Security module manages user authentication, authorization, and access control.
Modules → Security | Tutorial | How-to Guide | Reference
It manages user authentication, authorization, and access control for both engineering and runtime environments, ensuring compliance with FDA 21 CFR Part 11 and other regulatory requirements.
Security Module Configuration Workflow | ||
---|---|---|
Step | Action | Description |
Define Groups | Create user groups | Set permission levels for each group |
Create Users | Add user accounts | Assign users to groups and set individual permissions |
Configure Policies | Set security rules | Define password requirements and session controls |
Setup External Auth | Configure AD/LDAP | Connect to enterprise authentication systems |
Define RuntimeUsers | Configure database | Setup encrypted SQL storage for dynamic users |
Authentication
Users authenticate through local credentials, Active Directory, LDAP, or external databases. Session policies control timeout, concurrent logins, and automatic logoff.
Permissions are evaluated at multiple levels:
All security events are logged including logins, permission changes, and critical operations for compliance tracking.
Security Module LinksExplanation - to understand concepts→ Modules / User Interactions / Security Module Tutorials - to learn by doing→ Tutorials / User Interactions / Security Module Tutorial How-to Guides - to accomplish specific tasks→ How-to Guides / User Interactions / Security Module How-to Guide Reference - technical details→ Technical Reference / User Interactions / Security Module Reference |