Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Plant SCADA

Secure Your System

  • Last UpdatedJul 13, 2023
  • 1 minute read

A Plant SCADA system is protected by implementing a user-based security model. When planning a project, you need to consider who will be using the system and the areas they will need to access.

There are two ways you can manage user accounts:

  • Integrated Windows security (recommended) — Windows user accounts are used to access Plant SCADA computers. The security measures specified for the local network domain will apply.

  • Plant SCADA security — user accounts are created within the Plant SCADA project. They can be organized into groups.

In both cases, access to the Plant SCADA system is managed by assigning user accounts to "roles" defined within a project. Roles specify for a particular type of user:

  • The areas they will be able to access

  • The privileges they will have.

Roles and Plant SCADA user accounts are configured using the Security activity.

You can also Secure Runtime Computers, or run Plant SCADA as a Windows service.

See Also

Security

Roles

TitleResults for “How to create a CRG?”Also Available in