Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

InTouch HMI

Summary of Security System Tags and Functions

  • Last UpdatedJan 23, 2023
  • 1 minute read

The following table shows which security system tags and functions you can use with the different security modes:

InTouch Security

Operating System Security

ArchestrA Security

$AccessLevel

Yes

Yes

Yes

$ChangePassword

Yes

Yes

Yes

$ConfigureUsers

Yes

No

No

$InactivityTimeout

Yes

Yes

Yes

$InactivityWarning

Yes

Yes

Yes

$Operator

Yes

Yes

Yes

$OperatorDomain

No

Yes

Yes*

$OperatorDomainEntered

No

Yes

Yes*

$OperatorEntered

Yes

Yes

Yes

$OperatorName

Yes

Yes

Yes

$PasswordEntered

Yes

Yes

Yes

$VerifiedUserName

No

Yes

Yes

AddPermission()

No

Yes

No

AttemptInvisibleLogon()

Yes

Yes

Yes

ChangePassword()

Yes

No

No

EnableDisableKeys()

Yes

Yes

Yes

GetAccountStatus()

No

Yes

Yes*

InvisibleVerifyCredentials()

No

Yes

Yes*

IsAssignedRole()

No

No

Yes

Logoff()

Yes

Yes

Yes

LogonCurrentUser()

No

Yes

Yes*

PostLogonDialog()

Yes

Yes

Yes

QueryGroupMembership()

No

Yes

Yes*

* When ArchestrA security is OS user or group based

Related Links
TitleResults for “How to create a CRG?”Also Available in