Set logical name permissions

Starting from version 12.00, RSLogix 5000 supports Logical Names. You can use Logical Names to configure permissions for users and user groups to perform specific tasks in RSLogix 5000 and Studio 5000 Logix Designer software.
TIP:
We recommend that you use Permission Sets to improve the efficiency of the FactoryTalk Directory cache synchronization in Studio 5000 Logix Designer version 28.00 or later.
RSLogix 5000 is known as Studio 5000 Logix Designer starting from version 21.00.
Set permissions on the logical name to control whether a user-computer pair can:
  • See the logical name (
    Read
    )
  • Modify the properties of the logical name (
    Write
    )
  • Change the security settings of the logical name (
    Configure Security
    )
  • Delete the logical name (
    Delete
    )
  • Perform actions defined in a user action group
Prerequisites
Setting logical name permissions requires these security permissions:
  • Common > Read
  • Common > Configure Security
To set logical name permissions
  1. In
    FactoryTalk Administration Console
    Explorer
    , expand
    System > Networks and Devices
    >
    Logical Names,
    right-click the logical name, and select
    Security
    .
  2. In
    Security Settings
    , in the
    Permissions
    tab, either:
    • Set permissions by user:
      • Select
        User
        .
      • In
        Users and Computers
        , select a user and computer.
      • In
        Action
        , expand the category that contains the action to secure, and select the action.
    • Set permissions by action:
      • Select
        Action
        .
      • In
        Action
        , expand the category that contains the action to secure, and select the action. If the list of actions is blank, add users and computers first.
      • In
        Users and Computers
        , select a user and computer.
  3. Select
    Allow
    or
    Deny
    , or clear both. Clear both
    Allow
    and
    Deny
    to make
    Action Groups
    or the individual action group inherit its security settings from a resource higher in the directory tree.
  4. (optional) To control access to the selected action by another user or group, select
    Add
    , and in
    Select User and Computer,
    select the user or group, and computer or group to add, and select
    OK
    .
  5. When finished configuring security for the logical name, select
    OK
    .
Provide Feedback
Have questions or feedback about this documentation? Please submit your feedback here.
Normal