You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Next »

The Security Module provides comprehensive authentication, authorization, and access control for FrameworX solutions. This reference covers the module's configuration interfaces, runtime behavior, and integration with enterprise security systems.



Configuration Interfaces

ComponentLocationPurpose
UsersSecurity → UsersDefine local user accounts
PermissionsSecurity → PermissionsConfigure role-based access groups
PoliciesSecurity → PoliciesSet password and session requirements
RuntimeUsersSecurity → RuntimeUsersView external/dynamic users
MonitorSecurity → MonitorTrack active sessions (runtime only)

Module Components

Users

Local users defined within the solution configuration. Includes three pre-defined accounts:

  • Administrator - Full system access (set password immediately)
  • Guest - Anonymous/default access
  • User - Generic login account

→ [Security Users (Reference)] for detailed configuration

Permissions

Role-based access control groups defining what users can access in Designer and Runtime.

Pre-defined groups: Administrator, Engineering, Supervisor, Operator, Maintenance, Guest

→ [Security Permissions (Reference)] for detailed configuration

Policies

Security requirements for passwords, sessions, and electronic signatures.

Pre-defined policies: Default, Enhanced, Critical

→ [Security Policies (Reference)] for detailed configuration

RuntimeUsers

Dynamic users from external sources:

  • External SQL databases
  • Active Directory integration
  • LDAP server authentication
  • Script-created users

→ [Security RuntimeUsers (Reference)] for detailed configuration

Monitor

Real-time view of connected users and active sessions during runtime.

→ [Security Monitor (Reference)] for detailed configuration

External Authentication

Integration with enterprise authentication systems:

  • Windows Active Directory
  • LDAP servers
  • Custom authentication providers

→ [Windows AD / LDAP Server (Reference)] for detailed configuration

Runtime Behavior

Authentication Flow

  1. Check for local Engineering User
  2. If not found, check RuntimeUsers database
  3. If not found, check AD/LDAP (if configured)
  4. If no valid user, default to Guest

Permission Evaluation

Permissions are evaluated at multiple levels:

  • Solution Level - Overall access to the solution
  • Module Level - Access to specific modules (Tags, Alarms, etc.)
  • Display Level - Access to specific displays
  • Object Level - Access to individual controls/elements

Session Management

  • Automatic session timeout based on policy
  • Concurrent login restrictions
  • Session monitoring via Security → Monitor
  • Programmatic access via @Server.GetAllConnections()

Security Namespaces

Client Namespace

Runtime information about current user:

  • @Client.UserName - Current logged user
  • @Client.CurrentUser - User object with all properties
  • @Client.LogOn(username, password) - Login method
  • @Client.LogOff() - Logout method

Security Namespace

Security management methods:

  • @Security.CreateUser() - Create RuntimeUser dynamically
  • @Security.ValidateUser() - Verify credentials
  • @Security.ChangePassword() - Update user password

Configuration Storage

Solution Database

Local users, permissions, and policies are stored in the solution database (.dbsln file).

RuntimeUsers Database

External users stored in:

  • Default: SQLite database (Dataset.DB.RuntimeUsers)
  • Optional: SQL Server, PostgreSQL, or other databases
  • Encrypted storage for credentials

Security Features

Compliance Support

  • FDA 21 CFR Part 11 - Electronic signatures, audit trail, password policies
  • NERC CIP - Account monitoring, session management, audit logging
  • ISA-99/IEC 62443 - Zone security, role-based access

Advanced Features

  • Multi-factor authentication support
  • Certificate-based authentication
  • Single Sign-On (SSO) via AD
  • Encrypted credential storage
  • Session replay protection

Best Practices

Initial Setup

  1. Change default passwords immediately
  2. Configure policies before creating users
  3. Define permission groups based on roles
  4. Test authentication before deployment

Maintenance

  • Review user accounts quarterly
  • Monitor failed login attempts
  • Update passwords regularly
  • Audit permission changes
  • Document security model

Troubleshooting

IssueCheck
Cannot loginCredentials, account status, policy restrictions
Permission deniedGroup membership, module access, display security
Session timeoutPolicy settings, inactivity timer
AD authentication failsDomain configuration, network connectivity

Related Information

  • [Security Module (Concept)] - Overview and architecture
  • [Security Module (How-to Guide)] - Step-by-step configuration
  • [FDA 21 CFR 11 Compliance Design] - Regulatory compliance
  • [High Availability (Reference)] - Redundant security servers

In This Section

  • [Security Users (Reference)]
  • [Security Permissions (Reference)]
  • [Security Policies (Reference)]
  • [Security RuntimeUsers (Reference)]
  • [Security Monitor (Reference)]
  • [Windows AD / LDAP Server (Reference)]

.






  • No labels