Example: line of sight

FactoryTalk Security
allows security to differ based on machine location. Computer accounts are used to authenticate, and authorize or deny access to actions from individual computers in the
FactoryTalk
automation system. For example, use computer accounts to ensure that certain operations are performed only from computers that are located within direct view of equipment that is being controlled. This is sometimes referred to as line-of-sight security.
IMPORTANT:
Do not use
Windows
Remote Desktop
where line-of –sight security is required, because the location of the computer from which the user is operating the system cannot be established reliably. This can have unexpected results. For example, if the remote user’s computer has restricted write security, the local user could be denied access unexpectedly because the remote computer’s session persists after the remote user logged off.
To plan security for the system, start by making lists of users. Divide the users into groups, and plan what resources they need to access. Next, plan what actions users are allowed to perform on those resources, and from which computers or groups of computers. Configure security for computer accounts only in a
FactoryTalk
network directory. In a
FactoryTalk
local directory, all securable actions are confined to the local computer only.
Imagine a simple scenario in which a bakery needs to secure its application in a
FactoryTalk
Network Directory. In this example, each area of the application is secured to provide access to these users and computers:
  • The bakery's users are divisible into groups named Operators, Shift Leaders, and Supervisors.
  • There are multiple groups of operators, with each group responsible for operating its own area of the bakery (Ingredients, Mixing, Baking, and Packaging).
  • Operators perform day-to-day operations with the machinery in the bakery, and can read and write values to and from controllers in their own area. They can also read values from controllers in other areas of the bakery, but cannot modify values in those controllers.
  • Operators must be located within line of sight of the heavy machinery they are operating.
  • Shift leaders perform all of the same activities that operators do. Shift leaders can modify values in any area of the bakery, but only from computers located within line of sight of the equipment. Shift leaders can also view what is happening anywhere in the control system from any computer.
  • Supervisors are not located on the plant floor and cannot operate individual machines. They can only view what is happening anywhere in the control system.
Each group of users has different security needs:
Who
Needs access to these resources
For what actions
From where
Operators Ingredients
Ingredients
Read & Write
Computers within line of sight of equipment
Mixing, Baking, Packaging
Read
Any computer
Operators Mixing
Ingredients, Baking, Packaging
Read
Any computer
Mixing
Read & Write
Computers within line of sight of equipment
Operators Baking
Ingredients, Mixing, Packaging
Read
Any computer
Baking
Read & Write
Computers within line of sight of equipment
Operators Packaging
Ingredients, Mixing, Baking
Read
Any computer
Packaging
Read & Write
Computers within line of sight of equipment
Shift Leaders
All
Read & Write
Computers within line of sight of equipment
All
Read
Any computer
Supervisors
All
Read
Any computer
In this example, you would create the following user groups:
User group
Members
Operators
All user accounts for all operators
Operators Ingredients
User accounts for operators in Ingredients area
Operators Mixing
User accounts for operators in Mixing area
Operators Baking
User accounts for operators in Baking area
Operators Packaging
User accounts for operators in Packaging area
Shift Leaders
User accounts for all shift leaders
Supervisors
User accounts for all supervisors
Next, create computer groups and then populate the groups with individual computer accounts. For example, the computer group "Operators Mixing" should contain only the computer accounts that belong to that area.
Finally, secure each resource. For each resource that needs to be secured, right-click the resource (for example, each area), and then select
Security
to view
Security Settings
for the resource. To allow actions for a particular group of users and computers, select the group of users and computers, and then assign
Allow
permissions to the corresponding actions. Assign
Read
permissions before assigning
Write
permissions.
Permissions examples:
  • In the
    Ingredients
    area, allow
    Read
    access to Operators Ingredients, Mixing, Baking, and Packaging, Shift Leaders, and Supervisors from All Computers.
  • In the
    Ingredients
    area, allow
    Write
    access to Operators Ingredients and Shift Leaders, only from the group of computers located within line of sight of the Ingredients area.
  • In the
    Mixing
    area, allow
    Read
    access to Operators Ingredients, Mixing, Baking, and Packaging, Shift Leaders, and Supervisors from All Computers.
  • In the
    Mixing
    area, allow
    Write
    access to Operators Mixing and Shift Leaders, only from the group of computers located within line of sight of the Ingredients area.
Provide Feedback
Have questions or feedback about this documentation? Please submit your feedback here.
Normal