Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ InTouch HMI

Summary of security system tags and functions

  • Last UpdatedJun 17, 2024
  • 1 minute read

The following table shows which security system tags and functions you can use with the different security modes:

InTouch Security

Operating System

Security

ArchestrA Security

$AccessLevel

Yes

Yes

Yes

$ChangePassword

Yes

Yes

Yes

$ConfigureUsers

Yes

No

No

$InactivityTimeout

Yes

Yes

Yes

$InactivityWarning

Yes

Yes

Yes

$Operator

Yes

Yes

Yes

$OperatorDomain

No

Yes

Yes*

$OperatorDomainEntered

No

Yes

Yes*

$OperatorEntered

Yes

Yes

Yes

$OperatorName

Yes

Yes

Yes

$PasswordEntered

Yes

Yes

Yes

$VerifiedUserName

No

Yes

Yes

AddPermission()

No

Yes

No

AttemptInvisibleLogon()

Yes

Yes

Yes

AttemptInvisibleLogonEx()

Yes

Yes

Yes

ChangePassword()

Yes

No

No

EnableDisableKeys()

Yes

Yes

Yes

GetAccountStatus()

No

Yes

Yes*

InvisibleVerifyCredentials()

No

Yes

Yes*

InvisibleVerifyCredentialsEx()

No

Yes

Yes*

IsAssignedRole()

No

No

Yes

Logoff()

Yes

Yes

Yes

LogonCurrentUser()

No

Yes

Yes*

PostLogonDialog()

Yes

Yes

Yes

QueryGroupMembership()

No

Yes

Yes*

* When ArchestrA security is OS user or group based

Related Links
TitleResults for “How to create a CRG?”Also Available in