the set-up personnel must be called to change the limit.