Security module manages user authentication, authorization, and access control.
Modules → Security | Tutorial | How-to Guide | Reference
It manages user authentication, authorization, and access control for both engineering and runtime environments, ensuring compliance with FDA 21 CFR Part 11 and other regulatory requirements.
Security Module Configuration Workflow | ||
---|---|---|
Step | Action | Description |
Define Groups | Create user groups | Set permission levels for each group |
Create Users | Add user accounts | Assign users to groups and set individual permissions |
Configure Policies | Set security rules | Define password requirements and session controls |
Setup External Auth | Configure AD/LDAP | Connect to enterprise authentication systems |
Define RuntimeUsers | Configure database | Setup encrypted SQL storage for dynamic users |
Authentication
Users authenticate through local credentials, Active Directory, LDAP, or external databases. Session policies control timeout, concurrent logins, and automatic logoff.
Permissions are evaluated at multiple levels:
All security events are logged including logins, permission changes, and critical operations for compliance tracking.
→ Modules / User Interactions / Security Module → Tutorials / User Interactions / Security Module Tutorial → How-to Guides / User Interactions / Security Module How-to Guide → Technical Reference / User Interactions / Security Module ReferenceSecurity Module Links
Explanation - to understand concepts
Tutorials - to learn by doing
How-to Guides - to accomplish specific tasks
Reference - technical details