Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Instrumentation

Define Object Security

  • Last UpdatedOct 28, 2025
  • 2 minute read

Security Objects enable a Instrumentation Security Manager Administrator to set access rights to pre-defined 'objects' in AVEVA Instrumentation. The common access rights (Access Types) that may be applied to all objects are:

Full Access

Allows a user to add, edit and delete data.

Read-Only

Allows a user to read data only and create reports.

No Access

Stops a user from viewing the object, including disabling of editing and reporting.

The following access rights are available only for certain objects:

Process Data

Controls read-write access to Process Data in AVEVA Instrumentation Datasheets.

No Process Data

Stops a user creating new Process Data.

No Create

Prevents a user from creating new instruments or loops.

Full Access
(No Excel Import)

These access rights are applicable to certain objects, for example datasheets, where it may be necessary to restrict a user’s ability to import and export object data from and to Excel.

Full Access
(No Excel Export)

Full Access
(No Excel Import/Export)

Read Only
(No Excel Export)

Full Access
(No Edit Query)

Applicable to reports only. Users with this level of access have full access rights to reports except that they cannot edit the SQL queries that reports are constructed from.

Read Only
(Allow Issue & Revs)

Applicable to reports and customs reports only. Users with this level of access cannot edit or delete reports but they may issue them and create revisions for them.

Top level Security Objects are the Instrumentation Security Manager applications:

  • AVEVA Instrumentation Designer

  • AVEVA Instrumentation Engineer

  • AVEVA Instrumentation Process Engineer

  • AVEVA Instrument Wiring Manager

Within each application there are various Security Objects that define typical Instrumentation Security Manager objects such as Instruments, Cables, Loops, Datasheets, Drawings.

The following window shows the initial Objects treeview and the Application Objects:

Click on an Application Object. The application node expands to show the application's Security Objects that the Administrator can control access to:

For example, Datasheets, Datasheet Design (changing the forms in the database), Importing Datasheet Catalog.

TitleResults for “How to create a CRG?”Also Available in