Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ InTouch HMI

Create an alarm audit trail

  • Last UpdatedJul 19, 2024
  • 1 minute read

When you configure an InTouch alarm provider to use either operating system or ArchestrA authentication and an alarm occurs, the alarm display contains the full name of the operator in the Operator Full Name column, assuming the operator is logged on.

For example, if a user is registered in the PLANT_FLOOR domain with a user ID of JohnS and a full name of John Smith, the Operator Full Name column contains John Smith. If the alarm is subsequently acknowledged, and the node performing the acknowledgement is set to use operating system or ArchestrA security, the Operator Full Name column is updated to show the full name of the acknowledgement operator. Otherwise, the alarm display shows a computer name concatenated with whatever is in the $Operator tag.

InTouch security can include an operator’s full name with alarm acknowledgements. This is also possible on records pertaining to alarm detection. In most organizations, a logon ID is not a person's full name, but rather an abbreviation or role classification.

When you configure operating system authentication for the provider and consumer InTouch nodes:

  • The alarm display shows full names when alarms are generated and when acknowledgements are performed.

  • The alarm printer prints full names when alarms are generated and when acknowledgements are performed.

  • The Alarm DB Logger records domain name, log on user ID, and full user name with each alarm record for both Operator and AckOperator fields. This allows for unique identification even if an organization has two employees with identical full names.

  • The Operator field shows the user account in the DomainName\UserName format.

TitleResults for “How to create a CRG?”Also Available in