Define Object Security
- Last UpdatedOct 28, 2025
- 2 minute read
Security Objects enable a Instrumentation Security Manager Administrator to set access rights to pre-defined 'objects' in AVEVA Instrumentation. The common access rights (Access Types) that may be applied to all objects are:
|
Full Access |
Allows a user to add, edit and delete data. |
|
Read-Only |
Allows a user to read data only and create reports. |
|
No Access |
Stops a user from viewing the object, including disabling of editing and reporting. |
The following access rights are available only for certain objects:
|
Process Data |
Controls read-write access to Process Data in AVEVA Instrumentation Datasheets. |
|
No Process Data |
Stops a user creating new Process Data. |
|
No Create |
Prevents a user from creating new instruments or loops. |
|
Full Access |
These access rights are applicable to certain objects, for example datasheets, where it may be necessary to restrict a user’s ability to import and export object data from and to Excel. |
|
Full Access |
|
|
Full Access |
|
|
Read Only |
|
|
Full Access |
Applicable to reports only. Users with this level of access have full access rights to reports except that they cannot edit the SQL queries that reports are constructed from. |
|
Read Only |
Applicable to reports and customs reports only. Users with this level of access cannot edit or delete reports but they may issue them and create revisions for them. |
Top level Security Objects are the Instrumentation Security Manager applications:
-
AVEVA Instrumentation Designer
-
AVEVA Instrumentation Engineer
-
AVEVA Instrumentation Process Engineer
-
AVEVA Instrument Wiring Manager
Within each application there are various Security Objects that define typical Instrumentation Security Manager objects such as Instruments, Cables, Loops, Datasheets, Drawings.
The following window shows the initial Objects treeview and the Application Objects:

Click on an Application Object. The application node expands to show the application's Security Objects that the Administrator can control access to:

For example, Datasheets, Datasheet Design (changing the forms in the database), Importing Datasheet Catalog.