User Authentication
- Last UpdatedSep 05, 2024
- 1 minute read
Authentication and authorization for users
Typically, ICS software is comprised of a large number of systems, each accessed by a variety of users including engineers, operators and managers. The level of access that each type of user requires is different. So, it is necessary to manage user authentication and authorization to secure the system.
The following topics are covered in this section: