Security module manages user authentication, authorization, and access control.
Modules → Security | Tutorial | How-to Guide | Reference
On this Page:
It manages user authentication, authorization, and access control for both engineering and runtime environments, ensuring compliance with FDA 21 CFR Part 11 and other regulatory requirements.
Table of Contents maxLevel 2 minLevel 2 indent 10px exclude Steps
style none
Permissions are set levels of access for each user that determine what they can or cannot do within the solution.
Policies manage requirements on User Identification and Session Control.
These users are created and retrieved from an external encrypted SQL database or other identification servers.
The Security Module in FactoryStudio provides a range of features to ensure comprehensive security for your projects. Key features include:
FDA 21 CFR Part 11 and NERC
Our software platform offers various security and compliance features to assist organizations in meeting the requirements of FDA 21 CFR Part 11. It's important to recognize that compliance is a continuous process. Therefore, organizations should consistently monitor and update their systems and policies to ensure alignment with the standards set by the FDA.
Built-in .NET Security
Our platform’s development relies on .NET and utilizes managed code, adhering to security guidelines. Development with .NET managed code must comply with .NET rules. Specific guidelines are tailored for different modules. For instance, Alarms adhere to FDA guidelines, while Electrical device communications adhere to IEC61850 standards, among others. Below, we'll outline the main FS-Security topics along with some basic information about each.
Group and User Permissions
Using our platform, you have total flexibility to define privileges based on groups or individual users. Permissions can be set globally or linked to specific displays, objects, or input actions.
Runtime Users
Easily create users on the fly and store their credentials in SQL databases. You can also retrieve users from Active Directory or third-party systems for integrated security and unified login.
User Policies
We offer a complete set of user management features, including identification policies, session duration control, automated logoff, e-signatures, audit trails, and more.
Hot-standby Fault-tolerant Servers
Our platform provides reliable and easily configurable redundancy for seamless failover. It automatically initializes and synchronizes the primary and secondary servers. Additionally, setting up redundant physical networks and PLC nodes for device communication channels is straightforward.
Database Redundancy
You can assign the Alarm and Historian database to a third-party external cluster, or they can be automatically replicated when running on the platform’s servers.
Project Configuration Synchronization
The engineering tools offer features that simplify configuration and updates in redundant scenarios.
Hot-swapping
Redundant or stand-alone servers enable seamless switching of project versions, ensuring uninterrupted service for connected clients while maintaining the real-time database loaded.
Redundancy at the Core Level
All modules, including Real-Time tags, Devices, Alarms, Historian, Scripts, and Clients, were built from the ground up to meet redundancy and hot-swapping requirements.
Redundancy can be set individually for each Execution Profile (Development, Testing and Production)Security Module Configuration Workflow | ||
---|---|---|
Step | Action | Description |
Define Groups | Create user groups | Set permission levels for each group |
Create Users | Add user accounts | Assign users to groups and set individual permissions |
Configure Policies | Set security rules | Define password requirements and session controls |
Setup External Auth | Configure AD/LDAP | Connect to enterprise authentication systems |
Define RuntimeUsers | Configure database | Setup encrypted SQL storage for dynamic users |
Authentication
Users authenticate through local credentials, Active Directory, LDAP, or external databases. Session policies control timeout, concurrent logins, and automatic logoff.
Permissions are evaluated at multiple levels:
All security events are logged including logins, permission changes, and critical operations for compliance tracking.
Excerpt |
---|
Security Module LinksExplanation - to understand concepts→ Modules / User Interactions / Security Module Tutorials - to learn by doing→ Tutorials / User Interactions / Security Module Tutorial How-to Guides - to accomplish specific tasks→ How-to Guides / User Interactions / Security Module How-to Guide Reference - technical details→ Technical Reference / User Interactions / Security Module Reference |
Page Tree | ||
---|---|---|
|