Security module manages user authentication, authorization, and access control.
Modules → Security | Tutorial | How-to Guide | Reference
It
The Security modulemanages user authentication, authorization, and access control for both engineering and runtime environments, ensuring compliance with FDA 21 CFR Part 11 and other regulatory requirements.
→ Tutorial | Concept | How-to Guide | Reference
On this page:
Table of Contents maxLevel 2 minLevel 2
|
Security Module Configuration Workflow | ||
---|---|---|
Step | Action | Description |
Define Groups | Create user groups | Set permission levels for each group |
Create Users | Add user accounts | Assign users to groups and set individual permissions |
Configure Policies | Set security rules | Define password requirements and session controls |
Setup External Auth | Configure AD/LDAP | Connect to enterprise authentication systems |
Define RuntimeUsers | Configure database | Setup encrypted SQL storage for dynamic users |
Authentication
Users authenticate through local credentials, Active Directory, LDAP, or external databases. Session policies control timeout, concurrent logins, and automatic logoff.
Permissions are evaluated at multiple levels:
All security events are logged including logins, permission changes, and critical operations for compliance tracking.
Excerpt |
---|
Security Module LinksExplanation - to understand concepts→ Modules / User Interactions / Security Module Tutorials - to learn by doing→ Tutorials / User Interactions / Security Module Tutorial How-to Guides - to accomplish specific tasks→ How-to Guides / User Interactions / Security Module How-to Guide Reference - technical details→ Technical Reference / User Interactions / Security Module Reference |
Page Tree | |||
---|---|---|---|
|