Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Electrical

Define Object Security

  • Last UpdatedJul 25, 2025
  • 2 minute read

Security Objects enable a Electrical Security Manager Administrator to set access rights to pre-defined 'objects' in AVEVA Electrical. The common access rights (Access Types) that may be applied to all objects are:

Full Access

Allows a user to add, edit and delete data.

Read-Only

Allows a user to read data only and create reports.

No Access

Stops a user from viewing the object, including disabling of editing and reporting.

The following access rights are available only for certain objects:

Process Data

Controls read-write access to Process Data in AVEVA Electrical Datasheets.

No Process Data

Stops a user creating new Process Data.

Full Access (No Excel Import)

These access rights are applicable to certain objects, for example datasheets, where it may be necessary to restrict a user’s ability to import and export object data from and to Excel.

Full Access (No Excel Export)

Full Access (No Excel Import/Export)

Read Only (No Excel Export)

Full Access (No Edit Query)

Applicable to reports only. Users with this level of access have full access rights to reports except that they cannot edit the SQL queries that reports are constructed from.

Read Only (Allow Issue & Revs)

Applicable to reports and customs reports only. Users with this level of access cannot edit or delete reports but they may issue them and create revisions for them.

Top level Security Objects are the AVEVA Electrical applications:

  • Electrical Designer

  • Electrical Engineer

  • Electrical Wiring Manager

Within each application there are various Security Objects that define typical AVEVA Electrical objects such as Equipment, Cables, Loads, Datasheets, Drawings etc.

The following window shows the initial Objects tree-view showing the Application Objects:

Click on an Application Object. The application node expands to show the application's Security Objects that the Administrator can control access to:

For example, Datasheets, Datasheet Design (changing the forms in the database), Importing Datasheet Catalogue.

TitleResults for “How to create a CRG?”Also Available in